IAO-02: Assessments
Mechanisms exist to formally assess the cybersecurity and data protection controls in Technology Assets, Applications and/or Services (TAAS) through Information Assurance Program (IAP) activities to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements.
Control Question: Does the organization formally assess the cybersecurity and data protection controls in Technology Assets, Applications and/or Services (TAAS) through Information Assurance Program (IAP) activities to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements?
General (44)
US (27)
EMEA (8)
| Framework | Mapping Values |
|---|---|
| EMEA EU AI Act | 9.8 |
| EMEA EU EBA GL/2019/04 | 3.4.6(41) 3.4.6(42) 3.4.6(43) 3.4.6(43)(a) 3.4.6(43)(b) 3.4.6(44) 3.4.6(45) 3.4.6(46) 3.4.6(47) 3.4.6(48) 3.6.2(70) 3.6.2(71) |
| EMEA EU NIS2 Annex | 6.5.2(a) 6.5.2(b) |
| EMEA Germany Banking Supervisory Requirements for IT (BAIT) | 7.11 |
| EMEA Israel CDMO 1.0 | 10.6 16.5 17.2 17.16 17.18 |
| EMEA Qatar PDPPL | 11.1 11.2 |
| EMEA Saudi Arabia IoT CGIoT-1 2024 | 2-15-2 4-1-5 4-2-3 4-2-4 |
| EMEA UK DEFSTAN 05-138 | 1205 |
APAC (8)
| Framework | Mapping Values |
|---|---|
| APAC Australia ISM June 2024 | ISM-0100 |
| APAC China Cybersecurity Law | 35 |
| APAC India SEBI CSCRF | PR.AA.S16 |
| APAC Japan ISMAP | 14.2.8 |
| APAC New Zealand HISF 2022 | HHSP68 HML67 HSUP59 |
| APAC New Zealand HISF Suppliers 2023 | HSUP59 |
| APAC New Zealand NZISM 3.6 | 4.2.10.C.01 4.3.20.C.01 4.3.20.C.02 4.3.20.C.03 6.3.8.C.01 |
| APAC Singapore MAS TRM 2021 | 5.7.1 5.7.2 |
Americas (3)
| Framework | Mapping Values |
|---|---|
| Americas Bermuda BMACCC | 5.14 |
| Americas Canada OSFI B-13 | 2.4.4 |
| Americas Canada ITSP-10-171 | 03.12.01 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to formally assess the cybersecurity and data protection controls in Technology Assets, Applications and/or Services (TAAS) through Information Assurance Program (IAP) activities to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements.
Level 1 — Performed Informally
Information Assurance (IA) is ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Pre-production security testing is decentralized.
- IT personnel implement and maintain an informal process to conduct limited control testing of High Value Assets (HVAs) to meet specific statutory, regulatory and/ or contractual requirements for pre-production cybersecurity and data protection control testing.
Level 2 — Planned & Tracked
Information Assurance (IA) is requirements-driven and governed at a local/regional level, but not consistently across the enterprise. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Pre-production security testing is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for pre-production cybersecurity and data protection control testing.
- IT personnel implement and maintain an established a limited Information Assurance Program (IAP) capability to conduct limited control testing to meet specific statutory, regulatory and/ or contractual requirements for pre-production cybersecurity and data protection control testing.
- IAP operations focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Level 3 — Well Defined
Information Assurance (IA) is standardized across the enterprise and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Cybersecurity personnel implement and maintain an established Information Assurance Program (IAP) capability to conduct “business as usual” pre-production cybersecurity and data protection control testing focused on the concept of “security and data protection be design and by default.”
- The IAP validates that systems/applications/services/processes are both secure and compliant.
- A Governance, Risk & Compliance (GRC) function, or similar function, facilitates the implementation of cybersecurity and data protection controls to ensure that secure engineering practices are designed and implemented throughout the lifecycle of Technology Assets, Applications and/or Services (TAAS) both internal and external to the organization.
- A Project Management Office (PMO), or project management function, ensures project involvement for IAP as part of the organization's established project management processes.
- A Plan of Action and Milestones (POA&M) or similar mechanism, exists to document planned remediation actions to correct weaknesses or deficiencies noted during the assessment of the security controls, helping to reduce or eliminate known vulnerabilities.
- Administrative processes prevent systems/applications/services/processes from “going live” in a production environment without first going through the IAP process.
- The IAP uses a tiered approach to conformity testing, based on (1) the sensitivity of data that is stored, processed and/ or transmitted and (2) the criticality of the system/application/service/process.
Level 4 — Quantitatively Controlled
Information Assurance (IA) is metrics driven and provides sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in the review process for proposed changes.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to formally assess the cybersecurity and data protection controls in Technology Assets, Applications and/or Services (TAAS) through Information Assurance Program (IAP) activities to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements.
Assessment Objectives
- IAO-02_A01 the frequency at which to assess controls in the system and its environment of operation is defined.
- IAO-02_A02 individuals or roles to whom control assessment results are to be provided are defined.
- IAO-02_A03 an appropriate assessor or assessment team is selected for the type of assessment to be conducted.
- IAO-02_A04 a control assessment plan is developed that describes the scope of the assessment, including controls and control enhancements under assessment.
- IAO-02_A05 a control assessment plan is developed that describes the scope of the assessment, including assessment procedures to be used to determine control effectiveness.
- IAO-02_A06 a control assessment plan is developed that describes the scope of the assessment, including the assessment environment.
- IAO-02_A07 a control assessment plan is developed that describes the scope of the assessment, including the assessment team.
- IAO-02_A08 a control assessment plan is developed that describes the scope of the assessment, including assessment roles and responsibilities.
- IAO-02_A09 the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment.
- IAO-02_A10 security critical or essential software, firmware and hardware components for which to verify correctness are defined.
- IAO-02_A11 verification methods or techniques are defined.
- IAO-02_A12 the correctness of security critical or essential software, firmware and hardware components is verified using verification methods or techniques.
- IAO-02_A13 controls are assessed in the system and its environment of operation per an assessment frequency to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting established security requirements.
- IAO-02_A14 controls are assessed in the system and its environment of operation per an assessment frequency to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting established privacy requirements.
- IAO-02_A15 a control assessment report is produced that documents the results of the assessment.
- IAO-02_A16 the results of the control assessment are provided to individuals or roles.
Evidence Requirements
- E-IAO-03 Pre-Production Controls Testing
-
Documented evidence of pre-production cybersecurity & data protection controls testing to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements.
Information Assurance
Technology Recommendations
Micro/Small
- Controls Validation Testing (CVT)
Small
- Controls Validation Testing (CVT)
Medium
- Controls Validation Testing (CVT)
- Information Assurance (IA) program
- VisibleOps security management
Large
- Controls Validation Testing (CVT)
- Information Assurance (IA) program
- VisibleOps security management
Enterprise
- Controls Validation Testing (CVT)
- Information Assurance (IA) program
- VisibleOps security management