Skip to main content

IAO-03.2: Adequate Security for Sensitive / Regulated Data In Support of Contracts

IAO 7 — High Protect

Mechanisms exist to protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract.

Control Question: Does the organization protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract?

General (13)
Framework Mapping Values
CIS CSC 8.1 15.4
CIS CSC 8.1 IG2 15.4
CIS CSC 8.1 IG3 15.4
CSA CCM 4 DSP-17 IPY-04 STA-04 STA-09
CSA IoT SCF 2 CLS-04
NIST AI 600-1 GV-6.1-004
NIST Privacy Framework 1.0 ID.DE-P3
NIST 800-37 R2 P-17
NIST 800-171 R2 (source) 3.12.4
NIST CSF 2.0 (source) GV.SC-05
SCF CORE ESP Level 1 Foundational IAO-03.2
SCF CORE ESP Level 2 Critical Infrastructure IAO-03.2
SCF CORE ESP Level 3 Advanced Threats IAO-03.2
US (10)
Framework Mapping Values
US CJIS Security Policy 5.9.3 (source) 5.1.1.2 5.1.1.3 5.1.1.4 5.1.1.5 5.1.1.6 5.1.1.7 5.1.1.8
US CMMC 2.0 Level 2 (source) CA.L2-3.12.4
US CMMC 2.0 Level 3 (source) CA.L2-3.12.4
US DFARS Cybersecurity 252.204-70xx 252.204-7012
US HIPAA Administrative Simplification 2013 (source) 164.308(b)(3)
US HIPAA Security Rule / NIST SP 800-66 R2 (source) 164.308(b)(3)
US IRS 1075 2.C.9
US SSA EIESR 8.0 5.11
US - CO Colorado Privacy Act 6-1-1305(3)(b) 6-1-1305(5) 6-1-1305(5)(a) 6-1-1305(5)(b) 6-1-1305(5)(c) 6-1-1305(5)(d) 6-1-1305(5)(d)(I) 6-1-1305(5)(d)(I)(A) 6-1-1305(5)(d)(I)(B) 6-1-1305(6)
US - IL PIPA 45(a) 45(b) 45(c) 45(d) 50
EMEA (4)
Framework Mapping Values
EMEA Germany C5 2020 HR-06 PI-02
EMEA Israel CDMO 1.0 16.5
EMEA Saudi Arabia SACS-002 TPC-25
EMEA Serbia 87/2018 5 11
APAC (5)
Framework Mapping Values
APAC Australia ISM June 2024 ISM-0072 ISM-1451 ISM-1571 ISM-1572 ISM-1573 ISM-1574 ISM-1575
APAC Japan APPI 22
APAC New Zealand NZISM 3.6 2.2.5.C.02
APAC New Zealand Privacy Act of 2020 Principle 5 P5-(a) P5-(a)(i) P5-(a)(ii) P5-(a)(iii) P5-(b)
APAC Singapore MAS TRM 2021 5.4.3
Americas (1)
Framework Mapping Values
Americas Canada CSAG 4.26 4.28

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract.

Level 2 — Planned & Tracked

Information Assurance (IA) is requirements-driven and governed at a local/regional level, but not consistently across the enterprise. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Pre-production security testing is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for pre-production cybersecurity and data privacy control testing.
  • IT personnel implement and maintain an established a limited Information Assurance Program (IAP) capability to conduct limited control testing to meet specific statutory, regulatory and/ or contractual requirements for pre-production cybersecurity and data privacy control testing.
  • IAP operations focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
  • Administrative processes and technologies exist to protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract.
Level 3 — Well Defined

Information Assurance (IA) is standardized across the enterprise and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Cybersecurity personnel implement and maintain an established Information Assurance Program (IAP) capability to conduct “business as usual” pre-production cybersecurity and data privacy control testing focused on the concept of “security and data privacy be design and by default.”
  • The IAP validates that systems/applications/services/processes are both secure and compliant.
  • A Governance, Risk & Compliance (GRC) function, or similar function, facilitates the implementation of cybersecurity and data protection controls to ensure that secure engineering practices are designed and implemented throughout the lifecycle of systems, applications and services both internal and external to the organization.
  • A Project Management Office (PMO), or project management function, ensures project involvement for IAP as part of the organization's established project management processes.
  • A Plan of Action and Milestones (POA&M) or similar mechanism, exists to document planned remediation actions to correct weaknesses or deficiencies noted during the assessment of the security controls, helping to reduce or eliminate known vulnerabilities.
  • Administrative processes prevent systems/applications/services/processes from “going live” in a production environment without first going through the IAP process.
  • The IAP uses a tiered approach to conformity testing, based on (1) the sensitivity of data that is stored, processed and/ or transmitted and (2) the criticality of the system/application/service/process.
  • Administrative processes and technologies exist to protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract.
Level 4 — Quantitatively Controlled

Information Assurance (IA) is metrics driven and provides sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in the review process for proposed changes.
Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to protect sensitive/regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract.

Assessment Objectives

  1. IAO-03.2_A01 sensitive / regulated data that is collected, developed, received, transmitted, used or stored in support of the performance of a contract is protected.

Evidence Requirements

E-IAO-03 Pre-Production Controls Testing

Documented evidence of pre-production cybersecurity & data protection controls testing to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements.

Information Assurance

Technology Recommendations

Micro/Small

  • Cybersecurity Supply Chain Risk Management (C-SCRM) program
  • Contract flow-down requirements

Small

  • Cybersecurity Supply Chain Risk Management (C-SCRM) program
  • Contract flow-down requirements

Medium

  • Cybersecurity Supply Chain Risk Management (C-SCRM) program
  • Contract flow-down requirements

Large

  • Cybersecurity Supply Chain Risk Management (C-SCRM) program
  • Contract flow-down requirements

Enterprise

  • Cybersecurity Supply Chain Risk Management (C-SCRM) program
  • Contract flow-down requirements

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.