OPS-01: Operations Security
Mechanisms exist to facilitate the implementation of operational security controls.
Control Question: Does the organization facilitate the implementation of operational security controls?
General (37)
| Framework | Mapping Values |
|---|---|
| AICPA TSC 2017:2022 (used for SOC 2) (source) | CC2.2 |
| BSI Standard 200-1 | 8 8.1 |
| COSO 2017 | Principle 14 |
| CSA CCM 4 | IVS-08 |
| CSA IoT SCF 2 | IAM-16 |
| ENISA 2.0 | SO13 |
| ISO 22301 2019 | 8.1 8.4.2.1 8.4.2.2 8.4.2.3 8.4.2.4 |
| ISO 27001 2022 (source) | 8.1 |
| ISO 27002 2022 | 5.37 |
| ISO 27017 2015 | 7.2.2 12.1.1 CLD.12.1.5 |
| ISO 42001 2023 | 7.5.3 7.5.3(a) 7.5.3(b) |
| MITRE ATT&CK 10 | T1005, T1025 |
| MPA Content Security Program 5.1 | TS-1.5 |
| NIST AI 100-1 (AI RMF) 1.0 | GOVERN 1.2 GOVERN 1.3 GOVERN 1.4 GOVERN 3.2 GOVERN 4.1 GOVERN 5.1 GOVERN 6.0 GOVERN 6.1 MAP 3.5 |
| NIST 800-53 R4 | SC-38 |
| NIST 800-53 R5 (source) | SC-38 SR-7 |
| NIST 800-53 R5 (NOC) (source) | SC-38 SR-7 |
| NIST 800-160 | 3.4.12 |
| NIST 800-161 R1 | SC-38 SR-7 |
| NIST 800-161 R1 Level 2 | SC-38 SR-7 |
| NIST 800-161 R1 Level 3 | SC-38 SR-7 |
| NIST 800-171 R3 (source) | 03.15.01.a 03.15.01.b |
| NIST CSF 2.0 (source) | ID.IM |
| PCI DSS 4.0.1 (source) | 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 9.3.2 10.1.1 11.1.1 |
| PCI DSS 4.0.1 SAQ A (source) | 3.1.1 |
| PCI DSS 4.0.1 SAQ A-EP (source) | 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 8.1.1 8.3.8 |
| PCI DSS 4.0.1 SAQ B (source) | 3.1.1 |
| PCI DSS 4.0.1 SAQ B-IP (source) | 3.1.1 8.1.1 9.1.1 |
| PCI DSS 4.0.1 SAQ C (source) | 2.1.1 3.1.1 5.1.1 8.1.1 8.3.8 9.1.1 10.1.1 |
| PCI DSS 4.0.1 SAQ C-VT (source) | 2.1.1 3.1.1 8.1.1 9.1.1 |
| PCI DSS 4.0.1 SAQ D Merchant (source) | 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 9.3.2 10.1.1 11.1.1 |
| PCI DSS 4.0.1 SAQ D Service Provider (source) | 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 9.3.2 10.1.1 11.1.1 |
| PCI DSS 4.0.1 SAQ P2PE (source) | 3.1.1 9.1.1 |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | OPS-01 |
| SCF CORE ESP Level 1 Foundational | OPS-01 |
| SCF CORE ESP Level 2 Critical Infrastructure | OPS-01 |
| SCF CORE ESP Level 3 Advanced Threats | OPS-01 |
US (8)
| Framework | Mapping Values |
|---|---|
| US CERT RMM 1.2 | ADM:SG1.SP1 EC:SG3.SP2 KIM:SG1.SP1 OPD:SG1.SP4 OPF:SG3.SP1 RISK:SG4.SP1 VAR:SG2.SP3 |
| US DFARS Cybersecurity 252.204-70xx | 252.204-7008 252.204-7012 |
| US DHS ZTCF | SEC-03 |
| US FDA 21 CFR Part 11 | 11.10 11.10(f) |
| US GLBA CFR 314 2023 (source) | 314.4(c)(7) |
| US HIPAA HICP Medium Practice | 8.M.A |
| US HIPAA HICP Large Practice | 8.M.A 8.L.A |
| US TSA / DHS 1580/82-2022-01 | III.B.2 III.B.2.a III.B.2.b |
EMEA (7)
| Framework | Mapping Values |
|---|---|
| EMEA EU DORA | 9.1 9.2 |
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Germany C5 2020 | SP-01 |
| EMEA South Africa | 19 |
| EMEA Spain BOE-A-2022-7191 | 8.1 8.2 8.3 8.4 8.5 |
| EMEA Spain 311/2022 | 8.1 8.2 8.3 8.4 8.5 |
APAC (3)
| Framework | Mapping Values |
|---|---|
| APAC China Privacy Law | 51 51(1) 51(2) 51(3) 51(4) 51(5) 51(6) |
| APAC Japan ISMAP | 4.5.4 4.5.4.1 4.5.4.2 4.5.4.3 4.5.4.4 4.5.4.5 7.2.2.19.PB 12.1.1 12.1.5.P |
| APAC Singapore MAS TRM 2021 | 7.1.1 |
Americas (3)
| Framework | Mapping Values |
|---|---|
| Americas Canada CSAG | 1.3 1.5 |
| Americas Canada OSFI B-13 | 3 |
| Americas Canada ITSP-10-171 | 03.15.01.A 03.15.01.B |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to facilitate the implementation of operational security controls.
Level 1 — Performed Informally
Security Operations (OPS) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Cybersecurity operations are decentralized.
- The responsibility for developing and operating cybersecurity and data privacy procedures are up to the business process owner(s) to determine, including the definition and enforcement of roles and responsibilities.
Level 2 — Planned & Tracked
Security operations (OPS) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls to address applicable statutory, regulatory and contractual requirements for security operations.
- Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
- Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form.
Level 3 — Well Defined
Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for cybersecurity operations practices.
- The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for cybersecurity operations.
- A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data with regards to cybersecurity operations.
- A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including cybersecurity operations.
- A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
- Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
- Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective.
Level 4 — Quantitatively Controlled
Security Operations (OPS) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to facilitate the implementation of operational security controls.
Assessment Objectives
- OPS-01_A01 operations security controls to be employed to protect key organizational information throughout the system development life cycle are defined.
- OPS-01_A02 operations security controls are employed to protect key organizational information throughout the system development life cycle.
- OPS-01_A03 security operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
- OPS-01_A04 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support security operations.
- OPS-01_A05 responsibility and authority for the performance of security operations-related activities are assigned to designated personnel.
- OPS-01_A06 personnel performing security operations-related activities have the skills and knowledge needed to perform their assigned duties.
Evidence Requirements
- E-HRS-01 Position Categorization
-
Documented evidence of a discrete roles for cybersecurity & data privacy functions (e.g., position categorization).
Human Resources - E-HRS-03 Assigned Roles - Cybersecurity Staff
-
List of employed or contract personnel assigned to cybersecurity roles.
Human Resources - E-HRS-04 Assigned Roles - Data Privacy Staff
-
List of employed or contract personnel assigned to data privacy roles.
Human Resources - E-HRS-13 Defined Cybersecurity & Data Privacy Responsibilities
-
Documented evidence of a role-based cybersecurity & data privacy responsibilities to ensure personnel are both educated on the role and are responsible for the associated control execution.
Human Resources - E-HRS-15 Organization Chart
-
Current and accurate organization chart that depicts logical staff hierarchies.
Human Resources - E-HRS-27 Personnel Sanctions
-
Documented evidence of personnel management practices to formally sanction unacceptable behavior(s).
Human Resources
Technology Recommendations
Micro/Small
- Documented Standardized Operating Procedures (SOP)
Small
- Documented Standardized Operating Procedures (SOP)
Medium
- Documented Standardized Operating Procedures (SOP)
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
Large
- Documented Standardized Operating Procedures (SOP)
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
- COBIT 2019 Framework (https://isaca.org)
Enterprise
- Documented Standardized Operating Procedures (SOP)
- VisibleOps (https://itpi.org)
- ITIL 4 (https://axelos.com)
- COBIT 2019 Framework (https://isaca.org)