Skip to main content

OPS-01: Operations Security

OPS 8 — High Govern

Mechanisms exist to facilitate the implementation of operational security controls.

Control Question: Does the organization facilitate the implementation of operational security controls?

General (37)
Framework Mapping Values
AICPA TSC 2017:2022 (used for SOC 2) (source) CC2.2
BSI Standard 200-1 8 8.1
COSO 2017 Principle 14
CSA CCM 4 IVS-08
CSA IoT SCF 2 IAM-16
ENISA 2.0 SO13
ISO 22301 2019 8.1 8.4.2.1 8.4.2.2 8.4.2.3 8.4.2.4
ISO 27001 2022 (source) 8.1
ISO 27002 2022 5.37
ISO 27017 2015 7.2.2 12.1.1 CLD.12.1.5
ISO 42001 2023 7.5.3 7.5.3(a) 7.5.3(b)
MITRE ATT&CK 10 T1005, T1025
MPA Content Security Program 5.1 TS-1.5
NIST AI 100-1 (AI RMF) 1.0 GOVERN 1.2 GOVERN 1.3 GOVERN 1.4 GOVERN 3.2 GOVERN 4.1 GOVERN 5.1 GOVERN 6.0 GOVERN 6.1 MAP 3.5
NIST 800-53 R4 SC-38
NIST 800-53 R5 (source) SC-38 SR-7
NIST 800-53 R5 (NOC) (source) SC-38 SR-7
NIST 800-160 3.4.12
NIST 800-161 R1 SC-38 SR-7
NIST 800-161 R1 Level 2 SC-38 SR-7
NIST 800-161 R1 Level 3 SC-38 SR-7
NIST 800-171 R3 (source) 03.15.01.a 03.15.01.b
NIST CSF 2.0 (source) ID.IM
PCI DSS 4.0.1 (source) 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 9.3.2 10.1.1 11.1.1
PCI DSS 4.0.1 SAQ A (source) 3.1.1
PCI DSS 4.0.1 SAQ A-EP (source) 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 8.1.1 8.3.8
PCI DSS 4.0.1 SAQ B (source) 3.1.1
PCI DSS 4.0.1 SAQ B-IP (source) 3.1.1 8.1.1 9.1.1
PCI DSS 4.0.1 SAQ C (source) 2.1.1 3.1.1 5.1.1 8.1.1 8.3.8 9.1.1 10.1.1
PCI DSS 4.0.1 SAQ C-VT (source) 2.1.1 3.1.1 8.1.1 9.1.1
PCI DSS 4.0.1 SAQ D Merchant (source) 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 9.3.2 10.1.1 11.1.1
PCI DSS 4.0.1 SAQ D Service Provider (source) 1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 9.3.2 10.1.1 11.1.1
PCI DSS 4.0.1 SAQ P2PE (source) 3.1.1 9.1.1
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) OPS-01
SCF CORE ESP Level 1 Foundational OPS-01
SCF CORE ESP Level 2 Critical Infrastructure OPS-01
SCF CORE ESP Level 3 Advanced Threats OPS-01
US (8)
Framework Mapping Values
US CERT RMM 1.2 ADM:SG1.SP1 EC:SG3.SP2 KIM:SG1.SP1 OPD:SG1.SP4 OPF:SG3.SP1 RISK:SG4.SP1 VAR:SG2.SP3
US DFARS Cybersecurity 252.204-70xx 252.204-7008 252.204-7012
US DHS ZTCF SEC-03
US FDA 21 CFR Part 11 11.10 11.10(f)
US GLBA CFR 314 2023 (source) 314.4(c)(7)
US HIPAA HICP Medium Practice 8.M.A
US HIPAA HICP Large Practice 8.M.A 8.L.A
US TSA / DHS 1580/82-2022-01 III.B.2 III.B.2.a III.B.2.b
EMEA (7)
Framework Mapping Values
EMEA EU DORA 9.1 9.2
EMEA Austria Sec 14 Sec 15
EMEA Belgium 16
EMEA Germany C5 2020 SP-01
EMEA South Africa 19
EMEA Spain BOE-A-2022-7191 8.1 8.2 8.3 8.4 8.5
EMEA Spain 311/2022 8.1 8.2 8.3 8.4 8.5
APAC (3)
Framework Mapping Values
APAC China Privacy Law 51 51(1) 51(2) 51(3) 51(4) 51(5) 51(6)
APAC Japan ISMAP 4.5.4 4.5.4.1 4.5.4.2 4.5.4.3 4.5.4.4 4.5.4.5 7.2.2.19.PB 12.1.1 12.1.5.P
APAC Singapore MAS TRM 2021 7.1.1
Americas (3)
Framework Mapping Values
Americas Canada CSAG 1.3 1.5
Americas Canada OSFI B-13 3
Americas Canada ITSP-10-171 03.15.01.A 03.15.01.B

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to facilitate the implementation of operational security controls.

Level 1 — Performed Informally

Security Operations (OPS) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Cybersecurity operations are decentralized.
  • The responsibility for developing and operating cybersecurity and data privacy procedures are up to the business process owner(s) to determine, including the definition and enforcement of roles and responsibilities.
Level 2 — Planned & Tracked

Security operations (OPS) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls to address applicable statutory, regulatory and contractual requirements for security operations.
  • Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
  • Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form.
Level 3 — Well Defined

Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for cybersecurity operations practices.
  • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for cybersecurity operations.
  • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data with regards to cybersecurity operations.
  • A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including cybersecurity operations.
  • A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
  • Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
  • Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective.
Level 4 — Quantitatively Controlled

Security Operations (OPS) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to facilitate the implementation of operational security controls.

Assessment Objectives

  1. OPS-01_A01 operations security controls to be employed to protect key organizational information throughout the system development life cycle are defined.
  2. OPS-01_A02 operations security controls are employed to protect key organizational information throughout the system development life cycle.
  3. OPS-01_A03 security operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
  4. OPS-01_A04 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support security operations.
  5. OPS-01_A05 responsibility and authority for the performance of security operations-related activities are assigned to designated personnel.
  6. OPS-01_A06 personnel performing security operations-related activities have the skills and knowledge needed to perform their assigned duties.

Evidence Requirements

E-HRS-01 Position Categorization

Documented evidence of a discrete roles for cybersecurity & data privacy functions (e.g., position categorization).

Human Resources
E-HRS-03 Assigned Roles - Cybersecurity Staff

List of employed or contract personnel assigned to cybersecurity roles.

Human Resources
E-HRS-04 Assigned Roles - Data Privacy Staff

List of employed or contract personnel assigned to data privacy roles.

Human Resources
E-HRS-13 Defined Cybersecurity & Data Privacy Responsibilities

Documented evidence of a role-based cybersecurity & data privacy responsibilities to ensure personnel are both educated on the role and are responsible for the associated control execution.

Human Resources
E-HRS-15 Organization Chart

Current and accurate organization chart that depicts logical staff hierarchies.

Human Resources
E-HRS-27 Personnel Sanctions

Documented evidence of personnel management practices to formally sanction unacceptable behavior(s).

Human Resources

Technology Recommendations

Micro/Small

  • Documented Standardized Operating Procedures (SOP)

Small

  • Documented Standardized Operating Procedures (SOP)

Medium

  • Documented Standardized Operating Procedures (SOP)
  • VisibleOps (https://itpi.org)
  • ITIL 4 (https://axelos.com)

Large

  • Documented Standardized Operating Procedures (SOP)
  • VisibleOps (https://itpi.org)
  • ITIL 4 (https://axelos.com)
  • COBIT 2019 Framework (https://isaca.org)

Enterprise

  • Documented Standardized Operating Procedures (SOP)
  • VisibleOps (https://itpi.org)
  • ITIL 4 (https://axelos.com)
  • COBIT 2019 Framework (https://isaca.org)

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.