SAT-03.8: Continuing Professional Education (CPE) - DevOps Personnel
Mechanisms exist to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Control Question: Does the organization ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats?
General (7)
| Framework | Mapping Values |
|---|---|
| AICPA TSC 2017:2022 (used for SOC 2) (source) | CC1.4-POF7 |
| CIS CSC 8.1 | 14.9 |
| PCI DSS 4.0.1 (source) | 6.2.2 |
| PCI DSS 4.0.1 SAQ A-EP (source) | 6.2.2 |
| PCI DSS 4.0.1 SAQ C (source) | 6.2.2 |
| PCI DSS 4.0.1 SAQ D Merchant (source) | 6.2.2 |
| PCI DSS 4.0.1 SAQ D Service Provider (source) | 6.2.2 |
APAC (1)
| Framework | Mapping Values |
|---|---|
| APAC Australia ISM June 2024 | ISM-1780 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Level 1 — Performed Informally
C|P-CMM1 is N/A, since a structured process is required to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Level 2 — Planned & Tracked
C|P-CMM2 is N/A, since a well-defined process is required to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Level 3 — Well Defined
Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data with regards to security awareness and training. o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles. o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations. o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations. o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training. o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements. o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.
- A Governance, Risk & Compliance (GRC) function, or similar function:
- A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including security awareness and training.
- Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
- The Human Resources (HR) department:
- Cybersecurity and/ or data privacy personnel receive necessary Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices pertinent to their assigned roles and responsibilities.
- Application development and operations (DevOps) personnel receive CPE training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Level 4 — Quantitatively Controlled
See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Assessment Objectives
- SAT-03.8_A01 application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Technology Recommendations
Medium
- Minimum requirements for Continuing Professional Education (CPE)
Large
- Minimum requirements for Continuing Professional Education (CPE)
Enterprise
- Minimum requirements for Continuing Professional Education (CPE)