Skip to main content

SAT-03.8: Continuing Professional Education (CPE) - DevOps Personnel

SAT 8 — High Identify

Mechanisms exist to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Control Question: Does the organization ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats?

General (7)
APAC (1)
Framework Mapping Values
APAC Australia ISM June 2024 ISM-1780

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Level 2 — Planned & Tracked

C|P-CMM2 is N/A, since a well-defined process is required to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Level 3 — Well Defined

Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data with regards to security awareness and training. o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles. o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations. o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations. o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training. o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements. o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.

  • A Governance, Risk & Compliance (GRC) function, or similar function:
  • A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including security awareness and training.
  • Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
  • The Human Resources (HR) department:
  • Cybersecurity and/ or data privacy personnel receive necessary Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices pertinent to their assigned roles and responsibilities.
  • Application development and operations (DevOps) personnel receive CPE training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Assessment Objectives

  1. SAT-03.8_A01 application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats.

Technology Recommendations

Medium

  • Minimum requirements for Continuing Professional Education (CPE)

Large

  • Minimum requirements for Continuing Professional Education (CPE)

Enterprise

  • Minimum requirements for Continuing Professional Education (CPE)

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.