Home
Browse frameworks
Contact us
SAMMY premium
Sign in
SAMMY UI is optimized for resolutions with a width 1024px and higher.
Secure Controls Framework
Browse Secure Controls...
AIMA
ASVS
BSIMM 15
CIS Critical Security Controls
Cloud Controls Matrix
Cybersecurity Fundamentals
Cybersecurity Fundamentals 2.0
DSOMM
NIS2
NIST 800-171 Rev 2
NIST 800-171 Rev 3
NIST 800-34
NIST 800-53 v5
NIST CSF 2.0
NIST SSDF
OpenSAMM1.5
SAMM
Secure Controls Framework
Cybersecurity and Data Privacy Governance
Cybersecurity and Data Protection Governance Program
Steering Committee and Program Oversight
Status Reporting To Governing Body
Publishing Cybersecurity and Data Protection Documentation
Exception Management
Periodic Review and Update of Cybersecurity and Data Protection Program
Assigned Cybersecurity and Data Protection Responsibilities
Stakeholder Accountability Structure
Authoritative Chain of Command
Measures of Performance
Key Performance Indicators (KPIs)
Key Risk Indicators (KRIs)
Contacts With Authorities
Contacts With Groups and Associations
Defining Business Context and Mission
Define Control Objectives
Data Governance
Purpose Validation
Forced Technology Transfer (FTT)
State-Sponsored Espionage
Business As Usual (BAU) Secure Practices
Operationalizing Cybersecurity and Data Protection Practices
Select Controls
Implement Controls
Assess Controls
Authorize Systems, Applications and Services
Monitor Controls
Materiality Determination
Material Risks
Material Threats
Cybersecurity and Data Privacy Status Reporting
Artificial and Autonomous Technology
Artificial Intelligence (AI) and Autonomous Technologies Governance
AI and Autonomous Technologies-Related Legal Requirements Definition
Trustworthy AI and Autonomous Technologies
AI and Autonomous Technologies Value Sustainment
Situational Awareness of AI and Autonomous Technologies
AI and Autonomous Technologies Risk Mapping
AI and Autonomous Technologies Internal Controls
AI and Autonomous Technologies Context Definition
AI and Autonomous Technologies Mission and Goals Definition
AI and Autonomous Technologies Business Case
AI and Autonomous Technologies Potential Benefits Analysis
AI and Autonomous Technologies Potential Costs Analysis
AI and Autonomous Technologies Targeted Application Scope
AI and Autonomous Technologies Cost / Benefit Mapping
AI and Autonomous Technologies Training
AI and Autonomous Technologies Fairness and Bias
AI and Autonomous Technologies Risk Management Decisions
AI and Autonomous Technologies Impact Characterization
AI and Autonomous Technologies Likelihood and Impact Risk Analysis
AI and Autonomous Technologies Continuous Improvements
Assigned Responsibilities for AI and Autonomous Technologies
AI and Autonomous Technologies Risk Profiling
Artificial Intelligence Test, Evaluation, Validation and Verification (AI TEVV)
AI TEVV Trustworthiness Assessment
AI TEVV Tools
AI TEVV Trustworthiness Demonstration
AI TEVV Safety Demonstration
AI TEVV Resiliency Assessment
AI TEVV Transparency and Accountability Assessment
AI TEVV Privacy Assessment
AI TEVV Fairness and Bias Assessment
AI and Autonomous Technologies Model Validation
AI TEVV Results Evaluation
AI TEVV Effectiveness
AI TEVV Comparable Deployment Settings
AI TEVV Post-Deployment Monitoring
Updating AI and Autonomous Technologies
Robust Stakeholder Engagement for AI and Autonomous Technologies
AI and Autonomous Technologies Stakeholder Feedback Integration
AI and Autonomous Technologies Ongoing Assessments
AI and Autonomous Technologies End User Feedback
AI and Autonomous Technologies Incident and Error Reporting
AI and Autonomous Technologies Intellectual Property Infringement Protections
Data Source Identification
Data Source Integrity
AI and Autonomous Technologies Stakeholder Diversity
AI and Autonomous Technologies Stakeholder Competencies
AI and Autonomous Technologies Requirements Definitions
AI and Autonomous Technologies Implementation Tasks Definition
AI and Autonomous Technologies Knowledge Limits
AI and Autonomous Technologies Viability Decisions
AI and Autonomous Technologies Negative Residual Risks
Responsibility To Supersede, Deactivate and/or Disengage AI and Autonomous Technologies
AI and Autonomous Technologies Production Monitoring
AI and Autonomous Technologies Measurement Approaches
Measuring AI and Autonomous Technologies Effectiveness
Unmeasurable AI and Autonomous Technologies Risks
Efficacy of AI and Autonomous Technologies Measurement
AI and Autonomous Technologies Domain Expert Reviews
AI and Autonomous Technologies Performance Changes
Pre-Trained AI and Autonomous Technologies Models
AI and Autonomous Technologies Harm Prevention
AI and Autonomous Technologies Human Subject Protections
AI and Autonomous Technologies Environmental Impact and Sustainability
Previously Unknown AI and Autonomous Technologies Threats and Risks
AI and Autonomous Technologies Risk Tracking Approaches
AI and Autonomous Technologies Risk Response
Asset Management
Asset Governance
Asset-Service Dependencies
Stakeholder Identification and Involvement
Standardized Naming Convention
Approved Technologies
Asset Inventories
Updates During Installations / Removals
Automated Unauthorized Component Detection
Component Duplication Avoidance
Approved Baseline Deviations
Network Access Control (NAC)
Dynamic Host Configuration Protocol (DHCP) Server Logging
Software Licensing Restrictions
Data Action Mapping
Configuration Management Database (CMDB)
Automated Location Tracking
Component Assignment
Asset Ownership Assignment
Accountability Information
Provenance
Network Diagrams and Data Flow Diagrams (DFDs)
Asset Scope Classification
Control Applicability Boundary Graphical Representation
Compliance-Specific Asset Identification
Security of Assets and Media
Management Approval For External Media Transfer
Unattended End-User Equipment
Asset Storage In Automobiles
Kiosks and Point of Interaction (PoI) Devices
Physical Tampering Detection
Secure Disposal, Destruction or Re-Use of Equipment
Return of Assets
Removal of Assets
Use of Personal Devices
Use of Third-Party Devices
Usage Parameters
Bluetooth and Wireless Devices
Infrared Communications
Logical Tampering Protection
Inspection of Systems, Components and Devices
Bring Your Own Device (BYOD) Usage
Prohibited Equipment and Services
Roots of Trust Protection
Telecommunications Equipment
Video Teleconference (VTC) Security
Voice Over Internet Protocol (VoIP) Security
Microphones and Web Cameras
Multi-Function Devices (MFD)
Travel-Only Devices
Re-Imaging Devices After Travel
System Administrative Processes
Jump Server
Database Administrative Processes
Database Management System (DBMS)
Radio Frequency Identification (RFID) Security
Contactless Access Control Systems
Decommissioning
Asset Categorization
Categorize Artificial Intelligence (AI)-Related Technologies
Business Continuity and Disaster Recovery
Business Continuity Management System (BCMS)
Coordinate with Related Plans
Coordinate With External Service Providers
Transfer to Alternate Processing / Storage Site
Recovery Time / Point Objectives (RTO / RPO)
Recovery Operations Criteria
Recovery Operations Communications
Identify Critical Assets
Resume All Missions and Business Functions
Continue Essential Mission and Business Functions
Resume Essential Missions and Business Functions
Data Storage Location Reviews
Contingency Training
Simulated Events
Automated Training Environments
Contingency Plan Testing and Exercises
Coordinated Testing with Related Plans
Alternate Storage and Processing Sites
Contingency Plan Root Cause Analysis (RCA) and Lessons Learned
Ongoing Contingency Planning
Alternative Security Measures
Alternate Storage Site
Separation from Primary Site
Accessibility
Alternate Processing Site
Separation from Primary Site
Accessibility
Alternate Site Priority of Service
Preparation for Use
Inability to Return to Primary Site
Telecommunications Services Availability
Telecommunications Priority of Service Provisions
Separation of Primary / Alternate Providers
Provider Contingency Plan
Alternate Communications Channels
Data Backups
Testing for Reliability and Integrity
Separate Storage for Critical Information
Information System Imaging
Cryptographic Protection
Test Restoration Using Sampling
Transfer to Alternate Storage Site
Redundant Secondary System
Dual Authorization For Backup Media Destruction
Backup Access
Backup Modification and/or Destruction
Information System Recovery and Reconstitution
Transaction Recovery
Failover Capability
Electronic Discovery (eDiscovery)
Restore Within Time Period
Backup and Restoration Hardware Protection
Restoration Integrity Verification
Isolated Recovery Environment
Reserve Hardware
AI and Autonomous Technologies Incidents
Capacity and Performance Planning
Capacity and Performance Management
Resource Priority
Capacity Planning
Performance Monitoring
Elastic Expansion
Regional Delivery
Change Management
Change Management Program
Configuration Change Control
Prohibition Of Changes
Test, Validate and Document Changes
Cybersecurity and Data Privacy Representative for Asset Lifecycle Changes
Automated Security Response
Cryptographic Management
Security Impact Analysis for Changes
Access Restriction For Change
Automated Access Enforcement / Auditing
Signed Components
Dual Authorization for Change
Permissions To Implement Changes
Library Privileges
Stakeholder Notification of Changes
Control Functionality Verification
Report Verification Results
Cloud Security
Cloud Services
Cloud Infrastructure Onboarding
Cloud Infrastructure Offboarding
Cloud Security Architecture
Cloud Infrastructure Security Subnet
Application and Program Interface (API) Security
Virtual Machine Images
Multi-Tenant Environments
Customer Responsibility Matrix (CRM)
Multi-Tenant Event Logging Capabilities
Multi-Tenant Forensics Capabilities
Multi-Tenant Incident Response Capabilities
Data Handling and Portability
Standardized Virtualization Formats
Geolocation Requirements for Processing, Storage and Service Locations
Sensitive Data In Public Cloud Providers
Cloud Access Security Broker (CASB)
Side Channel Attack Prevention
Hosted Systems, Applications and Services
Authorized Individuals For Hosted Systems, Applications and Services
Sensitive/Regulated Data On Hosted Systems, Applications and Services
Prohibition On Unverified Hosted Systems, Applications and Services
Compliance
Statutory, Regulatory and Contractual Compliance
Non-Compliance Oversight
Compliance Scope
Cybersecurity and Data Protection Controls Oversight
Internal Audit Function
Cybersecurity and Data Protection Assessments
Independent Assessors
Functional Review Of Cybersecurity and Data Protection Controls
Audit Activities
Legal Assessment of Investigative Inquires
Investigation Request Notifications
Investigation Access Restrictions
Government Surveillance
Configuration Management
Configuration Management Program
Assignment of Responsibility
System Hardening Through Baseline Configurations
Reviews and Updates
Automated Central Management and Verification
Retention Of Previous Configurations
Development and Test Environment Configurations
Configure Systems, Components or Services for High-Risk Areas
Network Device Configuration File Synchronization
Approved Configuration Deviations
Respond To Unauthorized Changes
Baseline Tailoring
Least Functionality
Periodic Review
Prevent Unauthorized Software Execution
Explicitly Allow / Deny Applications
Split Tunneling
Software Usage Restrictions
Open Source Software
Unsupported Internet Browsers and Email Clients
User-Installed Software
Unauthorized Installation Alerts
Restrict Roles Permitted To Install Software
Configuration Enforcement
Integrity Assurance and Enforcement (IAE)
Zero-Touch Provisioning (ZTP)
Sensitive / Regulated Data Access Enforcement
Sensitive / Regulated Data Actions
Continuous Monitoring
Continuous Monitoring
Intrusion Detection and Prevention Systems (IDS and IPS)
Automated Tools for Real-Time Analysis
Inbound and Outbound Communications Traffic
System Generated Alerts
Wireless Intrusion Detection System (WIDS)
Host-Based Devices
File Integrity Monitoring (FIM)
Reviews and Updates
Proxy Logging
Deactivated Account Activity
Automated Response to Suspicious Events
Automated Alerts
Alert Threshold Tuning
Individuals Posing Greater Risk
Privileged User Oversight
Analyze and Prioritize Monitoring Requirements
Real-Time Session Monitoring
Centralized Collection of Security Event Logs
Correlate Monitoring Information
Central Review and Analysis
Integration of Scanning and Other Monitoring Information
Correlation with Physical Monitoring
Permitted Actions
Audit Level Adjustments
System-Wide / Time-Correlated Audit Trail
Changes by Authorized Individuals
Content of Event Logs
Sensitive Audit Information
Audit Trails
Privileged Functions Logging
Verbosity Logging for Boundary Devices
Limit Personal Data (PD) In Audit Records
Centralized Management of Planned Audit Record Content
Database Logging
Event Log Storage Capacity
Response To Event Log Processing Failures
Real-Time Alerts of Event Logging Failure
Event Log Storage Capacity Alerting
Monitoring Reporting
Query Parameter Audits of Personal Data (PD)
Trend Analysis Reporting
Time Stamps
Synchronization With Authoritative Time Source
Protection of Event Logs
Event Log Backup on Separate Physical Systems / Components
Access by Subset of Privileged Users
Cryptographic Protection of Event Log Information
Dual Authorization for Event Log Movement
Non-Repudiation
Identity Binding
Event Log Retention
Monitoring For Information Disclosure
Analyze Traffic for Covert Exfiltration
Unauthorized Network Services
Monitoring for Indicators of Compromise (IOC)
Session Audit
Alternate Event Logging Capability
Cross-Organizational Monitoring
Sharing of Event Logs
Covert Channel Analysis
Anomalous Behavior
Insider Threats
Third-Party Threats
Unauthorized Activities
Account Creation and Modification Logging
Cryptographic Protections
Use of Cryptographic Controls
Alternate Physical Protection
Export-Controlled Cryptography
Pre/Post Transmission Handling
Conceal / Randomize Communications
Cryptographic Cipher Suites and Protocols Inventory
Cryptographic Module Authentication
Transmission Confidentiality
Transmission Integrity
Encrypting Data At Rest
Storage Media
Offline Storage
Database Encryption
Non-Console Administrative Access
Wireless Access Authentication and Encryption
Public Key Infrastructure (PKI)
Availability
Cryptographic Key Management
Symmetric Keys
Asymmetric Keys
Cryptographic Key Loss or Change
Control and Distribution of Cryptographic Keys
Assigned Owners
Third-Party Cryptographic Keys
External System Cryptographic Key Control
Transmission of Cybersecurity and Data Privacy Attributes
Certificate Authorities
Certificate Monitoring
Data Classification and Handling
Data Protection
Data Stewardship
Sensitive / Regulated Data Protection
Sensitive / Regulated Media Records
Defining Access Authorizations for Sensitive/Regulated Data
Data and Asset Classification
Highest Classification Level
Media Access
Disclosure of Information
Masking Displayed Data
Controlled Release
Media Marking
Automated Marking
Cybersecurity and Data Privacy Attributes
Dynamic Attribute Association
Attribute Value Changes By Authorized Individuals
Maintenance of Attribute Associations By System
Association of Attributes By Authorized Individuals
Attribute Displays for Output Devices
Data Subject Attribute Associations
Consistent Attribute Interpretation
Identity Association Techniques and Technologies
Attribute Reassignment
Attribute Configuration By Authorized Individuals
Audit Changes
Media Storage
Physically Secure All Media
Sensitive Data Inventories
Periodic Scans for Sensitive / Regulated Data
Making Sensitive Data Unreadable In Storage
Storing Authentication Data
Media Transportation
Custodians
Encrypting Data In Storage Media
Physical Media Disposal
System Media Sanitization
System Media Sanitization Documentation
Equipment Testing
Sanitization of Personal Data (PD)
First Time Use Sanitization
Dual Authorization for Sensitive Data Destruction
Media Use
Limitations on Use
Prohibit Use Without Owner
Data Reclassification
Removable Media Security
Use of External Information Systems
Limits of Authorized Use
Portable Storage Devices
Protecting Sensitive Data on External Systems
Non-Organizationally Owned Systems / Components / Devices
Information Sharing
Information Search and Retrieval
Transfer Authorizations
Data Access Mapping
Publicly Accessible Content
Data Mining Protection
Ad-Hoc Transfers
Media and Data Retention
Minimize Sensitive / Regulated Data
Limit Sensitive / Regulated Data In Testing, Training and Research
Temporary Files Containing Personal Data (PD)
Geographic Location of Data
Archived Data Sets
Information Disposal
Data Quality Operations
Updating and Correcting Personal Data (PD)
Data Tags
Primary Source Personal Data (PD) Collection
De-Identification (Anonymization)
De-Identify Dataset Upon Collection
Archiving
Release
Removal, Masking, Encryption, Hashing or Replacement of Direct Identifiers
Statistical Disclosure Control
Differential Data Privacy
Automated De-Identification of Sensitive Data
Motivated Intruder
Code Names
Information Location
Automated Tools to Support Information Location
Transfer of Sensitive and/or Regulated Data
Transfer Activity Limits
Data Localization
Data Rights Management (DRM)
Embedded Technology
Embedded Technology Security Program
Internet of Things (IOT)
Operational Technology (OT)
Interface Security
Embedded Technology Configuration Monitoring
Prevent Alterations
Embedded Technology Maintenance
Resilience To Outages
Power Level Monitoring
Embedded Technology Reviews
Message Queuing Telemetry Transport (MQTT) Security
Restrict Communications
Authorized Communications
Operating Environment Certification
Safety Assessment
Certificate-Based Authentication
Chip-To-Cloud Security
Real-Time Operating System (RTOS) Security
Safe Operations
Endpoint Security
Endpoint Security
Endpoint Protection Measures
Prohibit Installation Without Privileged Status
Software Installation Alerts
Governing Access Restriction for Change
Malicious Code Protection (Anti-Malware)
Automatic Antimalware Signature Updates
Documented Protection Measures
Centralized Management of Antimalware Technologies
Heuristic / Nonsignature-Based Detection
Malware Protection Mechanism Testing
Evolving Malware Threats
Always On Protection
Software Firewall
Endpoint File Integrity Monitoring (FIM)
Integrity Checks
Endpoint Detection and Response (EDR)
Automated Notifications of Integrity Violations
Automated Response to Integrity Violations
Boot Process Integrity
Protection of Boot Firmware
Binary or Machine-Executable Code
Host Intrusion Detection and Prevention Systems (HIDS / HIPS)
Phishing and Spam Protection
Central Management
Automatic Spam and Phishing Protection Updates
Trusted Path
Mobile Code
Thin Nodes
Port and Input / Output (I/O) Device Access
Sensor Capability
Authorized Use
Notice of Collection
Collection Minimization
Sensor Delivery Verification
Collaborative Computing Devices
Disabling / Removal In Secure Work Areas
Explicitly Indicate Current Participants
Participant Identity Verification
Participant Connection Management
Malicious Link and File Protections
Explicit Indication Of Use
Hypervisor Access
Restrict Access To Security Functions
Host-Based Security Function Isolation
Human Resources Security
Human Resources Security Management
Position Categorization
Users With Elevated Privileges
Probationary Periods
Defined Roles and Responsibilities
User Awareness
Competency Requirements for Security-Related Positions
Personnel Screening
Roles With Special Protection Measures
Formal Indoctrination
Citizenship Requirements
Citizenship Identification
Terms of Employment
Rules of Behavior
Social Media and Social Networking Restrictions
Use of Communications Technology
Use of Critical Technologies
Use of Mobile Devices
Security-Minded Dress Code
Policy Familiarization and Acknowledgement
Access Agreements
Confidentiality Agreements
Post-Employment Obligations
Personnel Sanctions
Workplace Investigations
Personnel Transfer
Personnel Termination
Asset Collection
High-Risk Terminations
Post-Employment Requirements
Automated Employment Status Notifications
Third-Party Personnel Security
Separation of Duties (SoD)
Incompatible Roles
Two-Person Rule
Identify Critical Skills and Gaps
Remediate Identified Skills Deficiencies
Identify Vital Cybersecurity and Data Privacy Staff
Establish Redundancy for Vital Cybersecurity and Data Privacy Staff
Perform Succession Planning
Identification and Authentication
Identity and Access Management (IAM)
Retain Access Records
Authenticate, Authorize and Audit (AAA)
User and Service Account Inventories
Identification and Authentication for Organizational Users
Group Authentication
Replay-Resistant Authentication
Acceptance of PIV Credentials
Out-of-Band Authentication (OOBA)
Identification and Authentication for Non-Organizational Users
Acceptance of PIV Credentials from Other Organizations
Acceptance of Third-Party Credentials
Use of FICAM-Issued Profiles
Disassociability
Acceptance of External Authenticators
Identification and Authentication for Devices
Device Attestation
Device Authorization Enforcement
Identification and Authentication for Third Party Systems and Services
Sharing Identification and Authentication Information
Privileged Access by Non-Organizational Users
Multi-Factor Authentication (MFA)
Network Access to Privileged Accounts
Network Access to Non-Privileged Accounts
Local Access to Privileged Accounts
Out-of-Band Multi-Factor Authentication
User Provisioning and De-Provisioning
Change of Roles and Duties
Termination of Employment
Role-Based Access Control (RBAC)
Identifier Management (User Names)
User Identity (ID) Management
Identity User Status
Dynamic Management
Cross-Organization Management
Privileged Account Identifiers
Pairwise Pseudonymous Identifiers (PPID)
Authenticator Management
Password-Based Authentication
PKI-Based Authentication
In-Person or Trusted Third-Party Registration
Automated Support For Password Strength
Protection of Authenticators
No Embedded Unencrypted Static Authenticators
Hardware Token-Based Authentication
Default Authenticators
Multiple Information System Accounts
Expiration of Cached Authenticators
Password Managers
Biometric Authentication
Authenticator Feedback
Cryptographic Module Authentication
Hardware Security Modules (HSM)
Adaptive Identification and Authentication
Single Sign-On (SSO) Transparent Authentication
Federated Credential Management
Continuous Authentication
Re-Authentication
Account Management
Automated System Account Management (Directory Services)
Removal of Temporary / Emergency Accounts
Disable Inactive Accounts
Automated Audit Actions
Restrictions on Shared Groups / Accounts
Account Disabling for High Risk Individuals
System Account Reviews
Usage Conditions
Emergency Accounts
Privileged Account Management (PAM)
Privileged Account Inventories
Privileged Account Separation
Periodic Review of Account Privileges
User Responsibilities for Account Management
Credential Sharing
Access Enforcement
Access To Sensitive / Regulated Data
Database Access
Use of Privileged Utility Programs
Dedicated Administrative Machines
Dual Authorization for Privileged Commands
Revocation of Access Authorizations
Authorized System Accounts
Least Privilege
Authorize Access to Security Functions
Non-Privileged Access for Non-Security Functions
Privileged Accounts
Auditing Use of Privileged Functions
Prohibit Non-Privileged Users from Executing Privileged Functions
Network Access to Privileged Commands
Privilege Levels for Code Execution
Account Lockout
Concurrent Session Control
Session Lock
Pattern-Hiding Displays
Session Termination
User-Initiated Logouts / Message Displays
Permitted Actions Without Identification or Authorization
Reference Monitor
Identity Proofing (Identity Verification)
Management Approval For New or Changed Accounts
Identity Evidence
Identity Evidence Validation and Verification
In-Person Validation and Verification
Address Confirmation
Attribute-Based Access Control (ABAC)
Incident Response
Incident Response Operations
Incident Handling
Automated Incident Handling Processes
Insider Threat Response Capability
Dynamic Reconfiguration
Incident Classification and Prioritization
Correlation with External Organizations
Automatic Disabling of System
Indicators of Compromise (IOC)
Incident Response Plan (IRP)
Data Breach
IRP Update
Continuous Incident Response Improvements
Incident Response Training
Simulated Incidents
Automated Incident Response Training Environments
Incident Response Testing
Coordination with Related Plans
Integrated Security Incident Response Team (ISIRT)
Chain of Custody and Forensics
Situational Awareness For Incidents
Automated Tracking, Data Collection and Analysis
Incident Stakeholder Reporting
Automated Reporting
Cyber Incident Reporting for Sensitive Data
Vulnerabilities Related To Incidents
Supply Chain Coordination
Incident Reporting Assistance
Automation Support of Availability of Information / Support
Coordination With External Providers
Information Spillage Response
Responsible Personnel
Training
Post-Spill Operations
Exposure to Unauthorized Personnel
Root Cause Analysis (RCA) and Lessons Learned
Regulatory and Law Enforcement Contacts
Detonation Chambers (Sandboxes)
Public Relations and Reputation Repair
Information Assurance
Information Assurance (IA) Operations
Assessment Boundaries
Assessments
Assessor Independence
Specialized Assessments
Third-Party Assessments
Security Assessment Report (SAR)
System Security and Privacy Plan (SSPP)
Plan / Coordinate with Other Organizational Entities
Adequate Security for Sensitive / Regulated Data In Support of Contracts
Threat Analysis and Flaw Remediation During Development
Plan of Action and Milestones (POA&M)
Plan of Action and Milestones (POA&M) Automation
Technical Verification
Security Authorization
Maintenance
Maintenance Operations
Controlled Maintenance
Automated Maintenance Activities
Timely Maintenance
Preventative Maintenance
Predictive Maintenance
Automated Support For Predictive Maintenance
Maintenance Tools
Inspect Tools
Inspect Media
Prevent Unauthorized Removal
Restrict Tool Usage
Remote Maintenance
Auditing Remote Maintenance
Remote Maintenance Notifications
Remote Maintenance Cryptographic Protection
Remote Maintenance Disconnect Verification
Remote Maintenance Pre-Approval
Remote Maintenance Comparable Security and Sanitization
Separation of Maintenance Sessions
Authorized Maintenance Personnel
Maintenance Personnel Without Appropriate Access
Non-System Related Maintenance
Maintain Configuration Control During Maintenance
Field Maintenance
Off-Site Maintenance
Maintenance Validation
Maintenance Monitoring
Mobile Device Management
Centralized Management Of Mobile Devices
Access Control For Mobile Devices
Full Device and Container-Based Encryption
Mobile Device Tampering
Remote Purging
Personally-Owned Mobile Devices
Organization-Owned Mobile Devices
Mobile Device Data Retention Limitations
Mobile Device Geofencing
Separate Mobile Device Profiles
Restricting Access To Authorized Devices
Network Security
Network Security Controls (NSC)
Zero Trust Architecture (ZTA)
Layered Network Defenses
Denial of Service (DoS) Protection
Guest Networks
Cross Domain Solution (CDS)
Boundary Protection
Limit Network Connections
External Telecommunications Services
Prevent Discovery of Internal Information
Personal Data (PD)
Prevent Unauthorized Exfiltration
Dynamic Isolation and Segregation (Sandboxing)
Isolation of Information System Components
Separate Subnet for Connecting to Different Security Domains
Data Flow Enforcement – Access Control Lists (ACLs)
Deny Traffic by Default and Allow Traffic by Exception
Object Security Attributes
Content Check for Encrypted Data
Embedded Data Types
Metadata
Human Reviews
Policy Decision Point (PDP)
Data Type Identifiers
Decomposition Into Policy-Related Subcomponents
Detection of Unsanctioned Information
Approved Solutions
Cross Domain Authentication
Metadata Validation
Application Proxy
Interconnection Security Agreements (ISAs)
External System Connections
Internal System Connections
Network Segmentation (macrosegementation)
Security Management Subnets
Virtual Local Area Network (VLAN) Separation
Sensitive / Regulated Data Enclave (Secure Zone)
Segregation From Enterprise Services
Direct Internet Access Restrictions
Microsegmentation
Software Defined Networking (SDN)
Network Connection Termination
Network Intrusion Detection / Prevention Systems (NIDS / NIPS)
DMZ Networks
Wireless Intrusion Detection / Prevention Systems (WIDS / WIPS)
Host Containment
Resource Containment
Session Integrity
Invalidate Session Identifiers at Logout
Unique System-Generated Session Identifiers
Domain Name Service (DNS) Resolution
Architecture and Provisioning for Name / Address Resolution Service
Secure Name / Address Resolution Service (Recursive or Caching Resolver)
Sender Policy Framework (SPF)
Domain Registrar Security
Out-of-Band Channels
Safeguarding Data Over Open Networks
Wireless Link Protection
End-User Messaging Technologies
Electronic Messaging
Remote Access
Automated Monitoring and Control
Protection of Confidentiality / Integrity Using Encryption
Managed Access Control Points
Remote Privileged Commands and Sensitive Data Access
Work From Anywhere (WFA) - Telecommuting Security
Third-Party Remote Access Governance
Endpoint Security Validation
Expeditious Disconnect / Disable Capability
Wireless Networking
Authentication and Encryption
Disable Wireless Networking
Restrict Configuration By Users
Wireless Boundaries
Rogue Wireless Detection
Intranets
Data Loss Prevention (DLP)
DNS and Content Filtering
Route Internal Traffic to Proxy Servers
Visibility of Encrypted Communications
Route Privileged Network Access
Protocol Compliance Enforcement
Domain Name Verification
Internet Address Denylisting
Bandwidth Control
Authenticated Proxy
Certificate Denylisting
Content Disarm and Reconstruction (CDR)
Email Content Protections
Email Domain Reputation Protections
Sender Denylisting
Authenticated Received Chain (ARC)
Domain-Based Message Authentication Reporting and Conformance (DMARC)
User Digital Signatures for Outgoing Email
Encryption for Outgoing Email
Adaptive Email Protections
Email Labeling
User Threat Reporting
Physical and Environmental Security
Physical and Environmental Protections
Site Security Plan (SitePlan)
Zone-Based Physical Security
Physical Access Authorizations
Role-Based Physical Access
Dual Authorization for Physical Access
Physical Access Control
Controlled Ingress and Egress Points
Lockable Physical Casings
Physical Access Logs
Access To Information Systems
Physical Security of Offices, Rooms and Facilities
Working in Secure Areas
Searches
Temporary Storage
Monitoring Physical Access
Intrusion Alarms / Surveillance Equipment
Monitoring Physical Access To Information Systems
Visitor Control
Distinguish Visitors from On-Site Personnel
Identification Requirement
Restrict Unescorted Access
Automated Records Management and Review
Minimize Visitor Personal Data (PD)
Visitor Access Revocation
Supporting Utilities
Automatic Voltage Controls
Emergency Shutoff
Emergency Power
Emergency Lighting
Water Damage Protection
Automation Support for Water Damage Protection
Redundant Cabling
Fire Protection
Fire Detection Devices
Fire Suppression Devices
Automatic Fire Suppression
Temperature and Humidity Controls
Monitoring with Alarms / Notifications
Delivery and Removal
Alternate Work Site
Equipment Siting and Protection
Transmission Medium Security
Access Control for Output Devices
Information Leakage Due To Electromagnetic Signals Emanations
Asset Monitoring and Tracking
Electromagnetic Pulse (EMP) Protection
Component Marking
Proximity Sensor
On-Site Client Segregation
Data Privacy
Data Privacy Program
Chief Privacy Officer (CPO)
Privacy Act Statements
Dissemination of Data Privacy Program Information
Data Protection Officer (DPO)
Binding Corporate Rules (BCR)
Security of Personal Data
Limiting Personal Data Disclosures
Data Privacy Notice
Purpose Specification
Automated Data Management Processes
Computer Matching Agreements (CMA)
System of Records Notice (SORN)
System of Records Notice (SORN) Review Process
Privacy Act Exemptions
Real-Time or Layered Notice
Choice and Consent
Tailored Consent
Just-In-Time Notice and Updated Consent
Prohibition Of Selling or Sharing Personal Data
Revoke Consent
Product or Service Delivery Restrictions
Authorized Agent
Active Participation By Data Subjects
Global Privacy Control (GPC)
Restrict Collection To Identified Purpose
Authority To Collect, Use, Maintain and Share Personal Data
Primary Sources
Identifiable Image Collection
Acquired Personal Data
Validate Collected Personal Data
Re-Validate Collected Personal Data
Personal Data Retention and Disposal
Internal Use of Personal Data For Testing, Training and Research
Personal Data Accuracy and Integrity
Data Masking
Usage Restrictions of Sensitive Personal Data
Inventory of Personal Data
Personal Data Inventory Automation Support
Personal Data Categories
Data Subject Access
Correcting Inaccurate Personal Data
Notice of Correction or Processing Change
Appeal Adverse Decision
User Feedback Management
Right to Erasure
Data Portability
Personal Data Exportability
Information Sharing With Third Parties
Data Privacy Requirements for Contractors and Service Providers
Joint Processing of Personal Data
Obligation To Inform Third-Parties
Reject Unauthorized Disclosure Requests
Testing, Training and Monitoring
Personal Data Lineage
Data Quality Management
Automation
Data Analytics Bias
Data Tagging
Updating Personal Data (PD)
Data Management Board
Data Privacy Records and Reporting
Accounting of Disclosures
Notification of Disclosure Request To Data Subject
Register As A Data Controller and/or Data Processor
Potential Human Rights Abuses
Data Subject Communications
Conspicuous Link To Data Privacy Notice
Notice of Financial Incentive
Data Controller Communications
Project and Resource Management
Cybersecurity and Data Privacy Portfolio Management
Strategic Plan and Objectives
Targeted Capability Maturity Levels
Cybersecurity and Data Privacy Resource Management
Allocation of Resources
Cybersecurity and Data Privacy In Project Management
Cybersecurity and Data Privacy Requirements Definition
Business Process Definition
Secure Development Life Cycle (SDLC) Management
Manage Organizational Knowledge
Risk Management
Risk Management Program
Risk Framing
Risk Management Resourcing
Risk Tolerance
Risk Threshold
Risk Appetite
Risk-Based Security Categorization
Impact-Level Prioritization
Risk Identification
Risk Catalog
Risk Assessment
Risk Register
Risk Ranking
Risk Remediation
Risk Response
Compensating Countermeasures
Risk Assessment Update
Business Impact Analysis (BIA)
Supply Chain Risk Management (SCRM) Plan
Supply Chain Risk Assessment
AI and Autonomous Technologies Supply Chain Impacts
Data Protection Impact Assessment (DPIA)
Risk Monitoring
Risk Culture
Secure Engineering and Architecture
Secure Engineering Principles
Centralized Management of Cybersecurity and Data Privacy Controls
Achieving Resilience Requirements
Alignment With Enterprise Architecture
Standardized Terminology
Outsourcing Non-Essential Functions or Services
Technical Debt Reviews
Defense-In-Depth (DiD) Architecture
System Partitioning
Application Partitioning
Process Isolation
Security Function Isolation
Hardware Separation
Thread Separation
System Privileges Isolation
Information In Shared Resources
Prevent Program Execution
Predictable Failure Analysis
Technology Lifecycle Management
Fail Secure
Fail Safe
Non-Persistence
Refresh from Trusted Sources
Information Output Filtering
Limit Personal Data (PD) Dissemination
Memory Protection
Honeypots
Honeyclients
Heterogeneity
Virtualization Techniques
Concealment and Misdirection
Randomness
Change Processing and Storage Locations
Distributed Processing and Storage
Non-Modifiable Executable Programs
Secure Log-On Procedures
System Use Notification (Logon Banner)
Standardized Microsoft Windows Banner
Truncated Banner
Previous Logon Notification
Clock Synchronization
Application Container
Security Operations
Operations Security
Standardized Operating Procedures (SOP)
Security Concept Of Operations (CONOPS)
Service Delivery (Business Process Support)
Security Operations Center (SOC)
Secure Practices Guidelines
Security Orchestration, Automation, and Response (SOAR)
Shadow Information Technology Detection
Security Awareness and Training
Cybersecurity and Data Privacy-Minded Workforce
Cybersecurity and Data Privacy Awareness Training
Simulated Cyber Attack Scenario Training
Social Engineering and Mining
Role-Based Cybersecurity and Data Privacy Training
Practical Exercises
Suspicious Communications and Anomalous System Behavior
Sensitive Information Storage, Handling and Processing
Vendor Cybersecurity and Data Privacy Training
Privileged Users
Cyber Threat Environment
Continuing Professional Education (CPE) - Cybersecurity and Data Privacy Personnel
Continuing Professional Education (CPE) - DevOps Personnel
Counterintelligence Training
Cybersecurity and Data Privacy Training Records
Cybersecurity Knowledge Sharing
Technology Development and Acquisition
Technology Development and Acquisition
Product Management
Integrity Mechanisms for Software / Firmware Updates
Malware Testing Prior to Release
DevSecOps
Minimum Viable Product (MVP) Security Requirements
Ports, Protocols and Services In Use
Information Assurance Enabled Products
Development Methods, Techniques and Processes
Pre-Established Secure Configurations
Identification and Justification of Ports, Protocols and Services
Insecure Ports, Protocols and Services
Cybersecurity and Data Privacy Representatives For Product Changes
Commercial Off-The-Shelf (COTS) Security Solutions
Supplier Diversity
Documentation Requirements
Functional Properties
Software Bill of Materials (SBOM)
Developer Architecture and Design
Physical Diagnostic and Test Interfaces
Diagnostic and Test Interface Monitoring
Secure Coding
Criticality Analysis
Threat Modeling
Software Assurance Maturity Model (SAMM)
Supporting Toolchain
Software Design Review
Secure Development Environments
Separation of Development, Testing and Operational Environments
Secure Migration Practices
Cybersecurity and Data Privacy Testing Throughout Development
Continuous Monitoring Plan
Static Code Analysis
Dynamic Code Analysis
Malformed Input Testing
Application Penetration Testing
Secure Settings By Default
Manual Code Review
Use of Live Data
Test Data Integrity
Product Tampering and Counterfeiting (PTC)
Anti-Counterfeit Training
Component Disposal
Customized Development of Critical Components
Developer Screening
Developer Configuration Management
Software / Firmware Integrity Verification
Hardware Integrity Verification
Developer Threat Analysis and Flaw Remediation
Developer-Provided Training
Unsupported Systems
Alternate Sources for Continued Support
Input Data Validation
Error Handling
Access to Program Source Code
Software Release Integrity Verification
Archiving Software Releases
Software Escrow
Third-Party Management
Third-Party Management
Third-Party Inventories
Third-Party Criticality Assessments
Supply Chain Protection
Acquisition Strategies, Tools and Methods
Limit Potential Harm
Processes To Address Weaknesses or Deficiencies
Adequate Supply
Third-Party Services
Third-Party Risk Assessments and Approvals
External Connectivity Requirements - Identification of Ports, Protocols and Services
Conflict of Interests
Third-Party Processing, Storage and Service Locations
Third-Party Contract Requirements
Security Compromise Notification Agreements
Contract Flow-Down Requirements
Third-Party Authentication Practices
Responsible, Accountable, Supportive, Consulted and Informed (RASCI) Matrix
Third-Party Scope Review
First-Party Declaration (1PD)
Break Clauses
Third-Party Attestation (3PA)
Third-Party Personnel Security
Monitoring for Third-Party Information Disclosure
Review of Third-Party Services
Third-Party Deficiency Remediation
Managing Changes To Third-Party Services
Third-Party Incident Response and Recovery Capabilities
Threat Management
Threat Intelligence Program
Indicators of Exposure (IOE)
Threat Intelligence Feeds
Threat Intelligence Reporting
Insider Threat Program
Insider Threat Awareness
Vulnerability Disclosure Program (VDP)
Security Disclosure Contact Information
Threat Hunting
Tainting
Threat Catalog
Threat Analysis
Behavioral Baselining
Vulnerability and Patch Management
Vulnerability and Patch Management Program (VPMP)
Attack Surface Scope
Vulnerability Remediation Process
Vulnerability Ranking
Vulnerability Exploitation Analysis
Continuous Vulnerability Remediation Activities
Stable Versions
Flaw Remediation with Personal Data (PD)
Software and Firmware Patching
Centralized Management of Flaw Remediation Processes
Automated Remediation Status
Time To Remediate / Benchmarks For Corrective Action
Automated Software and Firmware Updates
Removal of Previous Versions
Vulnerability Scanning
Update Tool Capability
Breadth / Depth of Coverage
Privileged Access
Trend Analysis
Review Historical event logs
External Vulnerability Assessment Scans
Internal Vulnerability Assessment Scans
Acceptable Discoverable Information
Correlate Scanning Information
Penetration Testing
Independent Penetration Agent or Team
Technical Surveillance Countermeasures Security
Reviewing Vulnerability Scanner Usage
Red Team Exercises
Web Security
Web Security
Unauthorized Code
Use of Demilitarized Zones (DMZ)
Web Application Firewall (WAF)
Client-Facing Web Services
Cookie Management
Strong Customer Authentication (SCA)
Web Security Standard
Web Application Framework
Validation and Sanitization
Secure Web Traffic
Output Encoding
Web Browser Security
Website Change Detection
Publicly Accessible Content Reviews
CRY-01.4: Conceal / Randomize Communications
Conceal / Randomize Communications
CRY-01.4: Are cryptographic mechanisms utilized to conceal or randomize communication patterns?
Cryptographic mechanisms exist to conceal or randomize communication patterns.
CMMI Maturity Level
C|P - CMM 0: Not performed - This level of maturity is defined as “non-existence practices,” where the control is not being performed: - Practices are non-existent, where a reasonable person would conclude the control is not being performed. - Evidence of due care and due diligence do not exist to demonstrate compliance with applicable statutory, regulatory and/or contractual obligations.
C|P - CMM 1: Performed Informally - This level of maturity is defined as “ad hoc practices,” where the control is being performed, but lacks completeness & consistency: - Practices are “ad hoc” where the intent of a control is not met due to a lack consistency and formality. - When the control is met, it lacks consistency and formality (e.g., rudimentary practices are performed informally). - A reasonable person would conclude the control is not consistently performed in a structured manner. - Performance depends on specific knowledge and effort of the individual performing the task(s), where the performance of these practices is not proactively governed. - Limited evidence of due care and due diligence exists, where it would be difficult to legitimately disprove a claim of negligence for how cybersecurity/privacy controls are implemented and maintained.
C|P - CMM 2: Planned and Tracked - Practices are “requirements-driven” where the intent of control is met in some circumstances, but not standardized across the entire organization: - Practices are “requirements-driven” (e.g., specified by a law, regulation or contractual obligation) and are tailored to meet those specific compliance obligations (e.g., evidence of due diligence). - Performance of a control is planned and tracked according to specified procedures and work products conform to specified standards (e.g., evidence of due care). - Controls are implemented in some, but not all applicable circumstances/environments (e.g., specific enclaves, facilities or locations). - A reasonable person would conclude controls are “compliance-focused” to meet a specific obligation, since the practices are applied at a local/regional level and are not standardized practices across the enterprise. - Sufficient evidence of due care and due diligence exists to demonstrate compliance with specific statutory, regulatory and/or contractual obligations.
C|P - CMM 3: Well Defined - This level of maturity is defined as “enterprise-wide standardization,” where the practices are well-defined and standardized across the organization: - Practices are standardized “enterprise-wide” where the control is well-defined and standardized across the entire enterprise. - Controls are implemented in all applicable circumstances/environments (deviations are documented and justified). - Practices are performed according to a well-defined process using approved, tailored versions of standardized processes. - Performance of a control is according to specified well-defined and standardized procedures. - Control execution is planned and managed using an enterprise-wide, standardized methodology. - A reasonable person would conclude controls are “security-focused” that address both mandatory and discretionary requirements. Compliance could reasonably be viewed as a “natural byproduct” of secure practices. - Sufficient evidence of due care and due diligence exists to demonstrate compliance with specific statutory, regulatory and/or contractual obligations. - The Chief Information Security Officer (CISO) , or similar function, develops a security-focused Concept of Operations (CONOPS) that documents organization-wide management, operational and technical measures to apply defense-in- depth techniques (note - in this context, a CONOPS is a verbal or graphic statement of intent and assumptions regarding operationalizing the identified tasks to achieve the CISO’s stated objectives. The result of the CONOPS is operating the organization’s cybersecurity and data protection program so that it meets business objectives). Control or domain-specific CONOPS may be incorporated as part of a broader operational plan for the cybersecurity and data privacy program (e.g., cybersecurity-specific business plan).
C|P - CMM 4: Quantitatively Controlled - This level of maturity is defined as “metrics-driven practices,” where in addition to being well-defined and standardized practices across the organization, there are detailed metrics to enable governance oversight: - Practices are “metrics-driven” and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations, and identify areas for improvement. - Practices build upon established L3 maturity criteria and have detailed metrics to enable governance oversight. - Detailed measures of performance are collected and analyzed. This leads to a quantitative understanding of process capability and an improved ability to predict performance. - Performance is objectively managed, and the quality of work products is quantitatively known.
C|P - CMM 5: Continuously Improving - This level of maturity is defined as “world-class practices,” where the practices are not only well-defined and standardized across the organization, as well as having detailed metrics, but the process is continuously improving: - Practices are “world-class” capabilities that leverage predictive analysis. - Practices build upon established L4 maturity criteria and are time-sensitive to support operational efficiency, which likely includes automated actions through machine learning or Artificial Intelligence (AI). - Quantitative performance goals (targets) for process effectiveness and efficiency are established, based on the business goals of the organization. - Process improvements are implemented according to “continuous improvement” practices to affect process changes.
C|P - CMM 0: Not performed
C|P - CMM 1: Performed Informally
C|P - CMM 2: Planned and Tracked
C|P - CMM 3: Well Defined
C|P - CMM 4: Quantitatively Controlled
C|P - CMM 5: Continuously Improving
Description
Cryptographic mechanisms exist to conceal or randomize communication patterns.