Skip to main content

Bramble Security Compliance Controls

Security controls are a way to state our company's position on a variety of security topics. It's not enough to simply say "We encrypt data" since our customers and teams will naturally want to know "what data do we encrypt?" and "how do we encrypt that data?". When all of our established security controls are operating effectively this creates a security program greater than the sum of its parts that will demonstrate to our stakeholders that Bramble has a mature and comprehensive security program that will provide assurance that data within Bramble is reasonably protected.

Bramble Control Framework (BCF)

We have tried to take a comprehensive approach to our immediate and future security compliance needs. Older and larger companies tend to treat each security compliance requirement individually which results in independent security compliance teams going out to internal teams with multiple overlapping requests. For example, at such a company you might have one database engineer that is asked to provide evidence of how a particular database is encrypted based on SOC2 requirements, then again for ISO requirements, then again for FedRAMP requirements. This approach can be visualized as follows:

{{< mermaid >}}
graph TD;
    SOC2_Requirement1-->Team1;
    SOC2_Requirement1-->Team2;
    SOC2_Requirement2-->Team1;
    SOC2_Requirement2-->Team2;
    FedRAMP_Requirement1-->Team1;
    ISO_Requirement1-->Team2;
{{< /mermaid >}}

Given our efficiency value here at Bramble we wanted to create a set of security controls that would address multiple underlying requirements with a single security control which would allow us to make fewer requests of our internal teams and efficiently collect all evidence we would need for a variety of audits at once. This approach can be visualized as follows:

{{< mermaid >}}
graph TD;
    SOC2_Requirement1-->BCF;
    SOC2_Requirement2-->BCF;
    FedRAMP_Requirement1-->BCF;
    ISO_Requirement1-->BCF;
    BCF-->Team1;
    BCF-->Team2;
{{< /mermaid >}}

As our security compliance goals and requirements have evolved so have our requirements and constraints related to our security control framework. The latest iteration of our BCF is based on the Secure Control Framework by ComplianceForge since the SCF comes with extensive and reliable compliance and regulatory framework mappings.

Security Control Lifecycle

The lifecycle of our security controls can be found at this handbook page. As part of the security control lifecycle, all BCF security controls are reviewed and tested at a minimum on an annual basis or as required by regulation.

Control Ownership

Control Owner - Ensures that the design of the control and the control activities operate effectively and is responsible for remediation of any control activities that are required to bring that control into a state of audit-readiness.

Process Owner - Supports the operation of the control and carries out the process designed by the control owner. The process owner is most likely to be interviewed by an auditor to determine whether or not the process is operating as intended.

Security Control Changes

The Bramble security team is responsible for ensuring the consistency of the documentation of the security controls listed below. While normally we welcome any Bramble team-member to make edits to handbook pages, please be aware that even small changes to the wording of any of these controls impacts how they satisfy the requirements for the security frameworks they map to. Because of this, we ask that you contact the security team for any changes that need to be made to this page and the underlying guidance pages. The security team will then engage with you and make any appropriate changes to these handbook pages.

List of controls by family:

We are continuing to update the controls with additional details

ControlTitleDescription
AST-04Network Diagrams & Data Flow Diagrams (DFDs)Maintain network architecture diagrams that: - Contain sufficient detail to assess the security of the network's architecture; - Reflect the current state of the network environment; - Document all sensitive data flows.
AST-09Secure Disposal or Re-Use of EquipmentSecurely destroy media when it is no longer needed for business or legal purposes.
ControlTitleDescription
BCD-01Business Continuity Management System (BCMS)Facilitate contingency planning security controls to help ensure resilient assets and services.
BCD-02Identify Critical AssetsIdentify, document and resume the critical systems, applications and services that support essential missions and business processes within Recovery Time Objectives (RTOs) with little or no loss of operational continuity of the defined time period of the contingency plan’s activation.
BCD-04Contingency Plan Testing & ExercisesConduct tests and/or exercises to determine the contingency plan’s effectiveness and the organization’s readiness to execute the plan.
BCD-05Contingency Plan Root Cause Analysis (RCA) & Lessons LearnedConduct Root Cause Analysis (RCA) and “lessons learned” activities every time the contingency plan is activated.
BCD-06Contingency Planning & UpdatesKeep contingency plans current with business requirements and technology changes.
BCD-07Alternative Security MeasuresAlternative or compensating controls to satisfy security requirements when the primary means of implementing the security requirements is unavailable or compromised.
BCD-11Data BackupsCreate and routinely test recurring backups of data, software and system images verifying the reliability of the backup process to ensure the integrity and availability of the data.
BCD-12Information System Recovery & ReconstitutionEnsure the recovery and restoration of systems to a known state after a disruption, compromise or failure.
BCD-13Backup & Restoration Hardware ProtectionProtect backup and restoration of hardware and software.
ControlTitleDescription
CHG-01Change Management ProgramFacilitate the implementation of change management security controls.
CHG-02Configuration Change ControlGovern the technical configuration change control processes by testing and documenting proposed changes in a non-production environment before changes are implemented in a production environment including a cybersecurity representative in the configuration change control review process.
CHG-03Security Impact Analysis for ChangesAnalyze proposed changes for potential security impacts, prior to the implementation of the change.
CHG-04Access Restriction For ChangeEnforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes.
CHG-05Stakeholder Notification of ChangesEnsure stakeholders are made aware of and understand the impact of proposed changes.
CHG-06Security Functionality VerificationVerify the functionality of security controls when anomalies are discovered.
ControlTitleDescription
CLD-01Cloud ServicesFacilitate the implementation of cloud management security controls to ensure cloud instances are secure and in-line with industry best practices.
ControlTitleDescription
CPL-01Statutory, Regulatory & Contractual ComplianceFacilitate the identification and implementation of relevant legislative statutory, regulatory and contractual security controls.
CPL-02Security Controls OversightResponsible for security controls oversight.
CPL-03Security AssessmentsEnsure team members regularly review controlled documents within their area of responsibility for accuracy and adherence to appropriate security policies, standards and other applicable requirements.
CPL-04Audit ActivitiesPlan and execute compliance audits that minimize the impact of audit activities on business operations.
ControlTitleDescription
CFG-01Configuration Management ProgramFacilitate the implementation of configuration management security controls.
CFG-02System Hardening Through Baseline ConfigurationsDevelop, document, review, update and maintain secure baseline configurations at least annually as part of system component installations and upgrades for technology platforms that are consistent with industry-accepted system hardening standards and automating reports on baseline configurations of the systems.
ControlTitleDescription
CRY-01Use of Cryptographic ControlsFacilitate the implementation of cryptographic protections security controls using known public standards and trusted cryptographic technologies.
CRY-03Transmission ConfidentialityCryptographic mechanisms to protect the confidentiality of data being transmitted.
CRY-05Encrypting Data At RestCryptographic mechanisms to prevent unauthorized disclosure of information at rest.
CRY-08Public Key Infrastructure (PKI)Implement an internal Public Key Infrastructure (PKI) or obtain PKI services from a reputable PKI service provider.
CRY-09Cryptographic Key ManagementControls to protect the confidentiality, integrity and availability of keys by facilitating the production and management of symmetric cryptographic keys using Federal Information Processing Standards (FIPS)-compliant and asymmetric cryptographic keys using approved key management technology and processes that protect the user’s private key.
ControlTitleDescription
DCH-01Data ProtectionFacilitate logical and physical data protection controls and ensure data stewardship is assigned, documented and communicated and the quality of information remains complete and verifiable.
DCH-02Data & Asset ClassificationEnsure a complete and accurate data and asset list are categorized and prioritized based on their classification, criticality and business value, in accordance with applicable statutory, regulatory and contractual requirements.
DCH-08Physical Media DisposalSecurely retain and dispose of physical media when it is no longer required, using formal procedures.
DCH-09Digital Media SanitizationSanitize media, both digital and non-digital, with the strength and integrity commensurate with the classification or sensitivity of the information prior to disposal, release out of organizational control or release for reuse.
DCH-10Media UseRestrict the use of some types of digital media on systems or system components.
DCH-12Removable Media SecurityRestrict removable media in accordance with data handling and acceptable usage parameters.
DCH-13Use of External Information SystemsRestrict the use of portable storage devices by external parties, systems and services used to securely store, process and transmit data.
DCH-14Information SharingUtilize a process assisting users in making information sharing decisions to ensure data is appropriately protected.
DCH-17Ad-Hoc TransfersSecure ad-hoc exchanges of large digital files with internal or external parties.
DCH-21Information DisposalSecurely dispose of, destroy or erase information.
DCH-22Data Quality OperationsCheck for the accuracy, relevance, timeliness, impact, completeness and de-identification of information across the information lifecycle.
ControlTitleDescription
END-04Malicious Code Protection (Anti-Malware)Utilize anti-malware technologies to detect and eradicate malicious code.
END-06File Integrity Monitoring (FIM)Utilize File Integrity Monitor (FIM) technology to detect and report unauthorized changes to system files and configurations.
END-07Host Intrusion Detection and Prevention Systems (HIDS / HIPS)Utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) on sensitive systems.
ControlTitleDescription
GOV-01Security & Privacy Governance ProgramFacilitate cybersecurity and privacy governance security controls.
GOV-02Publishing Security & Privacy DocumentationEstablish, maintain and disseminate cybersecurity and privacy policies, standards and procedures.
GOV-03Periodic Review & Update of Security & Privacy ProgramReview the cybersecurity and privacy program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
GOV-04Assigned Security & Privacy ResponsibilitiesAssign a qualified individual with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity and privacy program.
GOV-05Measures of PerformanceImplementing Key Performance Indicators (KPIs) assisting organizational management and Key Risk Indicators (KRIs) assisting senior management with developing, reporting and monitoring measures of performance and trend analysis of the cybersecurity and privacy program.
GOV-06Contacts With AuthoritiesIdentify and document appropriate contacts within relevant law enforcement and regulatory bodies.
ControlTitleDescription
HRS-01Human Resources Security ManagementFacilitate personnel security controls.
HRS-02Position CategorizationManage personnel security risk by assigning a risk designation to all positions and establishing screening criteria for individuals filling those positions.
HRS-03Roles & ResponsibilitiesDefine cybersecurity responsibilities for all personnel and ensure that all security-related positions are staffed by qualified individuals who have the necessary skill set.
HRS-04Personnel ScreeningManage personnel security risk and formally indoctrinate all the relevant types of information to which an individual would have access to by following organized-defined special protections of screening individuals prior to authorizing access to a system that stores, transmits or processes sensitive information.
HRS-05Terms of EmploymentRequiring all employees and contractors to apply security and privacy principles in their daily work defined by acceptable and unacceptable rules of behavior for the use of technologies, including consequences for unacceptable behavior.
HRS-06Access AgreementsRequire employees and third-party users to sign appropriate access agreements such as Non-Disclosure Agreements (NDAs) or similar confidentiality agreements that reflect the needs to protect data and operational details prior to being granted access.
HRS-07Personnel SanctionsSanction personnel failing to comply with established security policies, standards and procedures by conducting employee misconduct investigations when there is reasonable assurance that a policy has been violated.
HRS-08Personnel TransferAdjust logical and physical access authorizations to systems and facilities upon personnel reassignment or transfer, in a timely manner.
HRS-09Personnel TerminationGovern the termination of individual employment by: -cretrieving organization-owned assets upon termination, - expediting the process of removing "high risk" individual’s access to systems and applications upon termination, as determined by management; and - governing third-party personnel by notifying terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information.
HRS-10Third-Party Personnel SecurityGovern third-party personnel by reviewing and monitoring third-party cybersecurity and privacy roles and responsibilities.
HRS-11Separation of DutiesMaintain Separation of Duties (SoD) to prevent potential malevolent activity without collusion.
HRS-13Identify Critical Skills & GapsEvaluate the critical cybersecurity and privacy skills needed to support the organization’s mission and identify gaps that exist.
ControlTitleDescription
IAC-01Identity & Access Management (IAM)Facilitate the identification and access management security controls.
IAC-02Identification & Authentication for Organizational UsersUniquely identify and authenticate organizational users and processes acting on behalf of organizational users.
IAC-03Identification & Authentication for Non-Organizational UsersUniquely identify and authenticate third-party users and processes that provide services to the organization.
IAC-04Identification & Authentication for DevicesUniquely identify and authenticate devices before establishing a connection using bidirectional authentication that is cryptographically- based and replay resistant.
IAC-05Identification & Authentication for Third Party Systems & ServicesIdentify and authenticate third-party systems and services.
IAC-06Multi-Factor Authentication (MFA)Automatically enforce Multi-Factor Authentication (MFA) for: - Remote network access; and/or - Non-console access to critical systems or systems that store, transmit and/or process sensitive data.
IAC-07User Provisioning & De-ProvisioningUtilize a formal user registration and de-registration process that governs the assignment of access rights.
IAC-07.1Change of Roles & DutiesRevoke user access rights following changes in personnel roles and duties, if no longer necessary or permitted.
IAC-08Role-Based Access Control (RBAC)Enforce a Role-Based Access Control (RBAC) policy over users and resources that applies need-to-know and fine-grained access control for sensitive data access.
IAC-09Identifier Management (User Names)Govern naming standards for usernames and systems to ensure proper user identification management for non-consumer users and administrators.
IAC-10Authenticator Management (Passwords)Securely manage passwords for users and devices ensuring vendor-supplied defaults are changed as part of the installation process.
IAC-15Account ManagementProactively govern account management of individual, group, system, application, guest and temporary accounts.
IAC-16Privileged Account Management (PAM)Restrict and control privileged access rights for users and services.
IAC-17Periodic ReviewPeriodically review the privileges assigned to users to validate the need for such privileges; and reassign or remove privileges, if necessary, to correctly reflect organizational mission and business needs.
IAC-20Access EnforcementEenforce logical access permissions through the principle of "least privilege."
IAC-21Least PrivilegeUtilize the concept of least privilege, allowing only authorized access to processes necessary to accomplish assigned tasks in accordance with organizational business functions.
IAC-22Account LockoutEnforce a limit for consecutive invalid login attempts by a user during an organization-defined time period and automatically locks the account when the maximum number of unsuccessful attempts is exceeded.
ControlTitleDescription
IAO-01Information Assurance (IA) OperationsFacilitate the implementation of cybersecurity and privacy assessment and authorization security controls.
IAO-02AssessmentsFormally assess and ensure assessors or assessment teams have the appropriate independence to conduct cybersecurity and privacy security control assessments in systems, applications and services through Information Assurance Program (IAP) activities to determine the extent to which the security controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting expected requirements for: - Statutory, regulatory and contractual compliance obligations; - Monitoring capabilities; - Mobile devices; - Databases; - Application security; - Embedded technologies (e.g., IoT, OT, etc.); - Vulnerability management; - Malicious code; - Insider threats; and - Performance/load testing.
IAO-04Threat Analysis & Flaw Remediation During DevelopmentRequire system developers and integrators to create and execute a Security Test and Evaluation (ST&E) plan to identify and remediate flaws during development.
IAO-05Plan of Action & Milestones (POA&M)Generate a Plan of Action and Milestones (POA&M), or similar risk register, to document planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities.
IAO-06Technical VerificationPerform Information Assurance Program (IAP) activities to evaluate the design, implementation and effectiveness of technical security and privacy controls.
ControlTitleDescription
IRO-01Incident Response OperationsImplement and govern processes and documentation to facilitate an organization-wide response capability for security and privacy-related incidents.
IRO-02Incident HandlingCover the preparation, automated detection or intake of incident reporting, analysis, containment, eradication and recovery.
IRO-04Incident Response Plan (IRP)Maintain and make available a current and viable Incident Response Plan (IRP) to all stakeholders to address Personal Data (PD) incidents according to applicable laws, regulations and contractual obligations.
IRO-07Integrated Security Incident Response Team (ISIRT)Establish an integrated team of cybersecurity, IT and business function representatives that are capable of addressing cybersecurity and privacy incident response operations.
IRO-09Situational Awareness For IncidentsDocument, monitor and report the status of cybersecurity and privacy incidents to internal stakeholders all the way through the resolution of the incident.
IRO-10Incident Stakeholder ReportingReport sensitive data incidents and provide security and privacy incident information in a timely manner to applicable: - Internal stakeholders; - Affected clients & third-parties; - Regulatory authorities; and to the provider of the product or service and other organizations involved in the supply chain for systems or system components related to the incident.
IRO-14Regulatory & Law Enforcement ContactsMaintain incident response contacts with applicable regulatory and law enforcement agencies.
ControlTitleDescription
MDM-01Centralized Management of Mobile DevicesDevelop, govern & update procedures to facilitate the implementation of mobile device management controls.
MDM-03Full Device & Container-Based EncryptionImplement cryptographic mechanisms to protect the confidentiality and integrity of information on mobile devices through full-device or container encryption.
ControlTitleDescription
MON-01Continuous MonitoringEnterprise-wide monitoring controls such as Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points. Bramble utilizes Host-based Intrusion Detection / Prevention Systems (HIDS/HIPS) to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities and actively responds to alerts from physical, cybersecurity, privacy and supply chain activities, blocking unwanted activities to achieve and maintain situational awareness. Bramble utilizes Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and detect attack attempts via wireless networks. Bramble sends logs to a Security Incident Event Manager (SIEM) or similar automated tool to review event logs on an ongoing basis and escalate incidents in accordance with established timelines and procedures.
MON-02Centralized Collection of Security Event LogsUtilize a Security Incident Event Manager (SIEM) or similar automated tool, to support the centralized collection of security-related event logs to maintain situational awareness.
MON-03Content of Audit RecordsConfigure systems to produce audit records that contain sufficient information to, at a minimum: - Establish what type of event occurred; - When (date and time) the event occurred; - Where the event occurred; - The source of the event; - The outcome (success or failure) of the event; and - The identity of any user/subject associated with the event.
MON-06Monitoring ReportingProvide an event log report generation capability to aid in detecting and assessing anomalous activities.
MON-10Audit Record RetentionRetain audit records for a time period consistent with records retention requirements to provide support for after-the-fact investigations of security incidents and to meet statutory, regulatory and contractual retention requirements.
MON-16Anomalous BehaviorDetect and respond to anomalous behavior that could indicate account compromise or other malicious activities.
ControlTitleDescription
NET-01Network Security ManagementDevelop, govern & update procedures to facilitate the implementation of network security controls.
NET-02Layered Network DefensesImplement security functions as a layered structure that minimizes interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
NET-03Boundary ProtectionLimit network access points by monitoring and controlling communications at the external network boundary and at key internal boundaries within the network.
NET-04Data Flow Enforcement – Access Control Lists (ACLs)Design, implement and review firewall and router configurations to restrict connections between untrusted networks and internal systems and deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
NET-06Network SegmentationLogically or physically segment information flows to accomplish network segmentation to other components of the system and implementing security management subnets to isolate security tools.
NET-08Network Intrusion Detection / Prevention Systems (NIDS / NIPS)Employ Network Intrusion Detection / Prevention Systems (NIDS/NIPS) to detect and/or prevent intrusions into the network.
NET-12Safeguarding Data over Open NetworksImplement cryptographic mechanisms for strong cryptography and security protocols to safeguard sensitive data during transmission over open, public networks and to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered.
NET-13Electronic MessagingProtect information involved in electronic messaging communications.
NET-14Remote AccessDefine, control and review remote access methods.
ControlTitleDescription
OPS-01Operations SecurityImplement operational security controls to identify and document Standardized Operating Procedures (SOP), or similar documentation, to enable the proper execution of day-to-day / assigned tasks.
OPS-02Security Concept Of Operations (CONOPS)Develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders.
OPS-03Service Delivery (Business Process Support)Define supporting business processes and implement appropriate governance and service management to ensure appropriate planning, delivery and support of the organization's technology capabilities supporting business functions, workforce, and/or customers based on industry-recognized standards to achieve the specific goals of the process area.
ControlTitleDescription
PES-01Physical & Environmental ProtectionsFacilitate the operation of physical and environmental protection controls.
PES-02Physical Access AuthorizationsImplement physical access controls to maintain a current list of personnel with authorized access to organizational facilities based on the position or role of the individual, (except for those areas within the facility officially designated as publicly accessible).
PES-03Physical Access ControlImplement physical access controls to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible).
ControlTitleDescription
PRI-05Use, Retention & Disposal - Retain Personal Data (PD), including metadata, for an organization-defined time period to fulfill the purpose(s) identified in the notice or as required by law; - Dispose of, destroys, erases, and/or anonymizes the PI, regardless of the method of storage; and - Use organization-defined techniques or methods to ensure secure deletion or destruction of PD (including originals, copies and archived records).
PRI-14Privacy Records & ReportingMaintain privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory privacy program mandates.
ControlTitleDescription
PRM-01Security Portfolio ManagementSecurity and privacy-related resource planning controls that define a viable plan for achieving cybersecurity & privacy objectives.
PRM-02Security & Privacy Resource ManagementAddress all capital planning and investment requests, including the resources needed to implement the security & privacy programs and documents all exceptions to this requirement.
PRM-03Allocation of ResourcesIdentify and allocate resources for management, operational, technical and privacy requirements within business process planning for projects / initiatives.
PRM-04Security & Privacy In Project ManagementAssess security and privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements.
PRM-05Security & Privacy Requirements DefinitionIdentify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC).
PRM-06Business Process DefinitionDefine business processes with consideration for cybersecurity and privacy that determines: - The resulting risk to organizational operations, assets, individuals and other organizations; and - Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
PRM-07Secure Development Life Cycle (SDLC) ManagementEnsure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures.
ControlTitleDescription
RSK-01Risk Management ProgramImplement risk management controls.
RSK-02Risk-Based Security CategorizationCategorizes systems and data in accordance with applicable local, state and Federal laws that: - Document the security categorization results (including supporting rationale) in the security plan for systems; and - Ensure the security categorization decision is reviewed and approved by the asset owner.
RSK-03Risk IdentificationIdentify and document risks, both internal and external.
RSK-04Risk AssessmentConduct an annual assessment of risk and maintain a risk register that monitors the reporting of risks including the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data.
RSK-05Risk RankingIdentify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices.
RSK-06Risk RemediationRemediate risks to an acceptable level and respond to findings from security and privacy assessments, incidents and audits to ensure proper remediation has been performed.
RSK-07Risk Assessment UpdateRoutinely update risk assessments and react accordingly upon identifying new security vulnerabilities, including using outside sources for security vulnerability information.
RSK-08Business Impact Analysis (BIA)Conduct a Business Impact Analysis (BIA).
RSK-09Supply Chain Risk Management PlanDevelop a plan for Supply Chain Risk Management (SCRM) and periodically assess supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans.
RSK-10Data Protection Impact Assessment (DPIA)Conduct a Data Protection Impact Assessment (DPIA) on systems, applications and services to evaluate privacy implications.
ControlTitleDescription
SAT-01Security & Privacy-Minded WorkforceSecurity workforce development and awareness controls.
ControlTitleDescription
SEA-01Secure Engineering PrinciplesCentrally-manage organization-wide management and implementation of industry-recognized cybersecurity and privacy practices and other related processes in the specification, design, development, implementation and modification of systems and services.
SEA-02Alignment With Enterprise ArchitectureDevelop an enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity and privacy principles that addresses risk to organizational operations, assets, individuals, and other organizations.
ControlTitleDescription
TDA-01Technology Development & AcquisitionTailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs.
TDA-02Security RequirementsTechnical and functional specifications, explicitly or by reference, in system acquisitions based on an assessment of risk.
TDA-15Developer Threat Analysis & Flaw RemediationRequire system developers and integrators to create a Security Test and Evaluation (ST&E) plan and implement the plan under the witness of an independent party.
ControlTitleDescription
THR-01Threat Intelligence ProgramIncludes a cross-organization information-sharing capability that can influence the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, response and recovery activities.
THR-02Indicators of Exposure (IOE)Develop Indicators of Exposure (IOE) to understand the potential attack vectors that could be used to attack the organization.
THR-04Insider Threat ProgramIncludes a cross-discipline insider threat incident handling team.
ControlTitleDescription
TPM-01Third-Party ManagementManagement of third-party security controls.
TPM-02Third-Party Criticality AssessmentsIdentify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services.
TPM-03Supply Chain ProtectionEvaluating security risks and addressing identified weaknesses or deficiencies in the security associated with the services and product supply chain, limiting harm from potential adversaries who identify and target the organization’s supply chain by utilizing tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services.
TPM-04Third-Party ServicesMitigate the risks associated with third-party access to the organization’s systems and data and ensure that the interests of third-party service providers are consistent with and reflect organizational interests.
TPM-05Third-Party Contract RequirementsIdentify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization’s needs to protect systems and data.
TPM-06Third-Party Personnel SecurityControl personnel security requirements including security roles and responsibilities for third-party providers.
TPM-07Monitoring for Third-Party Information DisclosureMonitor for evidence of unauthorized exfiltration or disclosure of organizational information.
TPM-08Review of Third-Party ServicesMonitor, regularly review and audit supplier service delivery for compliance with established contract agreements.
TPM-09Third-Party Deficiency RemediationAddress weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
TPM-10Managing Changes To Third-Party ServicesControl changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party.
TPM-11Third-Party Incident Response & Recovery CapabilitiesEnsure response/recovery planning and testing are conducted with critical suppliers/providers.
ControlTitleDescription
VPM-02Vulnerability Remediation ProcessEnsure that vulnerabilities are properly identified, tracked and remediated.
VPM-04Continuous Vulnerability Remediation ActivitiesAddress new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks.
VPM-05Software PatchingConduct software patching for all deployed operating systems, applications and firmware.
VPM-06Vulnerability ScanningDetect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications.
VPM-07Penetration TestingConduct penetration testing on systems and web applications.