AuditRubric
gv-oc-2 high Govern / Organizational Context

Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered

Different stakeholders have very different security expectations: customers want their data protected, regulators want documented compliance, investors want business continuity, and employees want clear guidance on acceptable behavior. Without a structured view of who these stakeholders are and what they need, security programs tend to address the loudest voices rather than the most important requirements. Understanding stakeholder expectations upfront prevents costly gaps and surprises during audits or incidents.

Estimated effort: 4h
governancestakeholderscontextrequirementscompliance

Implementation steps

  1. 1

    Identify all relevant internal and external stakeholders

    Create a stakeholder register that lists internal groups (board, executives, IT, legal, HR, operations) and external parties (customers, regulators, auditors, investors, partners, insurers). Note their primary interest in cybersecurity outcomes.

    confluencenotiongoogle-sheets
  2. 2

    Document each stakeholder's cybersecurity needs and expectations

    For each stakeholder group, capture their specific security expectations. Regulators may require specific controls or breach notification timelines. Customers may require SOC 2 or ISO 27001 reports. Insurers may require MFA and EDR. Use interviews, contract reviews, and regulatory guidance to gather this information.

    confluencegoogle-docsnotion
  3. 3

    Incorporate stakeholder requirements into the risk management process

    Map each stakeholder expectation to a policy, control, or risk register entry. Assign ownership and set review cycles aligned with stakeholder reporting cadences, such as annual customer trust reports or quarterly board updates.

    jiraconfluencegoogle-sheets

Evidence required

Stakeholder register

A documented list of internal and external stakeholders with their identified cybersecurity needs and expectations.

  • · Spreadsheet listing stakeholder groups, contact points, and security requirements
  • · Confluence page with stakeholder analysis including regulatory and customer expectations
  • · Risk management plan section covering stakeholder identification

Evidence of stakeholder input incorporated into security decisions

Documentation showing that stakeholder needs have influenced security policies, controls, or risk prioritization decisions.

  • · Risk register entries tagged with originating stakeholder requirement
  • · Policy change log referencing customer or regulator feedback
  • · Board meeting minutes discussing stakeholder security expectations

Related controls