cc1-2 High priority Security / Control Environment

Board or equivalent body oversees security risk

Someone at the governance level — a board, an audit committee, or a named executive — must formally own cybersecurity risk oversight. For most startups this is the CEO or a named board member. The requirement is not complex governance structures; it is that security risk is reviewed at the top of the organization on a defined cadence, decisions are documented, and that person can speak to what risks exist and what is being done about them.

Complete first: cc1-1

Implementation steps

  1. 1

    Assign a named security risk owner at the executive level

    Document who at board or executive level is responsible for cybersecurity oversight. For startups this is typically the CEO or CTO. For companies with boards, designate a board member or audit committee to receive security updates. Put this in your security policy.

    confluence notion
  2. 2

    Establish a recurring security review cadence

    Schedule at least quarterly reviews where the security posture, risk register, and significant incidents are presented to the oversight body. For boards, this can be part of an existing board meeting. Document the agenda and keep minutes or written summaries of each review.

    notion google-docs confluence
  3. 3

    Document oversight activities

    Keep records of security reviews: who attended, what risks were discussed, what decisions were made, and any follow-up actions assigned. These records are what auditors will inspect. Board minutes, email summaries, or a security review log all qualify.

    google-docs notion confluence

Evidence required

Documented oversight assignment

Written record showing who holds board-level or executive-level responsibility for cybersecurity risk oversight.

  • - Security policy naming the CISO or CTO as executive risk owner
  • - Board charter or committee charter referencing cybersecurity oversight
  • - Org chart with named security accountability

Records of security reviews

Evidence that security risk is reviewed at the governance level on a regular cadence.

  • - Board meeting minutes with security agenda item
  • - Quarterly security review summaries sent to executive team
  • - Risk register reviewed and signed off by executive sponsor

Related controls