Commitment to competence in security is demonstrated
People with security responsibilities need to actually know how to execute them. This control requires that the organization identifies what competencies are needed, assesses whether people have them, and fills gaps through hiring, training, or external support. An understaffed or undertrained security function is a systemic risk that undermines every other control.
Implementation steps
- 1
Define required security competencies for relevant roles
For each role with security responsibilities, document what knowledge or skills are expected. This can be informal for small teams but should be written. Examples: engineers should understand OWASP Top 10, IT admins should know how to configure MFA, the security lead should be able to run a tabletop incident exercise.
confluence notion google-docs - 2
Assess current competency and identify gaps
Review whether current staff meet the defined competency requirements. For small teams this can be a simple self-assessment. Document any gaps and the plan to address them.
google-docs notion - 3
Provide security training and track completion
Deliver security awareness training to all employees at least annually. For staff with specific security roles, provide role-appropriate training (e.g. secure coding, incident response, cloud security). Track completion records. Consider external certifications (CISSP, Security+, AWS Security Specialty) for key staff.
knowbe4 proofpoint sans coursera pluralsight
Evidence required
Security training completion records
Evidence that employees have completed required security training.
- - LMS report showing security awareness training completion by employee
- - KnowBe4 or similar completion records
- - Certification records for security staff (CISSP, CISM, Security+)
Competency requirements documentation
Written record of what security competencies are expected for relevant roles.
- - Training plan or curriculum for security-relevant roles
- - Security section in onboarding checklist
- - Job description requirements for security staff
Related controls
Commitment to integrity and ethical values is demonstrated
Control Environment
Board or equivalent body oversees security risk
Control Environment
Organizational structure and authority for security is defined
Control Environment
Accountability for security performance is enforced
Control Environment