governance Controls
32 controls across 4 frameworks.
CISA CPG
HIPAA
Designate a security official responsible for developing and implementing security policies and procedures
Administrative Safeguards / Assigned Security Responsibility
Implement reasonable and appropriate policies and procedures to comply with the HIPAA Security Rule
Policies & Procedures / Policy Implementation
Maintain written security policies, procedures, and records for six years from creation or last effective date
Policies & Procedures / Documentation
NIST CSF
The organizational mission is understood and informs cybersecurity risk management
Govern / Organizational Context
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
Govern / Organizational Context
Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed
Govern / Organizational Context
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
Govern / Organizational Context
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Govern / Organizational Context
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy
Govern / Oversight
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
Govern / Oversight
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments
Govern / Oversight
A cybersecurity risk management policy is established and enforced
Govern / Policy
The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology
Govern / Policy
Risk management objectives are established and agreed to by organizational stakeholders
Govern / Risk Management Strategy
Risk appetite and risk tolerance statements are established, communicated, and maintained
Govern / Risk Management Strategy
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
Govern / Risk Management Strategy
Strategic direction that describes appropriate risk response options is established and communicated
Govern / Risk Management Strategy
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
Govern / Risk Management Strategy
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
Govern / Risk Management Strategy
Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions
Govern / Risk Management Strategy
Organizational leadership is responsible and accountable for cybersecurity risk
Govern / Roles, Responsibilities, and Authorities
Cybersecurity roles, responsibilities, and authorities are established and enforced
Govern / Roles, Responsibilities, and Authorities
Adequate resources are allocated to cybersecurity commensurate with risk
Govern / Roles, Responsibilities, and Authorities
A cybersecurity supply chain risk management program is established
Govern / Cybersecurity Supply Chain Risk Management
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Govern / Cybersecurity Supply Chain Risk Management
Supply chain risk management is integrated into enterprise risk management processes
Govern / Cybersecurity Supply Chain Risk Management
Changes and exceptions are managed, assessed for risk impact, and tracked
Identify / Risk Assessment
SOC2
Commitment to integrity and ethical values is demonstrated
Security / Control Environment
Board or equivalent body oversees security risk
Security / Control Environment
Organizational structure and authority for security is defined
Security / Control Environment
Controls are deployed through policies and procedures
Security / Control Activities