governance

governance Controls

32 controls across 4 frameworks.

CISA CPG

HIPAA

NIST CSF

gv-oc-1

The organizational mission is understood and informs cybersecurity risk management

Govern / Organizational Context

gv-oc-2

Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered

Govern / Organizational Context

gv-oc-3

Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed

Govern / Organizational Context

gv-oc-4

Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated

Govern / Organizational Context

gv-oc-5

Outcomes, capabilities, and services that the organization depends on are understood and communicated

Govern / Organizational Context

gv-ov-1

Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy

Govern / Oversight

gv-ov-2

The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks

Govern / Oversight

gv-ov-3

Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments

Govern / Oversight

gv-po-1

A cybersecurity risk management policy is established and enforced

Govern / Policy

gv-po-2

The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology

Govern / Policy

gv-rm-1

Risk management objectives are established and agreed to by organizational stakeholders

Govern / Risk Management Strategy

gv-rm-2

Risk appetite and risk tolerance statements are established, communicated, and maintained

Govern / Risk Management Strategy

gv-rm-3

Cybersecurity risk management activities and outcomes are included in enterprise risk management processes

Govern / Risk Management Strategy

gv-rm-4

Strategic direction that describes appropriate risk response options is established and communicated

Govern / Risk Management Strategy

gv-rm-5

Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties

Govern / Risk Management Strategy

gv-rm-6

A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated

Govern / Risk Management Strategy

gv-rm-7

Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions

Govern / Risk Management Strategy

gv-rr-1

Organizational leadership is responsible and accountable for cybersecurity risk

Govern / Roles, Responsibilities, and Authorities

gv-rr-2

Cybersecurity roles, responsibilities, and authorities are established and enforced

Govern / Roles, Responsibilities, and Authorities

gv-rr-3

Adequate resources are allocated to cybersecurity commensurate with risk

Govern / Roles, Responsibilities, and Authorities

gv-sc-1

A cybersecurity supply chain risk management program is established

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-2

Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-3

Supply chain risk management is integrated into enterprise risk management processes

Govern / Cybersecurity Supply Chain Risk Management

id-ra-7

Changes and exceptions are managed, assessed for risk impact, and tracked

Identify / Risk Assessment

SOC2