Security Governance

Edited

Information security starts at the top, and this series of activities helps organizations act towards building a sustainable cyber security program.  

 

 

Category

Sub-Category

Name

Activity

Security Governance

 Policy Governance

Policy and Standard Review 

[The organization's] policies and standards are reviewed, approved by management, and communicated to authorized personnel [in accordance with the organization-defined frequency]. 

Security Governance

Policy Governance

Exception Management

[The organization] reviews exceptions to policies, standards, and procedures; exceptions are documented and approved based on business need and removed when no longer required. 

Security Governance

Policy Governance

Document Control

[The organization]'s document management criteria is periodically reviewed, approved by management, and communicated to authorized personnel; management determines the treatment and retention of documentation according to legal and regulatory requirements.

Security Governance 

Security Documentation 

Information Security Program Content 

[The organization-defined security leader] conducts a periodic staff meeting to communicate and align on relevant security threats, program performance, and resource prioritization.

Security Governance

Security Documentation

Procedures

[The organization's] key control capabilities are supported by documented procedures that are communicated to authorized personnel

Security Governance

Privacy Program

Privacy Readiness Review

[The organization] performs privacy readiness reviews to identify high-risk processing activities that impact personal data; identified non- compliance with [the organization] privacy practices is tracked through remediation.

Security Governance

Privacy Documentation

Document Management Standard: HIPAA

Documentation that impacts personal health information, including policies, procedures, and the documentation of actions, activities, or assessments, are retained for 6 years from the date of its creation, or the date when it last was in effect, whichever is later.

Security Governance

Workforce
Agreements

Proprietary
Rights Agreement

[Workforce personnel as defined by the organization] consent to a proprietary rights agreement. 

Security Governance

Workforce Agreements

Review of Confidentiality Agreements

[The organization's] proprietary rights agreement and network access agreement are reviewed [in accordance with the organization-defined frequency]. 

Security Governance

Workforce Agreements

Key Custodians Agreement

Cryptographic Key Custodians and Cryptographic Materials Custodians (CMC) acknowledge in writing or electronically that they understand and accept their cryptographic-key-custodian responsibilities. 

Security Governance 

Information Security Management System

Information Security Program 

[The organization] has an established security leadership team including key stakeholders in [the organization's] Information Security Program; goals and milestones for deployment of the information security program are established and communicated to the company. 

Security Governance

Information
Security Management System

Information
Security Management System Scope

Information Security Management System (ISMS) boundaries are formally defined in an ISMS scoping document.

Security Governance 

Information Security Management System 

Security Roles and Responsibilities 

Roles and responsibilities for the governance of Information Security within [the organization] are formally documented within the Information Security Management Standard and communicated on the [the organization] intranet.

Security Governance 

Information Security Management System 

Security Roles and Responsibilities: PCI Compliance 

Roles and responsibilities and a program charter for the governance of PCI DSS compliance within [the organization] are formally documented and communicated by management.

Security Governance 

Information
Security
Management
System

Information
Security
Resources

Information systems security implementation and management is included as part of the budget required to support [the organization's] security program.

Security Governance 

Information Security Management System

Management Review

The Information Security Management System (ISMS) steering committee conducts a formal management review of ISMS scope, risk assessment activities, control implementation, and audit results on an annual basis. 

Security Governance

Software Licensing

Software Usage Restrictions

[The Organization] maintains software license contracts and monitors its compliance with usage restrictions.