Security Governance
Information security starts at the top, and this series of activities helps organizations act towards building a sustainable cyber security program.
  | Category  | Sub-Category  | Name  | Activity  | 
|---|---|---|---|---|
Security Governance  | Policy Governance  | Policy and Standard Review  | [The organization's] policies and standards are reviewed, approved by management, and communicated to authorized personnel [in accordance with the organization-defined frequency].  | |
Security Governance  | Policy Governance  | Exception Management  | [The organization] reviews exceptions to policies, standards, and procedures; exceptions are documented and approved based on business need and removed when no longer required.  | |
Security Governance  | Policy Governance  | Document Control  | [The organization]'s document management criteria is periodically reviewed, approved by management, and communicated to authorized personnel; management determines the treatment and retention of documentation according to legal and regulatory requirements.  | |
Security Governance  | Security Documentation  | Information Security Program Content  | [The organization-defined security leader] conducts a periodic staff meeting to communicate and align on relevant security threats, program performance, and resource prioritization.  | |
Security Governance  | Security Documentation  | Procedures  | [The organization's] key control capabilities are supported by documented procedures that are communicated to authorized personnel  | |
Security Governance  | Privacy Program  | Privacy Readiness Review  | [The organization] performs privacy readiness reviews to identify high-risk processing activities that impact personal data; identified non- compliance with [the organization] privacy practices is tracked through remediation.  | |
Security Governance  | Privacy Documentation  | Document Management Standard: HIPAA  | Documentation that impacts personal health information, including policies, procedures, and the documentation of actions, activities, or assessments, are retained for 6 years from the date of its creation, or the date when it last was in effect, whichever is later.  | |
Security Governance  | Workforce  | Proprietary  | [Workforce personnel as defined by the organization] consent to a proprietary rights agreement.  | |
Security Governance  | Workforce Agreements  | Review of Confidentiality Agreements  | [The organization's] proprietary rights agreement and network access agreement are reviewed [in accordance with the organization-defined frequency].  | |
Security Governance  | Workforce Agreements  | Key Custodians Agreement  | Cryptographic Key Custodians and Cryptographic Materials Custodians (CMC) acknowledge in writing or electronically that they understand and accept their cryptographic-key-custodian responsibilities.  | |
Security Governance  | Information Security Management System  | Information Security Program  | [The organization] has an established security leadership team including key stakeholders in [the organization's] Information Security Program; goals and milestones for deployment of the information security program are established and communicated to the company.  | |
Security Governance  | Information  | Information  | Information Security Management System (ISMS) boundaries are formally defined in an ISMS scoping document.  | |
Security Governance  | Information Security Management System  | Security Roles and Responsibilities  | Roles and responsibilities for the governance of Information Security within [the organization] are formally documented within the Information Security Management Standard and communicated on the [the organization] intranet.  | |
Security Governance  | Information Security Management System  | Security Roles and Responsibilities: PCI Compliance  | Roles and responsibilities and a program charter for the governance of PCI DSS compliance within [the organization] are formally documented and communicated by management.  | |
Security Governance  | Information  | Information  | Information systems security implementation and management is included as part of the budget required to support [the organization's] security program.  | |
Security Governance  | Information Security Management System  | Management Review  | The Information Security Management System (ISMS) steering committee conducts a formal management review of ISMS scope, risk assessment activities, control implementation, and audit results on an annual basis.  | |
Security Governance  | Software Licensing  | Software Usage Restrictions  | [The Organization] maintains software license contracts and monitors its compliance with usage restrictions.  | 
