Logo

CISOBot - Your AI CISO Assistant

Browse SCF Controls

Explore the complete catalog of Secure Controls Framework controls

GOV-01
Cybersecurity & Data Protection Governance Program
Weight: 10

Mechanisms exist to facilitate the implementation of cybersecurity and data protection governance controls.

Domain: Cybersecurity & Data Protection Governance
GOV-01.1
Steering Committee & Program Oversight
Weight: 7

Mechanisms exist to coordinate cybersecurity, data protection and business alignment through a steering committee or advisory board, comprised of key cybersecurity, data protection and business executives, which meets formally and on a regular basis.

Domain: Cybersecurity & Data Protection Governance
GOV-01.2
Status Reporting To Governing Body
Weight: 5

Mechanisms exist to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization's cybersecurity and data protection program.

Domain: Cybersecurity & Data Protection Governance
GOV-01.3
Commitment To Continual Improvements
Weight: 7

Mechanisms exist to commit appropriate resources needed for continual improvement of the organization's cybersecurity and data protection program, including: (1) Staffing; (2) Budget; (3) Processes; and (4) Technologies.

Domain: Cybersecurity & Data Protection Governance
GOV-02
Publishing Cybersecurity & Data Protection Documentation
Weight: 10

Mechanisms exist to establish, maintain and disseminate cybersecurity and data protection policies, standards and procedures.

Domain: Cybersecurity & Data Protection Governance
GOV-02.1
Exception Management
Weight: 8

Mechanisms exist to prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded.

Domain: Cybersecurity & Data Protection Governance
GOV-03
Periodic Review & Update of Cybersecurity & Data Protection Program
Weight: 7

Mechanisms exist to review the cybersecurity and data protection program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.

Domain: Cybersecurity & Data Protection Governance
GOV-04
Assigned Cybersecurity & Data Protection Responsibilities
Weight: 10

Mechanisms exist to assign one or more qualified individuals with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity and data protection program.

Domain: Cybersecurity & Data Protection Governance
GOV-04.1
Stakeholder Accountability Structure
Weight: 8

Mechanisms exist to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.

Domain: Cybersecurity & Data Protection Governance
GOV-04.2
Authoritative Chain of Command
Weight: 7

Mechanisms exist to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.

Domain: Cybersecurity & Data Protection Governance
GOV-05
Measures of Performance
Weight: 6

Mechanisms exist to develop, report and monitor cybersecurity and data protection program measures of performance.

Domain: Cybersecurity & Data Protection Governance
GOV-05.1
Key Performance Indicators (KPIs)
Weight: 6

Mechanisms exist to develop, report and monitor Key Performance Indicators (KPIs) to assist organizational management in performance monitoring and trend analysis of the cybersecurity and data protection program.

Domain: Cybersecurity & Data Protection Governance
GOV-05.2
Key Risk Indicators (KRIs)
Weight: 6

Mechanisms exist to develop, report and monitor Key Risk Indicators (KRIs) to assist senior management in performance monitoring and trend analysis of the cybersecurity and data protection program.

Domain: Cybersecurity & Data Protection Governance
GOV-06
Contacts With Authorities
Weight: 5

Mechanisms exist to identify and document appropriate contacts with relevant law enforcement and regulatory bodies.

Domain: Cybersecurity & Data Protection Governance
GOV-07
Contacts With Groups & Associations
Weight: 7

Mechanisms exist to establish contact with selected groups and associations within the cybersecurity and data privacy communities to: (1) Facilitate ongoing cybersecurity and data protection education and training for organizational personnel; (2) Maintain currency with recommended cybersecurity and data protection practices, techniques and technologies; and (3) Share current cybersecurity and/or data privacy-related information including threats, vulnerabilities and incidents.

Domain: Cybersecurity & Data Protection Governance
GOV-08
Defining Business Context & Mission
Weight: 5

Mechanisms exist to define the context of its business model and document the organization's mission.

Domain: Cybersecurity & Data Protection Governance
GOV-09
Define Control Objectives
Weight: 5

Mechanisms exist to establish control objectives as the basis for the selection, implementation and management of the organization's internal control system.

Domain: Cybersecurity & Data Protection Governance
GOV-10
Data Governance
Weight: 9

Mechanisms exist to facilitate data governance to oversee the organization's policies, standards and procedures so that sensitive/regulated data is effectively managed and maintained in accordance with applicable statutory, regulatory and contractual obligations.

Domain: Cybersecurity & Data Protection Governance
GOV-11
Purpose Validation
Weight: 5

Mechanisms exist to monitor mission/business-critical Technology Assets, Applications and/or Services (TAAS) to ensure those resources are being used consistent with their intended purpose.

Domain: Cybersecurity & Data Protection Governance
GOV-12
Forced Technology Transfer (FTT)
Weight: 10

Mechanisms exist to avoid and/or constrain the forced exfiltration of sensitive/regulated information (e.g., Intellectual Property (IP)) to the host government for purposes of market access or market management practices.

Domain: Cybersecurity & Data Protection Governance
GOV-13
State-Sponsored Espionage
Weight: 10

Mechanisms exist to constrain the host government's ability to leverage the organization's Technology Assets, Applications and/or Services (TAAS) for economic or political espionage and/or cyberwarfare activities.

Domain: Cybersecurity & Data Protection Governance
GOV-14
Business As Usual (BAU) Secure Practices
Weight: 6

Mechanisms exist to incorporate cybersecurity and data protection principles into Business As Usual (BAU) practices through executive leadership involvement.

Domain: Cybersecurity & Data Protection Governance
GOV-15
Operationalizing Cybersecurity & Data Protection Practices
Weight: 9

Mechanisms exist to compel data and/or process owners to operationalize cybersecurity and data protection practices for each Technology Asset, Application and/or Service (TAAS) under their control.

Domain: Cybersecurity & Data Protection Governance
GOV-15.1
Select Controls
Weight: 8

Mechanisms exist to compel data and/or process owners to select required cybersecurity and data protection controls for each Technology Asset, Application and/or Service (TAAS) under their control.

Domain: Cybersecurity & Data Protection Governance
GOV-15.2
Implement Controls
Weight: 9

Mechanisms exist to compel data and/or process owners to implement required cybersecurity and data protection controls for each Technology Asset, Application and/or Service (TAAS) under their control.

Domain: Cybersecurity & Data Protection Governance
GOV-15.3
Assess Controls
Weight: 8

Mechanisms exist to compel data and/or process owners to assess if required cybersecurity and data protection controls for each Technology Asset, Application and/or Service (TAAS) under their control are implemented correctly and are operating as intended.

Domain: Cybersecurity & Data Protection Governance
GOV-15.4
Authorize Technology Assets, Applications and/or Services (TAAS)
Weight: 8

Mechanisms exist to compel data and/or process owners to obtain authorization for the production use of each Technology Asset, Application and/or Service (TAAS) under their control.

Domain: Cybersecurity & Data Protection Governance
GOV-15.5
Monitor Controls
Weight: 8

Mechanisms exist to compel data and/or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Domain: Cybersecurity & Data Protection Governance
GOV-16
Materiality Determination
Weight: 7

Mechanisms exist to define materiality threshold criteria capable of designating an incident as material.

Domain: Cybersecurity & Data Protection Governance
GOV-16.1
Material Risks
Weight: 7

Mechanisms exist to define criteria necessary to designate a risk as a material risk.

Domain: Cybersecurity & Data Protection Governance
GOV-16.2
Material Threats
Weight: 7

Mechanisms exist to define criteria necessary to designate a threat as a material threat.

Domain: Cybersecurity & Data Protection Governance
GOV-17
Cybersecurity & Data Protection Status Reporting
Weight: 8

Mechanisms exist to submit status reporting of the organization's cybersecurity and/or data privacy program to applicable statutory and/or regulatory authorities, as required.

Domain: Cybersecurity & Data Protection Governance
GOV-18
Quality Management System (QMS)
Weight: 4

Mechanisms exist to govern a Quality Management System (QMS) to ensure cybersecurity and data protection processes conform with applicable statutory, regulatory and/or contractual obligations.

Domain: Cybersecurity & Data Protection Governance
GOV-19
Assurance
Weight: 7

Mechanisms exist to define the basis for confidence that implemented practices conform to applicable security, compliance and resilience controls, where the control implementation performs as intended.

Domain: Cybersecurity & Data Protection Governance
GOV-19.1
Assurance Levels (AL)
Weight: 7

Mechanisms exist to utilize defined Assurance Levels (AL) for assessment activities to standardize the following assurance attributes: (1) Depth that addresses the rigor and level of detail of the assessment; and (2) Coverage that addresses the scope and breadth of the assessment.

Domain: Cybersecurity & Data Protection Governance
GOV-19.2
Assessment Objectives (AO)
Weight: 7

Mechanisms exist to utilize defined Assessment Objectives (AO) to assess the implementation of requirements, when available.

Domain: Cybersecurity & Data Protection Governance
GOV-20
Mergers, Acquisitions & Divestitures (MA&D)
Weight: 6

Mechanisms exist to define standardized practices to conduct Mergers, Acquisitions and Divestiture (MA&D) activities.

Domain: Cybersecurity & Data Protection Governance
GOV-20.1
Virtual Data Room (VDR)
Weight: 6

Mechanisms exist to provision a Virtual Data Room (VDR), or similar technology, to securely share documentation among stakeholders to conduct Mergers, Acquisitions and Divestiture (MA&D) activities.

Domain: Cybersecurity & Data Protection Governance
AAT-01
Artificial Intelligence (AI) & Autonomous Technologies Governance
Weight: 10

Mechanisms exist to ensure policies, processes, procedures and practices related to the mapping, measuring and managing of Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks are in place, transparent and implemented effectively.

Domain: Artificial & Autonomous Technologies
AAT-01.1
AI & Autonomous Technologies-Related Legal Requirements Definition
Weight: 8

Mechanisms exist to identify, understand, document and manage applicable statutory and regulatory requirements for Artificial Intelligence (AI) and Autonomous Technologies (AAT).

Domain: Artificial & Autonomous Technologies
AAT-01.2
Trustworthy AI & Autonomous Technologies
Weight: 10

Mechanisms exist to ensure Artificial Intelligence (AI) and Autonomous Technologies (AAT) are designed to be reliable, safe, fair, secure, resilient, transparent, explainable and data privacy-enhanced to minimize emergent properties or unintended consequences.

Domain: Artificial & Autonomous Technologies
AAT-01.3
AI & Autonomous Technologies Value Sustainment
Weight: 1

Mechanisms exist to sustain the value of deployed Artificial Intelligence (AI) and Autonomous Technologies (AAT).

Domain: Artificial & Autonomous Technologies
AAT-01.4
AI Model & Agent Inventory & Lifecycle Management
Weight: 5

Mechanisms exist to track the lifecycle of all AI models and AI agents, including ownership, intended purpose and status across: (1) Development; (2) Deployment; (3) Updates; and (4) Decommissioning.

Domain: Artificial & Autonomous Technologies
AAT-02
Situational Awareness of AI & Autonomous Technologies
Weight: 9

Mechanisms exist to develop and maintain an inventory of Artificial Intelligence (AI) and Autonomous Technologies (AAT) (internal and third-party).

Domain: Artificial & Autonomous Technologies
AAT-02.1
AI & Autonomous Technologies Risk Mapping
Weight: 9

Mechanisms exist to identify Artificial Intelligence (AI) and Autonomous Technologies (AAT) in use and map those components to potential legal risks, including statutory and regulatory compliance requirements.

Domain: Artificial & Autonomous Technologies
AAT-02.2
AI & Autonomous Technologies Internal Controls
Weight: 9

Mechanisms exist to identify and document internal cybersecurity and data protection controls for Artificial Intelligence (AI) and Autonomous Technologies (AAT).

Domain: Artificial & Autonomous Technologies
AAT-02.3
Adequate Protections For AI & Autonomous Technologies
Weight: 10

Mechanisms exist to ensure Artificial Intelligence (AI) and Autonomous Technologies (AAT) include reasonable cybersecurity and data protections that are commensurate with assessed risks and threats.

Domain: Artificial & Autonomous Technologies
AAT-02.4
AI Threat Modeling & Risk Assessment
Weight: 5

Mechanisms exist to conduct Artificial Intelligence (AI) and Autonomous Technologies (AAT)-specific threat modeling and risk assessments to address the following criteria across the lifecycle of the AAT: (1) Attack surfaces; (2) Adversarial threats; and (3) Abuse / misuse scenarios.

Domain: Artificial & Autonomous Technologies
AAT-03
AI & Autonomous Technologies Context Definition
Weight: 8

Mechanisms exist to establish and document the context surrounding Artificial Intelligence (AI) and Autonomous Technologies (AAT), including: (1) Intended purposes; (2) Potentially beneficial uses; (3) Context-specific laws and regulations; (4) Norms and expectations; and (5) Prospective settings in which the system(s) will be deployed.

Domain: Artificial & Autonomous Technologies
AAT-03.1
AI & Autonomous Technologies Mission and Goals Definition
Weight: 8

Mechanisms exist to define and document the organization's mission and defined goals for Artificial Intelligence (AI) and Autonomous Technologies (AAT).

Domain: Artificial & Autonomous Technologies