APRA CPS 230

Operational Risk Management

Framework

APRA CPS 230

Authority

APRA (Australian Prudential Regulation Authority)

Mapped Controls

73

About APRA CPS 230
Australian Prudential Regulation Authority - Prudential Standard CPS 230
SCF Control Crosswalk Mapping
Showing 73 SCF controls mapped to APRA CPS 230
SCF ControlControl NameDomainAPRA CPS 230 RequirementWeightActions
GOV-01.1
Steering Committee & Program OversightCybersecurity & Data Protection GovernanceN/A7
GOV-01.2
Status Reporting To Governing BodyCybersecurity & Data Protection GovernanceN/A5
GOV-04
Assigned Cybersecurity & Data Protection ResponsibilitiesCybersecurity & Data Protection GovernanceN/A10
GOV-04.1
Stakeholder Accountability StructureCybersecurity & Data Protection GovernanceN/A8
GOV-04.2
Authoritative Chain of CommandCybersecurity & Data Protection GovernanceN/A7
GOV-06
Contacts With AuthoritiesCybersecurity & Data Protection GovernanceN/A5
GOV-14
Business As Usual (BAU) Secure PracticesCybersecurity & Data Protection GovernanceN/A6
GOV-15
Operationalizing Cybersecurity & Data Protection PracticesCybersecurity & Data Protection GovernanceN/A9
GOV-15.1
Select ControlsCybersecurity & Data Protection GovernanceN/A8
GOV-15.5
Monitor ControlsCybersecurity & Data Protection GovernanceN/A8
BCD-01
Business Continuity Management System (BCMS)Business Continuity & Disaster RecoveryN/A10
BCD-01.4
Recovery Time / Point Objectives (RTO / RPO)Business Continuity & Disaster RecoveryN/A5
BCD-02
Identify Critical AssetsBusiness Continuity & Disaster RecoveryN/A9
BCD-02.1
Resume All Missions & Business FunctionsBusiness Continuity & Disaster RecoveryN/A8
BCD-02.2
Continue Essential Mission & Business FunctionsBusiness Continuity & Disaster RecoveryN/A8
BCD-02.3
Resume Essential Missions & Business FunctionsBusiness Continuity & Disaster RecoveryN/A8
BCD-04
Contingency Plan Testing & ExercisesBusiness Continuity & Disaster RecoveryN/A6
CHG-02
Configuration Change ControlChange ManagementN/A8
CHG-02.4
Automated Security ResponseChange ManagementN/A5
CHG-04
Access Restriction For ChangeChange ManagementN/A8
CHG-04.1
Automated Access Enforcement / AuditingChange ManagementN/A3
CHG-04.2
Signed ComponentsChange ManagementN/A3
CHG-04.3
Dual Authorization for ChangeChange ManagementN/A6
CHG-04.4
Permissions To Implement ChangesChange ManagementN/A6
CHG-04.5
Library PrivilegesChange ManagementN/A8
CHG-05
Stakeholder Notification of ChangesChange ManagementN/A9
CHG-06.1
Report Verification ResultsChange ManagementN/A5
CHG-07
Emergency ChangesChange ManagementN/A9
CHG-07.1
Documenting Emergency ChangesChange ManagementN/A7
CPL-01
Statutory, Regulatory & Contractual ComplianceComplianceN/A10
CPL-01.1
Non-Compliance OversightComplianceN/A9
CPL-02
Cybersecurity & Data Protection Controls OversightComplianceN/A10
CPL-02.1
Internal Audit FunctionComplianceN/A5
CFG-01.1
Assignment of ResponsibilityConfiguration ManagementN/A5
CFG-02.3
Retention Of Previous ConfigurationsConfiguration ManagementN/A3
CFG-02.5
Configure Technology Assets, Applications and/or Services (TAAS) for High-Risk AreasConfiguration ManagementN/A8
CFG-02.7
Approved Configuration DeviationsConfiguration ManagementN/A9
CFG-02.8
Respond To Unauthorized ChangesConfiguration ManagementN/A9
CFG-02.9
Baseline TailoringConfiguration ManagementN/A9
CFG-03
Least FunctionalityConfiguration ManagementN/A10
CFG-03.1
Periodic ReviewConfiguration ManagementN/A8
CFG-03.2
Prevent Unauthorized Software ExecutionConfiguration ManagementN/A7
CFG-03.4
Split TunnelingConfiguration ManagementN/A8
CFG-04
Software Usage RestrictionsConfiguration ManagementN/A9
CFG-04.2
Unsupported Internet Browsers & Email ClientsConfiguration ManagementN/A7
CFG-05
User-Installed SoftwareConfiguration ManagementN/A10
CFG-05.1
Unauthorized Installation AlertsConfiguration ManagementN/A8
CFG-05.2
Restrict Roles Permitted To Install SoftwareConfiguration ManagementN/A9
CFG-06
Configuration EnforcementConfiguration ManagementN/A7
CFG-06.1
Integrity Assurance & Enforcement (IAE)Configuration ManagementN/A3
CFG-07
Zero-Touch Provisioning (ZTP)Configuration ManagementN/A8
CFG-08
Sensitive / Regulated Data Access EnforcementConfiguration ManagementN/A7
CFG-08.1
Sensitive / Regulated Data ActionsConfiguration ManagementN/A7
IRO-01
Incident Response OperationsIncident ResponseN/A9
IRO-02
Incident HandlingIncident ResponseN/A10
IRO-10
Incident Stakeholder ReportingIncident ResponseN/A9
PRM-01
Cybersecurity & Data Protection Portfolio ManagementProject & Resource ManagementN/A8
PRM-02
Cybersecurity & Data Protection Resource ManagementProject & Resource ManagementN/A8
PRM-03
Allocation of ResourcesProject & Resource ManagementN/A8
RSK-01
Risk Management ProgramRisk ManagementN/A10
RSK-01.3
Risk ToleranceRisk ManagementN/A9
RSK-01.4
Risk ThresholdRisk ManagementN/A9
RSK-01.5
Risk AppetiteRisk ManagementN/A9
RSK-04
Risk AssessmentRisk ManagementN/A10
RSK-06
Risk RemediationRisk ManagementN/A10
TPM-01
Third-Party ManagementThird-Party ManagementN/A10
TPM-01.1
Third-Party InventoriesThird-Party ManagementN/A8
TPM-02
Third-Party Criticality AssessmentsThird-Party ManagementN/A9
TPM-03.2
Limit Potential HarmThird-Party ManagementN/A9
TPM-04.1
Third-Party Risk Assessments & ApprovalsThird-Party ManagementN/A9
TPM-05
Third-Party Contract RequirementsThird-Party ManagementN/A10
TPM-05.7
Break ClausesThird-Party ManagementN/A9
TPM-08
Review of Third-Party ServicesThird-Party ManagementN/A9