SCF Overview & Practitioner Guidebook
SCF Overview & Practitioner Guidebook
PRACTITIONER GUIDEBOOK
version 2024.4
This document is designed for cybersecurity & data privacy practitioners to gain an understanding of:
What the SCF is;
What the SCF is not;
The various capabilities of the SCF; and
How the SCF is intended to be used in an organization.
A control is the power to influence or direct behaviors and the course of events. That is precisely why
the Secure Controls Framework® (SCF) was developed – we want to influence secure practices within
organizations so that both cybersecurity and data privacy principles are designed, implemented and
managed in an efficient and sustainable manner.
NOTE - This guide is for educational purposes only. You are highly encouraged to work with a cybersecurity, privacy or audit professional to
validate any compliance-related assumptions. For more information, please visit https://securecontrolsframework.com
Table of Contents
Section 1. Terminology & Acronyms ..................................................................................................................... 5
Terminology Standardization ............................................................................................................................................................5
Acronyms ..........................................................................................................................................................................................7
Section 2. Introduction To The Secure Controls Framework®............................................................................... 9
Why Should An Organization Use The SCF? .......................................................................................................................................9
What The SCF Is ...............................................................................................................................................................................10
What The SCF Is Not ........................................................................................................................................................................10
Addressing The Who? What? Where? When? Why? and How? .......................................................................................................10
SCF Control Weighting Explanation .................................................................................................................................................11
Tailoring Is Required - Not All SCF Controls Are Applicable To Your Organization............................................................................11
Statutory Requirements................................................................................................................................................................12
Regulatory Requirements .............................................................................................................................................................12
Contractual Requirements ............................................................................................................................................................12
Tailoring SCF Controls - Defining “Must Have” vs “Nice To Have” Controls ......................................................................................13
Section 3. Designing & Building An Audit-Ready Cybersecurity & Data Privacy Program................................... 14
People, Processes, Technology, Data & Facilities (PPTDF)................................................................................................................14
Holistic Approach To Address Control Applicability .........................................................................................................................14
NIST IR 8477 - Set Theory Relationship Mapping (STRM) .................................................................................................................15
STRM Relationship Types ................................................................................................................................................................16
STRM Relationship Type #1: SUBSET OF ........................................................................................................................................16
STRM Relationship Type #2: INTERSECTS WITH .............................................................................................................................16
STRM Relationship Type #3: EQUAL ..............................................................................................................................................16
STRM Relationship Type #4: SUPERSET OF ....................................................................................................................................16
STRM Relationship Type #5: NO RELATIONSHIP.............................................................................................................................16
Expert-Derived Content (EDC) vs Natural Language Processing (NLP) ..............................................................................................16
Section 4. Understanding Fundamental Governance, Risk & Compliance (GRC) Functions................................ 17
GRC Is A Plan, Do, Check & Act (PDCA) Adventure – That Is A Concept that Should Be Embraced, Not Fought Against ...................17
Chicken vs Egg Debate: The Logical Order of GRC Functions ............................................................................................................18
Compliance ..................................................................................................................................................................................18
Governance ..................................................................................................................................................................................19
Risk Management ........................................................................................................................................................................20
GRC Integrations .............................................................................................................................................................................20
Section 5. Understanding What It Means To Adopt “Secure by Design” Principles ............................................ 21
Secure Practices Are Common Expectations ....................................................................................................................................21
Compliance Should Be Viewed As A Natural Byproduct of Secure Practices ....................................................................................21
Cybersecurity & Data Privacy by Design (C|P) Principles .................................................................................................................22
Steps To Operationalize The C|P Principles....................................................................................................................................22
SCF Domains & C|P Principles .......................................................................................................................................................22
Section 6. Understanding What It Means To Adopt “Privacy by Design” Principles ........................................... 27
SCF Data Privacy Management Principles (DPMP) ...........................................................................................................................27
Section 7. Integrated Controls Management (ICM) ............................................................................................ 29
IT General Controls (ITGC) ...............................................................................................................................................................29
Security vs Compliance ....................................................................................................................................................................29
This concept of identifying a negligence threshold is addressed in the SCF’s ..................................................................................30
Defining Compliance That Is Specific To Your Business Case ............................................................................................................30
Defining What It Takes For Your Business Processes To Be Secure & Resilient ................................................................................31
Discretionary Cybersecurity & Data Protection Considerations ......................................................................................................31
Discretionary Resilience Considerations ........................................................................................................................................31
Defining Negligence As It Pertains To Cybersecurity & Data Privacy ................................................................................................32
Determining A Breach Of Duty ......................................................................................................................................................32
Determining Whether There Was A Duty To Act ............................................................................................................................32
ICM Principles..................................................................................................................................................................................32
ICM Principle 1: Establish Context .................................................................................................................................................33
From the context of building a cybersecurity and data privacy program, it is important to clarify mandatory versus optional criteria: 3
The terms “SHALL” and “SHALL NOT” indicate requirements:
o To be followed strictly in order to conform; and
o From which no deviation is permitted.
The terms “SHOULD” and “SHOULD NOT” indicate that:
o Among several possibilities one (1) is recommended as particularly suitable, without mentioning or excluding
others;
o A certain course of action is preferred, but not necessarily required; or
o A certain possibility, or course of action, is discouraged, but not prohibited.
The terms “MAY” and “NEED NOT” indicate a course of action permissible within reasonable limits.
The terms “CAN” and “CANNOT” indicate:
o A possibility and capability; or
o The absence of that possibility or capability.
TERMINOLOGY STANDARDIZATION
Within the cybersecurity profession, the term “control” can be applied to a variety of contexts and can serve multiple purposes.
When used in content with the SCF, a control is a mechanism (e.g., a safeguard or countermeasure) designed to address
protection needs specified by security requirements.
Controls are:
o The power to make decisions about how something is managed or how something is done;
o The ability to direct the actions of someone or something;
o An action, method or law that limits; and/or
o A device or mechanism used to regulate or guide the operation of a machine, apparatus or system.
Requirements are statements that translate, or express, a need and its associated constraints and conditions.
The SCF is a more efficient way to operationalize cybersecurity and data privacy operations by simplifying the underlying controls
that comprise the basis of an organization’s cybersecurity and data privacy program. The reality is that most organizations struggle
with defining the minimum-security requirements that are necessary to address both (1) applicable compliance obligations and
(2) the need for secure practices. The SCF provides a straightforward and scalable method to define those “must have” and “nice
to have” requirements into a holistic control set to operationalize cybersecurity operations, risk management and third-party
governance.
In simple terms, the SCF is a metaframework, a “framework of frameworks.” It is a catalog of controls made up of over 200
authoritative sources (e.g., statutory, regulatory and contractual frameworks). This controls catalog contains over 1,200 controls
and is logically organized into thirty-three (33) domains. The structure of the SCF normalizes disparate control language into
something that is usable across technology, cybersecurity, data privacy and other departments where they can share the same
control language. The SCF enables not only intra-organization standardization, but inter-organization standardization (e.g.,
control GOV-03 means the same thing to one organization to any other organization using the SCF). The SCF targets silos, since
siloed practices within any organization are inefficient and can lead to poor security, due to poor communications and incorrect
assumptions.
The SCF is made up of volunteers who are specialists within the cybersecurity and data privacy professions. These people are
seasoned auditors, engineers, architects, incident responders, consultants and other specialists who live and breathe these
topics on a daily basis. The end product of their labor is "expert-derived content" that makes up the SCF.
In developing the SCF, we identified and analyzed over 200 cybersecurity and data
protection laws, regulations and frameworks. Through analyzing these thousands of
legal, regulatory and framework requirements, we identified the commonalities, and
this allows several thousand unique controls to be addressed by approximately
1,200 controls that make up the SCF. For instance, a requirement to maintain strong
passwords is not unique, since it is required by dozens of laws, regulations and
frameworks. This allows one well-worded SCF control to address multiple
requirements. This focus on simplicity and sustainability is key to the SCF, since it
can enable various teams to speak the same controls language, even though they
may have entirely different statutory, regulatory or contractual obligations that they
are working towards.
EXPERT INSIGHT (CONTROL SELECTION CONSIDERATIONS): Some people who are new to the SCF freak out due to their
misunderstanding where they think they have to all 1,200+ controls in the SCF. That is just not the case. It is best to visualize the
SCF as a “buffet of cybersecurity & data privacy controls,” where the presented buffet is a selection of 1,200+ controls. Just as
you do not eat everything possible on a buffet table, the same applies to the SCF’s control set where you only select the controls
you need. Once you know what is applicable to you, you can generate a customized control set that gives you just the controls
you need to address your statutory, regulatory and contractual obligations. The concept of tailoring the control set is explained at
the end of this section.
The SCF also contains helpful guidance on possible tools and solutions to address controls. Additionally, it contains maturity
criteria that can help an organization plan for and evaluate controls, based on a target maturity level.
Using the SCF should be viewed as a long-term tool to not only help with compliance-related efforts but to ensure cybersecurity
& data privacy principles are properly designed, implemented and maintained. The SCF helps implement a holistic approach to
protecting the Confidentiality, Integrity, Availability and Safety (CIAS) of your data, systems, applications and other processes.
The SCF can be used to assist with strategic planning down to tactical needs that impact the people, processes and technologies
directly impacting your organization.
EXPERT INSIGHT (MATERIALITY): The intended usage of materiality is meant to provide relevant context regarding risk thresholds.
Materiality designations are intended to act as a "guard rail" for risk management decisions. A material weakness crosses an
organization’s risk threshold by making an actual difference to the organization, where systems, applications, services, personnel,
the organization and/or third-parties are, or may be, exposed to an unacceptable level of risk. A financial benchmark is commonly
used to determine materiality. From a financial impact perspective, for an item to be considered material, the control deficiency,
risk, threat or incident (singular or a combination) generally must meet one, or more, of the following criteria where the potential
financial impact is measured as: 10
≥ 5% of pre-tax income
≥ 0.5% of total assets
≥ 1% of total equity (shareholder value); and/or
≥ 0.5% of total revenue.
TAILORING IS REQUIRED - NOT ALL SCF CONTROLS ARE APPLICABLE TO YOUR ORGANIZATION
The SCF is a tool and is only as good as how it is used – just like a pocketknife shouldn’t be used as a prybar. If a SCF user incorrectly
scopes their requirements, the resulting controls will not address their applicable compliance requirements. That is not a
deficiency of the SCF – that is simply negligence on the part of the user of the tool.
To ensure scoping is done properly, it is imperative for you to speak with your legal, IT, project management, cybersecurity and
procurement teams. The reason for this collaboration is so that you can get a complete picture of all the applicable laws,
regulations and frameworks that your organization is legally obligated to comply with. Those teams will likely provide the best
insights into what is required, and this list of requirements will then make it simple to go through and customize the SCF for your
specific needs!
Understanding the requirements for both cybersecurity & data privacy principles involves a simple process of distilling
expectations. This process is all part of documenting reasonable expectations that are “right-sized” for an organization, since
every organization has unique requirements.
Beyond just using compliance terminology properly, understanding which of the three types of compliance is crucial in managing
both cybersecurity & data privacy risk within an organization. The difference between non-compliance can be as stark as (1) going
to jail, (2) getting fined, (3) getting sued, (4) losing a contract or (5) an unpleasant combination of the previous options.
Understanding the “hierarchy of pain” with compliance leads to well-informed risk decisions that influence technology
purchases, staffing resources and management involvement. That is why it serves both cybersecurity and IT professionals well to
understand the compliance landscape for their benefit, since presenting issues of non-compliance in a compelling business
context to get the resources needed to complete their jobs.
From a cybersecurity & data privacy perspective, statutory compliance examples include but are not limited to:
US – Federal Laws
o Children’s Online Privacy Protection Act (COPPA)
o Fair and Accurate Credit Transactions Act (FACTA) – including “Red Flags” rule
o Family Education Rights and Privacy Act (FERPA)
o Federal Information Security Management Act (FISMA)
o Federal Trade Commission (FTC) Act
o Gramm-Leach-Bliley Act (GLBA)
o Health Insurance Portability and Accountability Act (HIPAA) / HITECH Act
o Sarbanes-Oxley Act (SOX)
US – State Laws
o California SB1386
o Massachusetts 201 CMR 17.00
o Oregon ORS 646A.622
International Laws
o Canada – Personal Information Protection and Electronic Documents Act (PIPEDA)
o UK – Data Protection Act (DPA)
o Other countries’ variations of Personal Data Protect Acts (PDPA)
REGULATORY REQUIREMENTS
Regulatory obligations are required by law, but they are different from statutory requirements in that these requirements refer to
rules issued by a regulating body that is appointed by a state or federal government. These are legal requirements through proxy,
where the regulating body is the source of the requirement. It is important to keep in mind that regulatory requirements tend to
change more often than statutory requirements.
From a cybersecurity & data privacy perspective, regulatory compliance examples include but are not limited to:
US Regulations
o Defense Federal Acquisition Regulation Supplement (DFARS) (NIST 800-171)
o Federal Acquisition Regulation (FAR)
o Federal Risk and Authorization Management Program (FedRAMP)
o DoD Information Assurance Risk Management Framework (DIARMF)
o National Industrial Security Program Operating Manual (NISPOM)
o New York Department of Financial Services 23 NYCRR 500
International Regulations
o European Union General Data Protection Regulation (EU GDPR)
CONTRACTUAL REQUIREMENTS
Contractual obligations are required by legal contracts between private parties. This may be as simple as a cybersecurity or
privacy addendum in a vendor contract that calls out unique requirements, but it also includes broader requirements from an
industry association that membership brings certain obligations.
From a cybersecurity & data privacy perspective, common contractual compliance examples include but are not limited to:
Cybersecurity Supply Chain Risk Management (C-SCRM) (e.g., NIST SP 800-161 R1)
Payment Card Industry Data Security Standard (PCI DSS)
Service Organization Control (SOC)
Generally Accepted Privacy Principles (GAPP)
Center for Internet Security (CIS) Critical Security Controls (CSC)
Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)
Fundamentally, the SCF is an Excel spreadsheet. Therefore, you can use your Excel skills to manually filter the requirements. If
you are comfortable with Excel, it might take you 5-10 minutes to do this filtering, depending on how many requirements you need
to map to.
Within the SCF, there is a column labelled “Minimum Security Requirements (MSR) MCR + MSR” that will assist you in this process.
EXPERT INSIGHT (BASELINING): The MSR + DSR resulting column shows the SCF controls that considered an organization's
Minimum Security Requirements (MSR) that will be used. The MSR is the baseline set of controls the organization should
implement to be both secure and compliant.
Building a security program that routinely incorporates cybersecurity & data protection practices into daily operations requires a
mastery of the basics. A useful analogy is with LEGO®, the children's toy. With LEGO® you can build nearly anything you want, but
it starts with the understanding of the various LEGO® shapes and how they either snap together or are incompatible.
Mastering the fundamentals of LEGO® building enables someone to become immensely creative since that individual
knows how everything interacts. It becomes possible to either follow the instructions or design and build structures based
on their own imagination.
Conversely, when an individual ignores the fundamental concepts with LEGO® building, any created structure will be
weak and include systemic flaws.
Cybersecurity and data privacy controls are not much different from LEGO® blocks, since those disciplines are made up of
numerous building blocks that all come together to build secure systems and processes. The lack of critical building blocks will
lead to insecure and poorly architected solutions. When you envision each component that makes up a cybersecurity or data
privacy “best practice” is a LEGO® block, it is possible to conceptualize how certain requirements are the foundation that form
the basis for other components to attach to. Only when all the building blocks come together and take shape do you get a
functional security / privacy program!
Think of the SCF as a toolkit for you to build out your overall security program domain-by-domain so that cybersecurity & data
privacy principles are designed, implemented and managed by default!
NIST IR 8477 is part of NIST’s broader NIST OLIR Program that is an “effort to facilitate Subject Matter Experts (SMEs) in defining
standardized online informative references (OLIRs) between elements of their documents, products, and services and elements
of NIST documents…” The SCF currently participates in the National Online Informative References (OLIR) Program and with
NIST's preference for STRM, we decided an aligned crosswalk mapping methodology makes sense.12
For SCF’s STRM practices, the SCF is always the “reference document” and the law, regulation or framework being mapped to is
always the “focal document.”
From a cybersecurity crosswalking perspective, NLP can be used to evaluate a control statement (e.g., must have firewall) to
identify the noun (e.g., firewall) and verb (e.g., must have) to determine the relative strength it maps to a different control (e.g.,
shall have network defense appliances). Where that becomes interesting is (1) protecting the underlying content (e.g., Intellectual
Property (IP)) and (2) patentability.
Works created by non-humans, including AI, are not eligible for copyright protection.13 While the SCF leverages expert-derived
content (e.g., human subject-matter experts), other metaframework solutions use NLP to create AI-generated crosswalk
mapping. Solutions leveraging NLP forfeit their IP since AI-generated content is currently prohibited from copyright protections
due to the content not being the work of a human creator. Therefore, NLP-generated content could be considered free content
from an IP perspective, since a copyright of AI-generated content would not be enforceable.
AI-based solutions in the GRC space also face a patentability issue due to the "mental steps" doctrine. In 2014, the US Supreme
Court ruled that inventions are ineligible for patenting if the patent claim is something a human could do in their mind or with
paper and pencil (e.g., a human performing sentence diagramming on a piece of paper and comparing the results of that sentence
diagram with another). That landmark case (Alice Corp. v. CLS Bank International) established a new uncertainty about patent
eligibility of AI and machine learning technologies. The result of Alice is that patents issued for compliance solutions leveraging
NLP to perform crosswalk mapping may not hold up to scrutiny by the Patent Trial and Appeal Board (PTAB) given NIST published
a document that describes how to perform crosswalk mapping without the assistance of technology.
While it is not the most flattering analogy, GRC is akin to the brakes on your
car, where they enable a business’ operations to go fast and avoid
catastrophic accidents safely. Without those "brakes", an accident is a
certainty! These brakes that enable a business’ operations to stay within the
guardrails are its cybersecurity policies, standards and procedures. These
requirements constitute “reasonable practices” that the organization is
required to implement and maintain to avoid being negligent.
GRC IS A PLAN, DO, CHECK & ACT (PDCA) ADVENTURE – THAT IS A CONCEPT THAT SHOULD BE EMBRACED, NOT
FOUGHT AGAINST
GRC most often deals with legally-binding requirements, so it is important to understand that negligence is situationally-
dependent. For example, an intoxicated driver who gets behind the wheel acting negligently. However, when sober, that same
individual is a champion race car driver who is highly skilled and would not be considered incompetent in any regard. In this
example, driving intoxicated constitutes a negligent act and shows that negligence has nothing to do with being incompetent. The
point is to demonstrate that an organization can employ many highly-competent personnel, but even competent people can
behave in a negligent manner. GRC fundamentally exists to help an organization avoid circumstances that could be construed as
negligent acts.
The premise is that controls are central to cybersecurity & data privacy operations as well as the business rhythms of the
organization. Without properly defining MCR and DSR thresholds, an organization’s overall cybersecurity & data privacy program
is placed in jeopardy as the baseline practices are not anchored to clear requirements. Furthermore, understanding and clarifying
the difference between "compliant" versus "secure" (e.g., MCR vs. MCR+DSR) enhances risk management discussions.
When establishing GRC practices, what is described below is the precedence of how (1) compliance influences (2) governance,
which influences (3) risk management. This addresses the "GRC chicken vs egg" debate:
COMPLIANCE
The genesis of GRC is to first identify applicable statutory, regulatory and contractual obligations that the organization must
adhere to, as well as internal business requirements (e.g., Board of Director directives). This is a compliance function that
identifies statutory, regulatory and contractual obligations. It is a due diligence exercise to identify what the organization is
reasonably required to comply with from a cybersecurity & data privacy perspective. This process involves interfacing with various
Lines of Business (LOB) to understand how the organization operates, including geographic considerations. Generally,
Compliance needs to work with the legal department, contracts management, physical security and other teams to gain a
comprehensive understanding of the organizational compliance needs.
Compliance is the “source of truth” for statutory, regulatory and contractual obligations. With that knowledge, Compliance
informs Governance about the controls that apply to applicable laws, regulations and frameworks. This knowledge is needed so
that Governance can determine the appropriate policies and standards that must exist. Compliance may identify requirements
to adhere to a specific industry framework (e.g., NIST CSF, ISO 27002, NIST 800-53, etc.), but organizations are usually able to
pick the framework that best fits their needs on their own. This is often where various compliance obligations exceed what a single
framework can address, so the organization must leverage some form of metaframework (e.g., framework of frameworks).
Given that not all controls are weighted equally, it is vitally important that personnel who represent the Risk Management function
are involved in developing an assigned weight for each control (e.g., the presence of a fully-patched border firewall should be
considered a more important control than end user awareness posters). This weighting of cybersecurity & data privacy controls is
necessary to ensure the results of risk assessments accurate support the intent of the organization's risk tolerance threshold.
That threshold is meant to establish a benchmark for defining acceptable and unacceptable risk.
GOVERNANCE
Based on these controls, Governance has two (2) key functions:
1. Develop policies and standards to meet those compliance obligations (defined by applicable control objectives); and
2. Assign ownership of those controls to the applicable stakeholders involved in the affected business processes. This
process often requires a documented Responsibility, Accountability, Supportive, Consulted and Informed (RASCI) chart
to ensure the organizational model supports effective implementation and oversight of the assigned controls.
Personnel representing the Governance function must work directly with the stakeholders (e.g., control owners and control
operators) who are directly responsible for implementing and operating their assigned cybersecurity & data privacy controls.
Those stakeholders are expected to develop and operate Standardized Operating Procedures (SOP) to ensure control
implementation is performed according to the company’s performance requirements, as established in the organization’s
cybersecurity & data privacy standards. The operation of those SOPs generates evidence of due care that reasonable practices
are in place and operating accordingly. Generating deliverables is an expected output from executing procedures.
The development and implementation of the policies and standards is evidence of due diligence that the organization's
compliance obligations are designed to address applicable administrative, technical and physical security controls. It is
important to ensure that policies and standards document what the organization is doing, as the policies and standards are often
the mechanisms by which outside regulators measure implementation and maturity of the control. Organizational governance
can be a vital element in the organization’s ability to implement, sustain and defend their compliance program.
Cybersecurity & data privacy documentation is generally comprised of six (6) main parts:
1. Policies establish management’s intent;
2. Control Objectives identifies leading practices;
3. Standards provide quantifiable requirements;
4. Controls identify desired conditions that are expected to be met;
5. Procedures / Control Activities establish how tasks are performed to meet the requirements established in standards and
to meet controls; and
6. Guidelines are recommended, but not mandatory.
Risk Management activities addresses both due diligence and due care obligations to identify, assess and remediate control
deficiencies:
Risk Management must align with Governance practices for exception management (e.g., compensating controls).
Compliance must evaluate findings from risk assessments and audits/assessments (both internal and external) to
determine if adjustments to the organization’s cybersecurity & data privacy controls (e.g., MCR + DSR) are necessary,
based on business process changes, technology advancements and/or an evolution of the organization's risk threshold.
While Risk Management personnel do not perform the actual remediation actions (that is the responsibility of the control owner),
Risk Management assists in determining the appropriate risk treatment options:
Reduce the risk to an acceptable level;
Avoid the risk;
Transfer the risk to another party; or
Accept the risk.
One key consideration for GRC, especially Risk Management, is that the appropriate level of organizational management makes
the risk management decision. Therefore, risks need to be ranked, so that the appropriate levels of management can be
designated as "approved authorities" to make a risk treatment determination. For example, a project manager should not be able
to accept a "high risk" that should be made by a VP or some other executive. By formally assigning risk to individuals and requiring
those in managerial roles to own their risk management decisions, it can help the organization maintain its target risk threshold.
GRC INTEGRATIONS
The processes described above can be visualized in the following diagram which shows the interrelated nature of governance,
risk management and compliance functions to build and maintain an organization’s cybersecurity & data privacy program.
Most companies have requirements to document cybersecurity & data protection processes but lack the knowledge and
experience to undertake such documentation efforts. That means organizations are faced with either outsourcing the work to
expensive consultants or they ignore the requirement and hope they do not get in trouble for being non-compliant. In either
situation, it is not a good place to be.
The SCF’s comprehensive listing of over 1,200 cybersecurity & data protection controls is categorized into thirty-three (33)
domains that are mapped to over 200 authoritative sources (e.g., statutory, regulatory and contractual frameworks). Those
applicable SCF controls can operationalize the cybersecurity & data privacy principles to help an organization ensure that secure
practices are implemented by design and by default.
You may be asking yourself, “What cybersecurity & data privacy principles should I be using?” and that is a great question. The
SCF helped with this common question by taking the thirty-three (33) domains of the SCF and creating principles that an
organization can use. The idea is that by focusing on these secure principles, an organization will design, implement and maintain
secure systems, applications and processes that will by default help the organization comply with its compliance obligations.
The C|P is a set of thirty-three (33) cybersecurity & data privacy principles that leverage the
SCF's extensive cybersecurity & data privacy control set. You can download the free poster
at https://securecontrolsframework.com/domains-principles/.
The “C pipe P” logo is a nod to the computing definition of the | or “pipe” symbol (e.g., shift + backslash), which is a computer
command line mechanism that allows the output of one process to be used as input to another process. In this way, a series of
commands can be linked to more quickly and easily perform complex, multi-stage processing. Essentially, the concept is that
security principles are being “piped” with privacy principles to create secure processes in an efficient manner.
The C|P establishes thirty-three (33) common-sense principles to guide the development and oversight of a modern cybersecurity
& data privacy program. Those thirty-three (33) C|P principles are listed below:
Why should you care? When you tie the broader C|P in with the SCF Data Privacy Management Principles (DPMP), you have an
excellent foundation for building and maintaining secure systems, applications and services that address cybersecurity & data
privacy considerations by default and by design. The DPMP is included in the SCF download as a separate tab in the Excel
spreadsheet. 15
Think of the SCF Privacy Management Principles as a supplement to the C|P to assist in defining and managing privacy principles,
based on selected privacy frameworks. This can enable your organization to align with multiple privacy frameworks that also map
to your cybersecurity & data privacy control set, since we found the “apples to oranges” comparison between disparate privacy
frameworks was difficult for most non-privacy practitioners to comprehend.
We took these frameworks and looked for similarities and gaps. If you download the SCF Data Privacy Management Principles,
you will see the direct mappings to these leading privacy frameworks. Given this, you now know the origin of the principle we
include in our document. This is a great tool for organizations that may have to address multiple requirements because it brings a
common language to simply things.
The eighty-six (86) principles of the SCF Data Privacy Management Principles are organized into eleven (11) domains:
1. Privacy by Design;
2. Data Subject Participation;
3. Limited Collection & Use;
4. Transparency;
5. Data Lifecycle Management;
6. Data Subject Rights;
7. Security by Design;
8. Incident Response;
9. Risk Management;
10. Third-Party Management; and
11. Business Environment.
ICM is defined as, “a holistic, technology-agnostic approach to cybersecurity & data privacy controls to identify, implement and
manage secure and compliant practices, covering an organization’s people, processes, technology and data, regardless of how
or where data is stored, processed and/or transmitted.”
ICM takes a different approach from the traditional definition of Governance, Risk
Management and Compliance (GRC) and/or Integrated Risk Management (IRM),
since ICM is controls-centric, where controls are viewed as the nexus, or central
pivoting point, for an organization’s cybersecurity & data privacy operations.
ICM is designed to proactively address the strategic, operational and tactical nature
of operating an organization’s cybersecurity & data privacy program at the control
level. ICM is designed to address both internal controls, as well as the broader
concept of Supply Chain Risk Management (SCRM).
OCEG defines GRC as, “GRC is the integrated collection of capabilities that enable an organization to reliably achieve objectives,
address uncertainty and act with integrity,” while Gartner jointly defines GRC/IRM as, "a set of practices and processes supported
by a risk-aware culture and enabling technologies, that improves decision making and performance through an integrated view of
how well an organization manages its unique set of risks."
Secure and compliant operations exist when applicable controls are properly scoped and implemented. ICM specifically focuses
on the need to understand and clarify the difference between "compliant" versus "secure" since that is necessary to have coherent
risk management discussions. To assist in this process, an organization’s applicable controls are categorized according to “must
have” vs “nice to have” requirements:
Minimum Compliance Requirements (MCR) are the absolute minimum requirements that must be addressed to comply
with applicable laws, regulations and contracts. MCR are primarily externally-influenced, based on industry, government,
state and local regulations. MCR should never imply adequacy for secure practices and data protection, since they are
merely compliance-related.
Discretionary Security Requirements (DSR) are tied to the organization’s risk appetite since DSR are “above and beyond”
MCR, where the organization self-identifies additional cybersecurity & data privacy controls to address voluntary industry
practices or internal requirements, such as findings from internal audits or risk assessments. DSR are primarily internally-
influenced, based on the organization’s respective industry and risk tolerance. While MCR establishes the foundational
floor that must be adhered to, DSR are where organizations often achieve improved efficiency, automation and enhanced
security.
SECURITY VS COMPLIANCE
For those on the receiving end of cybersecurity efforts, the terms “security” and “compliance” might seem synonymous. However,
understanding the subtle, yet crucial, differences between being compliant and being secure is paramount in safeguarding an
organization’s technologies and sensitive/regulated data.
The underlying issue in the “compliance vs security” debate is complacency and this is important for the broader concept of ICM.
Your adversaries are unrelenting, so why would you consciously choose to settle? That is where the concept of negligence comes
into play, when your failure to conduct due diligence and due care activities can be considered negligent behavior. That term tends
to scare executives, and it should, but it does not change the reality that there is a negligence threshold that is specific to each
organization. The question for you is, “Do you know what your negligence threshold is, based on your applicable laws, regulations
and contractual obligations?”
This concept of identifying a negligence threshold is addressed in the SCF’s Cybersecurity & Data Privacy Capability Maturity
Model (C|P-CMM).17
EXPERT INSIGHT (SCOPING): From a scoping perspective, compliance obligations may be organization-wide or narrowly scoped
to a specific enclave or project. It is solely your organization's responsibility to properly scope the applicability of its applicable
compliance controls. The Unified Scoping Guide (USG) is an excellent resource for your scoping exercise.18
DEFINING WHAT IT TAKES FOR YOUR BUSINESS PROCESSES TO BE SECURE & RESILIENT
Cybersecurity and data protection controls that are not required by a law, regulation or contractual obligation are “nice to have”
controls that are discretionary for an organization to implement. Any aspect of non-compliance with a discretionary control would
be isolated within the realm of the stakeholder making the requirement, since the requirement is internal to your organization. The
source of these discretionary requirements may be from:
Board of Director (BoD) guidance;
Steering Committee recommendations;
Internal Audit findings;
Third-party audit/assessment recommendations; and/or
Internal staff preferences.
The importance of these discretionary controls is that those are often organization-specific considerations to mitigate risk that is
specific to an organization’s business practices.
Negligent conduct may consist of either an act, or an omission to act when there is a duty to do so. Primary factors to consider
in ascertaining whether the person's conduct lacks reasonable care are:
The foreseeable likelihood that the person's conduct will result in harm;
The foreseeable severity of any harm that may ensue; and
The burden of precautions to eliminate or reduce the risk of harm.
Four (4) elements are generally required to establish a prima facie case of negligence:
1. Existence of a legal duty that the defendant owed to the plaintiff (e.g., complying with NIST SP 800-171 to protect
Controlled Unclassified Information (CUI));
2. Defendant's breach of that duty (e.g., failure to protect CUI in accordance with NIST SP 800-171 requirements under
applicable DFARS clauses);
3. Plaintiff's sufferance of an injury (e.g., financial losses due to lost contract due to non-compliance with NIST SP 800-171);
and
4. Proof that defendant's breach caused the injury (e.g., publicity about the data breach or other evidence pointing to
the entity being the source of the data breach)
Typically, to meet the injury element of the prima facie case, the injury must be one (1) of two (2) things:
1. Bodily harm; or
2. Harm to property (can be personal property or business property (physical or digital)).
If the burden of taking such precautions is less than the probability of injury multiplied by the gravity of any resulting injury, then
the party with the burden of taking precautions will have some amount of liability.
ICM PRINCIPLES
There are eight (8) principles associated with ICM:
1. Establish Context;
2. Define Applicable Controls;
3. Assign Maturity-Based Criteria;
4. Publish Policies, Standards & Procedures;
5. Assign Stakeholder Accountability;
6. Maintain Situational Awareness;
7. Manage Risk; and
8. Evolve Processes.
Understanding the requirements for both cybersecurity & data privacy principles involve a simple process of distilling
expectations. This process is all part of documenting reasonable expectations that are “right-sized” for an organization, since
every organization has unique requirements.
The approach looks at the following spheres of influence to identify applicable SCF controls:
Statutory obligations - These are laws (e.g., US state, federal and international laws).
Regulatory obligations - These are requirements from regulatory bodies or governmental agencies.
Contractual obligations - These are requirements that are stipulated in contracts, vendor agreements, etc.
Industry-recognized practices - These are requirements that are based on an organization’s specific industry that are
considered reasonably-expected practices.
Please keep in mind that the SCF is a tool and is only as good as its used – just like a pocketknife shouldn’t be used as a prybar.
Realistically, if you do not scope the controls from the SCF correctly, you will not address your applicable compliance
requirements since you are missing what is expected. That is not a deficiency of the SCF – that is simply negligence on the part of
the user of the tool.
To make sure scoping is done properly, it is imperative for you to speak with your legal, IT, project management, cybersecurity and
procurement teams (and other stakeholders you may feel are relevant to scoping controls). The reason for this collaboration is so
that you can get a complete picture of all the applicable laws, regulations and frameworks that your organization is legally
obligated to comply with. Those teams will likely provide the best insights into what is required, and this list of requirements will
then make it simple to go through and customize the SCF for your specific needs!
The MSR + DSR column will now have an “x” that marks each SCF control that is applicable for your needs, based on what was
The C|P-CMM draws upon the high-level structure of the Systems Security Engineering Capability Maturity Model v2.0 (SSE-CMM),
since we felt it was the best model to demonstrate varying levels of maturity for PPTDF at a control level. If you are unfamiliar with
the SSE-CMM, it is well-worth your time to read through the SSE-CMM Model Description Document that is hosted by the US
Defense Technical Information Center (DTIC).
NOTE: ComplianceForge is a SCF Licensed Content Provider (LCP) and has editable policies, standards and procedures
templates that are based on the SCF.
A great starting point is the NIST SP 800-181, Workforce Framework for Cybersecurity (NICE Framework). 24 The NICE Framework
offers an efficient way to assign stakeholder accountability for internal and external stakeholders.
The value of the C|P-RMM is having a standardized methodology where controls are tied to specific risks and threats. Based on
the other criteria offered by the SCF (e.g., weighting and maturity criteria), the C|P-RMM makes calculating risk a straightforward
process.
Controls are the nexus of a cybersecurity & data privacy program, so it is vitally important to understand how controls should be
viewed from a high-level risk management perspective. To progress from identifying a necessary control to a determination of risk,
it is a journey that has several steps, each with its own unique terminology. Therefore, it is important to baseline the understanding
of risk management terminology.
Traditional risk management practices have four (4) options to address identified risk:
1. Reduce the risk to an acceptable level;
2. Avoid the risk;
3. Transfer the risk to another party; or
4. Accept the risk.
In a mature risk program, the results of risk assessments are evaluated with the organization's risk appetite into consideration.
For example, if the organization has a Moderate Risk Appetite and there are several findings in a risk assessment that are High
Risk, then action must be taken to reduce the risk. Accepting a High Risk would violate the Moderate Risk Appetite set by
management. In reality, this leaves remediation, transferring or avoiding as the remaining three (3) options, since accepting the
risk would be prohibited.
Risk management involves coordinated activities that optimize the management of potential opportunities and adverse effects.
Proactive risk management activities provide a way to realize potential opportunities without exposing an organization to
unnecessary peril.
The ICGM utilizes a Plan, Do, Check & Act (PDCA) approach that is a logical way to design a governance structure:
Plan. The overall ICM process beings with planning. This planning will define the policies, standards and controls for the
organization. It will also directly influence the tools and services that an organization purchases, since technology
purchases should address needs that are defined by policies and standards.
Do. Arguably, this is the most important section for cybersecurity & data privacy practitioners. Controls are the “security
glue” that make processes, applications, systems and services secure. Procedures (also referred to as control activities)
are the processes in which the controls are actually implemented and performed.
Check. In simple terms, this is situational awareness. Situational awareness is only achieved through reporting through
metrics and reviewing the results of audits/assessments.
Act. This is essentially risk management, which is an encompassing area that deals with addressing two main concepts
(1) real deficiencies that currently exist and (2) possible threats to the organization.
There are likely many other use cases that the C|P-CMM can be used, but those objectives listed above drove the development of
this project. The reason for this simply comes down to a need by businesses, regardless of size or industry, for a solution that can
help fix those common frustrations that exist in most cybersecurity and data privacy programs. We want to help eliminate, or at
least minimize, the Fear, Uncertainty & Doubt (FUD) that is used to justify purchases and/or evaluate controls by injecting
objectivity into the process.
The C|P-CMM draws upon the high-level structure of the Systems Security Engineering Capability Maturity Model v2.0 (SSE-CMM),
since we felt it was the best model to demonstrate varying levels of maturity for PPTDF at a control level. If you are unfamiliar with
the SSE-CMM, it is well-worth your time to read through the SSE-CMM Model Description Document that is hosted by the US
Defense Technical Information Center (DTIC). 28
The SSE-CMM has been around for over two decades and is a community-owned maturity model, so it is free to use. The SSE-
CMM is also referenced as ISO/IEC 21827:2008 Information technology -- Security techniques -- Systems Security Engineering --
Capability Maturity Model (SSE-CMM).29
This stance on fraudulent misrepresentations may appear harsh, but it accurately describes the situation. There is no room in
cybersecurity and data protection operations for unethical parties, so the SCF Council published this guidance on what a
“reasonable party perspective” should be. This provides objectivity to minimize the ability of unethical parties to abuse the
intended use of the C|P-CMM.
The following two (2) questions should be kept in mind when evaluating the maturity of a control (or Assessment Objective (AO)).
1. Do I have reasonable evidence to defend my analysis/decision?
2. If there was an incident and I was deposed in a legal setting, can I justify my analysis/decision without perjuring myself?
Do you need to answer “yes” to every bullet pointed criteria under a level of maturity in the C|P-CMM? No. We recognize that every
organization is different. Therefore, the maturity criteria items associated with SCF controls are to help establish what would
reasonably exist for each level of maturity. Fundamentally, the decision comes down to assessor experience, professional
competence and common sense.
While a more mature implementation of controls can equate to an increased level of security, higher maturity and higher
assurance are not mutually inclusive. From a practical perspective, maturity is simply a measure of governance activities
pertaining to a specific control or set of controls. Maturity does not equate to an in-depth analysis of the strength and depth of the
control being evaluated (e.g., rigor).
According to NIST, assurance is “grounds for confidence that the set of intended security controls in an information system are
effective in their application.”31 Increased rigor in control testing is what leads to increased assurance. Therefore, increased rigor
and increased assurance are mutually inclusive.
The SCF Conformity Assessment Program (SCF CAP) leverages (3) three levels of rigor. The SCF CAP’s levels of rigor utilize
maturity-based criteria to evaluate a control, since a maturity target can provide context for “what right looks like” at a particular
organization: 32
Level 1 (Basic) - Basic assessments provide a level of understanding of the security measures necessary for determining
whether the safeguards are implemented and free of obvious errors.
Level 2 (Focused) - Focused assessments provide a level of understanding of the security measures necessary for
determining whether the safeguards are implemented and free of obvious / apparent errors and whether there are
increased grounds for confidence that the safeguards are implemented correctly and operating as intended.
Level 3 (Comprehensive) - Comprehensive assessments provide a level of understanding of the security measures
necessary for determining whether the safeguards are implemented and free of obvious errors and whether there are
further increased grounds for confidence that the safeguards are implemented correctly and operating as intended on an
ongoing and consistent basis and that there is support for continuous improvement in the effectiveness of the
safeguards.
L0 practices, or a lack thereof, are generally considered to be negligent. The reason for this is if a control is reasonably-expected
to exist, by not performing the control that is negligent behavior. The need for the control could be due to a law, regulation or
contractual obligation (e.g., client contract or industry association requirement).
NOTE: The reality with a L0 level of maturity is often:
For smaller organizations, the IT support role only focuses on “break / fix” work or the outsourced IT provider has a scope
in its support contract that excludes the control through either oversight or ignorance of the client’s requirements.
For medium / large organizations, there is IT and/or cybersecurity staff, but governance is functionally non-existent and
the control is not performed through either oversight, ignorance or incompetence.
L1 practices are generally considered to be negligent. The reason for this is if a control is reasonably-expected to exist, by only
implementing ad-hoc practices in performing the control that could be considered negligent behavior. The need for the control
could be due to a law, regulation or contractual obligation (e.g., client contract or industry association requirement).
NOTE: The reality with a L1 level of maturity is often:
For smaller organizations, the IT support role only focuses on “break / fix” work, or the outsourced IT provider has a limited
scope in its support contract.
For medium / large organizations, there is IT and/or cybersecurity staff but there is no management focus to spend time
or resources on the control.
L2 practices are generally considered to be “audit ready” with an acceptable level of evidence to demonstrate due diligence and
due care in the execution of the control. L2 practices are generally targeted on specific systems, networks, applications or
processes that require the control to be performed for a compliance need (e.g., PCI DSS, HIPAA, CMMC, NIST 800-171, etc.).
It can be argued that L2 practices focus more on compliance over security. The reason for this is the scoping of L2 practices are
33 Due care is the standard of care where a reasonable person would exercise in the same situation or under similar circumstances. This standard of care is used
to determine whether a party’s actions (or inactions) were negligent.
34 Due diligence is the care that a reasonable person exercises to avoid harm to other persons or their property.
It can be argued that L3 practices focus on security over compliance, where compliance is a natural byproduct of those secure
practices. These are well-defined and properly-scoped practices that span the organization, regardless of the department or
geographic considerations.
L4 practices are generally considered to be “audit ready” with an acceptable level of evidence to demonstrate due diligence and
due care in the execution of the control, as well as detailed metrics enable an objective oversight function. Metrics may be daily,
weekly, monthly, quarterly, etc.
L5 practices are generally considered to be “audit ready” with an acceptable level of evidence to demonstrate due diligence and
due care in the execution of the control and incorporates a capability to continuously improve the process. Interestingly, this is
where Artificial Intelligence (AI) and Machine Learning (ML) would exist, since AI/ML would focus on evaluating performance and
making continuous adjustments to improve the process. However, AI/ML are not required to be L5.
From a business consideration, the increase in cost and complexity will always require cybersecurity and data privacy leadership
to provide a compelling business case to support any maturity planning needs. Speaking in terms the business can understand is
vitally important.
NOTE: During the development of the C|P-CMM, a contributor identified an interesting insight that L0-L3 are “internal” maturity
levels for cybersecurity and data privacy teams, whereas L4-L5 are “external” maturity levels that expand beyond those teams.
When you look at the stakeholders involved in L0-L3, it is almost entirely IT, cybersecurity and data privacy. It isn’t until L4-L5 where
there is true business stakeholder involvement in oversight and process improvement. This creates an internal to external shift in
owning the cybersecurity & privacy program.
NEGLIGENCE CONSIDERATIONS
Without the ability to demonstrate evidence of both due care and due diligence, an organization may be found negligent. In
practical terms, the “negligence threshold” is between L1 and L2. The reason for this is at L2, practices are formalized to the point
that documented evidence exists to demonstrate reasonable steps were taken to operate a control.
RISK CONSIDERATIONS
Risk associated with the control in question decreases with maturity, but noticeable risk reductions are harder to attain above L3.
Oversight and process automation can decrease risk, but generally not as noticeably as steps taken to attain L3.
The point of this example is to demonstrate a relatable scenario that readers can comprehend how being asked to jump straight
into an advanced level of maturity is not practical, where it requires some level of lesser maturity. For example, if you were just
learning how to walk, it would be foolish to try and run the 400m hurdles that require both the strength and skill of sprinting, but
also the knowledge of how to jump over an obstacle.
In this example, this maturity model is applied to a control to raise an individual’s resting heart rate through exercise.
L0 – Sitting Down
o Sitting down would be non-existent effort. No evidence of exercise exists.
o Sitting down would be considered deficient in terms of meeting this control.
L1 – Crawling
o Crawling is at best considered ad-hoc exercise and likely doesn’t meet the intent of the control.
o Crawling would be considered deficient in terms of meeting this control.
L2 – Walking
o Walking builds on skills learned through crawling and demonstrates a capability that raises the individuals’
resting heart rate.
o Walking would meet the intent of the control, but there is clearly room for improvement.
L3 – Running
o Running builds on the skills learned through walking and meets the control’s intent.
o Running would be the “sweet spot” of maturity for this example.
L4 – 400-meter Sprint
o Sprinting builds on the skills learned through running and meets the control’s intent.
o Sprinting requires mastery of running skills to do it properly and avoid injury.
L5 – 400-meter Hurdles
o Running the hurdles builds upon skills learned through sprinting and meets the control’s intent.
o Hurdling requires a mastery of sprinting, since jumping hurdles is in addition to a sprinting race.
The time to execute a business plan to mature a cybersecurity and data privacy program generally spans several years, where
certain capabilities are prioritized over other capabilities. This means the CISO/CIO/CPO will establish CMM targets that evolve
each year, based on prioritization. In the graphic below, the use of a spider chart can be beneficial to identify current vs future
gaps with the C|P-CMM. Prioritization of capability maturities may be based on risk assessments, audits, compliance obligations
or management direction.
All too often, unprincipled cybersecurity & privacy leaders manipulate the business through Fear, Uncertainty and Doubt (FUD) to
scare other technology and business leaders into supporting cybersecurity initiatives. These bad actors maintain the illusion of a
strong cybersecurity & privacy program, when, in reality, the department is an array of disjointed capabilities that lacks a unifying
plan. These individuals stay in the job long enough to claim small victories, implement some cool technology, and then jump ship
for larger roles in other organizations to extend their path of disorder. In these cases, a common theme is the lack of viable
business planning beyond a shopping list of technologies and headcount targets to further their career goals.
CONSIDERATIONS
Cybersecurity & privacy departments are a cost center, not a revenue-generating business function. That means cybersecurity &
privacy compete with all other departments for budget, and it necessitates a compelling business case to justify needed
technology and staffing. Business leaders are getting smarter on the topic of cybersecurity & privacy, so these leaders need to rise
above the FUD mentality and deliver value that is commensurate with the needs of the business.
When identifying a target level of maturity, it is crucial to account for your organization’s culture. The reason for this is the
implementation of perceived “draconian” levels of security can cause a revolt in organizations not accustomed to heavy
From a CISO/CIO/CPO perspective, identifying a target level of maturity is also very beneficial in obtaining budget and protecting
their professional reputation. In cases where business leadership doesn’t support reaching the proposed target level of maturity,
the CISO/CIO/CPO at least has documentation to prove he/she demonstrated a defined resourcing need (e.g., CMM level to
support a business need) and the request was denied. Essentially, this can help cover a CISO/CIO/CPO in case an incident occurs
and blame is pointed. That is just the reality of life for anyone in a high-visibility leadership position and being able to deflect
unwarranted criticism is professional reputation insurance.
IDENTIFYING A SOLUTION
The most efficient manner we can recommend would be to first look at the thirty-three (33) domains that make up the SCF and
assign a high-level CMM level target for each domain.
While a CISO/CIO/CPO can stop at the domain level to target CMM levels, it is expected that they or their subordinates go through
each of the corresponding SCF controls to then tag each control with the appropriate target CMM level. These control targets can
then be assigned to managers and Individual Contributors (IC) to develop operational plans to reach those goals. Ideally, a
quarterly status review is conducted to oversee the progress made towards reaching the target CMM levels.
USE CASE #2 – ASSIST PROJECT TEAMS TO APPROPRIATELY PLAN & BUDGET SECURE PRACTICES
When you consider regulations such as the EU General Data Protection Regulation (GDPR), there is an expectation for systems,
applications and processes to identify and incorporate cybersecurity and data privacy by default and by design. To determine
what is appropriate and to evaluate it prior to “go live” it necessitates expectations for control maturity to be defined.
CONSIDERATIONS
Referencing back to the C|P-CMM Overview section of this document, L0-1 levels of maturity are identified as being deficient from
a “reasonable person perspective” in most cases. Therefore, project teams need to look at the “capability maturity sweet spot”
between L2-L4 to identify the reasonable people, processes and technologies that need to be incorporated into the solution.
As covered previously, avoiding negligent behavior is a critical consideration. The most common constraints that impact a
project’s maturity are: (1) budget and (2) time. A System Development Life Cycle (SDLC) has constraints, and it is expected that
security and privacy controls are applied throughout the SDLC.
IDENTIFYING A SOLUTION
While there are over 1,200 controls in the SCF’s controls catalog, it is necessary for a project team to pare down that catalog to
only what is applicable to the project (e.g., ISO 27002, PCI DSS, CCPA, etc.). This step simply involves filtering out the controls in
the SCF that are not applicable. This step can also be done within Excel or within a GRC solution (e.g., SCF Connect). In the end,
the result is a tailored set of controls that meets the project’s specific needs.
Now that you have pared down the SCF’s controls catalog to only what is applicable, it is a manual review process to identify the
appropriate level of maturity for each of the controls. Ideally, the project will inherit the same target maturity level for controls as
used throughout the organization. For any deviations, based on budget, time or other constraints, a risk assessment should be
conducted to ensure a lower level of maturity for project-specific controls is appropriate.
USE CASE #3 – PROVIDE OBJECTIVE CRITERIA TO EVALUATE THIRD-PARTY SERVICE PROVIDER SECURITY
It is now commonplace for External Service Providers (ESPs), including vendors and partners, to be contractually bound to
implement and manage a baseline set of cybersecurity and data privacy controls. This necessitates oversight of ESPs to ensure
controls are properly implemented and managed.
One of the issues with managing ESPs is most questionnaires ask for simple yes, no or not applicable answers. This approach
lacks details that provide critical insights into the actual security posture of the ESP. The C|P-CMM can be used to obtain more
nuanced answers from ESPs by having those ESPs select from L0-5 to answer if the control is implemented and how mature the
process is.
CONSIDERATIONS
Referencing back to the C|P-CMM Overview section of this document, L0-1 levels of maturity are identified as being deficient from
a “reasonable person perspective” in most cases. Therefore, organizations need to look at the “capability maturity sweet spot”
between L2-L4 to identify the reasonable people, processes and technologies that need ESPs need to be able to demonstrate to
properly protect your systems, applications, services and data, regardless of where it is stored, transmitted or processed. From
an ESP management perspective, this is often going to limit target CMM levels to L2-3 for most organizations.
ESP controls are expected to cover both your internal requirements, as well as external requirements from applicable laws,
regulations and contracts. Using the C|P-CMM can be an efficient way to provide a level of quality control over ESP practices.
Being able to demonstrate proper cybersecurity and data privacy practices is built upon the security principles of protecting the
confidentiality, integrity, availability and safety of your assets, including data.
Now that you have pared down the SCF’s controls catalog to only what is applicable, it is a manual review process to identify the
appropriate level of maturity for each of the controls that would be expected for the ESP. Ideally, the ESP will inherit the same
target maturity level for controls as used throughout the organization. For any deviations, based on contract clauses, budget, time
or other constraints, a risk assessment should be conducted to ensure a lower level of maturity for ESP-specific controls is
appropriate.
If the acquiring entity only leverages a single framework (e.g., NIST CSF, ISO 27002 or NIST 800-53) for due diligence work, it will
most likely provide a partial picture as to the divesting entity’s cybersecurity and data privacy practices. That is why the SCF-B is
a bespoke set of cybersecurity and data privacy controls that was purposely built for M&A to provide as complete a picture as
possible about the divesting entity’s cybersecurity and data privacy practices.
A control set questionnaire that asks for simple yes, no or not applicable answers is insufficient in M&A due diligence. Failure to
leverage maturity-based criteria will result in the inability to provide critical insights into the actual security posture of the divesting
entity. The C|P-CMM can be used to obtain more nuanced answers to determine (1) if a control is implemented and (2) how mature
the process behind the control is.
CONSIDERATIONS
Referencing back to the C|P-CMM Overview section of this document, L0-1 levels of maturity are identified as being deficient from
a “reasonable person perspective” in most cases. Therefore, acquiring entities need to look at the “capability maturity sweet
spot” between L2-L4 to identify the reasonable people, processes and technologies needed to demonstrate to properly protect
systems, applications, services and data, regardless of where it is stored, transmitted or processed.
Areas of deficiency can be identified and remediation costs determined, which can be used to adjust valuations. Key areas that
affect valuations include, but are not limited to:
Non-compliance with statutory, regulatory and/or contractual obligations;
Data protection practices (e.g., privacy);
IT asset lifecycle management (e.g., unsupported / legacy technologies);
Historical cybersecurity incidents;
Risk management (e.g., open items on a risk register or Plan of Action & Milestones (POA&M);
Situational awareness (e.g., visibility into activities on systems and networks);
Software licensing (e.g., intellectual property infringement);
Business Continuity / Disaster Recovery (BC/DR);
IT / cybersecurity architectures (e.g., deployment of on-premises, cloud and hybrid architectures); and
IDENTIFYING A SOLUTION
The SCF did the hard work by developing the SCF-B control set. The “best practices” that comprise the SCF-B include:
Trust Services Criteria (SOC 2);
CIS CSC;
COBITv5;
COSO;
CSA CCM;
GAPP;
ISO 27002;
ISO 31000;
ISO 31010;
NIST 800-160;
NIST Cybersecurity Framework;
OWASP Top 10;
UL 2900-1; and
EU GDPR.
The C|P-RMM:
Is a free solution that organizations can use to holistically approach that breaks risk management down into seventeen
(17) distinctive steps;
Exists is to help cybersecurity and data privacy functions create a repeatable methodology to identify, assess, report and
mitigate risk;
Offers flexibility to report on risk at a control level or aggregate level (e.g., a project, department, domain or organization-
level); and
Guides the decision to a risk treatment option (e.g., reduce, avoid, transfer or accept).
Based on the applicable statutory, regulatory and contractual obligations that impact the scope of a risk assessment, an
organization is expected to have an applicable set of cybersecurity and data privacy controls to cover those fundamental
compliance obligations. That set of controls identifies the in-scope requirements that must be evaluated to determine what risk
exists. This is generally considered to be a “gap assessment” where the assessor:
Evaluates those controls based on the entity's Threat Catalog to identify current or potential control deficiencies; and
Utilize the Risk Catalog to identify the applicable risks, based on the identified control deficiencies.
Therefore, it is vitally important to understand that risks and threats do not exist in a vacuum. If your cybersecurity and data privacy
program is appropriately built, you will have a robust controls framework where risks and threats will map directly to controls.
Why is this?
Controls are central to managing risks, threats procedures and metrics.
Risks, threats, metrics and procedures need to map into the controls, which then map to standards and policies.
In risk management, the old adage that “the path to hell is paved with good intentions” is applicable. Often, risk management
personnel are tasked with creating risk assessments and questions to ask without having a centralized set of organization-wide
cybersecurity and data privacy controls to work from. This generally leads to risk teams making up risks and asking questions that
are not supported by the organization’s policies and standards. For example, an organization is an “ISO shop” that operates an
ISO 27002-based Information Security Management System (ISMS) to govern its policies and standards, but its risk team is asking
questions about NIST SP 800-53 or NIST SP 800-171 controls that are not applicable to the organization.
EXPERT INSIGHT (ROGUE RISK MANAGEMENT OPERATIONS): Cybersecurity teams “making up risks” points to a few security
program governance issues:
If the need for additional controls to cover risks is legitimate, then the organization is improperly scoped and does not
have the appropriate cybersecurity and data privacy controls to address its applicable statutory, regulatory, contractual
or industry-expected practices.
If the organization is properly scoped, then the risk team is essentially making up requirements that are not supported by
the organization’s policies and standards.
Where the C|P-RMM exists to help cybersecurity and data privacy functions create a repeatable methodology to identify, assess,
report and mitigate risk. This is based on the understanding that the responsibility to approve a risk treatment solution rests with
the management of the LOB/department/team/stakeholder that “owns” the risk. The C|P-RMM is meant to guide the decision to
one of these common risk treatment options:
1. Reduce the risk to an acceptable level;
2. Avoid the risk;
3. Transfer the risk to another party; or
4. Accept the risk.
The C|P-RMM is designed to be an integral tool of an organization’s ability to demonstrate evidence of due diligence and due care.
This not only benefits your organization by having solid risk management practices, but it can also serve as a way to reduce risk
for those who have to initiate the hard discussions on risk management topics.
EXPERT INSIGHT (RISK ACCEPTANCE): It is a common problem for individuals who are directly impacted by risk to simply claim,
“I accept the risk” in a misplaced maneuver to make the risk go away, so that the project/initiative can proceed without having to
first address deficiencies. This is why it is critically important as part of a risk management program to identify the various levels
of management who have the legitimate authority to make risk management decisions. This can help prevent low-level managers
from recklessly accepting risks that should be reserved for more senior management.
Before you read further, ask yourself these two (2) questions about your organization and your personal exposure in risk
management:
1. Can you prove that the right people within your organization are both aware of risks and have taken direct responsibility
for mitigating those risks?
2. If there was a breach or incident that is due to identified risks that went unmitigated, where does the “finger pointing” for
blame immediately go to?
Instead of executive leadership hanging blame on the CIO or CISO, quality risk management documentation can prove that
reasonable steps were taken to identify, assess, report and mitigate risk. This type of documentation can provide evidence of due
diligence and due care on the part of the CIO/CISO/CRO, which firmly puts the responsibility back on the management of the
team/department/line of business that “owns” the risk.
Organizations often face conflicting expectations for risk management, based on department-level practices. For example, where
disjointed risk management practices exist, a “Moderate Risk” often has entirely different financial and/or operational impacts
across cybersecurity, IT, legal, finance, HR, operations, etc. The concept of Enterprise Risk Management (ERM) is to apply a
comprehensive, organization-wide approach to risk management practices, where each department operates according to a
similar playbook, where “Moderate Risk” means the same thing across the entire organization. This helps make an “apples to
apples” comparison that can aid in creating a more holistic approach to risk management practices when risk designations are
standardized.
Risk management activities are logical and systematic processes that can be used when making well-informed decisions to
improve effectiveness and efficiency. Proactive risk management activities have these characteristics:
Integrated into Business As Usual (BAU) activities (e.g., everyday work);
Focuses on proactive management involvement, rather than reactive crisis management;
Identifies and helps prepare for what might happen;
The articulation of risk management concepts is both an art and science. This requires a clear understanding of certain risk
management terminology:
Risk Appetite;
Risk Tolerance; and
Risk Threshold.
Risk management decisions must be explained in the context of the business, since risk management practices do not operate in
a vacuum. Therefore, it is crucial to understand the environment where risk management practices exist. This also requires a clear
understanding of business planning terminology:
Mission;
Vision; and
Strategy.
What is important to keep at the forefront of risk management considerations is the material nature of risk, as it pertains to the
organization. Risks that have a material impact include, but are not limited to:
Confidentiality, Integrity & Availability (CIA) of the organization’s sensitive/regulated data;
Supply chain security;
Macroeconomic forces;
Socio-political changes;
Statutory / regulatory changes;
Competitive landscape;
Diplomatic sanctions (e.g., taxes, customs, embargoes, etc.); and
Natural / manmade disasters (e.g., pandemics, war, etc.).
BASELINING RISK MANAGEMENT TERMINOLOGY
Risk management involves coordinated activities that optimize the management of potential opportunities and adverse effects.
Proactive risk management activities provide a way to realize potential opportunities without exposing an organization to
unnecessary peril.
The goal of risk analysis is to determine the potential negative implications of an action or situation to determine one (1) of two (2)
decisions:
1. Acceptable Risk: the criteria fall within a range of acceptable parameters; or
2. Unacceptable Risk: The criteria fall outside a range of acceptable parameters.
ComplianceForge published a “threats vs vulnerabilities vs risks” informational graphic that describes the relationship between
these components. That informational graphic is shown below:35
In the context of this definition of risk, it is important to define underlying components of this risk definition:
Danger: state of possibly suffering harm or injury.
Harm: material / physical damage.
Loss: destruction, deprivation or inability to use.
WHAT IS A THREAT?
In the context of cybersecurity & data privacy practices, “threat” is defined as:
Noun: A person or thing likely to cause damage or danger.
Verb: To indicate impending damage or danger.
UNDERSTANDING THE DIFFERENCES BETWEEN: RISK TOLERANCE VS RISK THRESHOLD VS RISK APPETITE
Key concepts associated with risk management include:
Risk Appetite: The types and amount of risk, on a broad level, an organization is willing to accept in its pursuit of value. 36
Risk Tolerance: The level of risk an entity is willing to assume in order to achieve a desired result. 37
Risk Threshold: Values used to establish concrete decision points and operational control limits to trigger management
action and response escalation.38
36
NIST Glossary for Risk Appetite - https://csrc.nist.gov/glossary/term/risk_appetite
37
NIST Glossary for Risk Tolerance - https://csrc.nist.gov/glossary/term/risk_tolerance
38
NIST Glossary for Thresholds - https://csrc.nist.gov/glossary/term/thresholds
A risk appetite does not contain granular risk management criteria and is primarily a “management statement” that is subjective
in nature. Similar in concept to how a policy is a "high-level statement of management intent," an organization's defined risk
appetite is a high-level statement of how all, or certain types of, risk are willing to be accepted.
Examples of an organization stating its risk appetite from basic to more complex statements:
"[organization name] is a low-risk organization and will avoid any activities that could harm its customers."
"[organization name] will aggressively pursue innovative solutions through Research & Development (R&D) to provide
industry-leading products and services to our clients, while maintaining a Moderate Risk Appetite. Developing
breakthrough products and services does invite potential risk through changes to traditional supply chains, disruptions to
business operations and changing client demand. Proposed business practices that pose greater than a Moderate Risk
will be considered on a case-by-case basis for financial, operational and legal implications.”
It is important to point out that in many immature risk programs, risk appetite statements are divorced from reality. Executive
leaders mean well when they issue risk appetite statements, but the Business As Usual (BAU) practices routinely violate the risk
appetite. This is often due to numerous reasons that include, but are not limited to:
Technical debt;
Dysfunctional management decisions;
Insecure practices;
Inadequate funding/resourcing;
Improperly scoped support contracts (e.g., Managed Service Providers (MSPs), consultants, vendors, etc.); and
Lack of pre-production security testing.
From a graduated scale perspective, it is possible to define "tolerable" risk criteria to create five (5) useful categories of risk:
1. Low Risk;
2. Moderate Risk;
3. High Risk;
4. Severe Risk; and
5. Extreme Risk.
There are two (2) objective criteria that go into defining what constitutes a low, moderate, high, severe or Extreme Risk includes:
1. Impact Effect (IE); and
2. Occurrence Likelihood (OL).
There are three (3) general approaches are commonly employed to estimate OL:
1. Relevant historical data;
2. Probability forecasts; and
3. Expert opinion.
An organization's risk tolerance is influenced by several factors that includes, but is not limited to:
Statutory, regulatory and contractual compliance obligations (including adherence to privacy principles for ethical data
protection practices).
Organization-specific threats (natural and manmade).
Reasonably expected industry practices.
Pressure from competition.
Executive management decisions.
Organizations that are reasonably expected to operate with a Low Risk Tolerance include, but are not limited to:
Critical infrastructure
Utilities (e.g., electricity, drinking water, natural gas, sanitation, etc.)
Telecommunications (e.g., Internet Service Providers (ISPs), mobile phone carriers, Cloud Service Providers (CSPs), etc.)
(high value)
Transportation (e.g., airports, railways, ports, tunnels, fuel delivery, etc.)
Technology Research & Development (R&D) (high value)
Healthcare (high value)
Government institutions:
o Military
o Law enforcement
o Judicial system
o Financial services (high value)
o Defense Industrial Base (DIB) contractors (high value)
Organizations that are reasonably expected to operate with a Moderate Risk Tolerance include, but are not limited to:
Education (e.g., K-12, colleges, universities, etc.)
Utilities (e.g., electricity, drinking water, natural gas, sanitation, etc.)
Telecommunications (e.g., Internet Service Providers (ISPs), mobile phone carriers, etc.)
Transportation (e.g., airports, railways, ports, tunnels, fuel delivery, etc.)
Technology services (e.g., Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), etc.)
Manufacturing (high value)
Healthcare
Defense Industrial Base (DIB) contractors and subcontractors
Legal services (e.g., law firms)
Construction (high value)
Organizations that may choose to operate with a High Risk Tolerance include, but are not limited to:
Startups
Hospitality industry (e.g., restaurants, hotels, etc.)
Construction
Manufacturing
Personal services
Organizations that may choose to operate with a High Risk Tolerance include, but are not limited to:
Startups
Artificial Intelligence (AI) developers
Risk thresholds are entirely unique to each organization, based on several factors that include:
Financial stability;
Management preferences;
Compliance obligations (e.g., statutory, regulatory and/or contractual); and
Insurance coverage limits.
WHAT IS MATERIALITY?
The SCF defines materiality as, “A deficiency, or a combination of deficiencies, in an organization’s cybersecurity and/or data
privacy controls (across its supply chain) where it is probable that reasonable threats will not be prevented or detected in a timely
manner that directly, or indirectly, affects assurance that the organization can adhere to its stated risk tolerance.” 39
The intended usage of materiality is meant to provide relevant context, as it pertains to risk thresholds. This is preferable when
compared to relatively hollow risk findings that act more as guidelines than actionable, decision-making criteria. Cybersecurity
materiality is meant to act as a "guard rail" for risk management decisions. A material weakness crosses an organization’s risk
threshold by making an actual difference to the organization, where systems, applications, services, personnel, the organization
and/or third-parties are, or may be, exposed to an unacceptable level of risk.
The SEC, Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS) lack specificity
in defining the criteria for materiality. Therefore, organizations generally have leeway to define it on their own. The lack of
authoritative definition for materiality is not unique, since the concept of risk appetite, risk tolerance and risk threshold also suffer
from nebulous definitions by statutory and regulatory authorities.
For an item to be considered material, the control deficiency, risk, threat or incident (singular or a combination) generally must
meet one or more of the following criteria where the potential financial impact is: 40
≥ 5% of pre-tax income
≥ 0.5% of total assets
≥ 1% of total equity (shareholder value); and/or
≥ 0.5% of total revenue.
This materiality determination can be visualized with this infographic with the callout for publicly traded companies having a
requirement to publicly disclose material cybersecurity incidents: 41
42 SEC - https://www.sec.gov/comments/265-24/26524-77.pdf
43 IFRS - https://www.ifrs.org/content/dam/ifrs/project/definition-of-materiality/definition-of-material-feedback-statement.pdf
In a mature risk program, the results of risk assessments are evaluated with the organization's risk appetite in consideration. For
example, if the organization has a Moderate Risk Appetite and there are several findings in a risk assessment that are High Risk,
then action must be taken to reduce the risk. Accepting a High Risk would violate the Moderate Risk Appetite set by management.
In reality, which leaves remediation, transferring or avoiding as the remaining three (3) options, since accepting the risk would be
prohibited.
Given the necessary changes to ramp up both talent and technology to put the appropriate solutions in place to meet the
company’s deadlines, there are gaps/deficiencies. When the risk management team assesses the associated risks, the results
identify a range of risks from High to Extreme. The reason for these results is simply due to the higher likelihood of emergent
behaviors occurring from AI that potentially could harm individuals (e.g., catastrophic impact effect). The results were objective
and told a compelling story that there is a realistic chance of significant damage to the company’s reputation and financial
liabilities from class action lawsuits.
With those results that point to risks exceeding the organization’s risk appetite, it is a management decision on how to proceed.
What does the CEO / Board of Directors (BoD) do?
Dispense with its long-standing risk appetite for this specific project so that a potentially lucrative business opportunity
can exist?
Is the AI project cancelled due to the level of risk?
If the CEO/BoD proceeds with accepting the risk, is it violating its fiduciary duties, since it is accepting risk that it
previously deemed unacceptable? Additionally, would it be considered negligent to accept high, severe or Extreme Risk
(e.g., would a rational individual under similar circumstances make the same decision?)?
These are all very real topics that need to be considered and how risk is managed has significant legal and financial implications.
MISSION
Influences the vision of the organization.
Requires a strategy to accomplish.
VISION
Inspires personnel to achieve the mission.
STRATEGY
Implements the mission.
COMPLIANCE OBLIGATIONS
Affect the strategy.
Affect resource prioritization.
RISK APPETITE
Must support the organization’s strategy.
Defines the organization’s risk tolerance.
RESOURCE PRIORITIZATION
Creates operational risks.
Affects:
o Processes that are implemented to achieve objectives;
o Technologies used to support operations;
o Staffing levels at the department / team level; and
o Supply chain quality & security (e.g., vendors, suppliers, contractors, consultants, etc.).
RISK TOLERANCE
Is defined by the organization’s risk appetite.
Influences LOB objectives.
Quantifies the organization’s risk thresholds.
PROCESSES
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
TECHNOLOGIES
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Create operational risks.
STAFFING
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Creates operational risks.
SUPPLY CHAIN
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Creates operational risks.
RISK THRESHOLDS
Provide criteria to assess operational risks.
Affect:
o Processes that are implemented to achieve objectives;
o Technologies used to support operations;
o Staffing levels at the department / team level; and
o Supply chain quality & security (e.g., vendors, suppliers, contractors, consultants, etc.).
OPERATIONAL RISK
Is assessed against the organization’s risk thresholds.
Must adhere to the organization’s risk tolerance, where the organization has four (4) options to address identified risks:
1. Reduce the risk to an acceptable level;
2. Avoid the risk;
3. Transfer the risk to another party; or
4. Accept the risk.
In the context of this definition of risk, it is important to define underlying components of this risk definition:
Danger: state of possibly suffering harm or injury
Harm: material / physical damage
Loss: destruction, deprivation or inability to use
Secure and compliant operations exist when both MCR and DSR are implemented and properly governed:
MCR are primarily externally-influenced, based on industry, government, state and local regulations. MCR should never
imply adequacy for secure practices and data protection, since they are merely compliance-related.
DSR are primarily internally-influenced, based on the organization’s respective industry and risk tolerance. While MCR
establishes the foundational floor that must be adhered to, DSR are where organizations often achieve improved
efficiency, automation and enhanced security.
The combination of MCR and DSR equate to an organization’s Minimum Security Requirements (MSR), which define the “must
have” and “nice to have” requirements for PPTDF in one control set. It defines the Minimum Viable Product (MVP) technical and
business requirements from a cybersecurity and data privacy perspective. In short, the MSR can be considered to be an
organization’s IT General Controls (ITGC), which establishes the basic controls that must be applied to systems, applications,
services, processes and data throughout the enterprise. ITGC provides the foundation of assurance for an organization’s decision
makers. ITGC enables an organization’s governance function to define how technologies are designed, implemented and
operated.
Maturity model criteria should be used by the organization as the benchmark to evaluate cybersecurity and data privacy controls.
Assessing risks in the context of the RMS applies to various assessment scenarios:
Cybersecurity Risk Assessment;
Third-Party Risk Assessment;
Data Protection Impact Assessment (DPIA);
Business Impact Assessment (BIA); and
Privacy Impact Assessment (PIA).
There are three (3) levels of rigor for a risk assessment:
1. Standard;
2. Enhanced; and
3. Comprehensive.
The definition of each assessment method includes types of objects to which the method can be applied. In addition, the
application of each method is described in terms of the attributes of depth and coverage.
The depth attribute addresses the rigor and level of detail of the assessment.
The coverage attribute addresses the scope or breadth of the assessment.
C|P-RMM STEP 8A. RISK ASSESSMENT LEVEL 1: STANDARD RIGOR (MINIMUM ASSURANCE)
Standard rigor assessments provide a level of understanding of the administrative, technical and physical cybersecurity and/or
data protection measures necessary for determining whether the applicable controls are:
1. Implemented; and
2. Free of obvious errors.
Standard rigor represents sufficient due care in the evaluation of cybersecurity and/or data protection controls. Standard rigor is
appropriate for the Manual Point In Time (MPIT) assessment methodology that:
1. Is relevant to a specific point in time (time at which the controls were evaluated); and
C|P-RMM STEP 8B. RISK ASSESSMENT LEVEL 2: ENHANCED RIGOR (MODERATE ASSURANCE)
Enhanced rigor assessments provide a level of understanding of the administrative, technical and physical cybersecurity and/or
data protection measures necessary for determining whether:
1. The applicable controls are:
a. Implemented; and
b. Free of obvious/apparent errors; and
2. There are increased grounds for confidence that the applicable controls are:
a. Implemented correctly; and
b. Operating as intended.
Enhanced rigor is appropriate for the Automated Point In Time (APIT) assessment methodology that utilizes automation to
augment a traditional assessment methodology, where AAT is used to compare the desired state of conformity versus the current
state via machine-readable configurations and/or assessment evidence:
1. Is relevant to a specific point in time (time at which the controls were evaluated);
2. In situations where technology cannot evaluate evidence, evidence is manually reviewed; and
3. The combined output of automated and manual reviews of artifacts is used to derive a finding.
C|P-RMM STEP 8C. RISK ASSESSMENT LEVEL 3: COMPREHENSIVE RIGOR (HIGH ASSURANCE)
Comprehensive rigor assessments provide a level of understanding of the administrative, technical and physical cybersecurity
and/or data protection measures necessary for determining:
1. Whether the applicable controls are:
a. Implemented; and
b. Free of obvious/apparent errors;
2. Whether there are further increased grounds for confidence that the applicable controls are:
a. Implemented correctly; and
b. Operating as intended on an ongoing and consistent basis; and
3. There is support for continuous improvement in the effectiveness of the applicable controls.
Comprehensive rigor is appropriate for the Automated Evidence with Human Review (AEHR) assessment methodology that is
used for ongoing, continuous control assessments:
1. AAT continuously evaluates controls by comparing the desired state of conformity versus the current state through
machine-readable configurations and/or assessment evidence; and
2. Recurring human reviews:
a. Evaluate the legitimacy of the results from automated control assessments; and
b. Validate the automated evidence review process to derive a finding.
An assessor can generally find this information in a well-documented System Security & Privacy Plan (SSPP). If the scoping is
incorrect, the context will likely also be incorrect, which can lead to a misguided and inaccurate risk assessment.
Without specific statutory, regulatory or contractual scoping instructions, the organization should leverage the Unified Scoping
Guide (USG) as the basis for scoping sensitive and/or regulated data. 46
Whenever possible, Assessment Objectives (AOs) need to be used to assess a control. Per the NIT Glossary, an AO is “a set of
determination statements that expresses the desired outcome for the assessment of a security control, privacy control, or control
enhancement.” There may be one or more AOs assigned to a control and all AOs are expected to be satisfied to legitimately be
able to conform to the intent of the control.
In most cases, it is not feasible to have an entirely quantitative assessment, so assessments should be expected to include semi-
qualitative or qualitative aspects. There are multiple methods to assess and calculate risk. The C|P-RMM simplifies risk
management practices by utilizing a form of risk matrix that takes Occurrence Likelihood (OL) and Impact Effect (IE) into account
to determine the risk categorization.
When a control is assessed, the result is referred to as a finding. Findings are not designed to have a specific “score” associated
with the evaluation of a control. Its value is in the subjective status associated with the implementation of the control. These
EXPERT INSIGHT (CONTROL ASSESSMENTS): I the context of control assessments, a designation of:
Satisfactory is positive, where the assessment criteria are met;
N/A is neutral, where the control, or AO, does not apply;
Alternative Control is neutral, where another control, or controls, is/are designated as sufficiently reducing the risk(s)
associated with the control; and
Deficient is negative, where the assessment criteria are not met;
There are multiple methods to actually assess and calculate risk. The C|P-RMM leverages work done in this area by
ComplianceForge’s Risk Management Program (RMP) to simplify risk management practices.
The organization’s risk documentation methodology should utilize one or more of the following options:
Risk Register;
Plan of Action & Milestones (POA&M);
Risk Assessment Report;
System Security & Privacy Plan (SSPP); or
Another documentation option of your choosing.
Before a risk report can be documented, it is very important to clarify if the results of the assessment are “inherent risk” or
“residual risk” since those have entirely different meanings and implications. Some people want to see both inherent and residual
risk, while some people just want to be presented with residual risk. That is why it is important to understand what story the risk
scores tell:
INHERENT RISK: The Occurrence Likelihood (OL), in combination with the Impact Effect (IE) will provide the "inherent
risk" score. This is considered a raw or unmitigated risk score. It is important to note that inherent risk does not take into
account any control weighting, the maturity of implemented controls or any other mitigating factors.
RESIDUAL RISK: To understand the "residual risk" that takes into account control weighting, the maturity of implemented
controls and other mitigating factors, it requires expanding upon inherent risk calculations. To identify the residual risk
score, OL is calculated by IE, Control Weighting (CW), Maturity Level (ML) and Mitigating Factors (MF).
This approach can be summarized by reporting to the organization’s management on the “health” of the assessed controls by one
of the following four (4) risk determinations:
1. Strictly Conforms;
2. Conforms;
3. Significant Deficiency; or
4. Material Weakness.
Strictly Conforms is a statement to the organization’s management that sufficient evidence of due care and due diligence exists
to assure that the organization’s stated risk tolerance can be achieved.
Conforms is a statement to the organization’s management that sufficient evidence of due care and due diligence exists to assure
that the organization’s stated risk tolerance can be achieved.
Significant Deficiency is a statement to the organization’s management that insufficient evidence of due care and due diligence
exists to assure that the organization’s stated risk tolerance is achieved, due to a systemic problem in the cybersecurity and/or
privacy program.
In the context of a significant deficiency, a systemic problem is a consequence of issues inherent in the overall function (e.g.,
team, department, project, application, service, vendor, etc.), rather than a specific, isolated factor. Systemic errors may require
changing the structure, personnel, technology and/or practices to remediate the significant deficiency.
Material Weakness is a statement to the organization’s management that (1) the cybersecurity and/or privacy program is
incapable of successfully performing its stated mission and (2) drastic changes to people, processes and/or technology are
necessary to remediate the findings.
C|P-RMM CALCULATIONS STEP 4: ACCOUNT FOR MITIGATING FACTORS TO DETERMINE RESIDUAL RISK
The final step is to account for Mitigating Factors (MF), which can be compensating controls or other process/technology
considerations that mitigate risk, specific to the identified threats.
Leveraging the by ComplianceForge’s Risk Management Program (RMP) structure, it is straightforward to translate the calculated
value of the residual risk score into a user-friendly risk category:
CDPAS PURPOSE
The CDPAS exists to provide performance standards for cybersecurity and data protection-related 3PAAC Services.
CDPAS INTENT
The CDPAS is not “one-size-fits-all.” Instead, the guidance throughout this document should be adopted and tailored to the
unique size, resources and risk circumstances of each OSA and 3PAO. The CDPAS can be modified, or augmented, with OSA-
specific requirements, policies, or other compliance obligations due to statutory, regulatory and/or contractual requirements.
This publication empowers OSAs to develop cybersecurity and data protection assessment strategies tailored to their specific
mission, business needs, threats and operational environments.
CDPAS STANDARDS
The following are the names of each CDPAS standard. The associate standard, justification and guidance can be found in the
CDPAS document: 48
47
SCF CDPAS - https://securecontrolsframework.com/content/cdpas.pdf
48
SCF CDPAS - https://securecontrolsframework.com/content/cdpas.pdf
The SCF CAP is focused on using the SCF as the control set to provide a company-level certification. While the SCF-CAP shares
some similarities with other existing, single-focused certifications (e.g., ISO 27001, CMMC, FedRAMP, etc.), the SCF CAP is unique
in its metaframework approach to covering cybersecurity and data protection requirements that span multiple laws, regulations
and frameworks
49
SCF CAP BoK - https://securecontrolsframework.com/content/cap/SCF-CAP-BOK.pdf
50
NIST SP 2000-01 - NIST Special Publication 200-01, ABC’s of Conformity Assessment
In the context of this definition of risk, it is important to define underlying components of this risk definition:
Danger: state of possibly suffering harm or injury
Harm: material / physical damage
Loss: destruction, deprivation or inability to use
With this understanding of what risk is, the SCF contains a catalog of thirty-nine (39) risks:
Risk*
Note - Some of these risks may Description of Possible Risk Due To Control Deficiency
Risk Grouping Risk # indicate a deficiency that could
be considered a failure to meet IF THE CONTROL FAILS, RISK THAT THE ORGANIZATION
"reasonable security practices" IS EXPOSED TO IS:
Asset Loss of integrity through Unauthorized changes that corrupt the integrity of the
R-AM-2
Management unauthorized changes system / application / service.
Exposure R-EX-4 Diminished reputation Diminished brand value (e.g., tarnished reputation).
Inability to maintain situational The inability to detect cybersecurity and/or privacy incidents
R-SA-1
awareness (e.g., a lack of situational awareness).
Situational
Awareness
Lack of a security-minded The inability to appropriately educate and train personnel to
R-SA-2
workforce foster a security-minded workforce.
Third-party compliance / legal The inability to maintain compliance due to third-party non-
R-SC-4
exposure compliance, criminal acts, or other relevant legal action(s).
NATURAL THREATS
Natural threats are caused by environmental phenomena that have the potential to impact individuals, processes, organizations
or society, as a whole. The SCF’s Threat Catalog contains fourteen (14) natural threats:
Threat
Threat* Threat Description
#
Regardless of geographic location, periods of reduced rainfall are expected. For non-
NT-1 Drought & Water Shortage agricultural industries, drought may not be impactful to operations until it reaches
the extent of water rationing.
Earthquakes are sudden rolling or shaking events caused by movement under the
NT-2 Earthquakes earth’s surface. Although earthquakes usually last less than one minute, the scope
of devastation can be widespread and have long-lasting impact.
Hurricanes and tropical storms are among the most powerful natural disasters
Hurricanes & Tropical because of their size and destructive potential. In addition to high winds, regional
NT-5
Storms flooding and infrastructure damage should be considered when assessing
hurricanes and tropical storms.
Landslides occur throughout the world and can be caused by a variety of factors
including earthquakes, storms, volcanic eruptions, fire, and by human modification
NT-6 Landslides & Debris Flow of land. Landslides can occur quickly, often with little notice. Location of critical
technologies should be considered (e.g., server room is in the basement or first floor
of the facility).
Severe weather is a broad category of meteorological events that include events that
NT-8 Severe Weather
range from damaging winds to hail.
Space weather includes natural events in space that can affect the near-earth
environment and satellites. Most commonly, this is associated with solar flares from
NT-9 Space Weather
the Sun, so an understanding of how solar flares may impact the business is of
critical importance in assessing this threat.
Thunderstorms are most prevalent in the spring and summer months and generally
occur during the afternoon and evening hours, but they can occur year-round and at
NT-10 Thunderstorms & Lightning all hours. Many hazardous weather events are associated with thunderstorms.
Under the right conditions, rainfall from thunderstorms causes flash flooding and
lightning is responsible for equipment damage, fires and fatalities.
Tornadoes occur in many parts of the world, including the US, Australia, Europe,
Africa, Asia, and South America. Tornadoes can happen at any time of year and
NT-11 Tornadoes occur at any time of day or night, but most tornadoes occur between 4–9 p.m.
Tornadoes (with winds up to about 300 mph) can destroy all but the best-built man-
made structures.
All tsunamis are potentially dangerous, even though they may not damage every
coastline they strike. A tsunami can strike anywhere along most of the US coastline.
NT-12 Tsunamis
The most destructive tsunamis have occurred along the coasts of California, Oregon,
Washington, Alaska and Hawaii.
While volcanoes are geographically fixed objects, volcanic fallout can have
significant downwind impacts for thousands of miles. Far outside of the blast zone,
NT-13 Volcanoes
volcanoes can significantly damage or degrade transportation systems and also
cause electrical grids to fail.
Winter storms is a broad category of meteorological events that include events that
Winter Storms & Extreme range from ice storms, to heavy snowfall, to unseasonably (e.g., record breaking)
NT-14
Cold cold temperatures. Winter storms can significantly impact business operations and
transportation systems over a wide geographic region.
MANMADE THREATS
Manmade threats are caused by an element of human intent, negligence or error, or threat of violence that have the potential to
impact individuals, processes, organizations or society, as a whole. The SCF’s Threat Catalog contains twenty-three (23)
manmade threats:
Threat
Threat* Threat Description
#
Unlike physical threats that prompt immediate action (e.g., "stop, drop, and roll" in
Hacking & Other the event of a fire), cyber incidents are often difficult to identify as the incident is
MT-2
Cybersecurity Crimes occurring. Detection generally occurs after the incident has occurred, with the
exception of "denial of service" attacks. The spectrum of cybersecurity risks is
The use of NBC weapons are in the possible arsenals of international terrorists and it
must be a consideration. Terrorist use of a “dirty bomb” — is considered far more
Nuclear, Biological and
MT-4 likely than use of a traditional nuclear explosive device. This may be a combination of
Chemical (NBC) Weapons
conventional explosive device with radioactive / chemical / biological material and
be designed to scatter lethal and sub-lethal amounts of material over a wide area.
Armed attacks, regardless of the motivation of the attacker, can impact a business.
Scenarios can range from single actors (e.g., "disgruntled" employee) all the way to a
MT-6 Terrorism & Armed Attacks coordinated terrorist attack by multiple assailants. These incidents can range from
the use of blade weapons (e.g., knives), blunt objects (e.g., clubs), to firearms and
explosives.
Utility service disruptions are focused on the sustained loss of electricity, Internet,
natural gas, water, and/or sanitation services. These incidents can have a variety of
MT-7 Utility Service Disruption
causes but directly impact the fulfillment of utility services that your business needs
to operate.
Dysfunctional management practices are a manmade threat that expose an
organization to significant risk. The threat stems from the inability of weak,
Dysfunctional Management
MT-8 ineffective and/or incompetent management to (1) make a risk-based decision and
Practices
(2) support that decision. The resulting risk manifests due to (1) an absence of a
required control or (2) a control deficiency.
Human error is a broad category that includes non-malicious actions that are
MT-9 Human Error unexpected and unpredictable by humans. These incidents can range from
misconfigurations, to misunderstandings or other unintentional accidents.
Sanctions is a Supply Chain Risk Management (SCRM) threat category that pertains
to past or present fraudulent activity or corruption. Primarily, the concern is if the
MT-19 Sanctions
third-party is subject to suspension, exclusion or other sanctions that can affect the
supply chain.
Counterfeit / Non-Conforming Products is a Supply Chain Risk Management (SCRM)
threat category that pertains to the integrity of components within the supply chain.
Counterfeit / Non- Counterfeits are products introduced to the supply chain that falsely claim to be
MT-20
Conforming Products produced by the legitimate Original Equipment Manufacturer (OEM), whereas non-
conforming are OEM products / materials that fail to meet the customer
specifications. Both can have a detrimental effect on the supply chain.
Operational Environment is a Supply Chain Risk Management (SCRM) threat
category that pertains to the user environment (e.g., place of performance).
MT-21 Operational Environment
Primarily, the concern is if the operational environment is hazardous that could
expose the organization operationally or financially.
An AO is an objective statement that establishes the desired outcome for the assessment for a specific control. There may be
multiple AOs associated with a control.
AO ORIGINS
Each AO is tagged to identify its origin. The AOs may include one, or more, origins due to overlap:
SCF created;
NIST SP 800-53A R5;
NIST SP 800-171A;
NIST SP 800-171A R3; and
NIST SP 800-172A.
EXPERT INSIGHT (POSSIBLE SOLUTIONS): For most SCF controls, the solutions would be to have administrative controls such as
documented policies, standards and procedures. It would be highly inefficient and add no value to have that common assumption written
for every control, so the focus was on unique administrative, physical and/or technical solutions that may be applicable for a specific
control, beyond the assumed policies, standards and procedures.
51
BLS Firm Size Classes - https://www.bls.gov/bdm/bdmfirmsize.htm
These are “good idea fairy” starting points for those who may want a push in the right direction for possible controls to address
these pre-defined topics.
52
NIST IR 8374 - https://csrc.nist.gov/pubs/ir/8374/final
The SCF Council’s is confident is that if an organization properly scopes its cybersecurity and data protection requirements with
security in mind, compliance will often be a natural byproduct of those actions. To properly use the SCF to become secure and
compliant, it requires an organization’s users to understand what the SCF is and how to use it. Therefore, these FAQs are
published for that purpose.
GENERAL FAQ
This section addresses general FAQ associated with the SCF.
While the SCF Council gives away the SCF for free, if you want a consultant to take you through setting up or operationalizing your
control set, you will have to pay for that service. The SCF Marketplace has a non-exclusive listing of cybersecurity and data privacy
professionals who have the skills and experience to assist you.
The quality of the SCF could easily justify a costly subscription service, but we know that would exclude most organizations and
defeat our broader goal of improving cybersecurity and data privacy practices on a macro scale. While our contributors are
volunteers, we rely on our generous sponsors to maintain the SCF.
The use of the term “mechanism” is the best option, since a mechanism can mean (1) a manual process, (2) a technology solution,
(3) outsourced contract or (4) a combination of those that come together to address the needs of the control. Some smaller
companies may lack technology solutions for many controls, so manual processes will likely prevail. However, getting into
Fortune 500 environments, technology solutions will most often exist to address the controls.
GEN-FAQ-008: WHY DOES THE SCF SAY IT IS THE COMMON CONTROLS FRAMEWORK?
The use of Common Controls Framework™ is trademarked by the SCF. The SCF has exclusive rights to say the SCF is the Common
GEN-FAQ-009: WHAT IS THE CYBERSECURITY & DATA PROTECTION ASSESSMENT STANDARDS (CDPAS)?
With the rise of Artificial Intelligence (AI) and autonomous technologies, the traditional Confidentiality, Integrity & Availability "CIA
Triad" is insufficient to address the needs of a modern, digital cybersecurity and data privacy program due to its avoidance of a
This section addresses general FAQ associated with the SCF CAP.
The SCF CAP is focused on using the SCF as the control set to provide a company-level certification. While the SCF-CAP shares
some similarities with other existing, single-focused certifications (e.g., ISO 27001, CMMC, FedRAMP, etc.), the SCF CAP is unique
in its metaframework approach to covering cybersecurity and data protection requirements that span multiple laws, regulations
and frameworks