-
Leadership and high level objectives
- Analyze organizational objectives, functions, and activities.
- Establish and maintain the scope of the organizational compliance framework and Information Assurance controls.
- Define the Information Assurance strategic roles and responsibilities.
- Establish and maintain a strategic plan.
- Establish and maintain a Governance, Risk, and Compliance awareness and training program.
- Establish and maintain communication protocols.
- Establish and maintain an internal reporting program.
- Establish and maintain an external reporting program.
-
Audits and risk management
- Define the roles and responsibilities for personnel assigned to tasks in the Audit function.
- Establish and maintain an audit program.
- Establish and maintain a risk management program.
- Publish a Report on Compliance for the organization's external requirements.
-
Monitoring and measurement
- Establish and maintain Security Control System monitoring and reporting procedures.
- Implement Security Control System monitoring and reporting procedures.
- Establish, implement, and maintain logging and monitoring operations.
- Establish and maintain a risk monitoring program.
- Establish, implement, and maintain a testing program.
- Monitor the usage and capacity of critical Information Technology assets.
- Establish and maintain a service management monitoring and metrics program.
- Establish and maintain a compliance monitoring policy.
- Monitor the performance of the governance, risk, and compliance capability.
- Monitor the organizational culture.
- Include monitoring in the corrective action plan.
- Report compliance monitoring statistics to the Board of Directors and other critical stakeholders, as necessary.
- Report actions taken on known security issues to the Board of Directors or Senior Executive Committee on a regular basis.
- Report known security issues to the Board of Directors or Senior Executive Committee on a regular basis.
- Provide intelligence support to the organization, as necessary.
-
Technical Security
- Establish and maintain an access classification scheme.
- Establish and maintain a digital identity management program.
- Establish and maintain an access control program.
- Identify and control all network access controls.
- Enforce information flow control.
- Secure access to each system component operating system.
- Control all methods of remote access and teleworking.
- Manage the use of encryption controls and cryptographic controls.
- Establish, implement, and maintain a malicious code protection program.
- Establish and maintain an application security policy.
- Establish and maintain a virtual environment and shared resources security program
-
Physical and environmental protection
- Establish and maintain a physical security program.
- Establish and maintain an environmental control program.
-
Operational and Systems Continuity
- Establish and maintain a business continuity program.
- Prepare the alternate facility for an emergency offsite relocation.
- Establish and maintain a continuity test plan.
- Test the continuity plan, as necessary.
- Implement the continuity plan, as necessary.
-
Human Resources management
- Establish and maintain high level operational roles and responsibilities.
- Define and assign workforce roles and responsibilities.
- Analyze workforce management.
- Establish and maintain a personnel management program.
- Establish and maintain the staff structure in line with the strategic plan.
- Establish job categorization criteria, job recruitment criteria, and promotion criteria.
- Train all personnel and third parties, as necessary.
- Establish and maintain a Code of Conduct as a part of the Terms and Conditions of employment.
- Establish, implement, and maintain performance reviews, as necessary.
- Establish and maintain an ethics program.
-
Operational management
- Establish and implement a capacity management plan.
- Manage cloud services.
- Establish, implement, and maintain a Governance, Risk, and Compliance framework.
- Establish and maintain a Service Management System, as necessary.
- Establish and maintain a network management program.
- Establish and maintain an Asset Management program.
- Establish and maintain a customer service program.
- Establish and maintain an Incident Response program.
- Establish and maintain a performance management standard.
- Establish and maintain a collection management program.
- Provide language analysis support, as necessary.
- Establish and maintain a Service Level Agreement framework.
- Establish, implement, and maintain a cost management program.
- Establish and maintain a change control program.
- Document the organization's local environments.
- Manage the creation of products and services, as necessary.
- Establish and maintain a service catalog.
- Conduct official proceedings, as necessary.
-
System hardening through configuration management
- Establish and maintain a Configuration Management program.
- Identify and document the system's Configurable Items.
- Establish and maintain a system hardening standard.
- Establish and maintain system hardening procedures.
-
Records management
- Establish and implement a translation management program.
- Establish and implement an information management program.
- Establish, implement, and maintain records management policies.
- Establish, implement, and maintain records management procedures.
-
Systems design, build, and implementation
- Establish and maintain a System Development Life Cycle program.
- Initiate the System Development Life Cycle planning phase.
- Initiate the System Development Life Cycle development phase or System Development Life Cycle build phase.
- Initiate the System Development Life Cycle implementation phase.
- Establish and maintain end user support communications.
-
Acquisition or sale of facilities, technology, and services
- Establish and maintain a product upgrade program.
- Plan for acquiring facilities, technology, or services.
- Acquire products or services.
- Establish, implement, and maintain facilities, assets, and services acceptance procedures
-
Privacy protection for information and data
-
Establish and maintain a privacy framework that protects restricted data.
-
Establish, implement, and maintain a personal data transparency program.
- Establish and maintain privacy notices, as necessary.
- Establish, implement, and maintain adequate openness procedures.
- Provide adequate structures, policies, procedures, and mechanisms to support direct access by the data subject to personal data that is provided upon request.
-
Establish, implement, and maintain a privacy policy.
- Document privacy policies in clearly written and easily understood language.
- Notify interested personnel and affected parties when changes are made to the privacy policy.
- Disseminate and communicate the privacy policy, as necessary.
-
Establish, implement, and maintain personal data choice and consent program.
- Establish and maintain disclosure authorization forms for authorization of consent to use personal data.
-
Establish, implement, and maintain a personal data accountability program.
- Assign ownership of the privacy program to the appropriate organizational role.
- Establish and maintain Binding Corporate Rules for the international transfers of personal data.
-
Establish and maintain a personal data use limitation program.
- Establish, implement, and maintain a personal data use purpose specification.
- Establish and maintain personal data access procedures.
- Establish, implement, and maintain personal data use limitation procedures.
- Establish and maintain personal data disclosure procedures.
-
Establish and maintain a personal data collection program.
- Establish and maintain personal data collection limitation boundaries.
-
Establish and maintain a data handling program.
- Establish, implement, and maintain data handling policies.
- Establish and maintain data handling procedures.
-
Establish, implement, and maintain a privacy impact assessment.
- Establish and maintain a privacy framework that protects restricted data.
-
Review compliance with the organization's privacy objectives.
- Establish and maintain a privacy framework that protects restricted data.
-
Develop remedies and sanctions for privacy policy violations.
- Investigate privacy rights violation complaints.
-
Harmonization Methods and Manual of Style
- Establish, implement, and maintain terminological resources.
-
Third Party and supply chain oversight
- Establish and maintain a supply chain management program.
- Establish, implement, and maintain supply chain due diligence standards.
- Conduct all parts of the supply chain due diligence process.
- Establish and maintain a supply chain due diligence report.
- Establish and maintain third party reporting requirements.
- Assess the effectiveness of third party services provided to the organization.
- Establish and maintain outsourcing contracts.
- Establish and maintain a chain of custody or traceability system over the entire supply chain.
- Establish and maintain third party security forces to protect the supply chain, as necessary.
- Establish and maintain information security controls for the supply chain.