Cyber Risk Governance

14 governance controls covering strategy, framework, oversight, operations, resources, and critical asset management.

2
Strategy
2
Framework
6
Oversight
2
Operations
1
Resources
1
Assets
GOV-1

Cyber Risk Strategy

Strategy

The organization has published a cyber risk strategy that is aligned with the technology and business strategies.

NIST CSF ISO 27001 COBIT FFIEC
GOV-2

Cyber Risk Framework

Framework

The organization has an established cyber risk framework (e.g., a complete set of elements including policies, standards, roles and responsibilities, risk management processes, risk taxonomy, risk appetite and emerging threats and technologies) in support of the cyber risk strategy, and ongoing threat, risk and incident management.

NIST CSF ISO 27001 COBIT FFIEC
GOV-3

Strategy and Framework Reviews

Oversight

The organization conducts regular reviews of the cyber risk strategy and cyber risk framework, to ensure compliance with legal and regulatory requirements.

NIST CSF ISO 27001 COBIT FFIEC
GOV-4

Risk-Informed Planning and Budgeting

Strategy

The organization considers cyber risk compliance requirements, identified risks, current and emerging threats, and potential incident related impacts on operations and services, as inputs to planning and prioritizing cyber risk projects, programs and budgets.

NIST CSF ISO 27001 COBIT FFIEC
GOV-5

Executive Accountability

Oversight

The organization has appointed an executive responsible for the cyber risk strategy, the cyber risk framework and for cyber risk awareness and knowledge at the executive level.

NIST CSF ISO 27001 COBIT FFIEC
GOV-6

Cyber Risk Policies

Framework

The organization has documented cyber risk policies to explain staff and contractor roles, responsibilities, rules and constraints as well as possible penalties for non-compliance.

NIST CSF ISO 27001 COBIT FFIEC
GOV-7

Three Lines of Defence

Oversight

The roles and responsibilities of each of the three lines of defence and other stakeholders are clearly described within the cyber risk framework.

NIST CSF ISO 27001 COBIT FFIEC
GOV-8

Key Risk and Performance Indicators

Oversight

Key risk and performance indicators as well as thresholds have been established for the organization's key cyber risk and controls. The risk indicators should align with the cyber risk appetite as stated in the cyber risk framework.

NIST CSF ISO 27001 COBIT FFIEC
GOV-9

Risk Review and Executive Escalation

Oversight

Cyber risks to the organization and its programs or customers are regularly reviewed, prioritized, escalated, explained to the appropriate executives or senior management, and those risks are prioritized for mitigation.

NIST CSF ISO 27001 COBIT FFIEC
GOV-10

Second Line Independent Review

Oversight

The second line of defence regularly provides an independent review of the various cyber risk assessments and other control activities conducted by the first line of defence.

NIST CSF ISO 27001 COBIT FFIEC
GOV-11

Personnel Background Checks

Operations

The organization ensures that background checks have been implemented for personnel/contractors and at third party providers, commensurate with the sensitivity and cyber risk needs of organization assets being managed.

NIST CSF ISO 27001 COBIT FFIEC
GOV-12

Formal Risk Acceptance

Operations

The organization has implemented a formal process for risk acceptance that is measured, tracked and reported.

NIST CSF ISO 27001 COBIT FFIEC
GOV-13

Cyber Risk Resources and Skills

Resources

The organization has allocated sufficient and skilled resources for the sustainment of cyber risk programs, systems, roles and services.

NIST CSF ISO 27001 COBIT FFIEC
GOV-14

Critical Asset Controls

Assets

The organization has identified its critical technology assets and has implemented appropriate controls to ensure confidentiality, integrity and availability. The controls are regularly reviewed and tested.

NIST CSF ISO 27001 COBIT FFIEC