Cyber Risk Governance
14 governance controls covering strategy, framework, oversight, operations, resources, and critical asset management.
Cyber Risk Strategy
StrategyThe organization has published a cyber risk strategy that is aligned with the technology and business strategies.
Cyber Risk Framework
FrameworkThe organization has an established cyber risk framework (e.g., a complete set of elements including policies, standards, roles and responsibilities, risk management processes, risk taxonomy, risk appetite and emerging threats and technologies) in support of the cyber risk strategy, and ongoing threat, risk and incident management.
Strategy and Framework Reviews
OversightThe organization conducts regular reviews of the cyber risk strategy and cyber risk framework, to ensure compliance with legal and regulatory requirements.
Risk-Informed Planning and Budgeting
StrategyThe organization considers cyber risk compliance requirements, identified risks, current and emerging threats, and potential incident related impacts on operations and services, as inputs to planning and prioritizing cyber risk projects, programs and budgets.
Executive Accountability
OversightThe organization has appointed an executive responsible for the cyber risk strategy, the cyber risk framework and for cyber risk awareness and knowledge at the executive level.
Cyber Risk Policies
FrameworkThe organization has documented cyber risk policies to explain staff and contractor roles, responsibilities, rules and constraints as well as possible penalties for non-compliance.
Three Lines of Defence
OversightThe roles and responsibilities of each of the three lines of defence and other stakeholders are clearly described within the cyber risk framework.
Key Risk and Performance Indicators
OversightKey risk and performance indicators as well as thresholds have been established for the organization's key cyber risk and controls. The risk indicators should align with the cyber risk appetite as stated in the cyber risk framework.
Risk Review and Executive Escalation
OversightCyber risks to the organization and its programs or customers are regularly reviewed, prioritized, escalated, explained to the appropriate executives or senior management, and those risks are prioritized for mitigation.
Second Line Independent Review
OversightThe second line of defence regularly provides an independent review of the various cyber risk assessments and other control activities conducted by the first line of defence.
Personnel Background Checks
OperationsThe organization ensures that background checks have been implemented for personnel/contractors and at third party providers, commensurate with the sensitivity and cyber risk needs of organization assets being managed.
Formal Risk Acceptance
OperationsThe organization has implemented a formal process for risk acceptance that is measured, tracked and reported.
Cyber Risk Resources and Skills
ResourcesThe organization has allocated sufficient and skilled resources for the sustainment of cyber risk programs, systems, roles and services.
Critical Asset Controls
AssetsThe organization has identified its critical technology assets and has implemented appropriate controls to ensure confidentiality, integrity and availability. The controls are regularly reviewed and tested.