Example Iso 27001 27002 Policies Standards
Example Iso 27001 27002 Policies Standards
Example Iso 27001 27002 Policies Standards
PROGRAM (CDPP)
ISO 27001:2013 / 27002:2022
INTRODUCTION
The Cybersecurity and Data Protection Program (CDPP) provides definitive information on the prescribed measures used to
establish and enforce the security program at ACME Consulting Services, LLC (ACME).
ACME is committed to protecting its employees, partners, clients and ACME from damaging acts that are intentional or
unintentional. Effective security is a team effort involving the participation and support of every entity that interacts with ACME
data and systems, applications and services. Therefore, it is the responsibility of both ACME personnel and third-parties to be aware
of and adhere to ACME’s cybersecurity and data protection requirements.
Protecting ACME data and the systems that collect, process and maintain this data is of critical importance. Commensurate with
risk, security and privacy measures must be implemented to guard against unauthorized access to, alteration, disclosure or
destruction of data and systems, applications and services. This also includes protection against accidental loss or destruction. The
security of systems, applications and services must include controls and safeguards to offset possible threats, as well as controls to
ensure confidentiality, integrity, availability and safety:
PURPOSE
The purpose of the Cybersecurity and Data Protection Program (CDPP) is to prescribe a comprehensive framework for:
Creating an Information Security Management System (ISMS) in accordance with ISO 27001.
Protecting the confidentiality, integrity and availability of ACME data and information systems.
Protecting ACME, its employees and its clients from illicit use of ACME information systems and data.
Ensuring the effectiveness of security controls over data and information systems that support ACME’s operations.
Recognizing the highly networked nature of the current computing environment and provide effective company-wide
management and oversight of those related Information Security risks.
Providing for development, review and maintenance of minimum security controls required to protect ACME’s data and
information systems.
The formation of these cybersecurity policies is driven by many factors, with the key factor being a risk. These policies set the ground
rules under which ACME operates and safeguards its data and systems to both reduce risk and minimize the effect of potential
incidents.
These policies, including their related control objectives, standards, procedures and guidelines, are necessary to support the
management of information risks in daily operations. The development of policies provides due care to ensure ACME users
understand their day-to-day security responsibilities and the threats that could impact the company.
Some standards apply specifically to persons with a specific job function (e.g., a System Administrator); otherwise, all personnel
supporting ACME business functions shall comply with the standards. ACME departments shall use these standards or may create a
more restrictive standard, but none that are less restrictive, less comprehensive or less compliant than these standards.
These policies do not supersede any other applicable law or higher-level company directive or existing labor management
agreement in effect as of the effective date of this policy.
ACME's documented roles and responsibilities provides a detailed description of ACME user roles and responsibilities, in regards to
cybersecurity-related use obligations.
ACME reserves the right to revoke, change or supplement these policies, standards and guidelines at any time without prior notice.
Such changes shall be effective immediately upon approval by management unless otherwise stated.
POLICY OVERVIEW
To ensure an acceptable level of cybersecurity risk, ACME is required to design, implement and maintain a coherent set of policies,
standards, procedures and guidelines to manage risks to its data and systems.
The CDPP addresses the policies, standards and guidelines. Data / process owners, in conjunction with asset custodians, are
responsible for creating, implementing and updated operational procedures to comply with CDPP requirements.
ACME users must protect and ensure the Confidentiality, Integrity, Availability and Safety (CIAS) of data and systems, regardless of
how its data is created, distributed or stored.
Security controls will be tailored accordingly so that cost-effective controls can be applied commensurate with the risk and
sensitivity of the data and system; and
Security controls must be designed and maintained to ensure compliance with all legal requirements.
EXCEPTION TO STANDARDS
While every exception to a standard potentially weakens protection mechanisms for ACME systems and underlying data,
occasionally exceptions will exist. When requesting an exception, users must submit a business justification for deviation from the
standard in question.
An Information Security Management System (ISMS) focuses on cybersecurity management and technology-related risks. The
governing principle behind ACME’s ISMS is that, as with all management processes, the ISMS must remain effective and efficient in
the long-term, adapting to changes in the internal organization and external environment.
In accordance with leading practices, ACME’s ISMS incorporates the typical "Plan-Do-Check-Act" (PDCA) or Deming Cycle, approach:
Plan: This phase involves designing the ISMS, assessing IT-related risks and selecting appropriate controls.
Do: This phase involves implementing and operating the appropriate security controls.
Check: This phase involves reviewing and evaluating the performance (efficiency and effectiveness) of the ISMS.
Act: This involves making changes, where necessary, to bring the ISMS back to optimal performance.
Management Intent: The purpose of the Security & Privacy Governance (GOV) policy is to govern a documented, risk-based program
that supports business objectives while encompassing appropriate security and privacy principles that addresses all applicable
statutory, regulatory and contractual obligations.
Policy: ACME shall implement and maintain a maturity-based capability to strengthen the security and resilience of its technology
infrastructure and data protection mechanisms against both physical and cyber threats. Security control decisions shall take
applicable statutory, regulatory and contractual obligations into account, but ACME acknowledges that being compliant does not
equate to being secure, so all stakeholders shall protect the confidentiality, integrity, availability and safety of ACME’s technology
resources and data, regardless of the geographic location of the data or technology in use. Cybersecurity and data protection
controls shall be tailored accordingly so that cost-effective controls can be applied commensurate with the risk and sensitivity of
the data and technology in use.
Supporting Documentation: This policy is supported by the following control objectives, standards and guidelines.
Standard: ACME’s security program must be represented in a single document, the Cybersecurity & Data Protection Program (CDPP)
that:
(a) Must be reviewed and updated at least annually; and
(b) Disseminated to the appropriate parties to ensure all ACME personnel understand their applicable requirements.
Guidelines: The security plans for individual systems and the organization-wide CDPP together provide complete coverage for all
cybersecurity and privacy-related controls employed within the organization.
Standard: ACME must establish a cybersecurity and privacy steering committee, or advisory board, comprised of key stakeholders
from ACME Lines of Business (LOB) and technology-related executives that:
(a) Meets formally and on a regular basis; and
(b) Receives briefings from the following:
1. Chief Information Security Officer (CISO) on matters of cybersecurity;
2. Chief Privacy Officer (CPO) on matters of privacy; and
3. Chief Risk Officer (CRO) on matters of enterprise risk.
Guidelines: To achieve proper situational awareness across the organization, key cybersecurity and privacy leaders must facilitate
communication with business stakeholders. This includes translating cybersecurity, privacy and risk concepts and language into
business concepts and language as well as ensuring that business teams consult with cybersecurity and privacy teams to determine
appropriate controls measures when planning new business projects.
The steering committee, or advisory board, can best advise the CISO, CPO and CRO on important matters pertaining to the
organization to ensure technology, security and privacy practices support the overall strategy and mission of the organization.
6
ISO 27001-2013: 4.3, 4.4, 5.1, 6.1.1 | ISO 27002-2022: 5.1, 5.4, 5.37| NIST SP 800-53 R5: PM-1
7
ISO 27001-2013: 4.3, 6.2, 7.4, 9.3, 10.2
Standard: ACME’s security and privacy policies and standards must be represented in a consolidated document, the Cybersecurity
& Data Protection Program (CDPP) that is:
(a) Endorsed by executive management; and
(b) Disseminated to the appropriate parties to ensure all ACME personnel understand their applicable requirements.
Guidelines: An organization’s cybersecurity policies create the roadmap for implementing cybersecurity and privacy measures to
protect its most valuable assets. All personnel should be aware of the sensitivity of data and their responsibilities for protecting it.
Standard: ACME’s business leadership (or other accountable business role or function) must review the Cybersecurity & Data
Protection Program (CDPP) at planned intervals or as a result of changes to the organization (e.g., mergers, acquisitions,
partnerships, new products, etc.) to ensure its continuing alignment with the security strategy, risk posture, effectiveness, accuracy,
relevance and applicability to statutory, regulatory and/or contractual compliance obligations.
Guidelines: Updates to the CDPP will be announced to employees via management updates or email announcements. Changes will
be noted in the Record of Changes to highlight the pertinent changes from the previous policies, procedures, standards and
guidelines.
Standard: Executive and line management must take formal action to support cybersecurity through clearly-documented direction
and commitment and must ensure the action has been assigned. The overall authority and responsibility for managing the security
program are delegated to ACME’s Chief Information Security Officer (CISO) and he/she must perform or delegate the following
security management responsibilities:
(a) Establish, document and distribute security policies and procedures;
(b) Monitor and analyze security alerts and information;
(c) Distribute and escalate security alerts to appropriate personnel;
(d) Establish, document and distribute security incident response and escalation procedures to ensure timely and effective
handling of all situations;
(e) Administer user accounts, including additions, deletions and modifications; and
(f) Monitor and control all access to data.
Guidelines: Central management refers to the organization-wide management and implementation of selected cybersecurity
controls and related processes. Central management includes planning, implementing, assessing, authorizing and monitoring the
organization-defined, centrally managed security controls and processes. Centrally-managed security controls and processes may
also meet independence requirements for assessments in support of initial and ongoing authorizations to operate as part of
organizational continuous monitoring.
8
ISO 27001-2013: 4.3, 5.2, 7.5.1, 7.5.2, 7.5.3 | ISO 27002-2022: 5.1, 5.37| NIST SP 800-53 R5: PM-1 | NIST CSF: ID.GV-1
9
ISO 27001-2013: 6.1.1, 7.4 | ISO 27002-2022: 5.1, 5.37| NIST SP 800-53 R5: PM-1
10
ISO 27001-2013: 5.3 | ISO 27002-2022: 5.2 | NIST SP 800-53 R5: PL-9, PM-2, PM-6, PM-29 | NIST CSF: ID.AM-6
11
ISO 27001-2013: 9.1 | NIST SP 800-53 R5: PM-6 | NIST CSF: PR.IP-8
Management Intent: The purpose of the Incident Response (IRO) policy is to establish and maintain a capability to guide ACME’s
response when security-related incidents occur.
Policy: ACME shall implement and maintain a robust cybersecurity and privacy incident handling capability to strengthen the
resilience of its technology resources that can detect, analyze, contain and recover from incidents that result from physical and
cyber threats. ACME's executive leadership shall maintain situational awareness of incidents to properly support business operations
and take appropriate action to protect ACME's reputation.
Supporting Documentation: This policy is supported by the following control objectives, standards and guidelines.
Standard: ACME’s Chief Information Security Officer (CISO), or the CISO’s designated representative(s) for incident response, must
develop and implement enterprise-wide incident response controls that, at a minimum, include :
(a) A formal, documented Integrated Incident Response Program (IIRP); and
(b) Processes to facilitate the implementation of the incident response processes and associated controls.
Guidelines: The objective is to ensure a consistent and effective approach to the management of cybersecurity incidents, including
communication on security events and weaknesses.
National Institute of Standards and Technology (NIST) guidance for incident response industry-recognized secure practices can be
referenced at:
Computer Security Incident Handling Guide184
Guide to Integrating Forensic Techniques into Incident Response 185
Standard: ACME’s Chief Information Security Officer (CISO), or the CISO’s designated representative(s) for incident response, must
develop and implement processes to:
(a) Investigate notifications from detection systems;
(b) Identify and assess the severity and classification of incidents;
(c) Define appropriate actions to take in response to the incident; and
(d) Respond with appropriate actions to minimize impact and ensure the continuation of business functions.
Guidelines: Organizations recognize that incident response capability is dependent on the capabilities of organizational systems and
the mission/business processes being supported by those systems. Therefore, organizations consider incident response as part of
the definition, design and development of mission/business processes and systems. Incident-related information can be obtained
from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring,
user/administrator reports and reported supply chain events. Effective incident handling capability includes coordination among
many organizational entities including, for example, mission/business owners, system owners, authorizing officials, human
resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices and the risk
executive (function).
183
ISO 27002-2022: 5.24 | NIST SP 800-53 R5: IR-1 | NIST CSF: PR.IP-9 | NIST SP 800-171 R2: NFO - IR-1
184
Computer Security Incident Handling Guide - http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf
185
Guide to Integrating Forensic Techniques into Incident Response - http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf
186
ISO 27002-2022: 5.24, 5.25, 5.26, 6.8 | NIST SP 800-53 R5: IR-4 | NIST CSF: DE.AE-2, DE.AE-4, DE.AE-5, RS.AN-1, RS.AN-4, RS.MI-1, RS.MI-2, RS.RP-1, RC.CO-1,
RC.CO-2, RC.CO-3 | NIST SP 800-171 R2: 3.6.1, 3.6.2
ACRONYMS
AD. Active Directory
BCP. Business Continuity Plan
CDE. Cardholder Data Environment
CERT. Computer Emergency Response Team
CMDB. Configuration Management Database
CTI. Controlled Technical Information 335
CUI. Controlled Unclassified Information 336
DAC. Discretionary Access Control
DLP. Data Loss Prevention
DRP. Disaster Recovery Plan
EPHI. Electronic Protected Health Information
FICAM. Federal Identity, Credential and Access Management
FIM. File Integrity Monitor
GDPR. General Data Protection Regulation
HIPAA. Health Insurance Portability and Accountability Act
IRP. Incident Response Plan
ISIRT. Integrated Security Incident Response Team
ISMS. Cybersecurity Management System
LAN. Local Area Network
LDAP. Lightweight Directory Authentication Protocol
MAC. Media Access Control
NIST. National Institute of Standards and Technology
PDCA. Plan Do Check Act
PIV. Personal Identity Verification
RBAC. Role-Based Access Control
SCRM. Supply Chain Risk Management
SDLC. System Development Life Cycle
TLS. Transport Layer Security
VLAN. Virtual Local Area Network
VPN. Virtual Private Network
WIDS/WIPS. Wireless Intrusion Detection / Protection System
DEFINITIONS
ACME recognizes two sources for authoritative definitions:
The National Institute of Standards and Technology (NIST) IR 7298, Glossary of Key Cybersecurity Terms, is the approved
reference document used to define common digital security terms;337 and
Unified Compliance Framework (UCF) Compliance Dictionary.338
335
CUI Registry - https://www.archives.gov/cui/registry/category-detail/controlled-technical-info.html
336
CUI Registry - https://www.archives.gov/cui/registry/category-list
337
NIST IR 7298 - https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.7298r3.pdf
338
UCF Compliance Dictionary - https://compliancedictionary.com
339
ISO/IEC/IEEE 29148
Acceptable Use
Rules of Behavior, 68
Compliance, 37
Identifiers
Service Accounts, 76
User Names, 76
Information Security Management System, 14
Plan-Check-Do-Act, 14
Least Functionality, 43
Least Privileges, 43
Media Sanitization, 58, 59
Destruction, 58, 59
Mobile Devices, 95
Password
Complexity, 77
Length, 77
Maximum Life, 77
Remote Access, 100, 101
Risk Management, 117
Roles & Responsibilities
Information Security Officer (ISO), 16
Virtual Private Network (VPN). See Remote Access
Vulnerability Management
Remediation Process, 144
Wireless, 101
‐ SUPPLEMENTAL DOCUMENTATION ‐
CYBERSECURITY & DATA PROTECTION
PROGRAM (CDPP)
ANNEXES, TEMPLATES & REFERENCES
Version 2021.1
TABLE OF CONTENTS
ANNEXES 3
ANNEX 1: DATA CLASSIFICATION & HANDLING GUIDELINES 3
ANNEX 2: DATA CLASSIFICATION EXAMPLES 8
ANNEX 3: DATA RETENTION PERIODS 10
ANNEX 4: BASELINE SECURITY CATEGORIZATION GUIDELINES 12
ANNEX 5: RULES OF BEHAVIOR (ACCEPTABLE & UNACCEPTABLE USE) 14
ANNEX 6: GUIDELINES FOR PERSONAL USE OF ORGANIZATIONAL IT RESOURCES 16
ANNEX 7: RISK MANAGEMENT FRAMEWORK (RMF) 17
ANNEX 8: SYSTEM HARDENING 20
TEMPLATES 22
TEMPLATE 1: MANAGEMENT DIRECTIVE (POLICY AUTHORIZATION) 22
TEMPLATE 2: USER ACKNOWLEDGEMENT FORM 23
TEMPLATE 3: USER EQUIPMENT RECEIPT OF ISSUE 24
TEMPLATE 4: SERVICE PROVIDER NON‐DISCLOSURE AGREEMENT (NDA) 25
TEMPLATE 5: INCIDENT RESPONSE PLAN (IRP) 26
TEMPLATE 6: INCIDENT RESPONSE FORM 37
TEMPLATE 7: APPOINTMENT ORDERS (INFORMATION SECURITY OFFICER) 38
TEMPLATE 8: PRIVILEGED USER ACCOUNT REQUEST FORM 39
TEMPLATE 9: CHANGE MANAGEMENT REQUEST FORM 40
TEMPLATE 10: CHANGE CONTROL BOARD (CCB) MEETING MINUTES 42
TEMPLATE 11: PLAN OF ACTION & MILESTONES (POA&M) / RISK REGISTER 43
TEMPLATE 12: PORTS, PROTOCOLS & SERVICES (PPS) 44
TEMPLATE 13: BUSINESS IMPACT ANALYSIS (BIA) 45
TEMPLATE 14: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (BCP) 47
TEMPLATE 15: PRIVACY IMPACT ASSESSMENT (PIA) 51
REFERENCES 53
REFERENCE 1: CDPP EXCEPTION REQUEST PROCESS 53
REFERENCE 2: ELECTRONIC DISCOVERY (EDISCOVERY) GUIDELINES 54
REFERENCE 3: TYPES OF SECURITY CONTROLS 55
REFERENCE 4: INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) 56
Cybersecurity & Data Protection Program (CDPP) – Supplemental Documentation Page 2 of 56
ANNEXES
ANNEX 1: DATA CLASSIFICATION & HANDLING GUIDELINES
DATA CLASSIFICATION
Information assets are assigned a sensitivity level based on the appropriate audience for the information. If the information has
been previously classified by regulatory, legal, contractual, or company directive, then that classification will take precedence.
The sensitivity level then guides the selection of protective measures to secure the information. All data are to be assigned one
of the following four sensitivity levels:
CLASSIFICATION DATA CLASSIFICATION DESCRIPTION
Restricted information is highly valuable, highly sensitive business information and the level of
protection is dictated externally by legal and/or contractual requirements. Restricted
Definition
information must be limited to only authorized employees, contractors, and business partners
with a specific business need.
RESTRICTED ∙ SIGNIFICANT DAMAGE would occur if Restricted information were to become available to
unauthorized parties either internal or external to [Company Name].
Potential
Impact of ∙ Impact could include negatively affecting [Company Name]’s competitive position, violating
Loss regulatory requirements, damaging the company’s reputation, violating contractual
requirements, and posing an identity theft risk.
Confidential information is highly valuable, sensitive business information and the level of
Definition
protection is dictated internally by [Company Name]
∙ MODERATE DAMAGE would occur if Confidential information were to become available to
CONFIDENTIAL unauthorized parties either internal or external to [Company Name].
Potential
Impact of ∙ Impact could include negatively affecting [Company Name]’s competitive position, damaging
Loss the company’s reputation, violating contractual requirements, and exposing the geographic
location of individuals.
Internal Use information is information originated or owned by [Company Name], or entrusted
to it by others. Internal Use information may be shared with authorized employees,
Definition
contractors, and business partners who have a business need, but may not be released to the
general public, due to the negative impact it might have on the company’s business interests.
INTERNAL USE
∙ MINIMAL or NO DAMAGE would occur if Internal Use information were to become available
Potential to unauthorized parties either internal or external to [Company Name].
Impact of
Loss ∙ Impact could include damaging the company’s reputation and violating contractual
requirements.
Public information is information that has been approved for release to the general public and
Definition
is freely shareable both internally and externally.
PUBLIC ∙ NO DAMAGE would occur if Public information were to become available to parties either
Potential internal or external to [Company Name].
Impact of
Loss ∙ Impact would not be damaging or a risk to business operations.
Cybersecurity & Data Protection Program (CDPP) – Supplemental Documentation Page 3 of 56
ANNEX 2: DATA CLASSIFICATION EXAMPLES
The table below shows examples of common data instances that are already classified to simplify the process. This list is not
inclusive of all types of data, but it establishes a baseline for what constitutes data sensitivity levels and will adjust to
accommodate new types or changes to data sensitivity levels, when necessary.
IMPORTANT: You are instructed to classify data more sensitive than this guide, if you feel that is warranted by the content.
Internal Use
Confidential
Restricted
Data
Sensitive Data Elements
Public
Class
Social Security Number (SSN) X
Employer Identification Number (EIN) X
Client or Employee Personal Data
Driver’s License (DL) Number X
Financial Account Number X
Payment Card Number (credit or debit) X
Government‐Issued Identification (e.g., passport, permanent resident card, etc.) X
Controlled Unclassified Information (CUI) X
Birth Date X
First & Last Name X
Age X
Phone and/or Fax Number X
Home Address X
Gender X
Ethnicity X
Email Address X
Compensation & Benefits Data X
Related Data
Employee‐
Medical Data X
Workers Compensation Claim Data X
Education Data X
Dependent or Beneficiary Data X
Business Plan (including marketing strategy) X
Marketing
Sales &
Financial Data Related to Revenue Generation X
Data
Marketing Promotions Development X
Internet‐Facing Websites (e.g., company website, social networks, blogs, promotions, etc.) X
News Releases X
Username & Password Pairs X
Infrastructure Data
Public Key Infrastructure (PKI) Cryptographic Keys (public & private) X
Networking &
Hardware or Software Tokens (multifactor authentication) X
System Configuration Settings X
Regulatory Compliance Data X
Internal IP Addresses X
Privileged Account Usernames X
Service Provider Account Numbers X
Financial Data Financial Data
Corporate Tax Return Information X
Strategic
Legal Billings X
Budget‐Related Data X
Unannounced Merger and Acquisition Information X
Trade Secrets (e.g., design diagrams, competitive information, etc.) X
Electronic Payment Information (Wire Payment / ACH) X
Operating
Paychecks X
Incentives or Bonuses (amounts or percentages) X
Stock Dividend Information X
Bank Account Information X
Cybersecurity & Data Protection Program (CDPP) – Supplemental Documentation Page 8 of 56
ANNEX 3: DATA RETENTION PERIODS
The following schedule highlights suggested retention periods* for some of the major categories of data:
* Retention periods are measured in years, after the event occurrence (e.g., termination, expiration, contract, filing, etc.)
CATEGORY TYPE OF RECORD RETENTION PERIOD
Amendments Permanent
Annual Reports Permanent
Articles of Incorporation Permanent
Board of Directors (elections, minutes, committees, etc.) Permanent
Bylaws Permanent
Capital stock & bond records Permanent
Charter Permanent
Business Contracts & agreements Permanent
Records Copyrights Permanent
Correspondence (General) 5
Correspondence (Legal) Permanent
Partnership agreement Permanent
Patents Permanent
Service marks Permanent
Stock transfers Permanent
Trademarks Permanent
CATEGORY TYPE OF RECORD RETENTION PERIOD
Audit report (external) Permanent
Audit report (internal) 3
Balance sheets Permanent
Bank deposit slips, reconciliations & statements 7
Bills of lading 3
Budgets 3
Cash disbursement & receipt record 7
Checks (canceled) 3
Credit memos 3
Depreciation schedule 7
Dividend register & canceled dividend checks Permanent
Employee expense reports 3
Financial Employee payroll records (W‐2, W‐4, annual earnings records, etc.) 7
Records Financial statements (annual) Permanent
Freight bills 3
General ledger Permanent
Internal reports (work orders, sales reports, production reports) 3
Inventory lists 3
Investments (sales & purchases) Permanent
Profit / Loss statements Permanent
Purchase and sales contracts 3
Purchase order 3
Subsidiary ledgers (accounts receivable, accounts payable, etc.) Permanent
Tax returns Permanent
Vendor Invoices 7
Worthless securities 7
Cybersecurity & Data Protection Program (CDPP) – Supplemental Documentation Page 10 of 56
ANNEX 4: BASELINE SECURITY CATEGORIZATION GUIDELINES
Assets and services are categorized by two primary attributes: (a) the potential impact they pose from misuse and (b) the data
classification level of the data processed, stored or transmitted by the asset or process. These two attributes combine to
establish a basis for controls that should be assigned to that system or asset. This basis is called an Assurance Level (AL).
DATA SENSITIVITY
This is straightforward where the data sensitivity rating represents the highest data classification of the data processed, stored
or transmitted by the asset or process
SAFETY & CRITICALITY
The Safety & Criticality (SC) rating reflects two aspects of the “importance” of the asset or process:
On one hand, SC simply represents the importance of the asset relative to the achievement of the company’s goals and
objectives (e.g., business critical, mission critical, or non‐critical).
On the other hand, SC represents the potential for harm that misuse of the asset or service could cause to [Company
Name], its clients, its partners, or the general public.
The three (3) SC ratings are:
SC‐1: Mission Critical. This category involves systems, services and data that is determined to be vital to the operations
or mission effectiveness of [Company Name]:
o Includes systems, services or data with the potential to significantly impact the brand, revenue or customers.
o Any business interruption would have a significant impact on [Company Name]’s mission.
Cannot go down without having a significant impact on [Company Name]’s mission.
The consequences of loss of integrity or availability of a SC‐1 system are unacceptable and could
include the immediate and sustained loss of mission effectiveness.
o Requires the most stringent protection measures that exceed leading practices to ensure adequate security.
o Safety aspects of SC‐1 systems, services and data could lead to:
Catastrophic hardware failure;
Unauthorized physical access to premises; and/or
Physical injury to users.
SC‐2: Business Critical. This category involves systems, services and data that are determined to be important to the
support of [Company Name]’s business operations:
o Includes systems, services or data with the potential to moderately impact the brand, revenue or customers.
o Affected systems, services or data can go down for up to twenty‐four (24) hours (e.g., one (1) business day)
without having a significant impact on [Company Name]’s mission.
Loss of availability is difficult to deal with and can only be tolerated for a short time.
The consequences could include delay or degradation in providing important support services or
commodities that may seriously impact mission effectiveness or the ability to operate.
The consequences of loss of integrity are unacceptable.
o Requires protection measures equal to or beyond leading practices to ensure adequate security.
o Safety aspects of SC‐2 systems could lead to:
Loss of privacy; and/or
Unwanted harassment.
SC‐3: Non‐Critical. This category involves systems, services and data that are necessary for the conduct of day‐to‐day
operations, but are not business critical in the short‐term:
o Includes systems, services or data with little or potential to impact the brand, revenue or customers.
o Affected systems, services or data can go down for up to seventy‐two (72) hours (e.g., three (3) business days)
without having a significant impact on [Company Name]’s mission.
The consequences of loss of integrity or availability can be tolerated or overcome without significant
impacts on mission effectiveness.
The consequences could include the delay or degradation of services or routine activities.
o Requires protection measures that are commensurate with leading practices to ensure adequate security.
o Safety aspects of SC‐3 systems could lead to:
Inconvenience;
Frustration; and/or
Embarrassment.
Cybersecurity & Data Protection Program (CDPP) – Supplemental Documentation Page 12 of 56
Where the data sensitivity and SC levels meet are considered the Assurance Levels (AL). The AL represents the “level of effort”
that is needed to properly ensure the Confidentiality, Integrity, Availability and Safety (CIAS) of the asset or process.
Asset Data Sensitivity
Categorization INTERNAL
RESTRICTED CONFIDENTIAL PUBLIC
Matrix USE
SC‐1
Enhanced Enhanced Enhanced Enhanced
Mission Critical
Safety &
Criticality
SC‐2
Enhanced Enhanced Basic Basic
Business Critical
SC‐3
Enhanced Basic Basic Basic
Non‐Critical
Figure 1: Asset Categorization Risk Matrix
BASIC ASSURANCE REQUIREMENTS
The minimum level of controls is defined as industry‐recognized leading practices (e.g., PCI DSS, NIST 800‐53, ISO 27002,
etc.).
For security controls in Basic assurance projects or initiatives, the focus is on the digital security controls being in place
with the expectation that no obvious errors exist and that as flaws are discovered they are addressed in a timely
manner.
ENHANCED ASSURANCE REQUIREMENTS
The minimum level of controls is defined as exceeding industry‐recognized leading practices (e.g., DLP, FIM, DAM, etc.).
For security controls in Enhanced Assurance projects, it is essentially the Standard Assurance level that is expanded to
require more robust Cybersecurity capabilities that are commensurate with the value of the project to [Company
Name].
Cybersecurity & Data Protection Program (CDPP) – Supplemental Documentation Page 13 of 56