AT-03 Security Training

Awareness and Training

Low Moderate High Privacy

Description

The organization identifies personnel that have significant information system security roles and responsibilities during the system development life cycle, documents those roles and responsibilities, and provides appropriate information system security training: (i) before authorizing access to the system or performing assigned duties; (ii) when required by system changes; and (iii) [Assignment: organization-defined frequency] thereafter.

Supplemental Guidance

The organization determines the appropriate content of security training based on the specific requirements of the organization and the information systems to which personnel have authorized access. In addition, the organization provides system managers, system and network administrators, and other personnel having access to system-level software, adequate technical training to perform their assigned duties. The organization’s security training program is consistent with the requirements contained in C.F.R. Part 5 Subpart C (5 C.F.R 930.301) and with the guidance in NIST Special Publication 800-50.

Changes from Rev 4

Title changed from 'Role-Based Security Training' Adds privacy to control text, to imply training includes privacy, as well as security; adds text to incorporate lessons learned from internal or external security or privacy incidents into training Adds parameter requiring role-based security and privacy training for personnel with specific roles and responsibilities Adds new control text with a parameter to update role-based training at a specific frequency Discussion adds examples of personnel to be trained as well as events that may precipitate an update to role-based training Incorporates role-based training elements of withdrawn App J control AR-05

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

7.2A.6.3

ISO 27002:2022

6.3

COBIT 2019

APO07BAI08

CIS Controls v8

CIS 14CIS 14.3CIS 14.4CIS 14.5CIS 14.7CIS 14.8CIS 14.9CIS 16.9

NIST CSF 2.0

GV.RR-04PR.AT-01PR.AT-02

PCI DSS v4.0.1

12.66.2.1

CSA CCM v4

DCS-11HRS-11HRS-12

CSA AICM v1

DCS-11HRS-11HRS-12HRS-14

ISO 42001:2023

A.4.6

NIS2 Directive

Art. 21(2)(g)

PRA Operational Resilience

SS2/21-17.1

APRA CPS 234

Para 19-20

BSI IT-Grundschutz

ORP.2ORP.3

ANSSI

Hygiene.4SecNumCloud.8.3

FINMA Circular 2023/1

IV.B.a(48)IV.B.a(49)IV.B.b(50)

OSFI B-13

B-13.1.1

EU GDPR

Art.29Art.32(4)Art.47(2)(n)

EU DORA

Art.13(6)Art.5(4)

BIO2

6.3

RBI CSF

Annex1.23

FISC Security Guidelines

FISC.O8

LGPD + BCB 4893

BCB.Art.4LGPD.Art.47

MLPS 2.0

8.1.8.2

DNB Good Practice

DNB.8.2DNB.9.2

SWIFT CSCF

SWIFT.7.2

SAMA CSF

1.6

NCA ECC

1-10

UAE IA

T5

CBB TM

TM-3

Qatar NIA

HR

CBUAE

CR-11

CBE CSF

GOV-4

SA JS2

JS2-8.6

CBN CSF

Part1.2Part8

BoG CISD

CISD-XCISD-XV

BoM CTRM

3.8

IOSCO Cyber Resilience

PROT-4

CPMI-IOSCO PFMI

CG.GOVCG.LE

FFIEC IS

I.AI.CII.C.7II.C.7(e)IV.A.1

NYDFS 500

500.10500.14

HIPAA Security Rule

§164.308(a)(5)(i)

ECB CROE

CROE.2.1.2CROE.2.3.2CROE.2.8.2

EBA ICT Guidelines

3.4.7

SEBI CSCRF

CAPACITYPR.AT

BOT Cyber Resilience

Ch7.1

CMMC 2.0

AT

NERC CIP

CIP-004-7

10 CFR 73.54

RG5.71-C-AT

TSA Pipeline SD

SD-2 Sec H

DOE C2M2 v2.1

WORKFORCE

API 1164

Sec 13

AWIA

AWWA Sec 8

IAEA NSS 17-T

Sec 9

Solvency II

DR.266

Lloyd's Minimum Standards

CRM.1MS8.13

NAIC Insurance Data Security

4-training4B

PRA SS1/23

P2.3P3.6

FCA SYSC 13

SYSC 13.5.1SYSC 13.6.1

HITRUST CSF v11

02.b

FDA 21 CFR Part 11

§11.10(i)

ISO 27799

7.2

NHS DSPT

NDG-1.3NDG-2.2NDG-2.3NDG-3.1NDG-3.2

CCSS v9.0

1.04.4

Basel SCO60

SCO60.60SCO60.74

BSSC Standards

GSP-03

SEC Custody (Digital Assets)

SEC-CD-19

ISO 17799 (legacy)

8.2.210.3.211.7.113.1.114.1.4

COBIT 4.1 (legacy)

PO7.4DS7.2