CM-13 Data Action Mapping

Configuration Management

New in Rev 5

Description

Develop and document a map of system data actions.

Supplemental Guidance

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generation, transformation, use, disclosure, retention, and disposal. A map of system data actions includes discrete data actions, elements of personally identifiable information being processed in the data actions, system components involved in the data actions, and the owners or operators of the system components. Understanding what personally identifiable information is being processed (e.g., the sensitivity of the personally identifiable information), how personally identifiable information is being processed (e.g., if the data action is visible to the individual or is processed in another part of the system), and by whom (e.g., individuals may have different privacy perceptions based on the entity that is processing the personally identifiable information) provides a number of contextual factors that are important to assessing the degree of privacy risk created by the system. Data maps can be illustrated in different ways, and the level of detail may vary based on the mission and business needs of the organization. The data map may be an overlay of any system design artifact that the organization is using. The development of this map may necessitate coordination between the privacy and security programs regarding the covered data actions and the components that are identified as part of the system.

Changes from Rev 4

New control in Rev 5.

Compliance Mappings

ISO 27002:2022

5.9

COBIT 2019

APO14BAI10

CIS Controls v8

CIS 3CIS 3.1CIS 3.2CIS 3.8

NIST CSF 2.0

ID.AM-07

SOC 2 TSC

CC6.7P1.3P1.4P1.5P1.6P1.7

PCI DSS v4.0.1

3.34.14.2

FINOS CCC

CCC-C04CCC-C16

ISO 42001:2023

A.4.3A.6.2.8A.7.3

PRA Operational Resilience

SS1/21-3.1SS1/21-5.2SS1/21-9.1

APRA CPS 234

Para 21

ANSSI

Hygiene.8

FINMA Circular 2023/1

IV.A(30)IV.A(31)IV.D(78)IV.D(79)IV.D(80)

OSFI B-13

B-13.2.1

EU GDPR

Art.25(1)Art.30(1)Art.30(2)Art.35(7)(a)Art.5(1)(b)Art.5(2)Art.6(4)Rec.78

EU DORA

Art.8(1)

BIO2

5.9

RBI CSF

Annex1.15

FISC Security Guidelines

FISC.O9FISC.T5

LGPD + BCB 4893

BCB.Art.20LGPD.Art.6

HKMA TM-E-1

TME1.12.4

SAMA CSF

2.1

NCA ECC

2-1

UAE IA

T4

CBB TM

TM-15TM-9

Qatar NIA

AM

CBE CSF

CRM-2

SA JS2

JS2-6.1

BoG CISD

CISD-VCISD-XII

POPIA

s13s15s17s8

IOSCO Cyber Resilience

ID-1ID-4

BCBS 239

Principle 2Principle 4

CPMI-IOSCO PFMI

CG.ID

FFIEC IS

II.C.5

NYDFS 500

500.13

ECB CROE

CROE.2.2.2

EBA ICT Guidelines

3.3.2

SEBI CSCRF

ID.AM

CMMC 2.0

CM

ISAE 3402

Clause 9

Solvency II

EIOPA-ICT-4.3

Lloyd's Minimum Standards

BP2.2MS1.1MS13.1MS13.2MS6.1MS8.7MS9.1

NAIC Insurance Data Security

4-asset

PRA SS1/23

P1.1P3.2

HITRUST CSF v11

07.a

ISO 27799

8.1

NHS DSPT

NDG-5.3NDG-5.4