PM-01 Information Security Program Plan

Program Management

Description

Develop and disseminate an organization-wide information security program plan that: a. Provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements; b. Includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance; c. Reflects the coordination among organizational entities responsible for information security; and d. Is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.

Supplemental Guidance

An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements. The plan can be represented in a single document or compilations of documents. The plan documents the program management controls and organization-defined common controls. The plan provides sufficient information about the controls (including specification of parameters for assignment and selection operations, explicitly or by reference) to enable an implementation that is unambiguously compliant with the intent of the plan and a determination of the risk to be incurred if the plan is implemented as intended. Updates to information security program plans include organizational changes and problems identified during plan implementation or control assessments.

Changes from Rev 4

Title unchanged. Incorporates guidance from multiple sources. Discussion expanded to address program plan updates and organizational changes.

Compliance Mappings

ISO 27001:2022

10.14.34.45.15.26.27.47.58.19.3A.5.1A.5.31

ISO 27002:2022

5.15.31

COBIT 2019

APO01APO02APO04APO13BAI05EDM01EDM02EDM05MEA03

CIS Controls v8

CIS 3.1

NIST CSF 2.0

GV.OC-03GV.PO-01GV.PO-02GV.RM-03GV.RR-01

PCI DSS v4.0.1

12.1

CSA CCM v4

GRC-01GRC-03GRC-05GRC-06GRC-07SEF-02STA-01STA-13

CSA AICM v1

GRC-01GRC-03GRC-05GRC-06GRC-07GRC-09GRC-10GRC-12GRC-14SEF-02STA-01STA-13

IEC 62443

2-1 4.2

NIS2 Directive

Art. 21(2)(a)

PRA Operational Resilience

PS6/21-1.1SS1/21-3.2SS2/21-3.1

MAS TRM

34

APRA CPS 234

Para 15Para 16-17

BSI IT-Grundschutz

ISMS.1ORP.1ORP.5

EU DORA

Art.5(1)

BIO2

5.15.31

RBI CSF

ITGRCA.4ITGRCA.24

FISC Security Guidelines

FISC.O1

LGPD + BCB 4893

BCB.Art.17BCB.Art.2LGPD.Art.50LGPD.BCB.Integration

HKMA TM-E-1

TME1.2.1TME1.2.3TME1.2.5TME1.7.1

MLPS 2.0

8.1.6

DNB Good Practice

DNB.1.1DNB.16.4DNB.5.1DNB.5.2

SAMA CSF

1.11.21.31.82.2

NCA ECC

1-11-21-31-7

UAE IA

T1T3

CBB TM

TM-1TM-2TM-3

Qatar NIA

GV

CBUAE

CR-1

CBE CSF

GOV-1

SA JS2

JS2-4JS2-5

CBN CSF

Part1.1Part1.3Part6.1Part7.1

BoG CISD

CISD-ICISD-IICISD-ISMS

POPIA

s19s8

BoM CTRM

1.11.31.4

IOSCO Cyber Resilience

GOV-1GOV-2PFMI-2PFMI-3

BCBS 239

Principle 1

CPMI-IOSCO PFMI

CG.GOVPFMI.P15PFMI.P2PFMI.P3

FFIEC IS

Appendix AI.AI.BII.C.1

NYDFS 500

500.19500.2500.3500.4

HIPAA Security Rule

§164.308(a)(1)(i)§164.308(a)(2)§164.316(a)§164.316(b)(1)§164.316(b)(2)(ii)§164.316(b)(2)(iii)

ECB CROE

CROE.2.1.1

EBA ICT Guidelines

3.13.2.13.2.23.3.13.4.13.6.1

SEBI CSCRF

CERTIFCLASSIFYGV.OCGV.POGV.RM

BOT Cyber Resilience

Ch1.1Ch1.2

NERC CIP

CIP-003-9

10 CFR 73.54

73.54(a)73.54(b)

TSA Pipeline SD

SD-1 Sec 1SD-2 Sec E

FERC CIP Orders

Order 706Order 893

DOE C2M2 v2.1

PROGRAM

AWIA

AWWA Sec 1

IAEA NSS 17-T

Sec 3

CBEST

CBEST.1

TIBER-EU

TIBER.PREP

PCI HSM

1

ISAE 3402

Clause 1Clause 2Clause 3

Solvency II

Art.41(1)Art.44(1)DR.258DR.260DR.266EIOPA-ICT-4.1EIOPA-ICT-4.2

Lloyd's Minimum Standards

CRM.1GOV.1MS10.1MS8.1MS8.2

NAIC Insurance Data Security

1044C4E79

PRA SS1/23

P2.1P2.2P2.3

FCA SYSC 13

SYSC 13.1-2SYSC 13.3SYSC 13.G.1

HITRUST CSF v11

00.a00.c04.a05.a13.a

FDA 21 CFR Part 11

§11.1

FDA Cybersecurity Guidance

524B-4SPDF-1

ISO 27799

18.15.15.26.1H.1

NHS DSPT

NDG-9.1

MiCA

Art.34(1)Art.36(1)Art.43(1)Art.54(1)Art.59(1)Art.63(2)Art.64(1)Art.65(1)Art.73(1)Art.86(1)Art.92(1)Art.94(1)Art.111(1)Art.83(1)Art.84(1)

Basel SCO60

SCO60.1SCO60.3SCO60.50SCO60.60

BSSC Standards

NOS-01GSP-01

SEC Custody (Digital Assets)

SEC-CD-01SEC-CD-14SEC-CD-17SEC-CD-18SEC-CD-19SEC-CD-20