PM-07 Enterprise Architecture

Program Management

Description

Develop and maintain an enterprise architecture with consideration for information security, privacy, and the resulting risk to organizational operations and assets, individuals, other organizations, and the Nation.

Supplemental Guidance

The integration of security and privacy requirements and associated controls into the organization's enterprise architecture helps to ensure that security and privacy considerations are addressed throughout the system development life cycle and are explicitly related to the organization's mission and business processes. The process of security and privacy requirements integration also embeds into the enterprise architecture and the organization's security and privacy architectures consistent with the organizational risk management strategy.

Changes from Rev 4

Privacy added. Risk to individuals and other organizations added.

Compliance Mappings

ISO 27001:2022

4.3A.5.8

ISO 27002:2022

5.8

COBIT 2019

APO02APO03APO05BAI01BAI11

NIST CSF 2.0

GV.OC-01ID.AM-05

MAS TRM

5

BIO2

5.8

RBI CSF

ITGRCA.4ITGRCA.12

LGPD + BCB 4893

BCB.Art.3-Supp

HKMA TM-E-1

TME1.2.2TME1.3.1TME1.5.3

DNB Good Practice

DNB.2.1

EU CRA

CRA.I.1

SAMA CSF

1.4

NCA ECC

1-11-6

UAE IA

T1

CBB TM

TM-2

Qatar NIA

GV

BoM CTRM

1.33.7

BCBS 239

Principle 2Principle 6

SEBI CSCRF

GV.OC

BOT Cyber Resilience

Ch6.2

NERC CIP

CIP-002-7

10 CFR 73.54

73.54(a)

Common Criteria

CC Part 1 — PP

ISAE 3402

Clause 9

FCA SYSC 13

SYSC 13.4

HITRUST CSF v11

00.a

FDA Cybersecurity Guidance

SPDF-1

Basel SCO60

SCO60.2

SEC Custody (Digital Assets)

SEC-CD-14