PM-10 Authorization Process

Program Management

Description

a. Manage the security and privacy state of organizational systems and the environments in which those systems operate through authorization processes; b. Designate individuals to fulfill specific roles and responsibilities within the organizational risk management process; and c. Integrate the authorization processes into an organization-wide risk management program.

Supplemental Guidance

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standards and guidelines. Specific roles for risk management processes include a risk executive (function) and designated authorizing officials for each organizational system and common control provider. The authorization processes for the organization are integrated with continuous monitoring processes to facilitate ongoing understanding and acceptance of security and privacy risks to organizational operations, organizational assets, individuals, other organizations, and the Nation.

Changes from Rev 4

Title changed from 'Security Authorization Process' to 'Authorization Process'. Privacy added throughout.

Compliance Mappings

ISO 27001:2022

4.3A.5.2

COBIT 2019

BAI11

RBI CSF

ITGRCA.5ITGRCA.6

MLPS 2.0

8.1.7.2

SAMA CSF

1.11.2

NCA ECC

1-21-4

UAE IA

T1

Qatar NIA

GV

CBUAE

CR-14

CBE CSF

GOV-1GOV-3

SA JS2

JS2-5JS2-9

CBN CSF

Part1.3Part6.2Part7.1

BoG CISD

CISD-COMPCISD-ICISD-ISMS

BCBS 239

Principle 1Principle 12Principle 13

FFIEC IS

I.B

HIPAA Security Rule

§164.308(a)(1)(i)§164.308(a)(1)(ii)(B)§164.308(a)(2)

EBA ICT Guidelines

3.6.1

SEBI CSCRF

CERTIFCLASSIFYGV.PO

CMMC 2.0

CA

TSA Pipeline SD

SD-1 Sec 1

IAEA NSS 17-T

Sec 3

PRA SS1/23

P2.2P2.3

FCA SYSC 13

SYSC 13.G.1

HITRUST CSF v11

00.a03.b05.a

ISO 27799

6.1

Basel SCO60

SCO60.1SCO60.3SCO60.60SCO60.74SCO60.85