PS-01 Personnel Security Policy And Procedures

Personnel Security

Low Moderate High

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the personnel security policy and associated personnel security controls.

Supplemental Guidance

The personnel security policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The personnel security policy can be included as part of the general information security policy for the organization. Personnel security procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publication 800-12 provides guidance on security policies and procedures.

Changes from Rev 4

Title changed from 'Personnel Security Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level personnel security policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the personnel security policy and procedures New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

5.3A.5.1A.5.2A.5.4

ISO 27002:2022

5.15.2

COBIT 2019

APO07

NIST CSF 2.0

GV.RR-02GV.RR-04

SOC 2 TSC

CC1.1CC1.1-POF1CC1.1-POF3CC1.2-POF1CC1.4CC1.4-POF1CC1.4-POF2CC1.4-POF3CC2.2-POF1CC2.2-POF3CC2.2-POF7CC3.3-POF1CC5.3CC5.3-POF1CC5.3-POF6CC7.2-POF1P1.1-POF5

PCI DSS v4.0.1

12.1

CSA CCM v4

CEK-02HRS-01HRS-07HRS-09

CSA AICM v1

CEK-02GRC-13HRS-01HRS-07HRS-09HRS-15

ISO 42001:2023

A.3.2A.4.6

NIS2 Directive

Art. 21(2)(i)

PRA Operational Resilience

SS1/21-5.1

APRA CPS 234

Para 18

BSI IT-Grundschutz

ORP.2

ANSSI

Hygiene.2Hygiene.7SecNumCloud.6.1SecNumCloud.8.1

FINMA Circular 2023/1

IV.A(23)IV.B.a(48)

OSFI B-13

B-13.1.1

EU GDPR

Art.32(4)Art.39(1)(b)Rec.78

EU DORA

Art.5(4)

BIO2

5.15.2

RBI CSF

Annex1.23ITGRCA.24

FISC Security Guidelines

FISC.O8

LGPD + BCB 4893

BCB.Art.2LGPD.Art.47

HKMA TM-E-1

TME1.2.5

DNB Good Practice

DNB.1.2DNB.5.1DNB.8.1DNB.8.4

SAMA CSF

1.21.51.7

NCA ECC

1-31-41-9

UAE IA

T3T5

Qatar NIA

HR

CBE CSF

GOV-2

SA JS2

JS2-8.6

CBN CSF

Part1.2Part9

BoG CISD

CISD-XV

POPIA

s19

BoM CTRM

1.23.8

IOSCO Cyber Resilience

GOV-1GOV-4

BCBS 239

Principle 1

CPMI-IOSCO PFMI

CG.GOVPFMI.P2

FFIEC IS

I.BII.C.1II.C.7

NYDFS 500

500.10500.3

HIPAA Security Rule

§164.308(a)(1)(ii)(C)§164.308(a)(2)§164.308(a)(3)(i)§164.316(a)

ECB CROE

CROE.2.1.2CROE.2.3.2

EBA ICT Guidelines

3.4.1

SEBI CSCRF

GV.RR

BOT Cyber Resilience

Ch7.2

CMMC 2.0

PS

NERC CIP

CIP-004-7

10 CFR 73.54

RG5.71-C-PS

DOE C2M2 v2.1

WORKFORCE

API 1164

Sec 13

AWIA

AWWA Sec 8

IAEA NSS 17-T

Sec 9

PCI HSM

1

ISAE 3402

Clause 9

Solvency II

Art.41(3)Art.42DR.258

Lloyd's Minimum Standards

MS8.2

NAIC Insurance Data Security

4-personnel

PRA SS1/23

P2.1P2.4

FCA SYSC 13

SYSC 13.6.1SYSC 13.6.3SYSC 13.6.4

HITRUST CSF v11

02.a04.a

FDA 21 CFR Part 11

§11.10(i)

ISO 27799

5.16.16.27.1

NHS DSPT

NDG-2.3

Basel SCO60

SCO60.60

BSSC Standards

GSP-04

SEC Custody (Digital Assets)

SEC-CD-01SEC-CD-19

ISO 17799 (legacy)

8.1.115.1.1

COBIT 4.1 (legacy)

PO4.6PO7.3PC5