SC-01 System And Communications Protection Policy And Procedures

System and Communications Protection

Low Moderate High

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.

Supplemental Guidance

The system and communications protection policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The system and communications protection policy can be included as part of the general information security policy for the organization. System and communications protection procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publication 800-12 provides guidance on security policies and procedures.

Changes from Rev 4

Title changed from 'System and Communications Protection Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level system and communications protection policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the system and communications protection policy and procedures New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.5.1

ISO 27002:2022

5.1

SOC 2 TSC

CC1.2-POF1CC1.4-POF1CC2.2CC2.2-POF1CC2.2-POF7CC3.2CC5.1CC5.2CC5.3CC5.3-POF1CC5.3-POF6CC6.1CC6.1-POF2CC6.1-POF5CC6.6CC6.6-POF1CC6.6-POF2CC6.6-POF3CC7.2-POF1P1.1-POF5

PCI DSS v4.0.1

12.1

CSA CCM v4

CEK-01IVS-01

CSA AICM v1

CEK-01I&S-01

ANSSI

Hygiene.2Hygiene.23RGS.1.3SecNumCloud.14.1SecNumCloud.6.1

FINMA Circular 2023/1

IV.A(23)IV.B.d(59)IV.D(78)

OSFI B-13

B-13.1.3B-13.3.2

EU GDPR

Art.32(1)(a)Art.32(1)(b)Art.5(1)(f)

EU DORA

Art.9(1)Art.9(4)(a)

BIO2

5.1

RBI CSF

Annex1.4ITGRCA.16

LGPD + BCB 4893

BCB.Art.2

HKMA TM-E-1

TME1.2.5

DNB Good Practice

DNB.1.2

SAMA CSF

1.2

NCA ECC

1-32-5

UAE IA

T3T8

CBB TM

TM-8

Qatar NIA

CS

CBN CSF

Part1.3

BoG CISD

CISD-VI

POPIA

s19

IOSCO Cyber Resilience

GOV-1

FFIEC IS

II.C.1

NYDFS 500

500.3

HIPAA Security Rule

§164.312(e)(1)§164.316(a)

EBA ICT Guidelines

3.4.1

SEBI CSCRF

PR.NS

BOT Cyber Resilience

Ch2.4

CMMC 2.0

SC

Solvency II

Art.41(3)DR.266

Lloyd's Minimum Standards

MS8.2

HITRUST CSF v11

04.a09.e

ISO 27799

5.1

MiCA

Art.62(7)

ISO 17799 (legacy)

10.8.115.1.1

COBIT 4.1 (legacy)

DS5.2PC5