← Frameworks / APRA CPS 234 / Coverage Analysis

APRA Prudential Standard CPS 234 Information Security — SP 800-53 Coverage

How well do NIST SP 800-53 Rev 5 controls address each APRA CPS 234 requirement? This analysis maps from framework clauses back to SP 800-53, with expert coverage weightings and gap identification.

Coverage Distribution
Full (85-100%): 4 Substantial (65-84%): 6 Partial (40-64%): 1 Weak (1-39%): 0

Clause-by-Clause Analysis

Sorted by clause
Para 15 An APRA-regulated entity must maintain an information security capability commensurate with the size and extent of threats to its information assets

Rationale

PM-01 security program; PM-03 resources; PM-13 workforce; PM-09 risk strategy. PL-09 (new in Rev 5) central management enables unified security control governance commensurate with entity size; PL-10 (new in Rev 5) baseline selection supports proportionate control selection. RA-07 (new in Rev 5) risk response strengthens threat-commensurate response actions.

Gaps

CPS 234 requires capability commensurate with threats. PL-09/PL-10 improve proportionality through central management and baseline selection. However, the CPS 234 concept of proportionate capability assessment tied to entity size and threat landscape remains more explicit than SP 800-53's approach.

Para 16-17 Board must ensure adequate maintenance of information security, senior management implement information security controls

Rationale

PM-01 program plan; PM-02 senior security role. PS-09 (new in Rev 5) position descriptions incorporates security responsibilities into organizational positions, strengthening the link between senior management roles and security accountability.

Gaps

CPS 234 places specific obligations on the Board and senior management for information security maintenance. PS-09 improves role definition but Australian regulatory board accountability requirements (board approval of security strategy, board-level reporting) need supplementation.

Mapped Controls

Para 18 Clearly defined information security-related roles and responsibilities

Rationale

PM-02 role assignment; PS-01/PS-02 personnel roles; PL-01 planning roles. PS-09 (new in Rev 5) position descriptions explicitly requires security responsibilities in role descriptions, directly strengthening CPS 234 compliance for defined roles.

Gaps

Minor: PS-09 closes the primary gap from v1.0 by formalizing security in position descriptions. CPS 234 board/senior management role definitions may still need supplementation.

Para 19-20 Maintain information security capability to manage information security vulnerabilities and threats commensurate with threats

Rationale

PM-13 workforce; AT-02/AT-03 training; PM-03 resources; RA-05 vulnerability management; SI-02 remediation. AT-06 (new in Rev 5) training feedback measures training effectiveness, supporting capability maintenance. RA-07 (new in Rev 5) risk response provides explicit threat-commensurate response actions.

Gaps

Minor: AT-06 improves capability measurement through training feedback. RA-07 strengthens threat response. CPS 234 emphasis on continuous capability maintenance commensurate with evolving threats is now better addressed but the proportionality concept remains implicit.

Para 21 Information asset identification and classification

Rationale

RA-02 security categorization; CM-08 component inventory; PM-05 system inventory. CM-12 (new in Rev 5) information location identifies where information assets reside across systems. CM-13 (new in Rev 5) data action mapping documents data processing flows, strengthening identification of information assets managed by third parties.

Gaps

Minor: CM-12/CM-13 significantly improve asset identification including information managed by related parties and third parties. CPS 234 asset classification is now well addressed.

Para 22-23 Information security controls must protect information assets commensurate with criticality and sensitivity, and be subject to testing

Rationale

AC family access controls; SC family communications protection; SI family integrity; AU family audit and accountability; CA-02 assessments; CA-08 penetration testing. SC-45 (new in Rev 5) system time synchronization ensures correlated audit evidence. SI-16 (new in Rev 5) memory protection strengthens technical controls for sensitive assets.

Gaps

Minor: SC-45 and SI-16 add depth to technical protection and audit correlation. CPS 234 testing program requirements are well addressed through CA family.

Para 24 Testing by an independent party

Rationale

CA-02(1) independent assessors; CA-08(1) independent penetration agent.

Gaps

Minor: CPS 234 requires testing by independent specialists where warranted. Well addressed by CA enhancements.

Mapped Controls

Para 25 Notify APRA of material information security incidents

Rationale

IR-06 incident reporting. IR-09 (new in Rev 5) information spillage response adds specific procedures for data exposure incidents, which may constitute material incidents under CPS 234.

Gaps

CPS 234 requires specific notification to APRA within 72 hours for material incidents and within 10 business days for control weaknesses. IR-09 improves handling of data spillage incidents. APRA-specific timelines and materiality thresholds remain regulatory requirements outside SP 800-53 scope.

Mapped Controls

Para 26 Notify APRA of material information security control weaknesses

Rationale

CA-05 POA&M; IR-06 reporting; PM-04 plan of action tracking. RA-07 (new in Rev 5) risk response provides structured treatment of identified control weaknesses including accept, mitigate, transfer.

Gaps

CPS 234 requires notifying APRA of control weaknesses that cannot be remediated in a timely manner. RA-07 improves structured risk response but APRA-specific notification requirements for unresolved weaknesses are regulatory and need supplementation.

Para 27-28 Internal audit review of information security controls

Rationale

CA-02 security assessments with independent assessor; PM-06 performance measurement.

Gaps

Minor: CPS 234 requires internal audit to review the design and operating effectiveness of information security controls. SP 800-53 covers assessment but internal audit-specific requirements are less detailed.

Mapped Controls

Para 29-33 Related party and third party arrangements

Rationale

SA-04 acquisition; SA-09 external services; SR family supply chain. SA-21 (new in Rev 5) developer screening adds personnel vetting for third-party development teams, strengthening CPS 234 third-party capability assessment.

Gaps

CPS 234 has specific requirements for related party and third party information security capability assessment. SA-21 improves third-party personnel vetting. The CPS 234-specific 'related party' concept and ongoing assessment requirements still need supplementation.

Methodology and Disclaimer

This coverage analysis maps from APRA CPS 234 clauses/requirements back to NIST SP 800-53 Rev 5 controls, assessing how well the SP 800-53 control set addresses each framework requirement.

Coverage weighting represents an informed estimate based on control-objective alignment, not a definitive compliance determination. Weightings consider whether SP 800-53 controls address the intent of each framework requirement, even where terminology and structure differ.

This analysis should be validated by qualified assessors for use in compliance or audit activities. The authoritative source for any compliance determination is always the framework itself.