NAIC Insurance Data Security Model Law (#668)
Model law adopted by 24+ US states requiring insurers, agents, and other licensed entities to develop comprehensive information security programs. 24 sections covering information security program requirements, risk assessment, board oversight, CISO designation, access controls, system and data safeguards, secure development practices, incident response, investigation and notification, third-party service provider oversight, and annual compliance certification to the commissioner.
Controls: 140
Total Mappings: 251
Publisher: National Association of Insurance Commissioners (NAIC) Version: Model Law #668 (2017) AC (12) AT (5) AU (11) CA (5) CM (11) CP (8) IA (5) IR (8) MP (4) PE (3) PL (8) PM (18) PS (8) PT (4) RA (6) SA (7) SC (6) SI (6) SR (5)
AC Access Control
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| AC-01 | Access Control Policies and Procedures | 4-access4B |
| AC-02 | Account Management | 4-access4B |
| AC-03 | Access Enforcement | 4-access4B |
| AC-04 | Information Flow Enforcement | 4B8 |
| AC-05 | Separation Of Duties | 4-access4B |
| AC-06 | Least Privilege | 4-access4-audit4B |
| AC-07 | Unsuccessful Login Attempts | 4-access |
| AC-11 | Session Lock | 4-access |
| AC-17 | Remote Access | 4-access4-audit |
| AC-19 | Access Control For Portable And Mobile Devices | 4-access |
| AC-20 | Use Of External Information Systems | 4-access4D |
| AC-21 | Information Sharing | 8 |
AT Awareness and Training
AU Audit and Accountability
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| AU-01 | Audit And Accountability Policy And Procedures | 7 |
| AU-02 | Auditable Events | 4-audit4B |
| AU-03 | Content Of Audit Records | 4-audit4B |
| AU-04 | Audit Storage Capacity | 4-audit |
| AU-05 | Response To Audit Processing Failures | 4-audit |
| AU-06 | Audit Monitoring, Analysis, And Reporting | 4-audit4B56-a |
| AU-07 | Audit Reduction And Report Generation | 4-audit5 |
| AU-08 | Time Stamps | 4-audit |
| AU-09 | Protection Of Audit Information | 4-audit7 |
| AU-11 | Audit Record Retention | 4-audit |
| AU-12 | Audit Record Generation | 4-audit4B |
CA Security Assessment and Authorization
CM Configuration Management
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| CM-01 | Configuration Management Policy And Procedures | 4-config |
| CM-02 | Baseline Configuration | 4-config4B |
| CM-03 | Configuration Change Control | 4-config4E |
| CM-04 | Monitoring Configuration Changes | 4-config4E |
| CM-05 | Access Restrictions For Change | 4-config |
| CM-06 | Configuration Settings | 4-config4B |
| CM-07 | Least Functionality | 4-config4B |
| CM-08 | Information System Component Inventory | 34-asset |
| CM-09 | Configuration Management Plan | 4-config |
| CM-12 | Information Location | 34-asset |
| CM-13 | Data Action Mapping | 4-asset |
CP Contingency Planning
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| CP-01 | Contingency Planning Policy And Procedures | 4F-b |
| CP-02 | Contingency Plan | 44F-b |
| CP-03 | Contingency Training | 4F-b |
| CP-04 | Contingency Plan Testing And Exercises | 4F-b |
| CP-06 | Alternate Storage Site | 4F-b |
| CP-07 | Alternate Processing Site | 4F-b |
| CP-09 | Information System Backup | 4F-b |
| CP-10 | Information System Recovery And Reconstitution | 4F-b |
IA Identification and Authentication
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| IA-01 | Identification And Authentication Policy And Procedures | 4-access4B |
| IA-02 | User Identification And Authentication | 4-access4B |
| IA-04 | Identifier Management | 4-access4B |
| IA-05 | Authenticator Management | 4-access4B |
| IA-08 | Identification and Authentication (Non-Organizational Users) | 4-access |
IR Incident Response
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| IR-01 | Incident Response Policy And Procedures | 4F-a |
| IR-02 | Incident Response Training | 4F-a |
| IR-03 | Incident Response Testing And Exercises | 4F-a |
| IR-04 | Incident Handling | 44F-a4F-b5 |
| IR-05 | Incident Monitoring | 4F-a5 |
| IR-06 | Incident Reporting | 4F-a56-a6-b |
| IR-07 | Incident Response Assistance | 4F-a |
| IR-08 | Incident Response Plan | 4F-a |
MP Media Protection
PE Physical and Environmental Protection
PL Planning
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| PL-01 | Security Planning Policy And Procedures | 44C |
| PL-02 | System Security Plan | 44B4E9 |
| PL-03 | System Security Plan Update | 4E |
| PL-04 | Rules Of Behavior | 104-training |
| PL-07 | Concept of Operations | 4 |
| PL-08 | Security and Privacy Architectures | 44B |
| PL-09 | Central Management | 4B |
| PL-10 | Baseline Selection | 9 |
PM Program Management
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| PM-01 | Information Security Program Plan | 1044C4E79 |
| PM-02 | Information Security Program Leadership Role | 44-personnel4C |
| PM-03 | Information Security and Privacy Resources | 44C |
| PM-04 | Plan of Action and Milestones Process | 44E |
| PM-05 | System Inventory | 34-asset |
| PM-06 | Measures of Performance | 44E |
| PM-08 | Critical Infrastructure Plan | 4A |
| PM-09 | Risk Management Strategy | 44A |
| PM-11 | Mission and Business Process Definition | 349 |
| PM-13 | Security and Privacy Workforce | 4-personnel4-training4C |
| PM-14 | Testing, Training, and Monitoring | 44-monitoring4-training4E4F-a5 |
| PM-16 | Threat Awareness Program | 4A |
| PM-20 | Dissemination of Privacy Program Information | 6-b |
| PM-22 | Personally Identifiable Information Quality Management | 6-b |
| PM-26 | Complaint Management | 6-a |
| PM-29 | Risk Management Program Leadership Roles | 4C |
| PM-30 | Supply Chain Risk Management Strategy | 4D |
| PM-31 | Continuous Monitoring Strategy | 4D |
PS Personnel Security
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| PS-01 | Personnel Security Policy And Procedures | 4-personnel |
| PS-02 | Position Categorization | 4-personnel |
| PS-03 | Personnel Screening | 4-personnel4B |
| PS-04 | Personnel Termination | 4-access4-personnel4B |
| PS-05 | Personnel Transfer | 4-access4-personnel |
| PS-06 | Access Agreements | 4-personnel4B |
| PS-07 | Third-Party Personnel Security | 4-personnel4D |
| PS-08 | Personnel Sanctions | 10 |
PT Personally Identifiable Information Processing and Transparency
RA Risk Assessment
SA System and Services Acquisition
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| SA-03 | Life Cycle Support | 4-config |
| SA-04 | Acquisitions | 4D |
| SA-08 | Security Engineering Principles | 4-config |
| SA-09 | External Information System Services | 4-personnel4D |
| SA-11 | Developer Security Testing | 4-config |
| SA-15 | Development Process, Standards, and Tools | 4-config |
| SA-22 | Unsupported System Components | 4-asset |
SC System and Communications Protection
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| SC-07 | Boundary Protection | 44-monitoring4B |
| SC-08 | Transmission Integrity | 4-encryption4B |
| SC-12 | Cryptographic Key Establishment And Management | 4-encryption4B |
| SC-13 | Use Of Cryptography | 4-encryption4B |
| SC-28 | Protection of Information at Rest | 4-encryption4B |
| SC-44 | Detonation Chambers | 4-monitoring |
SI System and Information Integrity
| Control | Name | NAIC Insurance Data Security References |
|---|---|---|
| SI-02 | Flaw Remediation | 4B |
| SI-03 | Malicious Code Protection | 4-monitoring4B |
| SI-04 | Information System Monitoring Tools And Techniques | 44-audit4-monitoring4B5 |
| SI-05 | Security Alerts And Advisories | 4-monitoring |
| SI-07 | Software And Information Integrity | 4B5 |
| SI-12 | Information Output Handling And Retention | 4-asset8 |