0% found this document useful (0 votes)
283 views1 page

Integrated Cybersecurity Governance Model - CMMC Version

Uploaded by

wenapo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
283 views1 page

Integrated Cybersecurity Governance Model - CMMC Version

Uploaded by

wenapo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Integrated Cybersecurity Governance Model (ICGM)™

Addressing Cybersecurity Maturity Model Certification (CMMC) & NIST 800-171 Compliance
This model represents a “Plan, Do, Check & Act”
POLICIES & S TANDARDS approach to implement and operate integrated
MAY INFLUENCE cybersecurity and privacy governance practices. The
GUIDELINES
START
PLAN SOMETIMES
ICGM is a useful tool to help visualize CMMC & NIST 800-
171 governance, risk and compliance-related activities.
IDENTIFY EXTERNAL INFLUENCERS GENERATE
[COMPLIANCE REQUIREMENTS] ARE ENFORCED
INFLUENCE BY INFLUENCE BECOMES
- STATUTORY & REGULATORY OBLIGATIONS POLICIES STANDARDS TOOL SELECTION
- CONTRACTUAL OBLIGATIONS
- INDUSTRY-RECOGNIZED PRACTICES ARE ALIGNED WITH
COMPLIANCE OBLIGATIONS
IDENTIFY INTERNAL INFLUENCERS ESTABLISH ARE IMPLEMENTED BY
& PROVIDE SCOPING FOR
[CORPORATE POLICIES & MANAGEMENT INTENT] COMPLIANCE-RELATED
- BUSINESS PROCESSES INFLUENCE CRITERIA FOR INFLUENCES
CONTROL OBJECTIVES [SSP I TEM]
- RISK TOLERANCE
- AUDIT FINDINGS IDENTIFY
REQUIREMENTS FOR [SSP I TEM]

CONTROLS
SUPPORT
800-171 PROCEDURES
REQUIRE THE IMPLEMENTATION OF CYBERSECURITY & PRIVACY ARE IMPLEMENTED BY PROCEDURES / ARE APPLIED TO SYSTEMS, APPLICATIONS,
MAY INFLUENCE &
IDENTIFY CHANGES TO [INCLUDES COMPENSATING CONTROLS FOR EXCEPTION REQUESTS] [POA&M ITEM] CONTROLS CONTROL ACTIVITIES [SSP I TEM] SERVICES & PROCESSES

DETERMINE THE PRIORITIZATION


& IMPLEMENTATION OF DO ENABLE THE
GENERATION OF
ARE REVIEWED
THROUGH

RESOURCE PRIORITIES [C3PAO ACTIVITY] VERIFY


EXCEPTION REQUESTS
RISK MANAGEMENT & NON-COMPLIANT ARE LINKED TO FEED
AFFECTS CONTROLS REQUIRE SECURITY METRICS AUDITS / ASSESSMENTS
AFFECTS
REMEDIATION ACTIONS ACCEPTABLE RISK TOLERANCE

ARE ASSESSED
[POA&M ITEM] EXCEPTION REQUESTS & NON-COMPLIANT PROCEDURES REQUIRE GENERATE
CHECK
AGAINST
GENERATES [POA&M ITEM] IDENTIFIES PROVIDE OVERSIGHT CAPABILITIES TO ANALYTICS & TRENDS
RISK ANALYSIS REQUIREMENTS FOR
RISK MANAGEMENT COVERS THE FOLLOWING: [KPIS / KRIS / KCIS]
- PLAN OF ACTION & MILESTONES (POA&M) SITUATIONAL
PROVIDE GUIDANCE TO INFLUENCES AWARENESS
- SYSTEM SECURITY PLAN (SSP) CORPORATE LEADERSHIP
- DATA PROTECTION IMPACT ASSESSMENTS (DPIAS)
- BUSINESS IMPACT ANALYSIS (BIA) DIRECTS
- RISK ASSESSMENTS INFLUENCE
- VENDOR ASSESSMENTS INFLUENCES
- THREAT ASSESSMENTS
- VULNERABILITY ASSESSMENTS
ACT REQUIRE
STAKEHOLDER CONFIDENCE

- PENETRATION TESTING
IDENTIFY NEEDS FOR IDENTIFY
DEFICIENCIES

Copyright © 2020 by ComplianceForge, LLC (ComplianceForge). All rights reserved. VERSION 2020.1
Modification of any content, including text and images, requires the prior written permission of ComplianceForge. Requests ma y be s ent to support@ complianceforge.com.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy