Protect

Protect

Develop and implement appropriate data processing safeguards.

PR.PO-P

Governance Policies

PR.PO-P1

An information technology baseline configuration is created and maintained incorporating security principles (e.g., concept of least functionality).

AMP.PR.1

Does the technological environment have a security baseline?

Notes
PR.PO-P2

Configuration change control processes are established and implemented.

AMP.PR.2

Does the organization have configuration integrity control solutions?

Notes
PR.PO-P3

Information backups are performed, maintained, and tested.

AMP.PR.3

Does the organization have a backup process implemented?

Notes
PR.PO-P4

Policies and regulations regarding the physical operating environment for organizational assets are met.

AMP.PR.4

Does the organization have policies and processes to authorize physical access to organizational employees?

Notes
PR.PO-P5

Protection processes are improved.

AMP.PR.5

Does the organization have adequate protection technologies?

Notes
PR.PO-P5

Protection processes are improved.

AMP.PR.6

Are protection technologies implemented according to best practices?

Notes
PR.PO-P6

The effectiveness of protection technologies is shared.

AMP.PR.7

Are performance indicators for technological protection solutions generated? Who monitors these indicators?

Notes
PR.PO-P7

Response plans (incident response and business continuity) and recovery plans (incident recovery and disaster recovery) are established, implemented, and managed.

AMP.PR.8

Does the organization have a BCP and DRP process to ensure operational resilience?

Notes
PR.PO-P7

Response plans (incident response and business continuity) and recovery plans (incident recovery and disaster recovery) are established, implemented, and managed.

AMP.PR.9

Does the organization have an incident response plan?

Notes
PR.PO-P8

Response and recovery plans are tested.

AMP.PR.10

Are existing plans tested (Business Continuity Plan, Disaster Recovery Plan, and IS and Privacy Incident Response Plan)?

Notes
PR.PO-P9

Privacy procedures are included in human resources practices (e.g., provisioning, personnel screening).

AMP.PR.11

Are privacy principles implemented during the employee hiring process?

Notes
PR.PO-P9

Privacy procedures are included in human resources practices (e.g., provisioning, personnel screening).

AMP.PR.12

Are privacy principles implemented during the period the employee is hired?

Notes
PR.PO-P9

Privacy procedures are included in human resources practices (e.g., provisioning, personnel screening).

AMP.PR.13

Are privacy principles implemented during the employee termination process?

Notes
PR.PO-P10

A vulnerability management plan is developed and implemented.

AMP.PR.14

Does the organization have a vulnerability management process?

Notes
PR.PO-P10

A vulnerability management plan is developed and implemented.

AMP.PR.15

Is there a process to remediate identified vulnerabilities?

Notes
PR.AC-P

Identity Management, Authentication, and Access Control

PR.AC-P1

Identities and credentials are issued, managed, verified, revoked, and audited for authorized individuals, processes, and devices.

AMP.PR.16

Is there an access management process?

Notes
PR.AC-P1

Identities and credentials are issued, managed, verified, revoked, and audited for authorized individuals, processes, and devices.

AMP.PR.17

Does it cover all systems that hold personal data?

Notes
PR.AC-P2

Physical access to data and devices is managed.

AMP.PR.18

Is there a process for physical access control to Data Centers?

Notes
PR.AC-P3

Remote access is managed.

AMP.PR.19

Is remote VPN access managed? How is it authenticated? Do terminated employees lose their access?

Notes
PR.AC-P4

Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.

AMP.PR.20

Are information system access profiles built aligned with employee roles? Is the principle of least privilege implemented?

Notes
PR.AC-P5

Network integrity is protected (e.g., network segregation, network segmentation).

AMP.PR.21

Is there network segmentation to protect systems holding personal data? How is the system architecture?

Notes
PR.AC-P6

Individuals and devices are reviewed and bound to credentials and authenticated according to transaction risk (e.g., security and privacy risks to individuals and other organizational risks).

AMP.PR.22

Is there an access review process implemented?

Notes
PR.DS-P

Data Security

PR.DS-P1

Data at rest is protected.

AMP.PR.23

Do network directories have access control implemented?

Notes
PR.DS-P2

Data in transit is protected.

AMP.PR.24

Do information systems have encryption for internet communication (SSL)?

Notes
PR.DS-P2

Data in transit is protected.

AMP.PR.25

Do information systems have encryption for internal communication?

Notes
PR.DS-P3

Systems/products/services and associated data are formally managed during removal, transfer, and disposition.

AMP.PR.26

Is there a process for removing/reviewing access profiles upon transfer?

Notes
PR.DS-P3

Systems/products/services and associated data are formally managed during removal, transfer, and disposition.

AMP.PR.27

Is the profile deletion process implemented in all information systems?

Notes
PR.DS-P4

Adequate capacity to ensure availability.

AMP.PR.28

Does the organization have a process for generating and monitoring availability indicators for technological environments?

Notes
PR.DS-P5

Data leak protections are implemented.

AMP.PR.29

Does the organization have DLP solutions implemented?

Notes
PR.DS-P6

Integrity verification mechanisms are used to verify software, firmware, and information integrity.

AMP.PR.30

Does the organization have software integrity control solutions implemented?

Notes
PR.DS-P7

Development and test environment(s) are separated from the production environment.

AMP.PR.31

Are development and test environments separated?

Notes
PR.DS-P7

Development and test environment(s) are separated from the production environment.

AMP.PR.32

Are data used in development (DEV) and test (QA) environments fictitious data?

Notes
PR.DS-P8

Integrity verification mechanisms are used to verify hardware integrity.

AMP.PR.33

Does the organization have hardware integrity control solutions?

Notes
PR.MA-P

Maintenance

PR.MA-P1

Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.

AMP.PR.34

Does the organization have a formally implemented change process?

Notes
PR.MA-P2

Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.

AMP.PR.35

Does the organization have a process for remote maintenance approvals?

Notes
PR.PT-P

Protective Technology

PR.PT-P1

Removable media is protected and its use restricted according to policy.

AMP.PR.36

Does the organization have a defined policy for removable media?

Notes
PR.PT-P1

Removable media is protected and its use restricted according to policy.

AMP.PR.37

How are exceptions handled?

Notes
PR.PT-P2

The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.

AMP.PR.38

Are protection technologies configured to release only the minimum necessary for the environment to function?

Notes
PR.PT-P3

Communications and control networks are protected.

AMP.PR.39

Does the technological environment have firewall, IPS solutions implemented for information protection?

Notes
PR.PT-P4

Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations.

AMP.PR.40

Are technological environments implemented in a fault-resilient architecture?

Notes