Back

Establish, implement, and maintain a security roles and responsibilities metrics program.


CONTROL ID
01667
CONTROL TYPE
Establish/Maintain Documentation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain a metrics policy., CC ID: 01654

This Control has the following implementation support Control(s):
  • Report on the percentage of role descriptions that define the Information Awareness roles for Security Managers and administrators., CC ID: 01685
  • Report on the percentage of role descriptions that define the information awareness roles for interested personnel., CC ID: 01686
  • Report on the percentage of role descriptions that define the information awareness roles for end users., CC ID: 01687
  • Report on the percentage of performance reviews that include the evaluation of Information Assurance responsibilities and policy compliance., CC ID: 01688
  • Report on the percentage of individuals who have access to security software, are trained, and authorized Security Administrators., CC ID: 01691
  • Report on the percentage of individuals who are able to assign security privileges, are trained, and authorized Security Administrators., CC ID: 01692


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • ¶ 8.1.1(3)(4)(5) IT Security Management and Policies. An organization should implement safeguards is to achieve an appropriate and consistent level of security throughout an organization. This safeguard category contains all those safeguards dealing with the management of IT security, the planning … (¶ 8.1.1(3)(4)(5), ISO 13335-4 Information technology - Guidelines for the management of IT Security - Part 4: Selection of safeguards, 2000)
  • The organization must establish and maintain a roles, responsibilities, and skills metrics standard. (ISPE9, CISWG Information Security Program Elements, 10-Jan-05)
  • The organization should implement and measure specific security education and training materials for critical DIB assets. This metric is measured by the proportion of DIB asset owners implementing security education and training materials. (§ 6.1.1 Table 6-2 Goal 8, Defense Industrial Base Information Assurance Standard)
  • Establish and collect metrics to monitor and validate cyber workforce readiness including analysis of cyber workforce data to assess the status of positions identified, filled, and filled with qualified personnel. (T0372, National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, NIST Special Publication 800-181)
  • Establish and collect metrics to monitor and validate cyber workforce readiness including analysis of cyber workforce data to assess the status of positions identified, filled, and filled with qualified personnel. (T0372, Reference Spreadsheet for the Workforce Framework for Cybersecurity (NICE Framework)”, July 7, 2020)