All Object Templates in Microsoft.ControlObjective.Library Management Pack

 DisplayNameDescriptionIDType
ID_01fe6d3d_33cc_4625_893a_0a8665b52a30Log Access Limitation Objective: Configure log files so that they can be accessed only by authorized personnel. Example: Failure to control access to system, application, and other logs might result in unauthorized access to sensitive information and unauthorized discovery of process. The Windows operating system allows the configuration of log files to control who can access the files. ID_01fe6d3d_33cc_4625_893a_0a8665b52a30System.Compliance.ControlObjectiveProjection
ID_04472e7a_ea43_4028_a81c_e251d3e3d532Controls ManagementControls ManagementID_04472e7a_ea43_4028_a81c_e251d3e3d532System.Compliance.CategoryProjection
ID_05348b6e_62c3_4930_af35_b8999fc0000aSystem Defaults Objective: Configure software systems to change default vendor authentication values, remove unnecessary features, and remove vendor-provided documentation. Example: Failure to properly configure vendor software might result in unauthorized access through default vendor accounts and passwords, exposure to attack through unnecessary features, and unauthorized discovery of software functionality or configuration through exposed documentation. ID_05348b6e_62c3_4930_af35_b8999fc0000aSystem.Compliance.ControlObjectiveProjection
ID_0685b08d_cd88_45fc_aef4_4ea2b4ebbbb9NonrepudiationNonrepudiationID_0685b08d_cd88_45fc_aef4_4ea2b4ebbbb9System.Compliance.CategoryProjection
ID_06f53b1c_74ea_4784_8708_e8780a05350eChange and Configuration ManagementChange and Configuration ManagementID_06f53b1c_74ea_4784_8708_e8780a05350eSystem.Compliance.CategoryProjection
ID_088babac_6ae2_4fa3_a978_0d4a2941fe61Record Request Objective: Manage the customer service request initial contact by recording the user’s contact information and the details of the user’s situation. Example: Failure to properly manage the customer's service request could affect the quality, completeness, and efficiency for arriving at a successful resolution. ID_088babac_6ae2_4fa3_a978_0d4a2941fe61System.Compliance.ControlObjectiveProjection
ID_08b5983b_9945_4c14_81b9_333922030be6Validate and Review Objective: Manage the validation and review of a change by validating the technical and business success or failure of the change, auditing the configuration database, communicating and recording the change, updating, and closing the request for change (RFC). Example: Failure to properly manage the validation and review of a change may result in inaccurate metrics, unrecognized problems, inaccurate configuration data, lack of awareness, and incorrect RFC information. ID_08b5983b_9945_4c14_81b9_333922030be6System.Compliance.ControlObjectiveProjection
ID_0cdc4060_b323_4033_90a2_ecddbf49a86fService Maps Objective: Manage the IT service portfolio so that business functions are mapped to corresponding IT services. Example: Failure to properly manage the IT service portfolio can result in redundant and wasteful consumption of resources and unneeded technological complexity. ID_0cdc4060_b323_4033_90a2_ecddbf49a86fSystem.Compliance.ControlObjectiveProjection
ID_0e6081d3_2a14_48d9_ab7c_e0446f14993bAccount Lock Objective: Configure accounts to lock if repeated unauthorized actions occur. Example: Failure to lock accounts that engage in repeated unauthorized actions might result in password discovery and unauthorized access to assets and sensitive data. The Windows operating system allows for centralized configuration and enforcement of account lock conditions within Group Policy. ID_0e6081d3_2a14_48d9_ab7c_e0446f14993bSystem.Compliance.ControlObjectiveProjection
ID_0f78a1c7_3263_4970_9013_46edaed4555aSoftware Development Lifecycle MetricsObjective: Regularly produce metrics from the software development lifecycle to correct and improve associated processes.ID_0f78a1c7_3263_4970_9013_46edaed4555aSystem.Compliance.ControlObjectiveProjection
ID_0fd6dd40_2d29_46bb_ade3_bd7bf91bd649Filter Problem Objective: Filter problems by evaluating if a problem record has already been created and determining the business justification for researching the problem.. Example: Failure to filter problems may result in unnecessary or undesired effort being expended in researching and reproducing a problem. ID_0fd6dd40_2d29_46bb_ade3_bd7bf91bd649System.Compliance.ControlObjectiveProjection
ID_10176eaf_1e00_4e71_b2ad_059b0d5be9bfSecurity ArchitectureThe organization will maintain a process to partition environments for separate business purposes. For example, sensitive information will be separate from non-sensitive information, and hosted information for clients will be separated from both other clients and internal environments.ID_10176eaf_1e00_4e71_b2ad_059b0d5be9bfSystem.Compliance.ControlObjectiveProjection
ID_10f28788_add3_410b_9ebd_6c89a782d29aManage Demand and Business Requests Objective: Manage demand to ensure that services address appropriate business needs by evaluating new requests, capturing current service usage and demand, identifying and validating future trends, and analyzing demand and requests. Example: Failure to properly manage the demand for an IT organization’s services could affect ability to provide appropriate services in a reliable fashion. ID_10f28788_add3_410b_9ebd_6c89a782d29aSystem.Compliance.ControlObjectiveProjection
ID_10fd0925_e966_4753_9a20_aba79e65a276Protocol Configuration Objective: Configure assets that are connected to networks so that only authorized communications protocols are enabled. Example: Failure to manage communications protocols might result in unauthorized discovery of data that traverses the network, including but not limited to authorization values (for example, passwords and keys) and sensitive data (for example, personal information and credit card numbers). The Windows operating system allows protocols to be enabled and disabled through Group Policy. ID_10fd0925_e966_4753_9a20_aba79e65a276System.Compliance.ControlObjectiveProjection
ID_11851614_476f_4f36_994c_fd6a71682b93Risk and Vulnerability Assessment Process Objective: Develop and maintain the organization's risk and vulnerability assessment process. Example: Failure to maintain a risk and vulnerability assessment process affects the ability of the organization to analyze the environment, workflows, software, hardware, and other assets for risks. ID_11851614_476f_4f36_994c_fd6a71682b93System.Compliance.ControlObjectiveProjection
ID_12a2b15a_21b8_4785_b698_012573892b8eContinually Monitor Objective: Continuously monitor by receiving notifications, analyzing the event, solve or escalate the event. Example: Failure to continuously monitor the service could affect the project by being unaware of significant events or trends in events, and failure to solve or escalate the event. ID_12a2b15a_21b8_4785_b698_012573892b8eSystem.Compliance.ControlObjectiveProjection
ID_14085b00_593a_4e32_b163_bce7b230a0edImplementation PhaseObjective: Develop and perform static analysis against software using only defined functions, APIs, and tools.ID_14085b00_593a_4e32_b163_bce7b230a0edSystem.Compliance.ControlObjectiveProjection
ID_1676091f_c55b_4d83_8e07_1fb0dac797b9Financial ManagementFinancial ManagementID_1676091f_c55b_4d83_8e07_1fb0dac797b9System.Compliance.CategoryProjection
ID_16e25ea7_c4d8_4ffa_9ba4_2e3549ea5cd1Third Party Risk Management Objective: Develop and maintain the organization's third-party risk management process. Example: Failure to maintain a third-party risk scoring process affects the ability of the organization to hold third parties accountable to applicable GRC requirements. ID_16e25ea7_c4d8_4ffa_9ba4_2e3549ea5cd1System.Compliance.ControlObjectiveProjection
ID_181eb5ff_93be_42cd_8e08_9f00aa8d8c03Log ManagementLog ManagementID_181eb5ff_93be_42cd_8e08_9f00aa8d8c03System.Compliance.CategoryProjection
ID_19297144_436e_4873_b70e_13a3f7433ceaSession Configuration Objective: Configure user sessions to enforce uniqueness and duration requirements and to ensure that such sessions originate only from authorized locations. Example: Failure to control user sessions could result in session hijacking, duplicate sessions on the same asset, duplicate sessions within assets involved in sensitive transactions, unauthorized use of multiple sessions, or sessions that are instantiated from unauthorized locations. ID_19297144_436e_4873_b70e_13a3f7433ceaSystem.Compliance.ControlObjectiveProjection
ID_1a60119a_4601_4a4c_bb49_4e65fe7bded9HR Awareness and TrainingHR Awareness and TrainingID_1a60119a_4601_4a4c_bb49_4e65fe7bded9System.Compliance.CategoryProjection
ID_1c279b2b_c0b8_4b87_a09b_3583b4f9d006Encryption Configuration Objective: Manage encryption algorithms in a secure manner. Example: Failure to manage encryption algorithms might result in the use of "broken" or otherwise compromised algorithms within critical services (for example, authentication, remote connectivity, and encrypted data storage) and transactions (for example, financial transactions). ID_1c279b2b_c0b8_4b87_a09b_3583b4f9d006System.Compliance.ControlObjectiveProjection
ID_1ce05ca8_d834_4965_8b04_d42a5999c74cIT Security ManagementIT Security ManagementID_1ce05ca8_d834_4965_8b04_d42a5999c74cSystem.Compliance.CategoryProjection
ID_1ce8a3d9_d238_4c65_910e_656710a9095fComply with Contractual Obligations Objective: Comply with all contractual obligations that, directly or indirectly, impact the organization's information assets, including but not limited to those obligations imposed by non-disclosure, confidentiality, and third party agreements. Example: Failure to comply with all contractual obligations could lead to sanctions for breach of contact, loss of revenue, and brand damage. ID_1ce8a3d9_d238_4c65_910e_656710a9095fSystem.Compliance.ControlObjectiveProjection
ID_1e46cac0_7f1c_45d0_bd26_32012ea3003dStabilization Management Process Objective: Manage the stabilization of developed services. Stabilization involves incorporating feedback and resolving bugs against developed solutions prior to deployment. Example: Failure to properly manage stabilization processes may result in improperly tested solutions, resulting in bugs or other undesired behavior within released solutions. ID_1e46cac0_7f1c_45d0_bd26_32012ea3003dSystem.Compliance.ControlObjectiveProjection
ID_1ec15259_4f3b_4c10_ac88_fa0495de1d35Release Readiness Milestone Review Objective: Approve milestone by customers and users, operations and support personnel, and key project stakeholders evaluating the solution and identify any remaining issues that must addressed before deployment Example: Failure to review and approve the developed solution for deployment could impact the solution by allowing into production an inadequate solution that does not fully meet expected user, operations, and support requirements. ID_1ec15259_4f3b_4c10_ac88_fa0495de1d35System.Compliance.ControlObjectiveProjection
ID_20a6f4c6_3547_4c8a_bc5f_0bc9b09b3f48Virus and Malware Protection Objective: Configure assets to be resistant against attack by virus, malware, and other forms of scripted or coded attack. Example: Failure to prevent virus and malware code from entering the environment might result in system instability, system compromise, and loss of sensitive information. Organizations typically maintain robust antivirus and anti-malware solutions that interact with operating systems to prevent execution of unauthorized code. ID_20a6f4c6_3547_4c8a_bc5f_0bc9b09b3f48System.Compliance.ControlObjectiveProjection
ID_20d6ea01_28b0_4d35_a3cd_41f61aa15a5eEstablish IT Governance Objective: Establish IT governance by setting vision, aligning IT to the business, and creating policy. Example: Failure to establsh IT governance could affect the value and agility of IT and the business by inhibiting decision making, acting in ignorance of regulatory requirements, and having no or inappropriate policy. ID_20d6ea01_28b0_4d35_a3cd_41f61aa15a5eSystem.Compliance.ControlObjectiveProjection
ID_213c9286_307c_445b_bcd1_e66320d9674fPolicy Resourcing Objective: Ensure resources are available to implement organizational policies, standards, and procedures. Example: Failure to provide adequate resources to implement organizational policies, standards, and procedures increases the chances that the unfunded policies, standards, or procedures will not be implemented. ID_213c9286_307c_445b_bcd1_e66320d9674fSystem.Compliance.ControlObjectiveProjection
ID_229bb4aa_24f5_44cc_b5ec_9a2a9503b7f1Service Level Management Objective: Manage IT service levels so that ongoing requirements, communications, and expectations between business and IT are proactively addressed and that internal IT dependencies and expectations are being addressed. Example: Failure to properly manage IT service levels could affect business performance, compliance, and application of IT resources and investments. ID_229bb4aa_24f5_44cc_b5ec_9a2a9503b7f1System.Compliance.ControlObjectiveProjection
ID_230ac5f8_6319_4c3e_85c2_d5edda7f93bdEncryption and Key ManagementEncryption and Key ManagementID_230ac5f8_6319_4c3e_85c2_d5edda7f93bdSystem.Compliance.CategoryProjection
ID_2486bf3c_b3c1_4c33_bc42_b7b58ac2ba3bAlign Responsibilities Objective: Align responsibilities by mapping responsibilities in terms of who is responsible for each piece of work to be done and who is accountable for that work. Example: Failure to align responsibilities may affect the ability of the organization to accomplish work and maintain accountability. ID_2486bf3c_b3c1_4c33_bc42_b7b58ac2ba3bSystem.Compliance.ControlObjectiveProjection
ID_2496405c_5c8a_41cc_b8df_419f28c7dbaeReview the Deployment Objective: Approve deployment milestone by reviewing and agreeing that the project team has fully disengaged and transferred the solution to permanent personnel, and that the post-project analysis documentation and the project close-out reporting is complete and documents lessons learned and best practices. Example: Failure to review and approve the state of the solution in production and the final documentation could impact the organization by creating role and responsibility conflicts, slowing the redeployment of resources, or not capturing lessons learned for continuous improvement. ID_2496405c_5c8a_41cc_b8df_419f28c7dbaeSystem.Compliance.ControlObjectiveProjection
ID_253edd13_56c1_42fb_a077_6497c8994059Reporting and Evidenciary OutputReporting and Evidenciary OutputID_253edd13_56c1_42fb_a077_6497c8994059System.Compliance.CategoryProjection
ID_25d7af62_4c83_4507_9266_39ee3db7f12aSystem Security Objective: Enable only authorized functions, features, services and settings within all IT systems. Example: Failure to control what functions, features, services, and settings are enabled might result in myriad control failures, such as unmanaged configuration and change control, unauthorized access, unauthorized transfer of sensitive data through unauthorized protocols and features, system compromise through unauthorized features and protocols, and unauthorized use of assets for inappropriate purposes. ID_25d7af62_4c83_4507_9266_39ee3db7f12aSystem.Compliance.ControlObjectiveProjection
ID_295367c8_fde8_425a_9ff5_dc18875cbc86Information ManagementInformation ManagementID_295367c8_fde8_425a_9ff5_dc18875cbc86System.Compliance.CategoryProjection
ID_29fc755b_b342_49f6_a626_770cbdf6ea99Information Systems Acquisition, Development & MaintenanceInformation Systems Acquisition, Development & MaintenanceID_29fc755b_b342_49f6_a626_770cbdf6ea99System.Compliance.CategoryProjection
ID_2b09b10f_eb8a_4a2b_8595_e28a5f8ffc62Development Management Process Objective: Manage the build management service management function. Build management is the process of developing solution components, including the code for any in-house application or infrastructure solution, documentation that developers create, as well as the infrastructure that supports the solution. Example: Failure to manage the build process may result in uncoordinated infrastructure solutions, missing documentation to guide developers in the creation of software, and improperly configured infrastructure to support the development of quality solutions. ID_2b09b10f_eb8a_4a2b_8595_e28a5f8ffc62System.Compliance.ControlObjectiveProjection
ID_2d97ec10_6f0b_413b_af98_414068de7216Certificate Management Objective: Configure the organization's deployed assets to require certificate validation of software prior to execution. Example: Failure to validate software certificates might cause unauthorized, pirated, compromised, or improperly licensed software to execute within the environment. ID_2d97ec10_6f0b_413b_af98_414068de7216System.Compliance.ControlObjectiveProjection
ID_2f20a086_4309_4904_a113_c7557ad0292cAssign Roles Objective: Manage the assignment of roles by deciding the nature of the responsibilities, determining the roles needed, determining the type of structure needed, applying teaming principles, making and communicating assignments, creating a training plan, creating a staffing plan, and fine tuning assignments. Example: Failure to manage the assignment of roles may affect the organization by introducing segregation of duty issues, conflicting responsibilities, opportunities for fraud and crime, or poorly trained workers and under-staffing. ID_2f20a086_4309_4904_a113_c7557ad0292cSystem.Compliance.ControlObjectiveProjection
ID_2f7b8a59_1da2_4841_a9ec_11fc101638d9Initiate Change Objective: Manage the initiation of a change by opening a request for change, checking the technical configuration, checking the business process and application configuration, identifying the business impact, assessing the risk, and updating the request for change (RFC). Example: Failure to manage the initiation of a change could affect the infrastructure, processes, or solution by introducing unintended consequences. ID_2f7b8a59_1da2_4841_a9ec_11fc101638d9System.Compliance.ControlObjectiveProjection
ID_2f7e0c59_102d_43d7_9fa0_a1daed1521e7Risk ManagementRisk ManagementID_2f7e0c59_102d_43d7_9fa0_a1daed1521e7System.Compliance.CategoryProjection
ID_2fb5c95c_26fd_4b55_8522_66c0fb233c05Change Request Management Process Objective: Manage changes to the organization's IT services and associated assets. Example: To deliver reliable and effective IT services, organizations need to ensure that change is planned and purposeful. The business relies on IT to embrace change management processes that take into consideration the needs for prompt action, reliable services, and compliance with policies and regulations. ID_2fb5c95c_26fd_4b55_8522_66c0fb233c05System.Compliance.ControlObjectiveProjection
ID_309033fd_0f6a_4598_b43c_fa805ed3c63aData Backup Objective: Back up (copy) data in a manner that allows recovery if the primary data system is corrupted or destroyed. Example: Failure to back up data to a secondary repository could result in irrevocable data loss or corruption. Failure to appropriately safeguard the secondary repository from the same circumstances that might affect the original system could result in both the primary and secondary system failing simultaneously. Organizations typically maintain enterprise-level backup and recovery solutions. The Microsoft Windows operating system also contains a basic backup feature, Windows Backup, that can be used to back up server configurations and file system data. ID_309033fd_0f6a_4598_b43c_fa805ed3c63aSystem.Compliance.ControlObjectiveProjection
ID_345e6fab_4438_499b_a3a6_a504f4ed132fEducation of the Software Development LifecycleObjective: All members of a software development team must receive appropriate training to stay informed about security basics and recent trends in security and privacy. Individuals in technical roles (developers, testers, and program managers) that are directly involved with the development of software programs must attend at least one unique security training class each year.ID_345e6fab_4438_499b_a3a6_a504f4ed132fSystem.Compliance.ControlObjectiveProjection
ID_3496a5ea_e12f_4b76_af51_983c34d1597cPlan Work Objective: Plan operational work by categorizing operational work, assigning resources, estimating duration, identifying dependencies, and building the operations schedule. Example: Failure to manage planning operational work could affect operations by not scheduling resources to work efficiently, missing dependencies, and poorly assigned resources. ID_3496a5ea_e12f_4b76_af51_983c34d1597cSystem.Compliance.ControlObjectiveProjection
ID_34efba12_663e_4849_af20_e3ebd6c2ff7dProject Planning Management Process Objective: Manage the organization's project planning by creating a customer technology baseline and evaluating products and technologies. Example: Failure to manage project planning for baselines and evaluations may lead to waste from redundancy or making incorrect build/buy decisions. ID_34efba12_663e_4849_af20_e3ebd6c2ff7dSystem.Compliance.ControlObjectiveProjection
ID_36f970e4_1df7_4656_8a68_c3f8715f31d2Define Requirements Objective: Define operational work requirements by Identifying the operational requirements imposed by SLAs and operating level agreements (OLAs), categorizing typical operational activities and tasks, and building an operations plan that details those items, as well as their requirements and dependencies. Example: Failure to identify and document operational work activities could affect operations by not meeting contractual agreements, creating conflicting or redundant work, or not managing requirements or dependencies. ID_36f970e4_1df7_4656_8a68_c3f8715f31d2System.Compliance.ControlObjectiveProjection
ID_372aa771_2bcd_48b8_8669_9dece0b81b44Resolve Request Objective: Manage customer service request resolution by determining how to best resolve the request as determined by the category of the request - information, service fulfillment, new service, or incident resolution. Example: Failure to determine the method for resolving a customer request could affect final outcome, appropriateness and timeliness of the resolution, and customer satisfaction. ID_372aa771_2bcd_48b8_8669_9dece0b81b44System.Compliance.ControlObjectiveProjection
ID_3784a03f_7f14_484a_8f16_561fc83d53a6Power ManagementPower ManagementID_3784a03f_7f14_484a_8f16_561fc83d53a6System.Compliance.CategoryProjection
ID_37da50ef_3143_493c_9317_79bcaab9caebApprove and Schedule Change Objective: Manage change approval by routing the change to the correct approving body, processing standard changes to release, analyzing the impact of the change and identifying reviewers, approving or rejecting the change (or seeking additional information), and updating the request for change (RFC). Example: Failure to manage the approval and scheduling of a change could lead to inappropriate changes being made, high-priority changes being delayed, changes that fail to take into account all affected elements, excessive risk, and failure to appropriately update the RFC. ID_37da50ef_3143_493c_9317_79bcaab9caebSystem.Compliance.ControlObjectiveProjection
ID_383c3581_fc6c_4edb_9c6b_7497c72f0958Audit Program Objective: Develop and maintain the organization's audit management program. Example: Failure to maintain an audit management program may affect the organization's ability to determine what must be audited, who must carry out audit duties, the timeline of internal and external audits for maximum efficiency, and how audit findings may be managed in a timely manner. ID_383c3581_fc6c_4edb_9c6b_7497c72f0958System.Compliance.ControlObjectiveProjection
ID_38eefa9f_38b8_4bff_914b_d65d2247d477Personnel Identification Objective: Require that all personnel in the facility are identified. Retain records of individuals with access to the facility based on policy requirements. Perform regular inventories of physical access devices, including electronic and physical keys. Regularly change keyed locks and cypher lock combinations. Example: Failure to restrict access to authorized personnel may result in unauthorized access to facilities and equipment residing at those facilities. ID_38eefa9f_38b8_4bff_914b_d65d2247d477System.Compliance.ControlObjectiveProjection
ID_3b1e62b1_019d_45c6_a56b_0f3afb0564a0Power Configuration Objective: Manage the environment's power. Example: Failure to manage the environment's power may result in power loss, interruption, or other degradataion of reliant services. ID_3b1e62b1_019d_45c6_a56b_0f3afb0564a0System.Compliance.ControlObjectiveProjection
ID_3b833b02_f302_40f3_9ebd_68565cae3dc4File System Objective: Configure file systems to prevent unauthorized access. Example: Failure to configure file systems with the proper rights management attributes may result in unauthorized access to data. ID_3b833b02_f302_40f3_9ebd_68565cae3dc4System.Compliance.ControlObjectiveProjection
ID_3d74e77b_6abc_43cc_b39d_1f566c02990bIdentify Team Changes Objective: Identify the role and responsibility changes needed by reviewing the IT portfolio, determining work to be done, and listing responsibilities. Example: Failure to identify role and responsibility changes affects the ability of the organization to reduce confusion and conflict while organizing, resourcing, and executing work. ID_3d74e77b_6abc_43cc_b39d_1f566c02990bSystem.Compliance.ControlObjectiveProjection
ID_40b02fba_4a65_43a9_b196_7453dd075061IT Infrastructure ManagementIT Infrastructure ManagementID_40b02fba_4a65_43a9_b196_7453dd075061System.Compliance.CategoryProjection
ID_41816fd2_65b9_4574_af24_31c749cdbd05Nonrepudiation Configuration Objective: Configure technologies to enforce nonrepudiation of information delivered through reports or transmitted through communications. Example: Nonrepudiation prevents a receiving party from refuting the receipt of an item or data. Configuring technologies to enforce nonrepudiation allows these technologies to log transactional receipts for all relevant transactions. Failure to configure nonrepudation might allow a party to deny receipt of information that is essential to transactional integrity in financial services, incident management integrity in security and availability-related services, as well as in other critical services. ID_41816fd2_65b9_4574_af24_31c749cdbd05System.Compliance.ControlObjectiveProjection
ID_41f2967a_8779_4b64_8a02_68497bfea418Disaster Recovery and Continuity Site Management Objective: Create and maintain an alternate site for IT services. Example: Failure to properly manage the organization’s alternate IT services site could result in unavailability of IT services if the main site is rendered unavailable. This may occur through natural disaster, catastrophic systems failure, or other interruptive event. ID_41f2967a_8779_4b64_8a02_68497bfea418System.Compliance.ControlObjectiveProjection
ID_43678272_f871_4cf0_aeed_ed033882bd27System SecuritySystem SecurityID_43678272_f871_4cf0_aeed_ed033882bd27System.Compliance.CategoryProjection
ID_456044f4_ddfd_430e_a6a4_12f928372749Define Requirements Objective: Define the IT service to be monitored, prepare the service component health model, and review the reliability requirements. Example: Failure to define monitoring, health, and reliability requirements could affect the ability to deliver services that meet performance and contractual obligations. ID_456044f4_ddfd_430e_a6a4_12f928372749System.Compliance.ControlObjectiveProjection
ID_45d77b2b_9e0f_4fdd_a82a_2b17b00d3c08Report Management Objective: Manage IT services and associated products to ensure required reports and other evidentiary output is created and maintained. Example: Failure to create and maintain evidentiary output might result in adverse court findings, fines, and other legal proceedings against the organization. Evidentiary output may be produced from services (collections of assets, data, processes, and applications) or an indivual service component. Output might include log files, configuration reports, status reports, process and procedure status reports, or financial transaction logs. ID_45d77b2b_9e0f_4fdd_a82a_2b17b00d3c08System.Compliance.ControlObjectiveProjection
ID_469cd167_1094_4cfb_9f62_57b56228941aDevelop and Test Change Objective: Manage change development and testing activities by designing the change, identifying configuration dependencies, building and testing the change, reviewing the readiness of the change for release, and updating the request for change (RFC). Example: Failure to manage the development and testing of a change could lead to inadequate or low-quality changes being made, changes that fail to take into account all affected elements, unreliable changes, excessive risk, and failure to appropriately update the RFC. ID_469cd167_1094_4cfb_9f62_57b56228941aSystem.Compliance.ControlObjectiveProjection
ID_46bb8efc_e40f_4fb0_8175_f1857b306a84Risk Scoring Process Objective: Develop and maintain the organization's risk scoring process. Example: Failure to maintain a risk scoring process affects the ability of the organization to compare and prioritize risks for remediation. ID_46bb8efc_e40f_4fb0_8175_f1857b306a84System.Compliance.ControlObjectiveProjection
ID_4705f5da_a2a6_49aa_8b70_634f943f9e4bRisk Management Process Objective: Develop and maintain the organization's risk management process. Example: Failure to maintain a risk management process affects the ability of the organization to identify and assign resources for remediation. ID_4705f5da_a2a6_49aa_8b70_634f943f9e4bSystem.Compliance.ControlObjectiveProjection
ID_4a61e30f_bb74_446f_a041_343b700d52a1Data RetentionData RetentionID_4a61e30f_bb74_446f_a041_343b700d52a1System.Compliance.CategoryProjection
ID_4a6fe32b_dba7_4c69_8c98_4ae628adad37Verification PhaseObjective: Perform run-time verification, fuzz testing, threat modeling, and attack surface reviews of developed software.ID_4a6fe32b_dba7_4c69_8c98_4ae628adad37System.Compliance.ControlObjectiveProjection
ID_4aa947ab_0018_4ba8_b89f_8012ebe5aee5Application Security Settings Objective: Manage the configuration, patching, and licensing of all deployed applications. Example: Failure to properly manage the organization’s software applications could affect security and be detrimental to the operational integrity of the organization. Lax software management could cause unrealized and unbudgeted licensing costs, problems with application licensing, security certificates, application configuration, security updates, and could allow the introduction of malicious software (malware) into the organization. ID_4aa947ab_0018_4ba8_b89f_8012ebe5aee5System.Compliance.ControlObjectiveProjection
ID_4b573b55_5864_414f_a9bf_b684cd4df551Authorized Hardware Objective: Require that all hardware in use by the organization is authorized. Example: Failure to control the use of hardware may result in unauthorized data storage, data transit, network, and other solutions. Also, unauthorized hardware may not be able to be configured to control requirements. ID_4b573b55_5864_414f_a9bf_b684cd4df551System.Compliance.ControlObjectiveProjection
ID_4c084e42_e558_4073_81c3_55ff5cb7db1eIdentity Management Objective: Provide all users and system entities with unique identities, and establish that access to the organization’s assets requires a unique identity and authentication value pair. Example: Failure to manage unique identities for users and system entities might complicate investigations that involve access to the organization's assets and data. The Windows operating system enforces unique identities within Active Directory Domain Services. ID_4c084e42_e558_4073_81c3_55ff5cb7db1eSystem.Compliance.ControlObjectiveProjection
ID_4c7fef9c_52e0_4a8c_892c_407330adc471User Access Reviews Objective: Review user access at planned intervals in order to validate that the level of access is still appropriate; remediate user access as needed. Example: Failing to review user access at regularly planned intervals may result in a user who has changed jobs keeping elevated access privileges that are no longer needed to perform the new job function. ID_4c7fef9c_52e0_4a8c_892c_407330adc471System.Compliance.ControlObjectiveProjection
ID_4d3417cf_33ab_4e70_a93d_9a571ed67c58StablilizeStablilizeID_4d3417cf_33ab_4e70_a93d_9a571ed67c58System.Compliance.CategoryProjection
ID_4d993112_af21_47ce_8cf4_e49fb0d1cd1cUser NotificationUser NotificationID_4d993112_af21_47ce_8cf4_e49fb0d1cd1cSystem.Compliance.CategoryProjection
ID_4fac9819_d4a4_4c06_8a69_67a7542501c5Policy Maintenance and Review Objective: Review the efficacy, reasonableness, and applicability of the organization's policies. Example: Failure to evaluate the efficacy, reasonableness, and applicability of the organization's policies may result in inefficient (time consuming, laborious), unreasonable (expensive), and unnecessary (no longer applicable) requirements within the organization's practices and technologies. ID_4fac9819_d4a4_4c06_8a69_67a7542501c5System.Compliance.ControlObjectiveProjection
ID_508f5a82_f132_47df_bb97_79050fb5cca6Data Integrity Objective: Manage the integrity of data that is used and generated by IT systems and services. Example: Failure to manage the integrity of data in the organization might affect the accuracy, calculations, transactions, values, measures, and other essential components of IT services. For example, the organization might generate unreliable conclusions or statements that affect its reputation or its ability to continue doing business. ID_508f5a82_f132_47df_bb97_79050fb5cca6System.Compliance.ControlObjectiveProjection
ID_543b2435_af7d_401b_95b1_da221e63d242Data Discovery Objective: Manage the ways that the organization discovers data that is used for business purposes to ensure that the discovery methods comply with relevant laws and regulations and that any required disclosures are made about how it will be used and managed as well as to whom it will be disclosed. Example: Failure to properly manage data discovery processes and procedures might result in unauthorized use or disclosure of such data and make the organization liable for sanctions, fines, or other penalties. ID_543b2435_af7d_401b_95b1_da221e63d242System.Compliance.ControlObjectiveProjection
ID_557df68f_05fe_4995_8240_a7d1c8049f0fDesign PhaseObjective: Reduce the attack surface of software through documentation of threat models for proposed software designs.ID_557df68f_05fe_4995_8240_a7d1c8049f0fSystem.Compliance.ControlObjectiveProjection
ID_55fbbcb7_b7e1_4c20_ba40_66bf100f5d3aMaintain an Information Security Management Program Objective: Maintain an information security management program to procect assets and data from harm. Example: Failure to manage risk, security policies, information security practices, assets, environments, and human interaction with data may result in data loss or corruption. ID_55fbbcb7_b7e1_4c20_ba40_66bf100f5d3aSystem.Compliance.ControlObjectiveProjection
ID_567f83c4_031b_468a_8684_a8261ea2465eReliability Planning Objective: Manage the planning of reliability capabilities so that there is clear understanding and documentation of the business requirements for the service, and how the target IT environment and the specifications for the service align with each other, how the service affects the current environment, and where there are significant technical or resource capability gaps. Example: Failure to properly manage the planning of reliability capabilites could affect the predictability, usefullness, efficiency, and cost of IT services. ID_567f83c4_031b_468a_8684_a8261ea2465eSystem.Compliance.ControlObjectiveProjection
ID_57241122_0de8_4b34_ac9a_bfcd2c0182f1Data Storage Objective: Manage the systems and devices that the organization uses to store data to ensure that the data is appropriately protected in accordance with its classification and sensitivity. Example: Failure to properly manage data storage might affect the organization’s ability to conduct its business and lead to unauthorized access or disclosure that might violate custodial agreements for protecting and using such data. ID_57241122_0de8_4b34_ac9a_bfcd2c0182f1System.Compliance.ControlObjectiveProjection
ID_5885d98d_caef_48d9_ba35_7ef7607f2b4cService Monitoring and Control Management Process Objective: Manage the monitoring and control of IT services. Example: Service monitoring and control (SMC) is the real-time observation of and alerting about health conditions (characteristics that indicate success or failure) in an IT environment. It helps to ensure that deployed services are operated, maintained, and supported in line with the service level agreement (SLA) targets agreed to between the business and IT. Failure to monitor services can result in unrealized and unresolved service failures. ID_5885d98d_caef_48d9_ba35_7ef7607f2b4cSystem.Compliance.ControlObjectiveProjection
ID_591af25b_b2e0_4ea0_b654_0acf2a7de637Patch Management Process Objective: Develop and maintain the organization's patch management process. Example: Failure to maintain a patch management process may result in the organization failing to patch its technologies for vulnerabilities, bugs, and other undesirable programmatic behavior. ID_591af25b_b2e0_4ea0_b654_0acf2a7de637System.Compliance.ControlObjectiveProjection
ID_5920cb07_3ace_4b24_afd5_b26d8ab074c6Change Detection Process for File Integrity Objective: Manage a file integrity detection process within the organization's IT environment and services. Example: Failure to detect file integrity issues may result in incorrect data being referenced in critical services, resulting in erroneous reports and engagement of potentially incorrect courses of action. ID_5920cb07_3ace_4b24_afd5_b26d8ab074c6System.Compliance.ControlObjectiveProjection
ID_59328db0_2a7b_4bfc_b40e_fcfc17ddb42cAvailability Management Objective: Manage growth of IT infrastructure based upon the organization's needs. Example: Failure to properly manage the organization’s IT infrastructure needs may result in overloaded services, resulting in poor performance. ID_59328db0_2a7b_4bfc_b40e_fcfc17ddb42cSystem.Compliance.ControlObjectiveProjection
ID_5a0de3f5_a7bc_4ae7_8f5a_97718121ae6cPassword Attributes Objective: Manage passwords to help ensure resistance to discovery through brute force attack. Example: Failure to enforce password complexity, change protocol, and other password parameters might result in passwords that could be easily compromised. For example, passwords that are simplistic or that consist of words that can be found in a dictionary could be discovered through automated brute-force methods. The Windows operating system, Group Policy, and Active Directory Domain Services (AD DS) allow password creation parameters to be easily configured, enforced, and managed. In this control objective, password creation parameters must be configured to significantly delay or prevent discovery of password values. Typically, this objective is achieved through password complexity requirements that include length, usage of different types of characters, and the amount of time that passwords are valid before they expire. Governance, risk, and compliance (GRC) authority documents provide a range of prescriptive guidance regarding specific parameters and settings. Microsoft ships configuration baselines and best practice guidance that balance GRC requirements with its customers' real-world requirements. ID_5a0de3f5_a7bc_4ae7_8f5a_97718121ae6cSystem.Compliance.ControlObjectiveProjection
ID_5c223a9a_ca21_4507_b66d_a97bc089260bInformation PrivacyInformation PrivacyID_5c223a9a_ca21_4507_b66d_a97bc089260bSystem.Compliance.CategoryProjection
ID_5e1b14c9_b487_41a7_a788_3e828474d478Classify Request Objective: Classify the customer service request by categorizing the user’s request, helping determine which solution will best benefit the user, determine if the request is supportable, and then prioritizing the request. Example: Failure to properly classify and prioritize the customers' service request could affect timeliness of resolution, appropriateness of the solution, and effective use of support resources. ID_5e1b14c9_b487_41a7_a788_3e828474d478System.Compliance.ControlObjectiveProjection
ID_5f05820d_36af_45d2_856b_5f0dc940ba2bSupport and Servicing PhaseObjective: Respond to software vulnerabilities through the release of security advisories and updates, when appropriate.ID_5f05820d_36af_45d2_856b_5f0dc940ba2bSystem.Compliance.ControlObjectiveProjection
ID_5f30a581_1ea6_42a4_a0eb_f5507e049e04Service Monitoring and ControlService Monitoring and ControlID_5f30a581_1ea6_42a4_a0eb_f5507e049e04System.Compliance.CategoryProjection
ID_623400b0_c24f_4a1c_9d0c_dccfd5c07d82Data Collection Objective: Manage the ways that the organization collects data to ensure that only authorized data is collected. Example: Failure to properly manage the collection of data might result in unauthorized use of confidential information, inappropriate use of information, or inadvertent disclosure of sensitive information. ID_623400b0_c24f_4a1c_9d0c_dccfd5c07d82System.Compliance.ControlObjectiveProjection
ID_641f4603_6236_467d_9807_16b36dfc9c8cReliability Plan Implementation Objective: Manage the development of various plans, including availability, capacity, data security, disaster recovery, monitoring, and review, and adjust the plans for suitability before approving them. Example: Failure to properly manage the development of plans could affect the degree of reliability that is achieved for the organization's resources. ID_641f4603_6236_467d_9807_16b36dfc9c8cSystem.Compliance.ControlObjectiveProjection
ID_662cfa95_9eac_4d41_924a_513783c113f5Architectural Change Management Objective: Manage architectural changes to the organization's networks and firewalls, including voice and wireless networks. Example: Failure to properly manage the organization’s networks may result in network map inaccuracies, including but not limited to undocumented network vulnerabilities. ID_662cfa95_9eac_4d41_924a_513783c113f5System.Compliance.ControlObjectiveProjection
ID_66848e32_d764_43c4_b2de_ec6996af573eChange Management Process Objective: Manage change that affects the organization's services and assets. Example: Failure to manage the configuration of the organization's assets may result in unknown, noncompliant configurations that could affect the confidentiality, integrity, and availability of associated services. ID_66848e32_d764_43c4_b2de_ec6996af573eSystem.Compliance.ControlObjectiveProjection
ID_66c51cf0_11c3_4652_8c7d_0e7b8eea1fb0Ensure Service Quality Objective: Ensure that the Service Desk has provided good service to the user by verifying the resolution of the Help request and sending a user satisfaction survey. Example: Failure to ensure good service could affect user satisfaction with Service Desk and lack of compliance with contracts\agreements. ID_66c51cf0_11c3_4652_8c7d_0e7b8eea1fb0System.Compliance.ControlObjectiveProjection
ID_66d42636_27d3_4092_b245_de8611dc4072Data ClassificationData ClassificationID_66d42636_27d3_4092_b245_de8611dc4072System.Compliance.CategoryProjection
ID_6747704f_d6fc_4e2e_bea6_fa91715e500cBuild ManagementBuild ManagementID_6747704f_d6fc_4e2e_bea6_fa91715e500cSystem.Compliance.CategoryProjection
ID_67aade00_b133_4d48_8dfd_8b5c00394b93Least Functionality Objective: Enable only authorized functions, features, services and settings within all IT systems. Example: Failure to control what functions, features, services, and settings are enabled might result in myriad control failures, such as unmanaged configuration and change control, unauthorized access, unauthorized transfer of sensitive data through unauthorized protocols and features, system compromise through unauthorized features and protocols, and unauthorized use of assets for inappropriate purposes. ID_67aade00_b133_4d48_8dfd_8b5c00394b93System.Compliance.ControlObjectiveProjection
ID_68acaa10_f1cd_4319_9f55_db1ea7841448Maintenance Management Objective: Manage the maintenance of IT infrastructure through a maintenance plan. Example: Failure to properly maintain the organization’s IT infrastructure may result in undocumented changes, unauthorized changes, failure to conduct preventive maintenance in a timely manner, unknown availability of replacement parts, and the inability to prove when maintenance was conducted. ID_68acaa10_f1cd_4319_9f55_db1ea7841448System.Compliance.ControlObjectiveProjection
ID_6a3d0220_1829_48f9_aecc_8c510f85f04fMaintain Work Instructions Objective: Maintain operational work instructions by changing or retiring existing work instructions when a better way of completing the work has been identified by performing maintenance and updating the operations guide. Example: Failure to manage the maintenance of operational work instructions could impact operations by performing tasks in less than optimal ways or failing to adapt work to new requirements. ID_6a3d0220_1829_48f9_aecc_8c510f85f04fSystem.Compliance.ControlObjectiveProjection
ID_6a41ae0c_d77c_4d78_b8a4_86cfc7d1e26eStabilize the Deployment Objective: Manage the solution deployment stabilizing and monitoring the solution during the quiet period prior to project team disengagement. Example: Failure to properly manage stabilizing and monitoring the solution deployment could affect the project by disengaging the project resources prior to final customer approval and sign off. ID_6a41ae0c_d77c_4d78_b8a4_86cfc7d1e26eSystem.Compliance.ControlObjectiveProjection
ID_6ad3da9d_5f44_421b_9c21_6a5ef0c27bc4Name Resolution Objective: Configure name resolution services to provide robust functionality and to limit name resolution data to authorized assets. Example: Failure to provide a robust, redundant name resolution service might affect service availability across a range of assets that require data direction and other connectivity services. ID_6ad3da9d_5f44_421b_9c21_6a5ef0c27bc4System.Compliance.ControlObjectiveProjection
ID_6b6a9d4b_51f4_4020_a277_87768d4c8711Asset Management Process Objective: Develop and maintain the organization's asset management process. Example: Failure to maintain an asset management process may result in inclusion of assets within IT services that do not meet compliance requirements such as warranty, configuration, and high availability. ID_6b6a9d4b_51f4_4020_a277_87768d4c8711System.Compliance.ControlObjectiveProjection
ID_6cacb378_98aa_4529_a117_2d0501275246Problem Management Process Objective: Manage problems within the organization's incident and problem management solution. Example: Failure to manage problems may result in inefficient management of incidents, which could leave the underlying problem unidentified. ID_6cacb378_98aa_4529_a117_2d0501275246System.Compliance.ControlObjectiveProjection
ID_6e8a2f02_2994_4984_87c3_5383584a4b8eExecute Work Objective: Manage the execution of operational work by evaluating the execution of work instructions, updating the operations log, and supplying input for Operational Health Management Review. Example: Failure to execute the operational work could impact the organization by performing work ineffectively, inefficiently, and with unpredictable results ID_6e8a2f02_2994_4984_87c3_5383584a4b8eSystem.Compliance.ControlObjectiveProjection
ID_6ff8c9f6_8508_43de_bb17_3044352b2654Key Management Objective: Manage encryption algorithm keys in a secure manner. Example: Failure to manage keys associated with deployed algorithms might result in unauthorized access to sensitive assets and data while in transit or storage. ID_6ff8c9f6_8508_43de_bb17_3044352b2654System.Compliance.ControlObjectiveProjection
ID_70a6b0b5_8a4d_4992_a1a3_7c4877352809Review Plans and Milestones Objective: Approve milestone by reviewing and then agreeing that the interim milestones have been met, that planned due dates are realistic, and that the projects, roles, and responsibilities are well defined and mechanisms are in place to address project risks Example: Failure to review and approve the project plans could impact the project by creating uncoordinated work and conflicting roles and responsibilities, resulting in delays, overruns, and potential project failure. ID_70a6b0b5_8a4d_4992_a1a3_7c4877352809System.Compliance.ControlObjectiveProjection
ID_72ba5eef_8168_4b33_b5cd_eb8b2bff61a6Security Policy Acceptance by Management Objective: Publish and communicate to all employees a formal information security policy that has management approval. Example: Failure to publish and communicate an approved information security policy could lead to non-compliance with policy, which in turn could lead to loss of information confidentiality, availability, or integrity. ID_72ba5eef_8168_4b33_b5cd_eb8b2bff61a6System.Compliance.ControlObjectiveProjection
ID_739daa32_6c46_4147_bc44_9cab3de2eb46Deploy Sites Objective: Manage the deployment of the solution to all targeted users and computers at each site. Example: Failure to properly manage solution site deployment could affect meeting site specific requirements and inhibit overall project completion. ID_739daa32_6c46_4147_bc44_9cab3de2eb46System.Compliance.ControlObjectiveProjection
ID_744475e4_3f49_4343_91ef_044732f67548Physical Environment Management Objective: Manage the physical environment's physical security to ensure only authorized access is permitted, and that unauthorized access is detectable. Example: Failure to mange the environment's physical security may result in system and data compromise, loss of assets, and loss of inventory control. ID_744475e4_3f49_4343_91ef_044732f67548System.Compliance.ControlObjectiveProjection
ID_74db08af_8e32_4883_964b_e88bde2adbeeData Retention Objective: Retain and destroy data as required by applicable data retention policies, investigations, and court orders. Example: Although seemingly contradictory, destruction is an integral component of a properly functioning data retention protocol. Failure to retain data could impair the organization's ability to conduct or comply with an investigation, which might lead to court-issued, e-discovery related fines and adverse court findings. Failure to destroy data might violate regulations or laws that govern how long information may be retained by the organization. ID_74db08af_8e32_4883_964b_e88bde2adbeeSystem.Compliance.ControlObjectiveProjection
ID_7788615d_734b_4584_bdc6_7c3a7f049223Event Logging Objective: Log events that affect the health, security, availability, configuration status, and operational status of assets. Example: Failure to record meaningful events will result in unknown states and conditions of critical assets and services, and will hamper incident management and investigation efforts. Events that occur within software applications are typically logged by the operating system. For this control objective, one or more processes should exist that monitor log files for meaningful events and alert administrative users to states, conditions, or trends that could affect the confidentiality, availability, or integrity of data, processes, and assets. ID_7788615d_734b_4584_bdc6_7c3a7f049223System.Compliance.ControlObjectiveProjection
ID_7b7ef3a6_902e_464b_aff6_96c75df05b62Assess, Monitor, and Control Risk Objective: Manage the assessment, monitoring, and control of risk by considering the potential consequences of activities, evaluating their impact, and then taking a very explicit approach to address related risks. Example: Failure to manage the assessment, monitoring, and control of risk may result in unknown, noncompliant configurations and operational activities that could affect the confidentiality, integrity, and availability of associated services. ID_7b7ef3a6_902e_464b_aff6_96c75df05b62System.Compliance.ControlObjectiveProjection
ID_7c714a84_22d5_46af_8a18_53b85964e477Software Development Lifecycle Security TeamObjective: Establish and maintain a team of personnel to review the software development lifecycle and respond to security issues as they are discovered.ID_7c714a84_22d5_46af_8a18_53b85964e477System.Compliance.ControlObjectiveProjection
ID_7f1df02d_c489_4eda_897b_6c930a67febfPerform IT Accounting and Reporting Objective: Manage IT accounting, reporting, and cost recovery functions by determining costs to use in budget comparisons, evaluating service usage reports as a basis for cost recovery, and assessing the actual derived benefits to the business for the services that are delivered. Example: Failure to properly manage the organization’s accounting, reporting, and cost recovery functions could affect financial reporting for the business, cost effectiveness, and the business value derived from IT services. ID_7f1df02d_c489_4eda_897b_6c930a67febfSystem.Compliance.ControlObjectiveProjection
ID_7f32411e_7656_4d45_99ae_cf189e9d32ebNon-Production Environments Objective: Production data shall not be replicated or used in non-production environments. Example: Replication of production data could lead to unauthorized disclosure of confidential data. ID_7f32411e_7656_4d45_99ae_cf189e9d32ebSystem.Compliance.ControlObjectiveProjection
ID_80275a69_b8af_4cc4_9441_573001eb0f98Acquisition ManagementAcquisition ManagementID_80275a69_b8af_4cc4_9441_573001eb0f98System.Compliance.CategoryProjection
ID_81798243_db7b_443c_b530_2d0eccc8f9bdBuild Work Instructions Objective: Build operational work instructions that enable identifying resources, identifying operational guidance, developing operational work instructions, and testing operational work instructions. Example: Failure to manage building operational work instructions could affect the full development of guidance and specific, tested instructions for the operational work identified in the operations plan. ID_81798243_db7b_443c_b530_2d0eccc8f9bdSystem.Compliance.ControlObjectiveProjection
ID_823a3aca_caa5_4b02_91c9_080bda429cc9Maintenance ManagementMaintenance ManagementID_823a3aca_caa5_4b02_91c9_080bda429cc9System.Compliance.CategoryProjection
ID_823d83c9_4378_471a_8817_7ae2199b9d94Personal Information Handling Objective: Manage the ways that the organization handles data that is classified as 'personal information' to ensure that only authorized personnel are granted access, and that the information is only used for authorized purposes. Example: Failure to properly manage personal information might result in unauthorized access, distribution, and/or uses that might violate custodial agreements for its protection and use. ID_823d83c9_4378_471a_8817_7ae2199b9d94System.Compliance.ControlObjectiveProjection
ID_83080ec1_d027_4c58_9a36_cc7f46af5289Problem ManagementProblem ManagementID_83080ec1_d027_4c58_9a36_cc7f46af5289System.Compliance.CategoryProjection
ID_86b4bb11_4c5a_4f5e_9304_b3bb4509c3dbDocument Problem Objective: Document a problem by creating a problem record, classifying the problem, and prioritizing the problem. Example: Failure to document the problem may result in negative impacts to the reliability or availability of a service or system. ID_86b4bb11_4c5a_4f5e_9304_b3bb4509c3dbSystem.Compliance.ControlObjectiveProjection
ID_88c6b10e_2489_4bd8_9ec8_16cd307b44d7Control and Report Objective: Control and report service management activities by producing reports and statistics, conducting Operational Health management review, and planning and executing service improvements. Example: Failure to manage the control and reporting of service management activities could impact services by not effectively performing the management and monitoring of operations and services. ID_88c6b10e_2489_4bd8_9ec8_16cd307b44d7System.Compliance.ControlObjectiveProjection
ID_89d694d9_d318_434d_87de_1b037244bbfdIncident Management Process Objective: Manage incidents that affect IT services. Example: Failure to properly manage incidents within IT services may result in service degregation, improper or unreliable operation, and service failure. ID_89d694d9_d318_434d_87de_1b037244bbfdSystem.Compliance.ControlObjectiveProjection
ID_8ab5d2a7_d5a0_4b8b_8288_e15a8d10e21aDeploy Core Components Objective: Prepare for solution deployment by deploying solution infrastructure in production. Example: Failure to deploy solution infrastructure could affect the project by introducing delays and missing release dates. ID_8ab5d2a7_d5a0_4b8b_8288_e15a8d10e21aSystem.Compliance.ControlObjectiveProjection
ID_8da5c0f3_3143_431d_814e_f644c709f7eeIT Process ManagementIT Process ManagementID_8da5c0f3_3143_431d_814e_f644c709f7eeSystem.Compliance.CategoryProjection
ID_8dccb928_3430_4890_b2b1_82778a97cf14Application of the Software Development LifecycleObjective: Apply the software security development lifecycle to software associated with personal/sensitive information, when the software will be used in a networked environment, or used within an enterprise or government environment.ID_8dccb928_3430_4890_b2b1_82778a97cf14System.Compliance.ControlObjectiveProjection
ID_94d2017e_016f_4131_bfd9_1a73c467fd62Classify Change Objective: Classify the change by identifying the priority of the change, identifying the category of the change, checking and validating the configuration, assessing the risk, and updating the request for change (RFC). Example: Failure to classify the change could lead to high-priority changes being delayed, changes that fail to take into account all affected elements, excessive risk, and failure to appropriately update the RFC. ID_94d2017e_016f_4131_bfd9_1a73c467fd62System.Compliance.ControlObjectiveProjection
ID_9508d9f4_8dda_487b_b046_161f5787aaf2Network Protection Objective: Maintain computer system connectivity with other systems only through authorized pathways and connections. Example: Failure to control connections and pathways could result in unauthorized discovery and access. For example, failure to segregate database servers or other servers that contain sensitive information and features from the Internet could allow unauthorized connectivity. In this control objective, such connectivity should be configured to only use documented, restricted pathways that the organization has deemed safe and appropriate for use. ID_9508d9f4_8dda_487b_b046_161f5787aaf2System.Compliance.ControlObjectiveProjection
ID_952d90e5_327c_4fbf_a4f2_9268abef7fddCommunication of Change Objective: Communicate the change to the change requestor. Example: Failure to communicate requested changes to the requesting party may lead to duplicate requests, and fails to close the communications loop on any changes made. ID_952d90e5_327c_4fbf_a4f2_9268abef7fddSystem.Compliance.ControlObjectiveProjection
ID_954c5591_a9e2_457d_9287_5d5be75f66d8Data Classification Objective: Conspicuously label sensitive data within files, folders, and groups of documents according to a managed data classification schema. Example: Failure to label data might cause unauthorized duplication, retention, destruction, or propagation of sensitive data that includes information about the organization, its personnel, and its customers. Failure to manage the data classification schema could result in ambiguous, conflicting , and unnecessarily complicated labels that might cause misclassification or misuse of data. The Windows operating system allows for data classification by location and file tagging. Data must be labeled in a manner that carries data classification with the data entity, such as a file, folder, email, or database table. Rules that affect the availability of information may be enforced through Rights Management Services (RMS). ID_954c5591_a9e2_457d_9287_5d5be75f66d8System.Compliance.ControlObjectiveProjection
ID_9550ce62_fcee_4ca9_926f_6171d5710c36Reliability ManagementReliability ManagementID_9550ce62_fcee_4ca9_926f_6171d5710c36System.Compliance.CategoryProjection
ID_95ac6bbf_7c1a_47eb_97a2_be9234927f7eFunctional Specification Documentation Objective: Write the functional specification by documenting requirements and linking requirements to a detailed description of what the solution will look like and how it will behave. Example: Failure to capture requirements or adequately describe the appearance and behavior could affect the project by leading to rework and unfulfilled customer expectations." ID_95ac6bbf_7c1a_47eb_97a2_be9234927f7eSystem.Compliance.ControlObjectiveProjection
ID_97f7cf06_417f_438e_b86b_73ba9dc5cc2dBusiness/IT Alignment ManagementBusiness/IT Alignment ManagementID_97f7cf06_417f_438e_b86b_73ba9dc5cc2dSystem.Compliance.CategoryProjection
ID_99925f98_57c6_4717_8b94_e154f75d0cb6Access ManagementAccess ManagementID_99925f98_57c6_4717_8b94_e154f75d0cb6System.Compliance.CategoryProjection
ID_99fb475e_ab85_487f_8f46_22a45df0d8f4DeployDeployID_99fb475e_ab85_487f_8f46_22a45df0d8f4System.Compliance.CategoryProjection
ID_9c90d625_5ff7_43ad_ad2d_ab73a65e32c5Remote Access Objective: Configure remote access services to only use authorized remote access connectivity pathways and authorization methods. Example: Failure to manage and properly configure remote access services might allow the use of unauthorized pathways and authorization methods, which could result in unauthorized access to sensitive data or assets. ID_9c90d625_5ff7_43ad_ad2d_ab73a65e32c5System.Compliance.ControlObjectiveProjection
ID_9fa15845_db8e_4bb6_bec8_fd496752c5faResearch Outcome Objective: Research the outcome by determining if a workaround or fix has been discovered, determining if a proactive action is possible, and closing the problem record. Example: Failure to research the outcome of the problem research activities may result in the identification of workarounds or fixes that are not viable or usable in the actual, complex, production environment. ID_9fa15845_db8e_4bb6_bec8_fd496752c5faSystem.Compliance.ControlObjectiveProjection
ID_a06c3575_58b9_4b72_8fd3_65adb3a81039OperationsOperationsID_a06c3575_58b9_4b72_8fd3_65adb3a81039System.Compliance.CategoryProjection
ID_a0a8c1e5_d600_43b7_b337_dece838c1e7bCreate Master Schedule Objective: Create a master schedule by combining and integrating all the schedules from bottom-up estimating, determining the release date after creating drafts of the functional specification and master project plan. Example: Failure to create a master schedule based on bottom-up estimating can impact the project by setting a final release date that is not realistic or achievable. ID_a0a8c1e5_d600_43b7_b337_dece838c1e7bSystem.Compliance.ControlObjectiveProjection
ID_a14b1c52_1473_4eba_bbb7_f428d9defa15Local Logon Objective: Configure local logon functionality to prevent unauthorized access. Example: Failure to configure authentication mechanisms may result in system compromise. ID_a14b1c52_1473_4eba_bbb7_f428d9defa15System.Compliance.ControlObjectiveProjection
ID_a1644570_ec3f_4bf2_8d7c_dc7b745067b1Outsourced Development Quality and Oversight Objective: Implement and maintain a quality and oversight program for outsourced software development, including the application of the security development lifecycle as appropriate. Example: Failure to independently validate the security design of an application could prevent the organization from identifying and remediating one or more security vulnerabilities in that application. ID_a1644570_ec3f_4bf2_8d7c_dc7b745067b1System.Compliance.ControlObjectiveProjection
ID_a351a74b_7de0_4c44_8517_aeda7e84483fDeployment Management Process Objective: Manage the deployment of services. Example: During deployment, the project team deploys the core solution and the site components into the production environment, stabilizes the deployment, transfers the project to operations, and gets final customer approval for the new solution. Failure to control deployment within the organization's IT environment and services may result in poor handoff to affected parties and an uncoordinated customer experience. ID_a351a74b_7de0_4c44_8517_aeda7e84483fSystem.Compliance.ControlObjectiveProjection
ID_a5e2b8b7_65a6_4950_bd09_142cde168d35Business Continuity ManagementBusiness Continuity ManagementID_a5e2b8b7_65a6_4950_bd09_142cde168d35System.Compliance.CategoryProjection
ID_a76d81c8_1fd1_4a87_b9cb_b9ac67401799Implement Service Objective: Implement the service by aligning new IT service to existing processes and functions, to existing IT organization, and to existing SMC tools. Example: Failure to successfully implement the service could affect the ability to manage the solution. ID_a76d81c8_1fd1_4a87_b9cb_b9ac67401799System.Compliance.ControlObjectiveProjection
ID_a7a0566f_f993_4924_99c1_91d667ad108dIdentity and Access ManagementIdentity and Access ManagementID_a7a0566f_f993_4924_99c1_91d667ad108dSystem.Compliance.CategoryProjection
ID_a7d3182b_3837_4917_a963_1adc28553e22Manage Operational Work Objective: Manage operational work by ensuring that the work outlined in the operations guide is being completed cost-effectively and is fulfilling the SLAs. This is accomplished by verifying work completed, optimizing the operations schedule, and optimizing operations resources. Example: Failure to manage operational work could impact the organization by creating inefficiencies, wasting resources, and failing to fulfill contractual obligations. ID_a7d3182b_3837_4917_a963_1adc28553e22System.Compliance.ControlObjectiveProjection
ID_a90469c8_424a_4e3b_bfd3_e0bcbd79fea5Policy Publication Objective: Publish the organization's written policies. Example: Without policy publication, the organization may not know what version of policy is in effect; also, audit bodies may determine that the organization does not provide adequate training for current policy, and that the policy is not readily available for reference. ID_a90469c8_424a_4e3b_bfd3_e0bcbd79fea5System.Compliance.ControlObjectiveProjection
ID_ac8a05b5_cfe5_4976_8435_c2a6d1574a2fVision and Scope Documentation Objective: Manage the project's vision and scope by providing clear direction for the project team, including outlining explicit project goals, priorities, and constraints as well as setting customer expectations. Example: Failure to properly manage vision and scope could affect the project results by attempting to achieve more than is needed, more than can be delivered, or failing to meet customer expecations. ID_ac8a05b5_cfe5_4976_8435_c2a6d1574a2fSystem.Compliance.ControlObjectiveProjection
ID_ac9aa917_16d3_4290_9689_dbb0405ed528Evaluate Products and Technologies Objective: Manage the organization's project planning by creating a customer technology baseline and evaluating products and technologies. Example: Failure to manage project planning for baselines and evaluations may lead to waste from redundancy or making incorrect build/buy decisions. ID_ac9aa917_16d3_4290_9689_dbb0405ed528System.Compliance.ControlObjectiveProjection
ID_ad5273f2_c4df_4f0c_9a2e_41155e7b1b92Requirements PhaseObjective: Document software security requirements, define quality gates, and define bug bars to establish minimum acceptable levels of security and privacy quality.ID_ad5273f2_c4df_4f0c_9a2e_41155e7b1b92System.Compliance.ControlObjectiveProjection
ID_ae27af38_cd11_49a6_a2b6_6744914d4e4fManagement Authorization of Acquisition Objective: Policies and procedures shall be established for management authorization for development or acquisition of new applications, systems, databases, infrastructure, services, operations, and facilities. Example: Failure to implement this MCO could lead to the development or acquisition of systems that do not comply with the organization's policies, standards, or procedures. It could also lead to the development or acquisition of an unauthorized system. ID_ae27af38_cd11_49a6_a2b6_6744914d4e4fSystem.Compliance.ControlObjectiveProjection
ID_b044877c_c54e_4afc_868b_27fe84ce7ee2User Access Contracts Objective: Ensure that employment contracts are signed by all users, and that the contracts address information security controls relevant to the position, physical location, systems, and data to be accessed. Example: Failure to contractually bind employees to required information security policy may result in a user claiming that information controls were not clearly prescribed. ID_b044877c_c54e_4afc_868b_27fe84ce7ee2System.Compliance.ControlObjectiveProjection
ID_b0ba2a64_6201_413f_86cd_3b699ca4dc26License Management Objective: Develop and maintain the organization's license management process. Example: Failure to maintain licenses may result in illegal or unlicensed use of software in a production environment, resulting in fines to the organization. ID_b0ba2a64_6201_413f_86cd_3b699ca4dc26System.Compliance.ControlObjectiveProjection
ID_b16c7581_b770_4a7c_957a_957747b324c3Policy ManagementPolicy ManagementID_b16c7581_b770_4a7c_957a_957747b324c3System.Compliance.CategoryProjection
ID_b5fe3fc3_b45f_483f_b2cc_c25908d6dba8Authentication Types Objective: Enable only authorized authentication mechanisms, and enforce their use when accessing assets, applications, or data. Example: Failure to control the authentication methods used to access the organization's systems, applications, and information might result in access methods that circumvent required access controls, account rules, and access log functions. Circumvention of these controls, rules, and functions could cause audit control failures if the authentication method violates password, access, and other associated policies. For example, organizations might require two-factor authentication when logging into the domain or network. If an alternate unauthorized authentication mechanism is used, two-factor authentication would not be enforced and the control would not be complied with. ID_b5fe3fc3_b45f_483f_b2cc_c25908d6dba8System.Compliance.ControlObjectiveProjection
ID_b836e846_2b92_470f_bd5a_0f9f06663984Capacity and Performance Management Objective: Configure logging functionality to accurately and securely record and store events. Example: The system's operating system typically controls the logging of security, system, and other operating system events as well as events within applications that run on the operating system. In this control objective, logging functionality should be configured to record the time, type, result, origin, and assets involved with recorded events. Access to logging functionality and output should be limited to authorized personnel, and all access attempts should be logged. Limited access prevents log alteration, and the logging of access attempts allows for investigation if unauthorized attempts are made. Log retention should be configured to accommodate investigation of events that relate to the types of data stored or processed. Logging functionality should be configured to halt sensitive transactional processes if log files are unavailable. ID_b836e846_2b92_470f_bd5a_0f9f06663984System.Compliance.ControlObjectiveProjection
ID_b9ecddd7_cff7_4c8c_b87f_044de2be4847Research Problem Objective: Research problems by reproducing the problem in a test environment, observing and documenting the symptoms of the problem, performing root cause analysis, developing a hypothesis and testing it, repeating this process until the root cause has been determined. Example: Failure to manage the researching of problems may result in inefficient and ineffective attempts at finding root cause, or failing to identify the true root cause. ID_b9ecddd7_cff7_4c8c_b87f_044de2be4847System.Compliance.ControlObjectiveProjection
ID_ba1f92d7_ada0_4ad8_aff5_0f3ccf056d0cOperations Management Process Objective: Manage the IT operations process, which includes the day to day operations of each IT service. Example: The operations process addresses what it takes to ensure effective and efficient day-to-day operations of an IT service after it has been conceived, built, and deployed into the production environment. Without such a process, the organization may not be able to measure or improve operational efficiency. ID_ba1f92d7_ada0_4ad8_aff5_0f3ccf056d0cSystem.Compliance.ControlObjectiveProjection
ID_ba2b2c14_a48e_4ee6_bc40_cf30e3f25038Security Awareness Training Objective: Train all users on their information security responsibilities. Example: Failure to train users on their information security responsibilities could lead to more information security incidents, more severe incidents, or both. ID_ba2b2c14_a48e_4ee6_bc40_cf30e3f25038System.Compliance.ControlObjectiveProjection
ID_bb54df5f_7da2_46e2_b7b0_d5a602b5f30bPackage Master Project Plan Objective: Create a master project plan by writing individual project plans and then rolling up individual plans into the master project plan. Example: Failure to roll up individual plans into the master project plan could impact clarity and understanding by introducing inconsistent document structures and conflicting terminology. ID_bb54df5f_7da2_46e2_b7b0_d5a602b5f30bSystem.Compliance.ControlObjectiveProjection
ID_bb986361_28fc_49b9_bdf0_9abe3902aeb8Governance, Risk, and ComplianceGovernance, Risk, and ComplianceID_bb986361_28fc_49b9_bdf0_9abe3902aeb8System.Compliance.CategoryProjection
ID_bccb3e2d_b705_493e_850a_af64da992c30Confirm Resolution and Close Request Objective: Manage the confirmation and closure of a customer service request by updating the Help request, determining if the service has been resumed, determining if the incident has been resolved, verifying successful fulfillment, and closing the Help request. Example: Failure to properly manage confirmation and closure of a customer service request could affect the continuous improvement of customer services, inappropriately closed requests, and customer satisfaction. ID_bccb3e2d_b705_493e_850a_af64da992c30System.Compliance.ControlObjectiveProjection
ID_bcfcca1a_a3bb_4b1f_9c1a_e8d123ead5ebInformation Privacy Objective: Ensure that personal information is collected and handled in a way that is compliant with applicable rules and regulations. Example: Aggregation of different fields in the same record could allow an organization to unique identify an individual, which may mean the organization is collecting, storing, and processing personal data in a way that does not comply with privacy laws, regulations, and standards. ID_bcfcca1a_a3bb_4b1f_9c1a_e8d123ead5ebSystem.Compliance.ControlObjectiveProjection
ID_bf537aa4_faba_4537_b3b3_1bf28366b4cfSystem ArchitectureSystem ArchitectureID_bf537aa4_faba_4537_b3b3_1bf28366b4cfSystem.Compliance.CategoryProjection
ID_bf6ec5fc_3dc9_4518_8bcf_556ea6baf7caVision and Scope Approval Objective: Manage the approval signoff on the vision/scope milestone by the team, customers, and stakeholders that indicates their approval of the vision/scope document and their agreement that the project team is ready to proceed to planning. Example: Failure to properly manage the vision/scope signoff could affect the quality, scope, timing, and viability of projects. ID_bf6ec5fc_3dc9_4518_8bcf_556ea6baf7caSystem.Compliance.ControlObjectiveProjection
ID_c0652654_bf03_4a70_836f_106bc358f28cHardware ConfigurationHardware ConfigurationID_c0652654_bf03_4a70_836f_106bc358f28cSystem.Compliance.CategoryProjection
ID_c0ffeb6c_d945_4127_84ea_b2b3a8ae04ffOperations Monitoring and ReportingOperations Monitoring and ReportingID_c0ffeb6c_d945_4127_84ea_b2b3a8ae04ffSystem.Compliance.CategoryProjection
ID_c19c894c_6cdf_484b_8e28_cf44c046a03bAudit ManagementAudit ManagementID_c19c894c_6cdf_484b_8e28_cf44c046a03bSystem.Compliance.CategoryProjection
ID_c2b549a4_66c6_4170_97a3_57988d87e0a9Protocol Configuration Exception Process Objective: Manage exceptions to standardized configuration of protocols used by assets. Example: Failure to properly manage exceptions to standardized protocol configuration could result in undocumented enablement of unauthorized protocols, which may lead to asset compromise. ID_c2b549a4_66c6_4170_97a3_57988d87e0a9System.Compliance.ControlObjectiveProjection
ID_c6d8c7a9_5bdd_4c9b_b0e6_88ae28eccae5Environment MgmtEnvironment MgmtID_c6d8c7a9_5bdd_4c9b_b0e6_88ae28eccae5System.Compliance.CategoryProjection
ID_c7507c26_ad07_46e0_9a0e_d97d9c20f1c2Logging Configuration Objective: Configure logging functionality to accurately and securely record and store events. Example: The operating system typically controls the logging of security, system, and other operating system events as well as events within applications that run on the operating system. In this control objective, logging functionality should be configured to record the time, type, result, origin, and assets involved with recorded events. Access to logging functionality and output should be limited to authorized personnel, and all access attempts should be logged. Limited access prevents log alteration, and the logging of access attempts allows for investigation if unauthorized attempts are made. Log retention should be configured to accommodate investigation of events that relate to the types of data stored or processed. Logging functionality should be configured to halt sensitive transactional processes if log files are unavailable. ID_c7507c26_ad07_46e0_9a0e_d97d9c20f1c2System.Compliance.ControlObjectiveProjection
ID_c83e378e_4932_4de8_b843_be6f53e5c58dSecurity Development LifecycleSecurity Development LifecycleID_c83e378e_4932_4de8_b843_be6f53e5c58dSystem.Compliance.CategoryProjection
ID_c8bf0adb_65ce_44b7_ac37_08df929b909cNetwork SecurityNetwork SecurityID_c8bf0adb_65ce_44b7_ac37_08df929b909cSystem.Compliance.CategoryProjection
ID_ca78d49f_7f1a_4c0b_81bf_637cd495f9b6System Integrity Objective: Manage the integrity of IT systems and the services they provide. Example: Failure to properly manage the integrity of the organization’s IT systems and the services they provide might result in errors that affect calculations, transactions, values, measures, and other fundamental components of different IT services. For example, the organization might inadvertently draw conclusions or make statements that are based on erroneous data. ID_ca78d49f_7f1a_4c0b_81bf_637cd495f9b6System.Compliance.ControlObjectiveProjection
ID_cd2653cd_e741_401a_9720_73f5efcc82e6Policy Needs Assessment Objective: Assess what policies apply to the organization by documenting goals, assessing current state, envisioning future state, and performing gap analyses. Example: Policy is the written intention of the organization. Without policy, organizational practices may self-determine and potentially fail to adequately address the applicability, sufficiency, and reasonableness of compliance requirements. ID_cd2653cd_e741_401a_9720_73f5efcc82e6System.Compliance.ControlObjectiveProjection
ID_d26a6176_3dc6_4dad_bf64_d90f66dfcb9aPolicy Creation Objective: Create applicable policies for the organization that address security, privacy, partner relationships, knowledge management, appropriate use, and policy governance. Example: Policy is the written intention of the organization. Without policy, organizational practices may self-determine the applicability, sufficiency, and reasonableness of compliance requirements. Also, failure to organize and document the intentions of the organization can result in duplicative and conflicting policy. ID_d26a6176_3dc6_4dad_bf64_d90f66dfcb9aSystem.Compliance.ControlObjectiveProjection
ID_d2b668b6_ebc3_4239_b1e7_fc19dd49d806Policy Enforcement and Evaluation Objective: Enforce and evaluate the efficacy, reasonableness, and applicability of the organization's policies and processes for requesting changes to policy. Example: Failure to enforce the organization's policies may result in undocumented noncompliance within the organization's practices and technologies. Failure to evaluate the efficacy, reasonableness, and applicability of the organization's policies may result in inefficient (time consuming, laborious), unreasonable (expensive), and unnecessary (no longer applicable) requirements within the organization's practices and technologies. Failure to address how to request changes to policy may result in noncompliant activities that undermine inappropriate or out of date policies. ID_d2b668b6_ebc3_4239_b1e7_fc19dd49d806System.Compliance.ControlObjectiveProjection
ID_d69cbbbd_d590_4a30_9bd6_48e80f60b314Team Accountability ManagementTeam Accountability ManagementID_d69cbbbd_d590_4a30_9bd6_48e80f60b314System.Compliance.CategoryProjection
ID_d84cb800_7601_4dd6_8a52_8026bdfb5bfcBaseline Configuration Objective: Manage change by initially baselining the configuration to capture the starting configuration, preparing for rollback and disaster recovery, and understanding the impact of the proposed change. Example: Failure to baseline the configuration could affect the ability to apply the change, the time it takes to make the change, or assess the impact of the change. ID_d84cb800_7601_4dd6_8a52_8026bdfb5bfcSystem.Compliance.ControlObjectiveProjection
ID_d8f63c13_0a6a_4fc2_ba58_f9822d736bc0Customer Service ManagementCustomer Service ManagementID_d8f63c13_0a6a_4fc2_ba58_f9822d736bc0System.Compliance.CategoryProjection
ID_d992e435_fbb1_4c9c_ba38_bc72aef57531User Rights Assignment Objective: Restrict asset and data access to individuals with a specific, authorized business need. Example: Failure to restrict access to assets and data, such as different types of accounts/roles in the organization, might lead to system failure through unauthorized configuration changes and loss of sensitive data, such as personal or financial data. ID_d992e435_fbb1_4c9c_ba38_bc72aef57531System.Compliance.ControlObjectiveProjection
ID_dc0a85c7_b8a3_4c3b_b5c0_c62f9abe440cData HandlingData HandlingID_dc0a85c7_b8a3_4c3b_b5c0_c62f9abe440cSystem.Compliance.CategoryProjection
ID_dc64e7ea_345b_4195_a0eb_660a6d3e9456General Access Limitation Objective: Grant service and system access only to authorized user and system accounts. Example: The Windows operating system controls identity and access management through Active Directory Domain Services (AD DS). If products use AD DS for authentication management, this control objective might be satisfied through role and account management as configured through AD DS. ID_dc64e7ea_345b_4195_a0eb_660a6d3e9456System.Compliance.ControlObjectiveProjection
ID_df104707_5386_46ed_840d_1cf3ae8faef6Data Access Objective: Allow only authorized personnel to access, modify, delete, or duplicate sensitive data. Example: Failure to control access to data might result in authorized access, modification, deletion, or duplication. Such actions might result in the loss of control of private or personal information, and could require the organization to report such losses to governing bodies and affected persons. Unauthorized data modification might result in significant problems, including but not limited to loss of transactional integrity, falsification of records, configuration modifications to assets, and escalation of privileges. ID_df104707_5386_46ed_840d_1cf3ae8faef6System.Compliance.ControlObjectiveProjection
ID_e06ffb56_9286_4494_8938_8d46348c4248Controls Management Process Objective: Develop and maintain the organization's controls management process. Example: Failure to maintain a controls management process may result in unorganized, duplicative, inapplicable, unreasonable, or inefficient application of controls within the environment. ID_e06ffb56_9286_4494_8938_8d46348c4248System.Compliance.ControlObjectiveProjection
ID_e0e1113a_dead_4ac9_aefe_a424a03da0e1Personnel ManagementPersonnel ManagementID_e0e1113a_dead_4ac9_aefe_a424a03da0e1System.Compliance.CategoryProjection
ID_e0e410be_5f74_4f44_80c6_5a3798e83daaUser Notification Objective: Notify users at logon of applicable information about authorized and unauthorized use of system assets. Example: Failure to notify users when they log on might result in inappropriate use of assets or data. Failure to notify might also affect the ability of an organization to prosecute inappropriate or unauthorized use of assets and data. The Windows operating system allows configuration of warning banners upon logon. Information within a logon banner should be developed in conjunction with the organization's legal counsel, auditors, and internal control personnel. Logon banners typically summarize who may use the asset, and applicable controls associated with data on these assets. Logon banners often reference written policy, and might direct users to additional relevant policy. ID_e0e410be_5f74_4f44_80c6_5a3798e83daaSystem.Compliance.ControlObjectiveProjection
ID_e4d963b8_ee56_49b1_8e20_ad98ed9ff461Data Roles and Responsibilities Objective: All data-related responsibilities shall be defined, documented and communicated. Example: Failure to define, document, and communicate responsibilities could lead to those responsibilities not being performed correctly or at all. ID_e4d963b8_ee56_49b1_8e20_ad98ed9ff461System.Compliance.ControlObjectiveProjection
ID_e82ad99f_88cc_4abe_8eb9_e8248bcc39faApplication SecurityApplication SecurityID_e82ad99f_88cc_4abe_8eb9_e8248bcc39faSystem.Compliance.CategoryProjection
ID_e881929f_a2ae_4f20_9c62_d79935212267Least Privilege Objective: Restrict asset and data access to individuals with a specific, authorized business need. Example: Failure to restrict access to assets and data might lead to system failure through unauthorized configuration changes and loss of sensitive data, such as personal or financial data. Data access is more than what is accessible upon successful login. Additional data access might be inadvertently available through less obvious means, such as locked screens (username, system type, data storage classification) and bug reports (internal database queries and table structures). Access management should follow an authorized procedure to assign access rights, associate accounts to personnel, communicate credentials, and revoke access rights. The process should allow for varied access according to the different types of accounts/roles in the organization, such as those for full time employee accounts, vendor accounts, emergency accounts, and maintenance accounts. These accounts might be configured with additional limitations, such as restricted access path, asset type, data types, or hours of availability. ID_e881929f_a2ae_4f20_9c62_d79935212267System.Compliance.ControlObjectiveProjection
ID_e8dd684d_135e_42a8_8e99_d5df06a132e0Service Requirements and Budget Management Objective: Manage service requirements and budgets by addressing services and business strategy, planning budgets, conducting budget reviews, and managing IT value realization. Example: Failure to properly manage the organization’s service requirements and budgets could result in failure to understand IT’s expected contribution to business results, or failure to track expected benefits through the process of value realization. ID_e8dd684d_135e_42a8_8e99_d5df06a132e0System.Compliance.ControlObjectiveProjection
ID_eb1ffb59_cf80_4c7f_802f_6f70ae15786bTime Configuration Objective: Configure assets to reference a single, centralized time source. Example: Failure to centrally manage the time source used by assets might hamper investigations when log files on more than one asset must be compared. Additional difficulties might arise within transactional sequences that require accurate time and date information. The Windows operating system provides the ability to centrally source time from a single server and require all other servers and computers to reference this server. ID_eb1ffb59_cf80_4c7f_802f_6f70ae15786bSystem.Compliance.ControlObjectiveProjection
ID_ec2c41a6_063c_438f_9bdb_f04a8a605829Physical Entry Log Book Objective: Require that all visitors to the facility are entered in a log book. Retain the log book based on policy requirements. Periodically review the log book for suspicious activity. Example: Failure to track visitors may result in unauthorized access to facilities and equipment residing at those facilities. ID_ec2c41a6_063c_438f_9bdb_f04a8a605829System.Compliance.ControlObjectiveProjection
ID_ec7d0760_e842_41c8_8c16_b65ee343492bRelease Change Objective: Manage the release of the change and any accompanying site components into the production environment by stabilizing the release, getting final customer approval of the change, documenting the released change and communicating the impact to users, transferring responsibility from the project team that built the change to Operations and Support, and updating the request for change (RFC) and the configuration database. Example: Failure to properly manage the release of the change could affect operations and the business by allowing into production an inadequate solution that does not fully address expected user, operations, and support requirements. ID_ec7d0760_e842_41c8_8c16_b65ee343492bSystem.Compliance.ControlObjectiveProjection
ID_eca053af_9062_41cc_99ce_5fc0709971eeAsset ManagementAsset ManagementID_eca053af_9062_41cc_99ce_5fc0709971eeSystem.Compliance.CategoryProjection
ID_ed3c3814_b4ba_456a_9d7e_751bf5df6e93Reliability Monitoring and Improving Plans Objective: Manage the monitoring, reporting and trend analysis, and reviews of service reliability. Example: Failure to properly manage the monitoring and improvement plans for reliability could affect the degree of achieved reliability and choices for resource investments. ID_ed3c3814_b4ba_456a_9d7e_751bf5df6e93System.Compliance.ControlObjectiveProjection
ID_ede094e1_cd5e_4432_bf33_369b6000b21cPhysical SecurityPhysical SecurityID_ede094e1_cd5e_4432_bf33_369b6000b21cSystem.Compliance.CategoryProjection
ID_ee7b250d_abb2_4d1d_bd0f_a181efcf3a7eStabilize Release Candidate Objective: Manage the stabilization of developed services. Stabilization involves incorporating feedback and resolving bugs against developed solutions prior to deployment. Example: Failure to properly manage stabilization processes may result in improperly tested solutions, resulting in bugs or other undesired behavior within released solutions. ID_ee7b250d_abb2_4d1d_bd0f_a181efcf3a7eSystem.Compliance.ControlObjectiveProjection
ID_ee993557_e608_47c4_a358_9210e22000beProject EnvisioningProject EnvisioningID_ee993557_e608_47c4_a358_9210e22000beSystem.Compliance.CategoryProjection
ID_f221d499_1ee7_45e4_b6f6_a35b3078b5ccConduct Pilot Objective: Validate the solution in production by pilot testing the entire solution in a subset of the live production environment, with a particular group of users, or on a subset of the infrastructure. Example: Failure to conduct pilot testing of the solution in production development could impact user experience ability to understand, learn, and use the solution and impact the final deployment of the solution. ID_f221d499_1ee7_45e4_b6f6_a35b3078b5ccSystem.Compliance.ControlObjectiveProjection
ID_f28be5f5_1a3b_429a_9506_86df84437cf8Policy Validation Objective: Validate the organization's written policies. Example: Without validation, policies may not be enforced and audit bodies may determine that management is not vested in existing policy. ID_f28be5f5_1a3b_429a_9506_86df84437cf8System.Compliance.ControlObjectiveProjection
ID_f2aaadcd_7de7_4e03_af64_a2127dd254dcIT Service Portfolio Development Objective: Manage the development of the IT service portfolio to ensure that the value of IT services in relation to business outcome are measured and that new project concepts are analyzed and approved. Example: Failure to properly manage the development of the IT portfolio could affect the ability to achieve the desired value that is derived from IT services. ID_f2aaadcd_7de7_4e03_af64_a2127dd254dcSystem.Compliance.ControlObjectiveProjection
ID_f3eba8e6_60d0_421e_8d9a_dcf572f6ee09Report Configuration Objective: Manage IT services and associated products to ensure required reports and other evidentiary output is configured according to policy. Example: Failure to configure reports and evidentiary output might result in the wrong information being recorded, or omission of important information. Such failures can result in adverse court findings, fines, and other legal proceedings against the organization. Evidentiary output may be produced from services (collections of assets, data, processes, and applications) or an indivual service component. Output might include log files, configuration reports, status reports, process and procedure status reports, or financial transaction logs. ID_f3eba8e6_60d0_421e_8d9a_dcf572f6ee09System.Compliance.ControlObjectiveProjection
ID_f4bc22bf_2175_4237_9313_255bbe54f3e2Team Organization Objective: Manage the project by assembling the core team, creating a project structure document that describes the team’s organization and the roles and specific responsibilities assigned to each team member, clarifying the chain of accountability to the customer, and specifying the designated points of contact that the project team has with the customer. Example: Failure to properly manage the team's formation and document the structure could affect role clarity with regard to who does what work, who should care about what deliverables, and who is responsible for maintaining customer relationships. ID_f4bc22bf_2175_4237_9313_255bbe54f3e2System.Compliance.ControlObjectiveProjection
ID_f58cd8a3_e6c2_474c_8ef2_e0bf717aed55Service HealthService HealthID_f58cd8a3_e6c2_474c_8ef2_e0bf717aed55System.Compliance.CategoryProjection
ID_f5915b0c_2df8_49e2_9f82_9a27a3aa0a51Identity ManagementIdentity ManagementID_f5915b0c_2df8_49e2_9f82_9a27a3aa0a51System.Compliance.CategoryProjection
ID_f8037189_4990_4e45_8ad9_b96d248792efDisaster RecoveryDisaster RecoveryID_f8037189_4990_4e45_8ad9_b96d248792efSystem.Compliance.CategoryProjection
ID_f898e1f1_fef8_4cab_8dc0_6278b1bddecaBackground Checks Objective: Require that all personnel with access to sensitive information have received background checks in compliance with applicable laws and regulations. Example: Failure to perform background checks may result in unauthorized behavior by personnel with a known history of crime. ID_f898e1f1_fef8_4cab_8dc0_6278b1bddecaSystem.Compliance.ControlObjectiveProjection
ID_f90c4628_b3a1_4019_a3f9_8e3661265a95Local Firewall Objective: Configure local firewalls to prevent unauthorized connections, and allow configuration changes only through authorized administrative accounts. Example: Firewalls installed on local users' computers should not allow users to change access control lists (ACLs) or other configuration parameters. Configuration should only be conducted through authorized accounts, typically administrative accounts or roles. This control objective helps prevent unauthorized opening of ports and pathways that are potential vulnerabilities. ID_f90c4628_b3a1_4019_a3f9_8e3661265a95System.Compliance.ControlObjectiveProjection
ID_fc089f22_7579_446e_9e2a_7641327c606dProject Planning ManagementProject Planning ManagementID_fc089f22_7579_446e_9e2a_7641327c606dSystem.Compliance.CategoryProjection
ID_fc1d53dc_09f3_4340_b5f9_962e6e37a2f6Build Management Process Objective: Manage the build management service management function. Build management is the process of developing solution components, including the code for any in-house application or infrastructure solution, documentation that developers create, as well as the infrastructure that supports the solution. Example: Failure to manage the build process may result in uncoordinated infrastructure solutions, missing documentation to guide developers in the creation of software, and improperly configured infrastructure to support the development of quality solutions." ID_fc1d53dc_09f3_4340_b5f9_962e6e37a2f6System.Compliance.ControlObjectiveProjection
ID_fd3e6ecd_d34c_493a_9087_c92ae58ad18dManage Finances Objective: Manage IT finances by creating IT budgets that reflect the business priorities; determine maintenance and operations costs, develop innovation and improvement initiatives, determine project costs, and establish value realization awareness across IT. Example: Failure to properly manage the organization’s finances could affect business performance, viability, and the stewardship of organization resources. ID_fd3e6ecd_d34c_493a_9087_c92ae58ad18dSystem.Compliance.ControlObjectiveProjection
ID_fe36cf69_225d_4a30_aa37_1a39fab5b468Comply with Directives Objective: Comply with directives by monitoring the legal and regulatory environment, adapting to regulatory changes, and responding to management directives. Example: Failure to comply with directives could lead to illegal activity, noncompliance with contracts, and generally underperforming organizations. ID_fe36cf69_225d_4a30_aa37_1a39fab5b468System.Compliance.ControlObjectiveProjection
ID_ff1d24ca_17e1_4980_af6c_9aab6952f17dIT Service Strategy Development Objective: Manage IT strategy so that IT goals are aligned with business goals to help ensure that IT invests in services that are effective and efficient in meeting organization needs. Example: Failure to properly manage the organization’s service strategy could affect the business's ability to function, adjust to changes in business and regulatory environment, and exercise stewardship of organization resources. ID_ff1d24ca_17e1_4980_af6c_9aab6952f17dSystem.Compliance.ControlObjectiveProjection
ID_ffb85a0e_8078_48fa_885c_a678f611077eRelease PhaseObjective: Conduct a final security review, maintain an incident response plan, and execute a release plan for developed software.ID_ffb85a0e_8078_48fa_885c_a678f611077eSystem.Compliance.ControlObjectiveProjection