Controls are your cybersecurity & data privacy program ---- A control is the power to influence or direct behaviors and the course of events.

Evidence Request List (ERL)

The SCF's Evidence Request List (ERL) is designed to standardize and streamline the evidence request process for a SCF-based assessment. However, the ERL can be used as a guidebook for "reasonable" artifacts to demonstrate evidence of due diligence and due care for other cybersecurity and/or privacy audits or assessments.

The ERL will be utilized as part of the SCF's Conformity Assessment Program (CAP) to identify reasonably-expected artifacts/evidence to meet applicable SCF controls, since the identified evidence artifacts are mapped to SCF controls. The benefits are:

  1. It levels the playing field by establishing evidence expectations upfront so there are no surprises; and
  2. It prevents an assessor from literally making up documentation requirements on the fly.

Since "time is money" when it comes to an audit/assessment, the ERL is specifically designed to make assessments more efficient, therefore less expensive. The ERL is one of the tabs that is included as part of the SCF:

# ERL # Area of Focus Documentation Artifact Artifact Description SCF Control Mappings
1 E-GOV-01 Security & Privacy Program Management Charter - Cybersecurity Program Documented evidence of a corporate-level (C-Level) organization and resourcing for a cybersecurity & privacy governance program. GOV-01
2 E-GOV-02 Security & Privacy Program Management Charter - Privacy Program Documented evidence of an executive steering committee, or advisory board, that is formed to perform oversight of privacy management decisions and is comprised of key cybersecurity, technology, risk, privacy and business executives. GOV-01
PRI-01
3 E-GOV-03 Security & Privacy Program Management Charter - Cybersecurity Steering Committee Documented evidence of an executive steering committee, or advisory board, that is formed to perform oversight of cybersecurity management decisions and is comprised of key cybersecurity, technology, risk, privacy and business executives. GOV-01.1
GOV-01.2
4 E-GOV-04 Security & Privacy Program Management Charter - Privacy Steering Committee Documented evidence of an executive steering committee, or advisory board, that is formed to perform oversight of privacy management decisions and is comprised of key cybersecurity, technology, risk, privacy and business executives. GOV-01.2
CPL-02
5 E-GOV-05 Security & Privacy Program Management Charter - Audit Committee Documented evidence of an executive steering committee, or advisory board, that is formed to perform oversight of internal and external audit management decisions and is comprised of key cybersecurity, technology, risk, privacy and business executives. GOV-01.2
CPL-02
6 E-GOV-06 Security & Privacy Program Management Charter - Risk Committee Documented evidence of an executive steering committee, or advisory board, that is formed to perform oversight of risk management decisions and is comprised of key cybersecurity, technology, risk, privacy and business executives. GOV-01.2
CPL-02
7 E-GOV-07 Security & Privacy Program Management Charter - Data Management Board (DMB) Documented evidence of the organization's Data Management Board (DMB) charter and mission. GOV-01.2
8 E-GOV-08 Security & Privacy Program Management Cybersecurity & Privacy Policies Documented evidence of an appropriately-scoped cybersecurity and privacy policies. Policies are high-level statements of management intent from an organization’s executive leadership that are designed to influence decisions and guide the organization to achieve the desired outcomes. Policies are enforced by standards and further implemented by procedures to establish actionable and accountable requirements. GOV-02
PRI-01
9 E-GOV-09 Security & Privacy Program Management Cybersecurity & Privacy Standards Documented evidence of an appropriately-scoped cybersecurity and privacy standards. Standards are mandatory requirements regarding processes, actions and configurations. Standards are intended to be granular and prescriptive to ensure systems, applications and processes are designed and operated to include appropriate cybersecurity and privacy protections GOV-02
10 E-GOV-10 Security & Privacy Program Management Cybersecurity & Privacy Controls Documented evidence of an appropriately-scoped cybersecurity and privacy controls. Controls are technical, administrative or physical safeguards. Controls are the nexus used to manage risks through preventing, detecting or lessening the ability of a particular threat from negatively impacting business processes. Controls directly map to standards, since control testing is designed to measure specific aspects of how standards are actually implemented. GOV-09
CPL-01
CPL-01.2
11 E-GOV-11 Security & Privacy Program Management Cybersecurity & Privacy Procedures Documented evidence of an appropriate appropriately-scoped cybersecurity and privacy procedures. Procedures are a documented set of steps necessary to perform a specific task or process in conformance with an applicable standard. Procedures help address the question of how the organization actually operationalizes a policy, standard or control. The result of a procedure is intended to satisfy a specific control. Procedures are also commonly referred to as “control activities.” GOV-02
OPS-01.1
12 E-GOV-12 Security & Privacy Program Management Cybersecurity & Privacy Policies & Standards Reviews Documented evidence of a periodic review process for the organization's cybersecurity and privacy policies and standards to identify necessary updates. GOV-03
13 E-GOV-13 Security & Privacy Program Management Measures of Performance (Metrics) Documented evidence of formal measure of performance that are used to track the health of the cybersecurity and privacy program (e.g., metrics, KPIs, KRIs). GOV-01.2
GOV-05
CPL-02
14 E-AST-01 Asset Management IT Asset Management (ITAM) Documented evidence of an IT Asset Management (ITAM) program. AST-01
AST-03
AST-03.1
AST-10
15 E-AST-02 Asset Management Asset Scoping Guidance Documented evidence of an asset scoping guidance. This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on defining in-scope systems, applications, services, processes and third-parties. AST-04.1
AST-04.2
AST-04.3
CPL-01.2
IAO-01.1
16 E-AST-03 Asset Management Asset Disposal Evidence Documented evidence of a Vulnerability & Patch Management Program (VPMP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. AST-09
DCH-08
DCH-09
DCH-09.1
17 E-AST-04 Asset Management Asset Inventories - Hardware Documented evidence of an inventory of the organization's technology hardware assets.  AST-02
18 E-AST-05 Asset Management Asset Inventories - Software Documented evidence of an inventory of the organization's software assets.  AST-02
19 E-AST-06 Asset Management Asset Inventories - Cloud Service Provider (CSP) Documented evidence of an inventory of the organization's cloud-based services (e.g., SaaS, IaaS, PaaS, etc.).  CLD-01
CLD-09
TPM-01.1
20 E-AST-07 Asset Management Cyber-Physical Systems (CPS) Documented evidence of an inventory of the organization's physical assets that process functions based on software and networks. AST-02
EMB-01
21 E-AST-08 Asset Management Asset Inventories - Sensitive / Regulated Data Documented evidence of an inventory of the organization's sensitive/regulated data (including systems where sensitive/regulated data is stored, processed and/or transmitted). CLD-10
DCH-06.2
BCD-11.2
PRI-05.5
22 E-AST-09 Asset Management Computer Lifecycle Plan (CLP) Documented evidence of a Computer Lifecycle Plan (CLP) that describes how the life of technology assets is managed. SEA-07.1
TDA-17
23 E-AST-10 Asset Management Prohibited Equipment List (PEM) Documented evidence of equipment identified by Federal Acquisition Regulation (FAR) section 889 prohibitions for certain telecommunications equipment. AST-17
24 E-AST-11 Asset Management Data Retention Program Documented evidence of a formal data retention program that governs the retention and destruction of data types. DCH-18
MON-10
PRI-05
25 E-AST-12 Asset Management Secure Baseline Configurations Reviews Documented evidence of a review process to ensure Secure Baseline Configurations (SBC) are current and applicable. CFG-02
CFG-02.5
NET-04
NET-04.1
NET-04.6
26 E-AST-13 Asset Management Secure Baseline Configurations - Cloud-Based Services Documented evidence of secure baseline configurations for all deployed types of cloud-based services or applications. CFG-02
CFG-02.5
27 E-AST-14 Asset Management Secure Baseline Configurations - Databases Documented evidence of secure baseline configurations for all deployed types of databases. CFG-02
CFG-02.5
28 E-AST-15 Asset Management Secure Baseline Configurations - Embedded Technologies Documented evidence of secure baseline configurations for all deployed types of embedded technologies. CFG-02
CFG-02.5
29 E-AST-16 Asset Management Secure Baseline Configurations - Major Applications Documented evidence of secure baseline configurations for all deployed types of major applications. CFG-02
CFG-02.5
30 E-AST-17 Asset Management Secure Baseline Configurations - Minor Applications Documented evidence of secure baseline configurations for all deployed types of minor applications. CFG-02
CFG-02.5
31 E-AST-18 Asset Management Secure Baseline Configurations - Mobile Devices Documented evidence of secure baseline configurations for all deployed types of mobile devices. CFG-02
CFG-02.5
32 E-AST-19 Asset Management Secure Baseline Configurations - Network Devices Documented evidence of secure baseline configurations for all deployed types of network devices. CFG-02
CFG-02.5
NET-04
NET-04.1
33 E-AST-20 Asset Management Secure Baseline Configurations - Server Class Systems Documented evidence of secure baseline configurations for all deployed types of server-class operating systems. CFG-02
CFG-02.5
34 E-AST-21 Asset Management Secure Baseline Configurations - Workstation Class Systems Documented evidence of secure baseline configurations for all deployed types of workstation-class operating systems. CFG-02
CFG-02.5
35 E-AST-22 Asset Management Provenance Documented evidence of that tracks the origin, development, ownership, location and changes to systems, system components and associated data. AST-03.2
36 E-AST-23 Asset Management Geolocation Inventory Documented evidence of designated internal and third-party facilities where organizational data is stored, transmitted and/or processed. BCD-02.4
CLD-09
DCH-19
DCH-24
37 E-AST-24 Asset Management Asset Categorization Documented evidence of a methodology to categorize technology assets (e.g., criticality and data classification considerations) AST-31
AST-31.1
38 E-BCM-01 Business Continuity Continuity of Operations Plan (COOP) Documented evidence of a Continuity of Operations Plan (COOP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. BCD-01
39 E-BCM-02 Business Continuity Recovery Time Objectives (RTOs) Documented evidence of Recovery Time Objectives (RTOs) that guide Continuity of Operations Plan (COOP)-related operations. BCD-01.4
40 E-BCM-03 Business Continuity Recovery Time Objectives (RTOs) Documented evidence of Recovery Point Objectives (RPOs) that guide Continuity of Operations Plan (COOP)-related operations. BCD-01.4
41 E-BCM-04 Business Continuity COOP Root Cause Analysis (RCA) Documented evidence of a Root Cause Analysis (RCA) from any Continuity of Operations Plan (COOP)-related training, testing or incident. BCD-05
42 E-BCM-05 Business Continuity COOP Updates Documented evidence of a periodic review process for the organization's Continuity of Operations Plan (COOP) to identify necessary updates. BCD-06
43 E-BCM-06 Business Continuity COOP Testing Documented evidence of a Continuity of Operations Plan (COOP)-related testing activity. BCD-03.1
BCD-04
44 E-BCM-07 Business Continuity COOP Training Documented evidence of a Continuity of Operations Plan (COOP)-related training activity. BCD-03
BCD-04
45 E-BCM-08 Business Continuity COOP Criticality Analysis Documented evidence of a Continuity of Operations Plan (COOP)-related criticality analysis. BCD-02
46 E-BCM-09 Business Continuity COOP Dependency Analysis Documented evidence of a Continuity of Operations Plan (COOP)-related dependency analysis for applications, systems, services, facilities, stakeholders and third-parties. AST-01.1
47 E-BCM-10 Business Continuity Backups Documented evidence of a Continuity of Operations Plan (COOP)-related data backup scheme that demonstrates the methods of data backup (including protection measures) for all data types to ensure business continuity requirements. BCD-11
48 E-BCM-11 Business Continuity Backups - Local Documented evidence of event logs for the on-site / local data backup solution. BCD-11
BCD-11.2
49 E-BCM-12 Business Continuity Backups - Remote Documented evidence of event logs for the off-site / remote data backup solution. BCD-11
BCD-11.2
50 E-BCM-13 Business Continuity Backups - Recovery Documented evidence of a Continuity of Operations Plan (COOP)-related criticality analysis for applications, systems, services, facilities, stakeholders and third-parties. BCD-11
BCD-11.1
51 E-CHG-01 Change Management Business Impact Analysis (BIA) Documented evidence of a Business Impact Analysis (BIA) for proposed changes. RSK-08
52 E-CHG-02 Change Management Charter - Change Control Board (CCB) Documented evidence of the organization's Change Control Board (CCB) charter and mission. CHG-01
CHG-02
53 E-CHG-03 Change Management Change Control Board (CCB) Minutes Documented evidence of Change Control Board (CCB) meeting minutes CHG-02.2
54 E-CHG-04 Change Management Evidence of Cybersecurity / Privacy Reviews Documented evidence of Change Control Board (CCB) meeting-related cybersecurity and/or privacy reviews for proposed change(s). CHG-02.3
55 E-CPL-01 Compliance Statutory, Regulatory & Contractual Obligations Documented evidence of applicable statutory, regulatory and/or contractual obligations for cybersecurity and privacy controls. CPL-01
56 E-CPL-02 Compliance Defined Compliance Scope (DCS) Documented evidence of a formal scoping document that identifies applicable statutory, regulatory and/or contractual obligations for the organization. Defines the affected Lines of Business (LOB), internal / external stakeholders and facilities for the specific scope of compliance obligations. AST-04.1
AST-04.2
AST-04.3
CPL-01.2
57 E-CPL-03 Compliance Controls Responsibility Matrix (CRM) Documented evidence of a Controls Responsibility Matrix (CRM), or similar documentation, that identifies the stakeholder involved in executing assigned controls (e.g., Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix). AST-01.2
AST-03
CLD-06.1
TPM-05.4
58 E-CPL-04 Compliance Internal Audit (IA) Documented evidence of an Internal Audit (IA) capability. CPL-02.1
59 E-CPL-05 Compliance Internal Audit (IA) Findings Documented evidence of a centrally-managed and prioritized repository Internal Audit (IA) findings. CPL-01.1
CPL-03
GOV-01.2
60 E-CPL-06 Compliance Manufacturer Disclosure Statement for Medical Device Security (MDS2) Documented Manufacturer Disclosure Statement for Medical Device Security (MDS2) that communicates information about medical device security and privacy characteristics to current device owners and potential buyers. [note MDS2 is specific to medical device manufacturers] TDA-01.1
TDA-02.1
TDA-02.5
TDA-04
TDA-04.1
TPM-04
TPM-04.2
61 E-CPL-07 Compliance Control Assessments Documented evidence of internal or third-party control assessments to provide governance oversight of cybersecurity and privacy controls. CPL-02
CPL-02.1
CPL-03
CPL-03.1
62 E-CPL-08 Compliance Functional Review of Cybersecurity Controls Documented evidence of control testing to ensure cybersecurity controls function as expected. CPL-03.2
63 E-CPL-09 Compliance Non-Compliance Oversight Reporting Documented evidence of governance oversight reporting of non-compliance to the organization's executive leadership. CPL-02
GOV-01.2
64 E-CRY-01 Cryptographic Protections FIPS-Validated Certificates Documented evidence of FIPS-validated cryptographic modules. [note FIPS-validated cryptography is specific to US government contractors for NIST SP 800-171 & CMMC compliance] CRY-03
CRY-04
CRY-09
CRY-09.1
CRY-09.2
65 E-DCH-01 Data Protection Data Classification Scheme Documented evidence of an organization-specific data classification scheme. AST-04.1
DCH-02
66 E-DCH-02 Data Protection Data Handling Practices Documented evidence of an organization-specific data handling practices (e.g., guidance specific the data classification scheme). AST-04.1
DCH-02
67 E-DCH-03 Data Protection Network Diagram - Global System View (GSV) Documented evidence of a high-level network diagram that provides a conceptual, logical depiction of the network(s) to describe the interconnections of the systems/applications/services, including internal and external interfaces. AST-04
NET-02
68 E-DCH-04 Data Protection Network Diagram - Low Level Documented evidence of a low-level network diagram that provides a detailed, logical depiction of assets on the network(s). AST-04
NET-02
69 E-DCH-05 Data Protection Data Flow Diagram (DFD) Documented evidence of a Data Flow Diagram (DFD) that accurately identifies where sensitive/regulated data is stored, transmitted and/or processed. AST-02.8
AST-04
NET-02
70 E-DCH-06 Data Protection Third-Party Inventories Documented evidence of an inventory of Third-Party Service Providers (TSP), contractors, vendors, etc. that directly or indirectly impact the organization's data, systems, applications, services and/or processes. TPM-01.1
71 E-DCH-07 Data Protection Media Sanitization Documentation Documented evidence of media sanitization actions. DCH-09
DCH-09.1
72 E-DCH-08 Data Protection Authorization Documentation Documented evidence of that identifies authorized users and processes acting on behalf of authorized users. CFG-08
73 E-SAT-01 Education Continuing Professional Education (CPE) Documented evidence of Continuing Professional Education (CPE) requirements for cybersecurity and privacy personnel. SAT-03.7
74 E-SAT-02 Education Initial User Training Documented evidence of initial user training for cybersecurity and/or privacy topics. SAT-02
SAT-02.2
SAT-04
HRS-05.7
75 E-SAT-03 Education Practical Exercises Documented evidence of practical user training exercises for cybersecurity and/or privacy topics (e.g., phishing exercise). SAT-02.1
SAT-03.1
SAT-04
76 E-SAT-04 Education Recurring User Training Documented evidence of recurring (e.g., annual) user training for cybersecurity and/or privacy topics. SAT-03.4
SAT-03.6
SAT-03.7
SAT-04
HRS-05.7
77 E-SAT-05 Education Role-Based Training Documented evidence of specialized user training for privileged users, executives, individuals who handle sensitive/regulated data, etc. SAT-03
SAT-03.4
SAT-03.5
SAT-04
78 E-MON-01 Event Log Monitoring Evidence of Log Review Processes Documented evidence of centralized collection and review/analysis of security event logs. MON-01.2
MON-01.8
MON-02
MON-02.2
79 E-MON-02 Event Log Monitoring Malware Activity Documented evidence of malware activity being logged and included as part of the centralized event log collection and review/analysis process. MON-01.8
MON-02.2
END-04.3
80 E-MON-03 Event Log Monitoring Privileged User Oversight Documented evidence of malware activity being logged and included as part of the centralized event log collection and review/analysis process. MON-01.14
MON-01.15
81 E-MON-04 Event Log Monitoring Rogue Devices Documented evidence of rogue device identification is included as part of the centralized event log collection and review/analysis process. AST-02.6
82 E-MON-05 Event Log Monitoring Security Events Documented evidence of security-relevant activities being logged and included as part of the centralized event log collection and review/analysis process. MON-01.2
MON-01.8
MON-02
MON-02.2
83 E-HRS-01 Human Resources Defined Cybersecurity & Privacy Roles Documented evidence of a discrete roles for cybersecurity and privacy functions (e.g., position categorization).  GOV-04
HRS-02
HRS-03
HRS-03.1
84 E-HRS-02 Human Resources Assigned Roles - Application Developers List of employed or contract personnel assigned to application development roles. HRS-02
HRS-02.1
HRS-03
85 E-HRS-03 Human Resources Assigned Roles - Cybersecurity Staff List of employed or contract personnel assigned to cybersecurity roles. HRS-02
HRS-02.1
HRS-03
86 E-HRS-04 Human Resources Assigned Roles - Privacy Staff List of employed or contract personnel assigned to privacy roles. HRS-02
HRS-02.1
HRS-03
87 E-HRS-05 Human Resources Role Assignment - CISO Documented evidence of a formal role assignment to the Chief Information Security Officer (CISO) position. GOV-04
88 E-HRS-06 Human Resources Role Assignment - COO Documented evidence of a formal role assignment to the Chief Operations Officer (COO) position. GOV-04
89 E-HRS-07 Human Resources Role Assignment - CIO Documented evidence of a formal role assignment to the Chief Information Officer (CIO) position. GOV-04
90 E-HRS-08 Human Resources Role Assignment - CPO Documented evidence of a formal role assignment to the Chief Privacy Officer (CPO) position. GOV-04
PRI-01.1
91 E-HRS-09 Human Resources Role Assignment - CRO Documented evidence of a formal role assignment to the Chief Risk Officer (CRO) position. GOV-04
92 E-HRS-10 Human Resources Role Assignment - DPO Documented evidence of a formal role assignment to Data Protection Officer (DPO) positions. GOV-04
PRI-01.4
93 E-HRS-11 Human Resources Role Assignment - Sensitive / Regulated Data Documented evidence of a formal role assignment to personnel who are cleared to handle sensitive/regulated data. HRS-02
HRS-02.1
HRS-03
94 E-HRS-12 Human Resources Role Review Documented evidence of a formal review process to ensure personnel roles currently reflect business needs. IAC-07
IAC-07.1
IAC-08
IAC-17
95 E-HRS-13 Human Resources Defined Cybersecurity & Privacy Responsibilities Documented evidence of a role-based cybersecurity and privacy responsibilities to ensure personnel are both educated on the role and are responsible for the associated control execution. GOV-04
HRS-03
HRS-03.1
96 E-HRS-14 Human Resources Responsibilities Review Documented evidence of a formal review process to ensure assigned responsibilities currently reflect business needs for the assigned role. IAC-17
97 E-HRS-15 Human Resources Organization Chart Current and accurate organization chart that depicts logical staff hierarchies. GOV-04
GOV-04.1
GOV-04.2
98 E-HRS-16 Human Resources Access Agreements  Documented evidence of personnel management practices protecting sensitive/regulated data through formal access agreements. HRS-03.1
HRS-05
HRS-06
HRS-10
99 E-HRS-17 Human Resources Background Checks Documented evidence of personnel screening practices, which centers around some form of formalized background check process. HRS-04
HRS-04.1
100 E-HRS-18 Human Resources Provisioning Checklist (Onboarding) Documented evidence of personnel management practices to formally onboard personnel into their assigned roles. HRS-03
HRS-03.1
HRS-04.2
HRS-05.7
HRS-10
IAC-07
101 E-HRS-19 Human Resources Deprovisioning Checklist (Offboarding) Documented evidence of personnel management practices to formally offboard personnel from their assigned roles due to employment termination or role change. HRS-06.2
HRS-09
HRS-09.1
HRS-09.2
HRS-09.3
IAC-07
IAC-07.1
IAC-07.2
102 E-HRS-20 Human Resources Non-Disclosure Agreements (NDAs) Documented evidence of the use of Non-Disclosure Agreements (NDAs) that restricts unauthorized sharing of sensitive/regulated data. HRS-06.1
103 E-HRS-21 Human Resources Position Competency Requirements Documented evidence of personnel management practices to define minimum competency requirements for cybersecurity & privacy-related roles. HRS-03.2
HRS-04
HRS-04.1
104 E-HRS-22 Human Resources Rules of Behavior Documented evidence of personnel management practices to define "acceptable use" or "rules of behavior" criteria that specify acceptable and unacceptable user behaviors.  HRS-02
HRS-02.1
HRS-03
HRS-05
HRS-05.1
HRS-05.2
HRS-05.3
HRS-05.4
HRS-05.5
HRS-10
105 E-HRS-23 Human Resources Critical Cybersecurity & Privacy Skills Documented evidence of personnel management practices to formally identify critical cybersecurity skills needed to support business operations. HRS-03.2
HRS-13
106 E-HRS-24 Human Resources Critical Cybersecurity & Privacy Skill Gaps Documented evidence of personnel management practices to formally identify critical cybersecurity skill gaps. HRS-13
HRS-13.1
107 E-HRS-25 Human Resources Separation of Duties (SoD) Documented evidence of personnel management practices to implement and maintain Separation of Duties (SoD) to prevent potential inappropriate activity without collusion. HRS-11
HRS-12
108 E-HRS-26 Human Resources Vital Cybersecurity & Privacy Staff Documented evidence of personnel management practices to formally identify vital cybersecurity & privacy personnel. HRS-13.2
109 E-IAM-01 Identity & Access Management Access Permission Review Documented evidence of periodic access permission reviews. IAC-17
110 E-IAM-02 Identity & Access Management Defined Roles (RBAC) Documented evidence of defined access control-specific roles (e.g., Role Based Access Control (RBAC)). IAC-08
111 E-IAM-03 Identity & Access Management Privileged User Inventory Documented evidence of an inventory of privileged users across systems, applications and services (internal and external). IAC-16
IAC-16.1
112 E-IRO-01 Incident Response Incident Response Program (IRP) Documented evidence of a Incident Response Plan (IRP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. IRO-04
113 E-IRO-02 Incident Response Indicators of Compromise (IOC) Documented evidence of defined Indicators of Compromise (IOC). IRO-03
114 E-IRO-03 Incident Response Incident Tracking Documented evidence of a centralized repository to track cybersecurity and privacy incidents. IRO-02
IRO-09
115 E-IRO-04 Incident Response IRP Testing Documented evidence of an Incident Response Plan (IRP)-related testing activity. IRO-06
116 E-IRO-05 Incident Response Table Top Exercises Documented evidence of "table top" exercises that test incident response practices. IRO-05
117 E-IRO-06 Incident Response IRP Training Documented evidence of an Incident Response Plan (IRP)-related training activity. IRO-05
118 E-IRO-07 Incident Response IRP Updates Documented evidence of a periodic review process for the organization's Incident Response Plan (IRP) to identify necessary updates. IRO-04.2
119 E-IRO-08 Incident Response Root Cause Analysis (RCA) Documented evidence of a Root Cause Analysis (RCA) from any Incident Response Plan (IRP)-related training, testing or incident. IRO-13
120 E-IAO-01 Information Assurance Information Assurance Program (IAP) Documented evidence of a Information Assurance Program (IAP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. IAO-01
121 E-IAO-02 Information Assurance Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV) Documented evidence of Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV) practices to enable AI-related testing, identification of incidents and information sharing. AAT-10
122 E-MNT-01 Maintenance Maintenance - Authorized Maintenance Personnel Documented evidence of personnel who have designated maintenance roles. MNT-06.1
123 E-MNT-02 Maintenance Maintenance Plan Documented evidence of a Maintenance Plan. This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. MNT-01
124 E-MNT-03 Maintenance Patch Management Documented evidence of maintenance activities for systems, applications and services management (e.g., patch management). VPM-01
VPM-04
VPM-05
125 E-MNT-04 Maintenance Infrastructure Maintenance Documented evidence of maintenance activities for the organization's infrastructure and supporting systems. MNT-01
MNT-02
MNT-03
MNT-03.1
126 E-NET-01 Network Security Content / DNS Filtering Documented evidence of the methods that content / DNS filtering is implemented to prevent Internet traffic from prohibited content and/or hostile web sites. NET-18
NET-18.1
127 E-NET-02 Network Security Wireless Rogue Detection Documented evidence of automated or manual means to detect rogue wireless devices. NET-15.5
128 E-NET-03 Network Security Work From Anywhere (WFA) Guidance (remote workers) Documented evidence of administrative and technical measures that are enforced at "alternate work sites" which includes working from home or working while traveling on business. NET-14
NET-14.5
129 E-PES-01 Physical Security Environmental Monitoring Documented evidence of environmental monitoring (e.g., water leaks, temperature, humidity, etc.) PES-01
PES-07
PES-08
PES-09
130 E-PES-02 Physical Security Visitor Logbook Documented evidence of a visitor management and logging visitor activities. PES-03
PES-03.3
PES-06
PES-06.4
131 E-PES-03 Physical Security  Defined Physical Security Roles Documented evidence of defined physical access control-specific roles that limit physical access to rooms and/or facilities. PES-02
PES-02.1
132 E-PES-04 Physical Security  Site Security Plan (Site Plan) Documented evidence of a site security plan (site plan). PES-01.1
133 E-PRI-01 Privacy Accounting of Disclosures Documented evidence of accounting for privacy-related disclosures. PRI-14.1
134 E-PRI-02 Privacy Authorized Use Documented evidence of authorized use definitions for privacy-related data operations. PRI-04
PRI-04.1
PRI-05
PRI-05.1
135 E-PRI-03 Privacy Data Authority Registrations Documented evidence of registrations made with applicable data authorities for privacy-related data processing. PRI-15
136 E-PRI-04 Privacy Data Protection Impact Assessment (DPIA) Documented evidence of Data Protection Impact Assessment (DPIA). RSK-10
137 E-PRI-05 Privacy Data Sharing Agreement Documented evidence of formal data sharing practices that address, at a minimum:
• The business justification for the data sharing;
• The type / category of data being shared;
• The third-parties the data is being shared with;
• Lawful bases for data sharing; and
• Data subject rights.
PRI-01.5
PRI-07
PRI-07.1
PRI-07.2
138 E-PRI-06 Privacy Data Subject Access Documented evidence of how data subject access requests are handled that includes intake through remediation. PRI-06
139 E-PRI-07 Privacy Personal Data Categories Documented evidence of formal personal data categories. PRI-05.7
140 E-PRI-08 Privacy Privacy Notice Documented evidence of a publicly-accessible privacy notice. PRI-02
141 E-PRM-01 Resource Management Cybersecurity Business Plan (CBP) Documented evidence of a cybersecurity-specific business plan that documents a strategic plan and discrete objectives. GOV-08
PRM-01.1
PRM-03
142 E-PRM-02 Resource Management Portfolio Roadmap Documented evidence of the organization's roadmap for implementing cybersecurity-related initiatives and technologies. PRM-01
PRM-02
PRM-03
143 E-PRM-03 Resource Management Secure Development Lifecycle (SDLC) Documented evidence of a secure development lifecycle that the organization utilizes for new initiatives or significant changes to existing initiatives to ensure cybersecurity and privacy principles are identified and implemented by default. PRM-04
PRM-05
PRM-06
PRM-07
144 E-PRM-04 Resource Management Targeted Maturity Level Documented evidence of a targeted level of control maturity from a Capability Maturity Model (CMM). PRM-01.2
145 E-RSK-01 Risk Management Risk Management Program (RMP) Documented evidence of a Risk Management Program (RMP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. RSK-01
146 E-RSK-02 Risk Management Cybersecurity Supply Chain Risk Management (C-SCRM) Documented evidence of a Cybersecurity Supply Chain Risk Management (C-SCRM). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. RSK-09
TPM-03
147 E-RSK-03 Risk Management Plan of Actions & Milestones (POA&M) / Risk Register Documented evidence of a POA&M, or risk register, that tracks control deficiencies from identification through remediation. AST-02.4
CPL-02
RSK-04.1
148 E-RSK-04 Risk Management Cybersecurity Risk Assessment (RA) Documented evidence of a cybersecurity-specific risk assessment. RSK-04
149 E-RSK-05 Risk Management Supply Chain Risk Assessment (SCRA) Documented evidence of supply chain-specific risk assessment that evaluates risks that are specific to its supply chain. RSK-09.1
150 E-RSK-06 Risk Management Risk Threshold Documented evidence the organization has a defined risk threshold. RSK-01.3
151 E-RSK-07 Risk Management Risk Tolerance Documented evidence the organization has a defined risk tolerance. RSK-01.4
152 E-TDA-01 Technology Design & Acquisition Secure Software Development Principles (SSDP) Documented evidence of a Secure Software Development Principles (SSDP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. SEA-01
TDA-01
153 E-TDA-02 Technology Design & Acquisition Security & Privacy by Design (SPBD) Documented evidence of a Security & Privacy by Design (SPBD). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. SEA-01
TDA-01
154 E-TDA-03 Technology Design & Acquisition Application Security Testing Documented evidence of application security testing (e.g., DAST, SAST, fuzzing, etc.). TDA-06.2
TDA-09
TDA-09.1
TDA-09.2
TDA-09.3
TDA-09.4
TDA-09.5
TDA-09.6
155 E-TDA-04 Technology Design & Acquisition Design and Development Plan (DDP) Documented evidence of an engineering method to control the design process and govern the lifecycle of the product/service. SEA-01
SEA-02
SEA-03
TDA-02.3
TDA-05
TDA-06.3
156 E-TDA-05 Technology Design & Acquisition Failure Mode and Effect Analysis (FMEA) Documented evidence of an engineering method designed to define, identify, and present solutions for system failures, problems, or errors. TDA-01.1
TDA-06.5
TDA-09
157 E-TDA-06 Technology Design & Acquisition Multi Patient Harm View (MPHV) Documented evidence of a description of a Multi Patient Harm View (MPHV) that explains how the device / system defends against and/or responds to attacks with the potential to harm multiple patients. [note MPHV is specific to medical device manufacturers] TDA-01.1
TDA-02
TDA-04
TDA-04.1
158 E-TDA-07 Technology Design & Acquisition Ports, Protocols & Services (PPS) Documented evidence of all ports, protocols and services in use by the system, application or service. TDA-01.1
TDA-02.1
TDA-02.5
TPM-04.2
159 E-TDA-08 Technology Design & Acquisition Secure Engineering Principles (SEP) Documented evidence of defined secure engineering principles used to ensure Confidentiality, Integrity, Availability & Safety (CIAS) concerns are properly addressed in the design and implementation of systems, applications and services. SEA-01
TDA-01
TDA-06
160 E-TDA-09 Technology Design & Acquisition Security Architecture View Documented evidence that identifies security-relevant system elements and their interfaces:
• Define security context, domains, boundaries, and external interfaces of the system;
• Align the architecture with (a) the system security objectives and requirements, (b) security design characteristics; and
• Establish traceability of architecture elements to user and system security requirements.
CLD-02
SEA-01
SEA-02
SEA-03
161 E-TDA-10 Technology Design & Acquisition Security Use Case View (SUCV) Documented evidence of diagrams, with explanatory text, describing various security scenarios in each of the operational and clinical functionality states of the system and how the system addresses each scenario architecturally. [note SUCV is specific to medical device manufacturers] TDA-04
TDA-04.1
TDA-06.2
162 E-TDA-11 Technology Design & Acquisition Software Assurance Maturity Model (SAMM) Documented evidence of a Software Assurance Maturity Model (SAMM). TDA-06
TDA-06.3
163 E-TDA-12 Technology Design & Acquisition Software Bill of Materials (SBOM) Documented evidence of a Software Bill of Materials (SBOM). TDA-04.2
164 E-TDA-13 Technology Design & Acquisition Software Escrow Documented evidence of a software escrow solution. TDA-20.3
165 E-TDA-14 Technology Design & Acquisition System Security & Privacy Plan (SSPP) Documented evidence of at least one (1) System Security Plan (SSPP) that covers the sensitive/regulated data environment. There may be multiple SSPPs, based on applicable contracts. AST-02.4
IAO-03
166 E-TDA-15 Technology Design & Acquisition Updateability / Patchability View Documented evidence of a description of the end-to-end process permitting software updates and patches to be deployed to the device/service. TDA-01.1
TDA-01.2
TDA-04.1
167 E-TDA-16 Technology Design & Acquisition Vulnerability Disclosure Program (VDP) Documented evidence of a Vulnerability Disclosure Program (VDP) (e.g., bug bounty). THR-06
168 E-THR-01 Threat Management Indicators of Exposure (IOE) Documented evidence of defined Indicators of Exposure (IOE). THR-02
169 E-THR-02 Threat Management Industry Associations / Memberships Documented evidence of industry associations the organization utilizes to maintain situational awareness of evolving threats and trends. GOV-07
170 E-THR-03 Threat Management Threat Intelligence Feeds (TIF) Documented evidence of threat intelligence feeds. THR-03
171 E-THR-04 Threat Management Threat Intelligence Program (TIP) Documented evidence of a formal capability that intakes and analysis threat information to determine specific threat to the organization and necessary actions to mitigate the threat(s). THR-01
THR-04
172 E-THR-05 Threat Management Threat Mitigation Documented evidence of steps taken to mitigate identified threats. TDA-06.2
THR-07
VPM-01
VPM-04
173 E-TPM-01 Third-Party Management Third-Party Contracts Documented evidence of third-party contractual obligations for cybersecurity and privacy protections. TPM-01
TPM-05
PRI-07
PRI-07.1
PRI-07.2
174 E-TPM-02 Third-Party Management Third-Party Criticality Assessment Documented evidence of third-party criticality assessment that evaluates the critical nature of each third-party the organization works with. TPM-02
175 E-TPM-03 Third-Party Management Third-Party Service Reviews Documented evidence of a formal, annual stakeholder review of third-party services for each Third-Party Service Provider (TSP). TPM-01
TPM-05
TPM-05.5
TPM-08
TPM-09
176 E-TPM-04 Third-Party Management Service Level Agreements (SLAs) Documented evidence of third-party Service Level Agreements (SLAs) to support business operations. BCD-09.3
BCD-10.1
OPS-03
177 E-TPM-05 Third-Party Management Break Clauses Documented evidence of "break clauses" in third-party contracts. TPM-05.7
178 E-VPM-01 Vulnerability & Patch Management Vulnerability & Patch Management Program (VPMP) Documented evidence of a Vulnerability & Patch Management Program (VPMP). This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on organizational practices that support existing policies and standards. VPM-01
179 E-VPM-02 Vulnerability Management Penetration Testing - Application Documented evidence of Application Security Testing (AST) activities:
• Abuse case, malformed, and unexpected inputs (e.g.,  Robustness or Fuzz testing);
• Attack surface analysis;
• Vulnerability chaining;
• Closed box testing of known vulnerability scanning;
• Software composition analysis of binary executable files; and/or
• Static and dynamic code analysis, including testing for credentials that are “hardcoded,” default, easily guessed, and easily compromised.
VPM-07
180 E-VPM-03 Vulnerability Management Penetration Testing - Network Documented evidence of internal and external network penetration testing activities that focus on discovering and exploiting security vulnerabilities. VPM-07
181 E-VPM-04 Vulnerability Management Red Team Testing Documented evidence of "red team" testing. VPM-07.1
182 E-VPM-05 Vulnerability Management Vulnerability Assessments Documented evidence of internal and external vulnerability assessment activities. VPM-06
VPM-06.6
VPM-06.7