| PM-1 | Information Security Program Plan | a. Develop and disseminate an organization-wide information security program plan that: 1. Provides an overview of the r... |
| PM-10 | Authorization Process | a. Manage the security and privacy state of organizational systems and the environments in which those systems operate t... |
| PM-11 | Mission and Business Process Definition | a. Define organizational mission and business processes with consideration for information security and privacy and the... |
| PM-12 | Insider Threat Program | Implement an insider threat program that includes a cross-discipline insider threat incident handling team. |
| PM-13 | Security and Privacy Workforce | Establish a security and privacy workforce development and improvement program. |
| PM-14 | Testing, Training, and Monitoring | a. Implement a process for ensuring that organizational plans for conducting security and privacy testing, training, and... |
| PM-15 | Security and Privacy Groups and Associations | Establish and institutionalize contact with selected groups and associations within the security and privacy communities... |
| PM-16 | Threat Awareness Program | Implement a threat awareness program that includes a cross-organization information-sharing capability for threat intell... |
| PM-17 | Protecting Controlled Unclassified Information on External Systems | a. Establish policy and procedures to ensure that requirements for the protection of controlled unclassified information... |
| PM-18 | Privacy Program Plan | a. Develop and disseminate an organization-wide privacy program plan that provides an overview of the agency’s privacy p... |
| PM-19 | Privacy Program Leadership Role | Appoint a senior agency official for privacy with the authority, mission, accountability, and resources to coordinate, d... |
| PM-2 | Information Security Program Leadership Role | Appoint a senior agency information security officer with the mission and resources to coordinate, develop, implement, a... |
| PM-20 | Dissemination of Privacy Program Information | Maintain a central resource webpage on the organization’s principal public website that serves as a central source of in... |
| PM-21 | Accounting of Disclosures | a. Develop and maintain an accurate accounting of disclosures of personally identifiable information, including: 1. Date... |
| PM-22 | Personally Identifiable Information Quality Management | Develop and document organization-wide policies and procedures for: a. Reviewing for the accuracy, relevance, timeliness... |
| PM-23 | Data Governance Body | Establish a Data Governance Body consisting of [Assignment: organization-defined roles] with [Assignment: organization-d... |
| PM-24 | Data Integrity Board | Establish a Data Integrity Board to: a. Review proposals to conduct or participate in a matching program; and b. Conduct... |
| PM-25 | Minimization of Personally Identifiable Information Used in Testing, Training, and Research | a. Develop, document, and implement policies and procedures that address the use of personally identifiable information... |
| PM-26 | Complaint Management | Implement a process for receiving and responding to complaints, concerns, or questions from individuals about the organi... |
| PM-27 | Privacy Reporting | a. Develop [Assignment: organization-defined privacy reports] and disseminate to: 1. [Assignment: organization-defined o... |
| PM-28 | Risk Framing | a. Identify and document: 1. Assumptions affecting risk assessments, risk responses, and risk monitoring; 2. Constraints... |
| PM-29 | Risk Management Program Leadership Roles | a. Appoint a Senior Accountable Official for Risk Management to align organizational information security and privacy ma... |
| PM-3 | Information Security and Privacy Resources | a. Include the resources needed to implement the information security and privacy programs in capital planning and inves... |
| PM-30 | Supply Chain Risk Management Strategy | a. Develop an organization-wide strategy for managing supply chain risks associated with the development, acquisition, m... |
| PM-31 | Continuous Monitoring Strategy | Develop an organization-wide continuous monitoring strategy and implement continuous monitoring programs that include: a... |
| PM-32 | Purposing | Analyze [Assignment: organization-defined systems or systems components] supporting mission essential services or functi... |
| PM-4 | Plan of Action and Milestones Process | a. Implement a process to ensure that plans of action and milestones for the information security, privacy, and supply c... |
| PM-5 | System Inventory | Develop and update [Assignment: organization-defined frequency] an inventory of organizational systems. |
| PM-6 | Measures of Performance | Develop, monitor, and report on the results of information security and privacy measures of performance. |
| PM-7 | Enterprise Architecture | Develop and maintain an enterprise architecture with consideration for information security, privacy, and the resulting... |
| PM-8 | Critical Infrastructure Plan | Address information security and privacy issues in the development, documentation, and updating of a critical infrastruc... |
| PM-9 | Risk Management Strategy | a. Develops a comprehensive strategy to manage: 1. Security risk to organizational operations and assets, individuals, o... |