The Skill Set Needed To Implement The NIST Privacy Framework
The Skill Set Needed To Implement The NIST Privacy Framework
T
o offer insight into the professional skillset needed to implement the NIST
Privacy Framework, the International Association of Privacy Professionals’
Westin Research Center mapped the Privacy Framework’s Core to the Body
of Knowledge for a Certified Information Privacy Manager. This body of knowledge
was created by the IAPP’s certification advisory board to reflect the skillset and
knowledge required by a privacy professional working in the field. It is annually
updated, as required by IAPP’s ANSI accreditation, through a formal process to
determine what professionals in the field are currently doing, under what conditions,
and with what levels of knowledge and skill. The IAPP’s CIPM certification is then
updated to align with this body of knowledge. The CIPM Body of Knowledge was
updated June 1, 2020 and this document reflects the current version.
Awareness and
Training (GV.AT-P):
The organization’s
Domain I. Developing a Privacy Program
workforce and third
E. Communicate.
parties engaged in
a. Awareness.
data processing are
i. Create awareness of the organiza-
provided privacy
tion’s privacy program internally
awareness education
and externally.
and are trained to
ii. Develop internal and external
perform their pri-
communication plans to ingrain
vacy-related duties
organizational accountability.
and responsibilities
iii. Identify, catalog and maintain docu-
consistent with related
ments requiring updates as privacy
policies, processes,
requirements changesEducation
procedures, and
and awareness.
agreements and
organizational
privacy values.
d. Incident handling.
1. Understand key roles and
responsibilities.
2. Develop a communications plan
to notify executive management.
e. Follow incident response process to
ensure meeting jurisdictional, global
and business requirements.
1. Engage privacy team.
2. Review the facts.
3. Conduct analysis.
4. Determine actions (contain,
communicate, etc.).
5. Execute.
6. Monitor.
7. Review and apply
lessons learned.
f. Identify incident reduction techniques.
g. Incident metrics—quantify the cost of
a privacy incident.
Data Processing
Policies, Processes,
and Procedures
(CT.PO-P): Policies,
Control-P (CT-P):
processes, and proce-
Develop and imple-
dures are maintained
ment appropriate Domain I. Developing a Privacy Program
and used to manage
activities to enable C. Establish a privacy program.
data processing (e.g.,
organizations c. Develop a privacy strategy.
purpose, scope, roles
or individuals to iii. Develop a data governance strategy
and responsibilities in
manage data with for personal information (collection,
the data processing
sufficient granu- authorized use, access, destruction).
ecosystem, and
larity to manage
management commit-
privacy risks.
ment) consistent with
the organization’s risk
strategy to protect
individuals’ privacy.
Communication
Policies, Processes,
Communicate-P and Procedures
(CM-P): Develop (CM.PO-P): Policies, Domain I. Developing a Privacy Program
and implement processes, and proce- E. Communicate.
appropriate dures are maintained a. Awareness.
activities to enable and used to increase i. Create awareness of the organiza-
organizations transparency of the tion’s privacy program internally
and individuals organization’s data and externally.
to have a reliable processing practices ii. Develop internal and external
understanding and (e.g., purpose, communication plans to ingrain
engage in a dia- scope, roles and organizational accountability.
logue about how responsibilities in iii. Identify, catalog and maintain docu-
data are processed the data processing ments requiring updates as privacy
and associated ecosystem, and requirements changes.
privacy risks. management commit-
ment) and associated
privacy risks.
Identity Manage-
ment, Authentica-
Domain V. Privacy Operational Life
tion, and Access
Cycle: Protect
Control (PR.AC-P):
A. Information security practices.
Access to data and
a. Access controls for physical and
devices is limited to
virtual systems.
authorized individ-
i. Access control on need to know.
uals, processes, and
ii. Account management (e.g.,
devices, and is man-
provision process).
aged consistent with
iii. Privilege management.
the assessed risk of
unauthorized access.
Data Security
(PR.DS-P): Data are
managed consistent
with the organization’s Domain V. Privacy Operational Life
risk strategy to Cycle: Protect
protect individuals’ A. Information security practices.
privacy and maintain b. Technical security controls.
data confidentiality,
integrity, and
availability.
Maintenance
(PR.MA-P): System Domain V. Privacy Operational Life
maintenance and Cycle: Protect
repairs are performed A. Information security practices.
consistent with c. Implement appropriate
policies, processes, administrative safeguards.
and procedures.
i. Large organizations.
Governance Policies, Processes,
1. Chief privacy officer.
and Procedures (GV.PO-P): The
2. Privacy manager.
policies, processes, and procedures
3. Privacy analysts.
to manage and monitor the organiza-
4. Business line privacy leaders.
tion’s regulatory, legal, risk, environ-
5. “First responders.”
mental, and operational requirements
ii. Small organizations/sole data
are understood and inform the
protection officer (DPO) includ-
management of privacy risk.
ing when not only job.
b. Designate a point of contact for
privacy issues.
c. Establish/endorse the measurment
of professional competency.
subject inquiries.
3. Use.
4. Retention.
Monitoring and Review
5. Disclosure to third parties.
(GV.MT-P): The policies, processes,
6. Incidents (breaches,
and procedures for ongoing review
complaints, inquiries).
of the organization’s privacy posture
7. Employees trained.
are understood and inform the
8. PIA metrics.
management of privacy risk.
9. Privacy risk indicators.
10. Percent of company
functions represented by
governace mechanisms.
ii. Trending.
iii. Privacy program return
on investment (ROI).
iv. Business resiliency metrics.
v. Privacy program maturity level.
vi. Resource utilization.
d. Identify systems/application
collection points.
organization’s polices.
strategy to protect individuals’ privacy,
c. Define the methods for physical
increase manageability, and enable the
and electronic data destruction.
implementation of privacy principles
d. Define roles and responsibilities
(e.g., individual participation, data
for managing the sharing and
quality, data minimization).
disclosure of data for internal
and external use.
a. Legal compliance.
i. Preventing harm.
ii. Collection limitations.
iii. Accountability.
iv. Monitoring and enforcement. Governance Policies, Processes,
b. Incident response planning. and Procedures (GV.PO-P): The
i. Understand key roles policies, processes, and procedures
and responsibilities. to manage and monitor the organiza-
1. Identify key business tion’s regulatory, legal, risk, environ-
stakeholders. mental, and operational requirements
1. Information security. are understood and inform the
2. Legal. management of privacy risk.
3. Audit. Monitoring and Review
4. Human resources. (GV.MT-P): The policies, processes,
5. Marketing. and procedures for ongoing review of
B. Privacy incident response
d. Incident handling.
1. Understand key roles and
responsibilities.
2. Develop a communications
plan to notify executive
management.
e. Follow incident response process
to ensure meeting jurisdictional,
global and business requirements.
1. Engage privacy team.
2. Review the facts.
3. Conduct analysis.
4. Determine actions (contain,
communicate, etc.).
5. Execute.
6. Monitor.
7. Review and apply
lessons learned.
f. Identify incident reduction
techniques.
g. Incident metrics—quantify the
cost of a privacy incident.