7.1—Privacy in Enterprise Architecture
>Control Description
Incorporate data privacy requirements into enterprise architecture to ensure that risk is addressed so Technology Assets, Applications and/or Services (TAAS) achieve the necessary levels of trustworthiness, protection and resilience.
>Cross-Framework Mappings
SCF
CLD-01
CompareCLD-02
CompareGOV-15
CompareGOV-15.1
CompareGOV-15.2
CompareGOV-15.3
CompareGOV-15.4
CompareGOV-15.5
CompareCHG-02
CompareCHG-03
CompareIAC-01.2
CompareIAC-06
CompareIAC-08
CompareIAC-16
CompareIAC-21
CompareIAC-28.1
ComparePRI-01.6
CompareSEA-01
CompareSEA-02
CompareTDA-01.1
CompareTDA-02.3
CompareTDA-02.4
CompareTDA-02.6
CompareTDA-02.7
CompareTDA-02.8
CompareTDA-02.9
CompareTDA-02.10
CompareTDA-02.11
CompareTDA-06
CompareTDA-06.5
CompareTDA-22
CompareHRS-04
CompareAsk AI
Configure your API key to use AI features.