PRM-06—Business Process Definition
Weight: 7
>Control Description
Mechanisms exist to define business processes with consideration for cybersecurity and data protection that determines:
(1) The resulting risk to organizational operations, assets, individuals and other organizations; and
(2) Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
>Cross-Framework Mappings
SOC 2 TSC
EU DORA
SOC 2 TSC (Detailed)
CC1.3
CompareCC3.1
CompareCC3.1-POF7
CompareCC3.1-POF8
CompareCC3.1-POF9
CompareCC3.1-POF10
CompareCC3.1-POF11
CompareCC3.1-POF12
CompareCC3.1-POF13
CompareCC3.1-POF14
CompareCC3.1-POF15
CompareCC3.1-POF16
CompareCC3.4
CompareCC4.1
CompareCC5.1
CompareCC5.2
CompareP6.7-POF1
ComparePI1.1
ComparePI1.1-POF1
ComparePI1.3-POF1
ComparePI1.3-POF2
ComparePI1.3-POF3
ComparePI1.3-POF4
ComparePI1.3-POF5
ComparePI1.4-POF1
ComparePI1.4-POF2
ComparePI1.4-POF3
ComparePI1.4-POF4
ComparePI1.5-POF1
ComparePI1.5-POF2
ComparePI1.5-POF3
ComparePI1.5-POF4
CompareFCA CRM
HIPAA Simplification 2013
Ask AI
Configure your API key to use AI features.