Mapping cyber governance code to ISACA COBIT-19
Updated 16 April 2025
Introduction
This mapping document is for boards, directors and Chief Information Security Officers (or equivalent) and will help understand the Cyber Governance Code of Practice (the Code).
The mapping document illustrates where there are similarities and differences between the Code and the .聽It can be used by organisations to understand what actions of the Code they may already be implementing through adherence to the ISACA COBIT-19 framework.聽聽
The mapping document is illustrative and should only be used as a point of reference. It is not intended to be authoritative or be taken as legal advice on compliance with the framework mentioned.聽
If you have any comments or questions on the Cyber Governance mapping, please contact [email protected]
Principle A: Risk management聽
Action A1: Gain assurance that the technology processes, information and services critical to the organisation鈥檚 objectives have been identified, prioritised and agreed.聽
Alignment with ISACA COBIT-19: BAI09.02 Manage critical assets, DSS04.01 Define the business continuity policy, objectives and scope聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽
Action A2: Agree senior ownership of cyber security risks and gain assurance that they are integrated into the organisation鈥檚 wider enterprise risk management and internal controls.鈥�
Alignment with ISACA COBIT-19: EDM01 Ensured Governance Framework Setting and Maintenance, APO01.05 Establish roles and responsibilities聽
Action A3: Define and clearly communicate the organisation鈥檚 cyber security risk appetite and gain assurance that the organisation has an action plan to meet these risk expectations.聽聽聽
Alignment with ISACA COBIT-19: EDM03.01 Evaluate risk management, APO12.02 Analyse risk, APO13.02 Define and manage an information security and privacy risk treatment plan, BAI02.03 Manage requirements risk聽
Action A4: Gain assurance that supplier information is routinely assessed, proportionate to their level of risk and that the organisation is resilient to cyber security risks from its supply chain and business partners.聽聽聽
Alignment with ISACA COBIT-19: APO10.05 Monitor vendor performance and compliance聽
Action A5: Gain assurance that risk assessments are conducted regularly and that risk mitigations account for recent, or expected, changes in the organisation, technology, regulations or wider threat landscape.聽
Alignment with ISACA COBIT-19: APO01.11 Manage continual improvement of the I&T management system, MEA04.08 Report and follow up on the assurance initiative, MEA04.09 Follow up on recommendations and actions聽
Principle B: Strategy聽
Action B1: Gain assurance that the organisation has developed a cyber strategy and this is aligned with, and embedded within, the wider organisational strategy.聽
Alignment with ISACA COBIT-19: APO02.06 Communicate the I&T strategy and direction, APO02.05 Define the strategic plan and road map聽
Action B2: Gain assurance that the cyber strategy aligns with the agreed cyber risk appetite (Action A3), meets relevant regulatory obligations, and accounts for current or expected changes (Action A5).聽聽聽
Alignment with ISACA COBIT-19: EDM03.01 Evaluate risk management, EDM03.02 Direct risk management, APO12.02 Analyse risk, APO12.03 Maintain a risk profile, MEA03 Managed Compliance with External Requirements聽
Action B3: Gain assurance that resources are allocated effectively to manage the agreed cyber risks (Action A3 and A5).聽
Alignment with ISACA COBIT-19: APO06.02 Prioritise resource allocation, EDM04.02 Direct resource management聽
Action B4: Gain assurance that the cyber strategy is being delivered effectively and is achieving the intended outcomes.聽聽聽
Alignment with ISACA COBIT-19: EDM02.04 Monitor value optimisation聽
Principle C: People聽
Action C1: Promote a cyber security culture that encourages positive behaviours and accountability across all levels. This should be aligned with the organisation鈥檚 strategy (Action B1).聽
Alignment with ISACA COBIT-19: APO01.01 Design the management system for enterprise I&T, APO01.02 Communicate management objectives, direction and decisions made聽
Action C2: Gain assurance that there are clear policies that support a positive cyber security culture.聽
Alignment with ISACA COBIT-19: No comparison聽
Action C3: Undertake training to improve your own cyber literacy and take responsibility for the security of the data and digital assets that you use.聽聽聽
Alignment with ISACA COBIT-19: No comparison聽
Action C4: Gain assurance using suitable metrics that the organisation has an effective cyber security training, education and awareness programme.聽
Alignment with ISACA COBIT-19: APO07.03 Maintain the skills and competencies of personnel, DSS04.06 Conduct continuity plan training聽
Principle D: Incident, planning response and recovery聽
Action D1: Gain assurance that the organisation has a plan to respond to and recover from a cyber incident impacting business critical technology processes, information and services.聽
Alignment with ISACA COBIT-19: No comparison聽
Action D2: Gain assurance that there is at least annual exercising of the plan involving relevant internal and external stakeholders and that lessons from the exercise are reflected in the incident plan (Action D1) and risk assessments (Action A5).聽
Alignment with ISACA COBIT-19: DSS04.04 Exercise, test and review the business continuity plan (BCP) and disaster response plan (DRP)聽
Action D3: In the event of an incident, take responsibility for individual regulatory obligations, such as reporting, and support the organisation in critical decision making and external communications.聽
Alignment with ISACA COBIT-19: DSS02 - Managed Service Requests and Incidents聽
Action D4: Gain assurance that a post incident review process is in place to incorporate lessons learned into future risk assessments (Action A5), response and recovery plans (Action D1) and exercising (Action D2).聽
Alignment with ISACA COBIT-19: DSS04.08 Conduct post-resumption review聽
Principle E: Assurance and oversight聽
Action E1: Establish a cyber governance structure which is embedded within the wider governance structure of the organisation. This should include clear definition of roles and responsibilities, including ownership of cyber at executive and non-executive director level.聽聽聽
Alignment with ISACA COBIT-19: EDM01.02 Direct the governance system, APO01.04 Define and implement the organizational structures聽
Action E2: Require formal reporting on at least a quarterly basis, set suitable metrics to track, and agree tolerances for each. These should be aligned to the cyber strategy (Action B1) and based on the agreed cyber risk appetite (Action A3).聽
Alignment with ISACA COBIT-19: MEA01 - Managed Performance and Conformance Monitoring聽
Action E3: Establish regular two-way dialogue with relevant senior executives, including but not limited to, the chief information security officer (or equivalent).聽聽聽
Alignment with ISACA COBIT-19: EDM05 - Ensured Stakeholder Engagement聽
Action E4: Gain assurance that cyber security considerations (including the actions in this code) are integrated and consistent with existing internal and external audit and assurance mechanisms.聽
Alignment with ISACA COBIT-19: MEA04 - Managed Assurance聽
Action E5: Gain assurance that senior executives are aware of relevant regulatory obligations, as well as best practice contained within other Codes of Practice.聽
Alignment with ISACA COBIT-19: MEA03 - Managed Compliance with External Requirements