Domain 5: Security Program Management and Oversight Module 38 of 61

Security Governance and Policy Frameworks

Security+ Domain 5 — Security Program Management and Oversight A — Governance and Risk 12–15 minutes

What the Exam Is Really Testing

Governance is where security starts — before the first firewall rule is written, before the first user account is provisioned. Without governance, technical controls have no authority behind them and no direction guiding them.

Governance provides the framework that ensures security decisions align with business objectives — before any technical control is deployed.

The exam will describe organizational scenarios where policies are absent, roles are unclear, or frameworks are misapplied. Your job is to identify the correct governance document, the appropriate role, or the right framework for the situation. Everything else in Domain 5 builds on these concepts.


The Policy Hierarchy

Security governance operates through a document hierarchy. Each level serves a distinct purpose, and the exam tests whether you can distinguish between them.

Policies are high-level statements of management intent. They define what the organization requires and why. Policies are mandatory, approved by senior leadership, and rarely change. They do not specify how to accomplish anything.

Examples include:

  • Acceptable use policy (AUP) — defines permitted and prohibited use of organizational assets
  • Information security policy — establishes the organization's commitment to protecting information assets
  • Business continuity policy — mandates continuity planning across the enterprise
  • Disaster recovery policy — requires recovery capabilities for critical systems
  • Incident response policy — establishes requirements for detecting, reporting, and responding to security events

Standards are mandatory requirements that support policies. They define specific requirements that must be met. Where a policy says "protect sensitive data," a standard says "encrypt sensitive data using AES-256."

Procedures are step-by-step instructions for performing specific tasks. They describe exactly how to accomplish what standards require. A procedure tells you which buttons to click, which commands to run, and in what order.

Guidelines are recommendations and best practices. They are not mandatory. Guidelines suggest approaches but allow flexibility based on circumstances.

The hierarchy flows from abstract to specific:

Policy → Standard → Procedure → Guideline

Policies are mandatory and broad. Standards are mandatory and specific. Procedures are mandatory and detailed. Guidelines are optional and advisory.


Governance Roles

The exam tests your understanding of who is responsible for what in security governance. Confusing these roles is one of the most common mistakes.

CISO (Chief Information Security Officer) leads the security program. The CISO reports to executive leadership, sets security strategy, and is ultimately accountable for the organization's security posture. The CISO does not configure firewalls — the CISO ensures the right people, processes, and technologies are in place.

Security committee or steering committee is a cross-functional group that provides governance oversight. The committee includes representatives from business units, IT, legal, compliance, and executive leadership. It ensures security decisions consider business impact across the entire organization.

Data owner is typically a senior business leader who has ultimate responsibility for a specific data set. The data owner classifies data, determines who should have access, and approves access requests. The data owner is not a technical role.

Data custodian is the technical role responsible for implementing the protections the data owner requires. The custodian manages backups, enforces access controls, and maintains the systems that store data. Think of the custodian as the person who implements what the owner decides.

Data controller determines the purposes and means of processing personal data. This role originates from privacy regulations like GDPR. The controller decides why and how personal data is processed.

Data processor processes data on behalf of the controller. A cloud provider storing your customer data is a processor. The processor follows the controller's instructions but does not determine the purpose of processing.

The exam frequently tests the distinction between owner and custodian, and between controller and processor.


External Frameworks and Regulations

Organizations do not operate in a vacuum. External requirements shape governance decisions, and the exam expects you to recognize which frameworks apply in different scenarios.

PCI DSS (Payment Card Industry Data Security Standard) applies to any organization that stores, processes, or transmits payment card data. It prescribes specific technical and operational controls for protecting cardholder data.

SOX (Sarbanes-Oxley Act) applies to publicly traded companies and requires internal controls over financial reporting. IT security is relevant because financial data depends on system integrity.

HIPAA (Health Insurance Portability and Accountability Act) applies to healthcare organizations and their business associates. It requires protections for protected health information (PHI) including administrative, physical, and technical safeguards.

GDPR (General Data Protection Regulation) applies to organizations that process personal data of EU residents, regardless of where the organization is located. It establishes data subject rights, consent requirements, and breach notification obligations.

These are not interchangeable. The exam will describe an industry or data type and expect you to identify the applicable regulation.


Board and Committee Involvement

Security governance is not solely an IT function. The exam tests whether you understand that effective governance requires executive and board-level involvement.

Boards of directors have fiduciary responsibility for organizational risk, including cybersecurity risk. Board involvement means:

  • Reviewing security posture reports regularly
  • Approving the risk appetite statement
  • Ensuring adequate funding for security programs
  • Holding executive leadership accountable for security outcomes

Security committees bridge the gap between technical teams and business leadership. They translate technical risks into business terms and ensure security investments align with organizational priorities.

When the exam asks about governance effectiveness, the answer almost always involves leadership engagement — not technical improvement.


Pattern Recognition

When you see governance questions, look for these patterns:

  • If the question asks about "what" must be done → policy
  • If the question asks about specific requirements → standard
  • If the question asks about "how" to do something step by step → procedure
  • If the question mentions optional or recommended → guideline
  • If the question asks who decides data classification → data owner
  • If the question asks who implements protections → data custodian
  • If the question mentions determining purpose of processing → data controller
  • If the question mentions processing on behalf of another → data processor

Trap Patterns

The exam will try to mislead you with these common traps:

  • Confusing policies with procedures. A policy never contains step-by-step instructions. If the answer describes specific technical steps, it is a procedure, not a policy.
  • Confusing data owner with data custodian. The owner is a business leader who classifies and authorizes access. The custodian is a technical implementer. The owner decides; the custodian executes.
  • Thinking standards are optional. Standards are mandatory. Guidelines are optional. Do not mix these up.
  • Assuming the CISO handles everything. Governance is distributed. The CISO leads the program but does not own the data, approve all access, or configure all controls.

Scenario Practice


Question 1

A hospital needs to ensure patient records are protected according to federal requirements. The IT department is unsure which regulations apply.

Which regulation is MOST applicable?

A. PCI DSS
B. SOX
C. HIPAA
D. GDPR

Answer & reasoning

Correct: C

HIPAA specifically governs the protection of protected health information (PHI) in healthcare organizations. PCI DSS covers payment cards, SOX covers financial reporting for public companies, and GDPR covers EU resident data privacy.


Question 2

An organization's information security document states: "All sensitive data must be encrypted at rest and in transit using AES-256 or equivalent." This document also specifies minimum key lengths and approved cipher suites.

What type of document is this?

A. Policy
B. Standard
C. Procedure
D. Guideline

Answer & reasoning

Correct: B

This document specifies mandatory requirements with technical detail (AES-256, key lengths, cipher suites). It is too specific to be a policy but does not contain step-by-step instructions like a procedure. Standards define the specific mandatory requirements that support policies.


Question 3

A new privacy regulation requires the organization to determine whether its cloud provider is handling customer data appropriately. The VP of Marketing originally collected the customer data for campaign purposes.

Who is the data controller in this scenario?

A. The cloud provider
B. The IT security team
C. The organization that collected the data
D. The end customers

Answer & reasoning

Correct: C

The data controller determines the purposes and means of processing personal data. The organization collected the data for marketing purposes — it decided why and how the data would be processed. The cloud provider is the data processor, acting on the controller's instructions.


Key Takeaway

Governance questions on the exam always come down to authority and structure. Match the document type to the level of detail described — policies are broad and mandatory, standards are specific and mandatory, procedures are step-by-step, and guidelines are optional. Know which role has authority for the decision in question: owners classify data, custodians implement protections, controllers determine purpose, processors follow instructions.

If you can sort the document hierarchy and the role distinctions without hesitating, you will handle governance questions with confidence. Everything else in the security program flows from this foundation.

Next Module Module 39: Risk Identification and Assessment