PM — Program Management
30 controls in the Program Management family
PM-2Information Security Program Leadership Role
PM-3Information Security And Privacy Resources
PM-4Plan Of Action And Milestones Process
PM-5System Inventory
PM-6Measures Of Performance
PM-7Enterprise Architecture
PM-8Critical Infrastructure Plan
PM-9Risk Management Strategy
PM-10Authorization Process
PM-11Mission And Business Process Definition
PM-12Insider Threat Program
PM-13Security And Privacy Workforce
PM-14Testing, Training, And Monitoring
PM-15Security And Privacy Groups And Associations
PM-16Threat Awareness Program
PM-17Protecting Controlled Unclassified Information On External Systems
PM-18Privacy Program Plan
PM-19Privacy Program Leadership Role
PM-20Dissemination Of Privacy Program Information
PM-21Accounting Of Disclosures
PM-22Personally Identifiable Information Quality Management
PM-23Data Governance Body
PM-25Minimization Of Personally Identifiable Information Used In Testing, Training, And Research
PM-26Complaint Management
PM-27Privacy Reporting
PM-28Risk Framing
PM-29Risk Management Program Leadership Roles
PM-30Supply Chain Risk Management Strategy
PM-31Continuous Monitoring Strategy
PM-32Purposing