Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

2.1.2. Security Governance Principles and Frameworks

💡 First Principle: Security governance answers the question "who is accountable for what security outcomes?" without which every security decision becomes either arbitrary or paralyzed by competing authority. Governance doesn't tell you how to be secure — it tells you who decides and how they're held accountable.

Security governance sits above security management. Management is the day-to-day execution of security activities. Governance is the structures, processes, and relationships through which the organization directs and controls its security posture at the board and executive level.

Key governance roles:
RoleAccountabilityDoes NOT Do
Board of DirectorsSets risk appetite; ensures security is part of corporate strategyDay-to-day security management
CEO / Executive TeamEnsures resources are allocated; owns enterprise riskTechnical security decisions
CISOTranslates business risk into security strategy; reports to board/C-suiteNetwork administration, patch deployment
Data OwnerBusiness unit manager accountable for specific data's classification and usePhysically managing storage systems
Data CustodianIT staff who implement controls the data owner requiresSetting classification policies
Data UserEmployees accessing data for their job functionModifying classification or controls

Major security frameworks — these appear frequently on the exam as selection scenarios (which framework best fits this organization?):

FrameworkBest ForWhat It Provides
ISO 27001/27002Organizations wanting internationally recognized certificationISMS certification, controls catalog (27002), audit-ready structure
NIST CSFOrganizations wanting flexible, risk-based frameworkFive functions: Identify, Protect, Detect, Respond, Recover
NIST 800-53US federal agencies and contractorsComprehensive control catalog, impact-based baselines
COBITOrganizations aligning IT to business governanceIT governance, process maturity, board-level accountability
SABSAEnterprise security architectsBusiness-driven, risk-based security architecture methodology
PCI DSSOrganizations processing payment cardsPrescriptive technical and procedural requirements
FedRAMPCloud providers serving US federal governmentCloud security authorization baseline

💡 Key Point: The exam uses "due care" and "due diligence" with surgical precision. Due diligence is the investigation and assessment conducted before making a decision (research, audits, vendor assessments). Due care is the ongoing responsible action after a decision to maintain an appropriate level of protection. You exercise due diligence when evaluating a vendor; you exercise due care when monitoring them afterward.

⚠️ Exam Trap: "Senior management is ultimately responsible for security." This is true — and it means management cannot fully delegate security accountability to the security team. The CISO is responsible for the security program; senior management is responsible for the security outcomes of the organization. When a major breach occurs, executives — not just the CISO — bear accountability.

Reflection Question: A company is evaluating two security frameworks: ISO 27001 (requires third-party certification audit) and NIST CSF (self-assessment, no certification). They serve enterprise customers in the EU and US. Which is more appropriate, and why? What governance question does this answer raise?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications