Skip to main content
← All controls
ID.GV-2 / A.6.1.1 / CIS-1.1 NIST Cybersecurity Framework v1.1

Is there one person clearly responsible for "cyber" in your business (even if it’s not their full job)?

Demonstrate that the organization has formally designated one accountable individual for cybersecurity oversight with documented responsibilities and authority.

Description

What this control does

This control establishes a single named individual with defined accountability for cybersecurity governance, risk, and compliance activities within the organization, regardless of whether cybersecurity is their sole responsibility. The designated person serves as the primary point of contact for cyber incidents, risk decisions, policy oversight, and coordination with technical teams or third parties. This ensures clear ownership and prevents cybersecurity from becoming an unowned, diffused responsibility that falls through organizational cracks.

Control objective

What auditing this proves

Demonstrate that the organization has formally designated one accountable individual for cybersecurity oversight with documented responsibilities and authority.

Associated risks

Risks this control addresses

  • Cybersecurity incidents are not escalated or responded to promptly because no single person owns the issue, leading to prolonged attacker dwell time
  • Security policies and controls are inconsistently applied across departments due to lack of centralized coordination and decision authority
  • Regulatory compliance gaps emerge because no individual is tracking obligations or coordinating audit responses
  • Budget and resource allocation for security tools and training is deprioritized when no advocate has clear accountability
  • Vendor security assessments and third-party risk management are neglected without a designated owner to manage the process
  • Security awareness training and incident response planning lack continuity and organizational commitment without executive sponsorship
  • Conflicting security decisions are made by different business units, creating exploitable inconsistencies in the security posture

Testing procedure

How an auditor verifies this control

  1. Request the current organizational chart, role descriptions, and any governance documentation identifying cybersecurity responsibilities
  2. Identify the individual formally designated as responsible for cybersecurity through appointment letters, job descriptions, or board/executive minutes
  3. Interview the designated individual to confirm their understanding of scope, authority, reporting lines, and specific cybersecurity duties
  4. Review evidence of the designated person's active involvement in cybersecurity activities within the past 90 days, such as meeting minutes, incident escalations, policy approvals, or risk assessments
  5. Verify that executive leadership and key department heads are aware of who holds cybersecurity accountability by reviewing communication records or conducting brief confirmatory interviews
  6. Examine whether the designated person has access to necessary resources, including budget authority or ability to escalate to decision-makers, by reviewing authorization matrices or procurement records
  7. Validate that the designation is documented in accessible governance materials such as policies, intranet pages, or incident response plans that reference the role by name or title
  8. Confirm the designation is current and has been reviewed within the past 12 months as part of organizational role reviews or governance updates
Evidence required Auditor collects organizational charts with cybersecurity role highlighted, appointment letters or email confirmations designating the responsible individual, and job descriptions or role charters outlining cybersecurity duties. Additional evidence includes meeting minutes or emails demonstrating active cybersecurity decision-making by the designated person, incident logs showing their involvement in escalations, and policy documents or intranet pages publicly identifying them as the cybersecurity point of contact.
Pass criteria A single named individual is formally documented as accountable for cybersecurity, their responsibilities are defined in writing, and evidence shows active履行 of those duties within the audit period with organizational awareness of their role.