NIST 800-53 REV 5 • CONFIGURATION MANAGEMENT

CM-13Data Action Mapping

Develop and document a map of system data actions.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

Supplemental Guidance

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generation, transformation, use, disclosure, retention, and disposal. A map of system data actions includes discrete data actions, elements of personally identifiable information being processed in the data actions, system components involved in the data actions, and the owners or operators of the system components. Understanding what personally identifiable information is being processed (e.g., the sensitivity of the personally identifiable information), how personally identifiable information is being processed (e.g., if the data action is visible to the individual or is processed in another part of the system), and by whom (e.g., individuals may have different privacy perceptions based on the entity that is processing the personally identifiable information) provides a number of contextual factors that are important to assessing the degree of privacy risk created by the system. Data maps can be illustrated in different ways, and the level of detail may vary based on the mission and business needs of the organization. The data map may be an overlay of any system design artifact that the organization is using. The development of this map may necessitate coordination between the privacy and security programs regarding the covered data actions and the components that are identified as part of the system.

Practitioner Notes

Data action mapping requires you to document how personal information moves through your system — what data actions are performed (collection, storage, sharing, deletion) and by which components.

Example 1: Create a data flow diagram in Visio or Lucidchart showing how customer PII flows from your web form to your database to your CRM to your email system.

Example 2: Use Microsoft Purview Compliance Manager to map data processing activities against privacy requirements and identify gaps in your data handling procedures.