π Policy Implementation Tracking Model¶
The Core Distinction¶
GetCimple makes a critical distinction that most governance platforms miss:
A policy is a governance standard (what you SHALL do), not a statement of current reality (what you currently ARE doing).
This separation between policy and implementation is fundamental to honest, effective governance.
The Problem This Solves¶
Traditional Approach (Broken)¶
Most compliance tools treat policies as binary:
- β Policy exists β You're compliant
- β Policy doesn't exist β You're non-compliant
This creates a dangerous illusion where having a policy document means you're "doing" what it says.
GetCimple's Approach (Honest)¶
We separate three distinct states:
- Policy Status: Is the policy approved as your governance standard?
- Implementation Status: Are you actually doing what the policy requires?
- Gap Status: What's the difference between what you said you'd do and what you're actually doing?
Real-World Example: SDLC Policy¶
Scenario: Software Development Company¶
A company develops custom web and mobile applications. They adopt the Secure Software Development Lifecycle (SDLC) Policy during onboarding.
During Assessment, They Reveal:¶
β Implemented (20% of requirements):
- Using Git for version control
- Some code review happening
- Basic deployment process
β οΈ Partially Implemented (30% of requirements):
- Have dev and prod environments (but staging is mixed with dev)
- Some input validation (but inconsistent)
- API authentication on some APIs (but not all)
β Not Implemented (50% of requirements):
- No SAST/DAST/SCA testing
- No vulnerability disclosure program
- No Software Bill of Materials (SBOM)
- No threat modeling
- No security training for developers
- No formal secure coding standards
- No secrets scanning
What Happens Next?¶
1. Policy Status: APPROVED β ¶
The board approves the SDLC policy as the company's security standard for software development.
This means: "We commit that this is what we SHOULD be doing."
2. Implementation Status: 23% COMPLIANT β οΈ¶
The system calculates actual compliance:
- Implemented controls: 20%
- Partially implemented: 30% Γ 0.1 weighting = 3%
- Total: 23% compliant
This means: "This is what we're ACTUALLY doing today."
3. Gap Analysis Generated π¶
Critical Gaps (5 items):
- No SAST/DAST/SCA testing (ISM-0402) - High Risk
- No vulnerability disclosure program (ISM-1616) - High Risk
- No SBOM generation (ISM-1730) - Medium Risk
- No threat modeling (ISM-1238) - Medium Risk
- No secrets scanning (ISM-2030) - High Risk
Medium Priority Gaps (8 items):
- Incomplete environment segregation
- Inconsistent input validation
- Partial API authentication
- etc.
4. Remediation Roadmap Created π―¶
Each gap gets:
- Owner: CTO, Security Lead, Dev Lead
- Target Date: Based on priority and resources
- Priority: Critical, High, Medium, Low
- Resources Required: Tools, training, time
Example Roadmap:
- Q1 2025: Implement SAST/DAST/SCA tools (Owner: CTO, Budget: $15K)
- Q2 2025: Launch vulnerability disclosure program (Owner: Security Lead)
- Q2 2025: Implement SBOM generation (Owner: Dev Lead)
- Q3 2025: Formalize secure coding standards (Owner: Dev Lead)
- Q4 2025: Complete environment segregation (Owner: CTO)
5. Board Approval Package π¶
The board approves THREE things:
- β The Policy: "This is our security standard"
- β The Gap Analysis: "We acknowledge we're only 23% compliant"
- β The Remediation Plan: "Here's how we'll reach 80% by EOY"
How It Appears in GetCimple¶
Policy Dashboard¶
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Secure Software Development Lifecycle Policy β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Status: ACTIVE β
β
β Approval Date: 2025-01-15 β
β Approved By: Board of Directors β
β β
β Implementation: 23% β οΈ β
β Target: 80% by 2025-12-31 π― β
β β
β Controls Tracked: 52 β
β ββ Implemented: 10 (19%) β
β ββ In Progress: 16 (31%) β
β ββ Not Started: 24 (46%) β
β ββ Not Applicable: 2 (4%) β
β β
β Next Board Review: 2025-04-15 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Board Report (Quarterly)¶
SDLC POLICY COMPLIANCE REPORT - Q1 2025
Policy Status: Active β
Overall Implementation: 23% β οΈ
Target for Q2: 45% π―
On Track: Yes β
CRITICAL GAPS REQUIRING BOARD ATTENTION:
1. No SAST/DAST/SCA Testing
- Risk: High - Vulnerable code may reach production
- Owner: CTO
- Status: Tool evaluation in progress
- Target: 2025-03-31
- Budget: $15K approved
2. No Vulnerability Disclosure Program
- Risk: High - No mechanism for security researchers
- Owner: Security Lead
- Status: Policy draft under review
- Target: 2025-04-30
- Budget: No additional cost
PROGRESS SINCE LAST QUARTER:
β
Completed:
- Git version control standardized
- Code review process formalized
π‘ In Progress (8 items):
- SAST/DAST/SCA implementation (40% complete)
- Environment segregation (staging environment deployed)
- API authentication rollout (60% of APIs secured)
π Compliance Trend:
Q4 2024: 18%
Q1 2025: 23% (+5%)
Q2 2025: 45% (target)
Control-Level Detail View¶
POLICY: Secure Software Development Lifecycle
SECTION: 2.1 Software Artefact Security
Control: ISM-2026 - Scan artefacts for malicious code
ββ Status: NOT IMPLEMENTED β
ββ Risk: HIGH π΄
ββ Owner: CTO
ββ Target Date: 2025-03-31
ββ Evidence Required:
β ββ Screenshots of scanning tool
β ββ Sample scan reports
β ββ CI/CD pipeline configuration
ββ Remediation Notes:
ββ Evaluating Snyk vs. WhiteSource
ββ Budget approved: $15K
ββ Integration with GitHub Actions planned
Control: ISM-2027 - Verify artefacts by digital signature
ββ Status: NOT IMPLEMENTED β
ββ Risk: HIGH π΄
ββ Owner: DevOps Lead
ββ Target Date: 2025-04-15
ββ Dependencies: ISM-2026 must be completed first
Control: ISM-2023 - Authoritative source for software
ββ Status: IMPLEMENTED β
ββ Implementation Date: 2024-06-15
ββ Evidence:
β ββ GitHub Enterprise instance
β ββ Access control policies
β ββ Audit logs
ββ Review Date: 2025-06-15
The Three-State Model¶
1. Policy State (Governance)¶
Question: "What have we committed to do?"
Possible Values:
- Draft: Policy being developed
- Under Review: Policy awaiting board approval
- Approved: Board has approved as standard
- Active: Policy in force
- Superseded: Replaced by newer version
Board's Role: Approve or reject the policy as the organization's standard.
2. Implementation State (Reality)¶
Question: "What are we actually doing?"
Measured At: Control level (not policy level for complex policies)
Possible Values Per Control:
- Not Started: No implementation yet
- In Progress: Partially implemented
- Implemented: Fully implemented
- Not Applicable: Control doesn't apply to this organization
Management's Role: Update implementation status as work progresses, upload evidence.
3. Gap State (Action Required)¶
Question: "What's the difference between what we said and what we're doing?"
Calculated Automatically:
- Gap Size: Implementation percentage vs. target
- Risk Level: Based on ACSC ISM criticality ratings
- Priority: Critical, High, Medium, Low
- Timeline: Target completion dates
- Resources: Budget and people required
Everyone's Role:
- Board: Oversees gap closure progress
- Management: Executes remediation plan
- Implementation Team: Does the actual work
Why This Matters¶
For Directors¶
Honest Oversight: See the real picture, not a fantasy.
"We have a policy" β "We're compliant"
Directors can see:
- What standard has been set (the policy)
- What's actually happening (implementation status)
- What work is needed (the gap)
- Who's responsible and when (remediation plan)
- Progress over time (quarterly tracking)
Legal Protection: Demonstrates active oversight and good governance, even when gaps exist.
For Management¶
Clear Roadmap: Know exactly what to implement and when.
No more guessing:
- β Specific controls to implement
- β Clear priorities
- β Assigned owners
- β Target dates
- β Success criteria
Progress Visibility: Show the board you're making progress.
For Auditors¶
Transparency: Demonstrates mature governance.
Auditors see:
- Policies exist (governance framework)
- Gaps are identified (self-awareness)
- Plans exist to close gaps (commitment)
- Progress is tracked (accountability)
This is better than pretending everything is perfect.
Policy Types: Simple vs. Complex¶
Simple Policies¶
Characteristics:
- 10-15 requirements
- Usually high implementation rates
- Can report at policy level
Examples:
- Password Policy
- Acceptable Use Policy
- Social Media Policy
Reporting: "Password Policy: 90% compliant"
Complex Policies¶
Characteristics:
- 50+ requirements
- Often low initial implementation
- MUST report at control level
Examples:
- Secure Software Development Lifecycle Policy (52 controls)
- Infrastructure, Network and Cloud Security Policy
- Vulnerability Management Policy
Reporting: Requires detailed control-level tracking with remediation roadmap.
Common Scenarios¶
Scenario 1: New Policy, Low Implementation¶
Example: Adopting SDLC policy when no secure development practices exist.
Result:
- Policy: Active β
- Implementation: 15% β οΈ
- Gap: 85% π΄
Board Action: Approve aggressive remediation timeline with budget.
Scenario 2: Existing Practices, Formalizing Policy¶
Example: Company already does secure coding but never formalized it.
Result:
- Policy: Active β
- Implementation: 70% β
- Gap: 30% π‘
Board Action: Quick approval, focus on documenting existing practices.
Scenario 3: Progressive Implementation¶
Example: Taking 18 months to reach full compliance.
Progress:
- Q1: 23% β Q2: 45% β Q3: 62% β Q4: 80% β
Board Action: Quarterly reviews to track progress and adjust as needed.
Scenario 4: Risk Acceptance¶
Example: Some controls are too expensive or not applicable.
Result:
- Policy: Active β
- Implementation: 65% β
- Gap: 35% (20% accepted risk, 15% planned)
Board Action: Formally accept certain risks, commit to closing other gaps.
Data Model Overview¶
Policy
ββ policy_id: UUID
ββ policy_name: "Secure Software Development Lifecycle Policy"
ββ policy_status: "Active"
ββ approval_date: "2025-01-15"
ββ approval_authority: "Board of Directors"
ββ overall_compliance: 23% (calculated)
ββ target_compliance: 80%
ββ target_date: "2025-12-31"
ββ controls: Control[]
Control
ββ control_id: UUID
ββ control_reference: "ISM-2026"
ββ control_description: "Scan all artefacts for malicious code"
ββ control_requirement: "All software artefacts scanned before import"
ββ section: "2.1 Software Artefact Security"
ββ implementation_status: "Not Started" | "In Progress" | "Implemented" | "N/A"
ββ implementation_percentage: 0-100%
ββ risk_level: "Critical" | "High" | "Medium" | "Low"
ββ assigned_owner: "CTO"
ββ target_implementation_date: "2025-03-31"
ββ actual_implementation_date: null
ββ evidence_required: string[]
ββ evidence_uploaded: Evidence[]
ββ remediation_notes: "Evaluating Snyk vs. WhiteSource"
Evidence
ββ evidence_id: UUID
ββ control_id: UUID
ββ evidence_type: "Screenshot" | "Document" | "Configuration" | "Log"
ββ file_url: string
ββ uploaded_by: User
ββ upload_date: timestamp
ββ description: string
Integration with Essential Eight¶
Essential Eight already uses this model successfully:
- E8 Status: Maturity level (0, 1, 2, 3)
- Implementation: Current maturity vs. Target maturity
- Gap: Controls below target maturity
- Remediation: Roadmap to target maturity
GetCimple extends this proven approach to all policies.
Best Practices¶
For Onboarding¶
- Be Honest: Don't inflate implementation status
- Start Small: Pick achievable targets for first quarter
- Show Progress: Even 5% improvement matters
- Document Everything: Evidence is key
For Board Reporting¶
- Lead with Status: Policy active, implementation at X%
- Show Trend: Progress since last quarter
- Highlight Wins: Completed controls
- Focus on Gaps: What needs attention
- Clear Accountability: Who owns what
For Implementation Teams¶
- Update Regularly: Keep status current
- Upload Evidence: As soon as controls are implemented
- Flag Blockers: If stuck, escalate early
- Celebrate Progress: Mark controls complete
Key Takeaways¶
- Policies are standards, not statements of current reality
- Implementation is tracked separately at the control level
- Gaps are identified and managed with clear ownership
- Board approves three things: Policy + Gap Analysis + Remediation Plan
- Progress is tracked over time with quarterly board reviews
- Honesty is valued over the illusion of perfect compliance
Further Reading¶
- Policy Management (MVP) - How policies are managed in GetCimple
- Essential Eight Framework - Example of this model in action
- Key Concepts - Definitions and terminology
Questions? This model is fundamental to how GetCimple provides honest, effective governance. If you have questions about how it applies to your organization, reach out to support.