PM-11: Mission and Business Process Definition
PM-11 requires you to define your organization’s mission and business processes in a way that explicitly considers information security, privacy, and the resulting risk to operations, assets, individuals, other organizations, and the Nation (NIST SP 800-53 Rev. 5 OSCAL JSON). To operationalize it, publish a mission/process inventory, map it to systems and data, assign accountable owners, and keep evidence that security and privacy risks were considered and acted on.
Key takeaways:
- You need a documented, owned mission-and-process definition that connects directly to systems, data, and risk decisions (NIST SP 800-53 Rev. 5 OSCAL JSON).
- Auditors look for traceability: mission → processes → systems/data → security & privacy risk considerations → decisions and updates.
- The fastest path is a lightweight process taxonomy, a system/data mapping, and a repeatable change trigger tied to enterprise governance.
The pm-11: mission and business process definition requirement is easy to misread as an “enterprise architecture” exercise. In audits, it is treated as something simpler and more operational: can you show that your mission and core processes are defined, and that security and privacy risk considerations are baked into how those processes run and change (NIST SP 800-53 Rev. 5 OSCAL JSON)?
PM-11 lives in NIST SP 800-53’s Program Management (PM) family. That placement matters. Assessors typically expect leadership-level intent (what the organization does and how it does it), plus clear working artifacts your security and privacy program uses to scope controls, prioritize risk, and justify investments. If you handle federal information, operate a federal information system, or support those environments as a contractor, PM-11 becomes a practical prerequisite for clean boundaries, accurate system inventories, defensible risk assessments, and credible authorization packages (NIST SP 800-53 Rev. 5).
This page gives requirement-level implementation guidance you can execute quickly: who owns what, the minimum viable artifact set, step-by-step build instructions, evidence to retain, common audit hangups, and a practical execution plan. Where helpful, it also explains how tools like Daydream can keep PM-11 evidence current without turning it into a documentation treadmill.
Regulatory text
Requirement (excerpt): “Define organizational mission and business processes with consideration for information security and privacy and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; and” (NIST SP 800-53 Rev. 5 OSCAL JSON).
Operator interpretation (what you must do):
- Define and document your organization’s mission and the business processes that execute it.
- Show that security and privacy were explicitly considered in that definition, including the downstream risk to operations, assets, individuals, other organizations, and the Nation.
- Make it usable: your definition must connect to scoping decisions (systems, data, third parties, control applicability) and be kept current through governance (NIST SP 800-53 Rev. 5 OSCAL JSON).
Plain-English meaning
PM-11 asks: “What do you do, how do you do it, and how did you account for security and privacy risk in that operating model?” If your mission/process definition can’t be traced to systems and data flows, it won’t support risk decisions and will read like shelfware.
Who it applies to
PM-11 is relevant anywhere NIST SP 800-53 is the baseline, especially in these contexts (NIST SP 800-53 Rev. 5):
- Federal information systems (agency-owned or operated).
- Contractor systems handling federal data (including environments supporting federal programs).
Operationally, this touches:
- Enterprise governance (mission, strategic objectives, operating model).
- GRC/security and privacy teams (risk assessments, control scoping, SSP inputs).
- Business owners (process ownership, performance metrics, change decisions).
- IT/system owners and architects (system boundaries, interfaces, inventories).
- Third-party risk management teams (processes that depend on third parties and data sharing).
What you actually need to do (step-by-step)
Step 1: Name a control owner and define the “PM-11 product”
Assign a PM-11 owner (often the CISO/GRC lead with enterprise architecture or operations as a co-owner). Set a clear deliverable: a Mission & Business Process Definition pack that is approved, versioned, and mapped to your risk program (NIST SP 800-53 Rev. 5 OSCAL JSON).
Deliverable checklist:
- Mission statement (or authoritative reference).
- Business process taxonomy (top-level and key sub-processes).
- Process owners and critical dependencies (systems, data, third parties).
- Security and privacy risk considerations tied to processes.
Step 2: Build a business process taxonomy that matches how you run the business
Keep it pragmatic. Start with a single page list of core processes, then add detail where risk is highest.
Minimum fields (table works well):
- Process name
- Purpose (how it supports the mission)
- Executive/process owner
- Systems used (primary systems of record)
- Data categories handled (especially regulated/sensitive)
- Third parties involved (processors, platforms, managed services)
- Primary security and privacy considerations (short bullets)
- Upstream/downstream dependencies
This is the backbone that lets you prove you considered risk “to operations, assets, individuals, other organizations, and the Nation” in context (NIST SP 800-53 Rev. 5 OSCAL JSON).
Step 3: Map processes to systems, data flows, and trust boundaries
Audits often fail here. A process list alone does not show risk consideration.
Create a simple traceability map:
- Each critical process links to:
- system(s) that execute it,
- interfaces/APIs or data exchanges,
- data repositories,
- user communities/roles,
- third parties that touch the process.
Outputs you want:
- A process-to-system matrix (spreadsheet is fine).
- A data flow diagram for the most critical processes (a small set is better than none).
- A system boundary note that aligns with your SSP boundary decisions, where applicable (NIST SP 800-53 Rev. 5).
Step 4: Document how security and privacy risk were considered per process
PM-11 does not require a novel risk methodology; it requires proof of consideration and follow-through.
For each critical process, capture:
- Key threats/abuse cases relevant to the process.
- Privacy touchpoints (collection, use, sharing, retention, deletion).
- Impact narrative aligned to the requirement language (operations/assets/individuals/others/Nation) (NIST SP 800-53 Rev. 5 OSCAL JSON).
- Existing controls and known gaps.
- Decision log: accept/mitigate/transfer/avoid, with owner.
If you already have enterprise risk registers, connect them. If you have PIAs/threshold analyses, reference them. The point is traceable evidence, not duplicate paperwork.
Step 5: Operationalize updates with change triggers
Define explicit triggers that force a PM-11 refresh:
- New or materially changed business process
- New system or major system change
- New data type or new use of existing data
- New third party supporting a core process
- Material incident or audit finding that changes process risk
Tie these triggers to your existing governance: architecture review board, SDLC gates, procurement intake, third-party onboarding, and privacy review.
Step 6: Make it assessable: map PM-11 to owner, procedure, and recurring evidence
Assessors will ask: who owns it, what’s the procedure, what evidence is produced on a recurring basis (NIST SP 800-53 Rev. 5 OSCAL JSON).
A practical approach:
- One PM-11 procedure (how updates happen, approvals, review cadence).
- A recurring evidence list (what you can show every time).
Daydream can help here by turning PM-11 into a living requirement page with named owners, mapped systems/third parties, and a standard evidence checklist, so updates don’t depend on tribal knowledge.
Required evidence and artifacts to retain
Retain evidence that is both definitional (what the mission/processes are) and operational (how risk was considered and acted on):
Core artifacts:
- Approved mission and business process definition document (versioned).
- Process taxonomy and process owner assignments.
- Process-to-system and process-to-third-party mappings.
- Data flow diagrams or interface inventories for critical processes.
- Risk considerations per critical process (worksheet, risk register entries, or decision logs).
- Governance records: approvals, review notes, change tickets that triggered updates.
Assessment-ready extras (if you have them):
- Crosswalk from processes to system boundaries and SSP sections (NIST SP 800-53 Rev. 5).
- Privacy documentation references where applicable.
Common exam/audit questions and hangups
Expect these questions:
- “Show me your top business processes and who owns them.”
- “Which processes handle sensitive data, and how did you decide the control scope?”
- “How does a new third party or new SaaS tool trigger updates to your process definition?”
- “Where do I see privacy considerations tied to process design, not just a generic privacy policy?”
- “How do you know this is current?”
Common hangups:
- No traceability from process to system/data.
- Stale documentation with no change mechanism.
- Security-only view that ignores privacy considerations embedded in processes (NIST SP 800-53 Rev. 5 OSCAL JSON).
Frequent implementation mistakes (and how to avoid them)
Mistake 1: Writing an essay instead of building a usable inventory
Fix: Use tables and matrices. Make it easy to map to systems and evidence.
Mistake 2: Treating PM-11 as a one-time deliverable
Fix: Add change triggers and require updates as part of procurement, SDLC, and architecture review.
Mistake 3: Ignoring third parties in “business process” definitions
Fix: Add a required “third parties involved” column per process and link it to your third-party inventory and due diligence workflow.
Mistake 4: No documented consideration of privacy
Fix: Add a privacy section per process: data collected, purpose, sharing, retention, deletion, and user rights touchpoints (NIST SP 800-53 Rev. 5 OSCAL JSON).
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for PM-11. Practically, PM-11 failures usually show up as audit findings and authorization delays because weak mission/process definitions cascade into unclear system boundaries, incomplete inventories, and unsupported risk decisions (NIST SP 800-53 Rev. 5). The operational risk is direct: if you cannot articulate critical processes and dependencies, you cannot reliably prioritize controls, manage third-party exposure, or demonstrate that privacy and security were considered as part of how the business operates.
Practical 30/60/90-day execution plan
Use phases rather than calendar promises. Move fast, keep scope tight, and prove operability.
First 30 days (establish the baseline)
- Assign PM-11 owner and approving authority.
- Draft the top-level mission/process taxonomy.
- Identify the critical processes (the ones that would materially disrupt operations if degraded).
- Build the first process-to-system and process-to-third-party matrix.
- Define the PM-11 procedure and change triggers.
Next 60 days (add traceability and risk content)
- Document data categories and key data flows for critical processes.
- Add security and privacy risk considerations per critical process.
- Link risk decisions to your risk register and POA&M-style tracking where you use it.
- Socialize with process owners and get formal approvals.
Next 90 days (make it durable and audit-ready)
- Integrate triggers into procurement, SDLC, and third-party onboarding.
- Run a tabletop “change event” (new SaaS, new third party, new data use) and prove the PM-11 update path works.
- Package evidence for assessors: latest version, approvals, matrices, and sample change-trigger updates.
- If you use Daydream, configure PM-11 with a named owner, mapped artifacts, and recurring evidence tasks so the record stays current.
Frequently Asked Questions
Do I need a full enterprise process model to satisfy PM-11?
No. You need a defined set of mission-aligned processes that is detailed enough to map to systems, data, third parties, and risk decisions (NIST SP 800-53 Rev. 5 OSCAL JSON). Start with the critical processes and expand based on risk.
What’s the minimum evidence an auditor will accept?
An approved mission/process definition plus a process-to-system mapping and documented security and privacy considerations for critical processes (NIST SP 800-53 Rev. 5 OSCAL JSON). If your documentation cannot show how changes get captured, expect follow-up questions.
How do I tie PM-11 to third-party risk management?
Add third-party dependencies at the process level, then link each dependency to your third-party inventory and onboarding workflow. This creates a clean path from “this process changed” to “this third party must be assessed.”
Who should approve the PM-11 artifact?
Use the leader accountable for business operations (COO or equivalent) with security/privacy sign-off, because PM-11 is a program-level definition that affects scope and risk decisions (NIST SP 800-53 Rev. 5 OSCAL JSON).
We already have an SSP. Isn’t that enough?
An SSP describes a system and its controls; PM-11 explains the mission and business processes that the system supports and how risk was considered at the process level (NIST SP 800-53 Rev. 5). The SSP often depends on PM-11 outputs for boundary and scoping rationale.
How do I keep PM-11 current without creating busywork?
Use change triggers tied to real workflows: procurement intake, SDLC gates, architecture review, privacy review, and third-party onboarding. Tools like Daydream help by assigning ownership and standardizing recurring evidence so updates happen as part of normal governance.
Frequently Asked Questions
Do I need a full enterprise process model to satisfy PM-11?
No. You need a defined set of mission-aligned processes that is detailed enough to map to systems, data, third parties, and risk decisions (NIST SP 800-53 Rev. 5 OSCAL JSON). Start with the critical processes and expand based on risk.
What’s the minimum evidence an auditor will accept?
An approved mission/process definition plus a process-to-system mapping and documented security and privacy considerations for critical processes (NIST SP 800-53 Rev. 5 OSCAL JSON). If your documentation cannot show how changes get captured, expect follow-up questions.
How do I tie PM-11 to third-party risk management?
Add third-party dependencies at the process level, then link each dependency to your third-party inventory and onboarding workflow. This creates a clean path from “this process changed” to “this third party must be assessed.”
Who should approve the PM-11 artifact?
Use the leader accountable for business operations (COO or equivalent) with security/privacy sign-off, because PM-11 is a program-level definition that affects scope and risk decisions (NIST SP 800-53 Rev. 5 OSCAL JSON).
We already have an SSP. Isn’t that enough?
An SSP describes a system and its controls; PM-11 explains the mission and business processes that the system supports and how risk was considered at the process level (NIST SP 800-53 Rev. 5). The SSP often depends on PM-11 outputs for boundary and scoping rationale.
How do I keep PM-11 current without creating busywork?
Use change triggers tied to real workflows: procurement intake, SDLC gates, architecture review, privacy review, and third-party onboarding. Tools like Daydream help by assigning ownership and standardizing recurring evidence so updates happen as part of normal governance.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream