2
Most read
6
Most read
14
Most read
by Erlan Bakiev, Ph.D.
Cyber security standards
and
Controls
 Cybersecurity standards are techniques generally set forth in published
materials that attempt to protect the cyber environment of a user or
organization.
 This environment includes:
 users themselves
 networks
 devices
 all software
 processes
 information in storage or transit
 applications
 services
 systems that can be connected directly or indirectly to networks
Cybersecurity standards
 The principal objective:
 to reduce the risks
 including prevention or mitigation of cyber-attacks.
These published materials consist of collections of:
 tools,
 Policies
 security concepts
 security safeguards
 guidelines,
 risk management approaches,
 actions,
 training,
 best practices,
 assurance and technologies.
Cybersecurity standards cont.
 Cyber security frameworks are sets of documents describing guidelines, standards,
and best practices designed for cyber security risk management. The frameworks
exist to reduce an organization's exposure to weaknesses and vulnerabilities that
hackers and other cyber criminals may exploit.
What is a Cyber Security Framework?
 The NIST Cybersecurity Framework (NIST CSF) provides a
policy framework of computer security guidance for how private
sector organizations in the US can assess and improve their ability to
prevent, detect, and respond to cyber attacks.
 It provides a high level taxonomy of cybersecurity outcomes and a
methodology to assess and manage those outcomes.
 It is intended to help private sector organizations that provide critical
infrastructure with guidance on how to protect it, along with relevant
protections for privacy and civil liberties.
NIST Cybersecurity
Framework (NIST CSF)
 SO/IEC 27001, part of the growing ISO/IEC 27000 family of standards,
is an information security management system (ISMS) standard, of
which the last revision was published in October 2013 by
the International Organization for Standardization (ISO) and
the International Electro technical Commission (IEC).
 Its full name is ISO/IEC 27001:2013 – Information technology – Security
techniques – Information security management systems –
Requirements.
 ISO/IEC 27001 formally specifies a management system that is
intended to bring information security under explicit management
control.
ISO/IEC 27001 and 27002
 ISO/IEC 27002 incorporates mainly part 1 of the BS 7799 good
security management practice standard.
 The latest versions of BS 7799 is BS 7799-3.
 ISO/IEC 27002 is a high level guide to cybersecurity.
 It is most beneficial as explanatory guidance for the
management of an organization to obtain certification to the
ISO/IEC 27001 standard.
 The certification once obtained lasts three years.
 Depending on the auditing organization, no or some
intermediate audits may be carried out during the three years.
ISO/IEC 27001 and 27002 Cont.
 The Payment Card Industry Data Security Standard (PCI DSS) is a
global framework for any organization that processes, stores, or
transmits cardholder information. Launched in 2004 by major credit
card companies American Express, Discover, JCB, MasterCard, and
VISA, the framework aims to keep cardholder information safe and
reduce fraud.
 To do this, PCI DSS outlines four compliance levels, depending on
the organization’s transactions per annum, and 12 required steps
that meet security best practices.
PCI DSS
 HIPAA cybersecurity frameworks for patients’ protected health
information (PHI).
 The Health Insurance Portability and Accountability Act of 1996
(HIPAA) is a federal legislation for healthcare compliance. An act
of the US Congress created by lawyers and lawmakers, HIPAA
applies to “covered entities,” including health providers, health
plans and insurance companies, and health clearinghouses.
Although there’s no official certification, HIPAA compliance is
enforced by the US Department of Health and Human Services’
Office for Civil Rights (OCR).
HIPPA
 The Sarbane-Oxley IT General Controls (SOX ITGC) is a subset of
the broader Sarbane-Oxley Act and sets financial report
requirements for all companies preparing for an initial public
offering (IPO) or publicly traded companies across all industries.
 SOX ITGC attests to the integrity of the data and processes of
internal financial reporting controls, including applications,
operating systems, databases, and the supporting IT
infrastructure. Controls in this framework encompass access to
programs and data, program changes, computer operations, and
program development.
SOX
 The General Data Protection Regulation (GDPR) is a framework
passed by the European Union (EU) to protect the data privacy
and security of its citizens. Enacted in 2016, the GDPR impacts all
organizations that collect and process the data of EU citizens,
regardless of where the company is located.
GDPR
 Security controls are safeguards or countermeasures to
avoid, detect, counteract, or minimize security risks to
physical property, information, computer systems, or other
assets.
Security controls
 According to the time that they act, relative to a security
incident:
 Before the event, preventive controls are intended to prevent
an incident from occurring e.g. by locking out unauthorized
intruders;
 During the event, detective controls are intended to identify
and characterize an incident in progress e.g. by sounding the
intruder alarm and alerting the security guards or police;
 After the event, corrective controls are intended to limit the
extent of any damage caused by the incident e.g. by recovering
the organization to normal working status as efficiently as
possible.
Classification of Security controls
 According to their nature:
 Physical controls e.g. fences, doors, locks and fire
extinguishers;
 Procedural controls e.g. incident response processes,
management oversight, security awareness and training;
 Technical controls e.g. user authentication (login) and logical
access controls, antivirus software, firewalls;
 Legal and regulatory or compliance controls e.g. privacy laws,
policies and clauses.
Classification of Security controls
Cont.
 ISO/IEC 27001 specifies 114 controls in 14 groups:
 A.5: Information security policies
 A.6: How information security is organized
 A.7: Human resources security - controls that are applied before, during, or after
employment.
 A.8: Asset management
 A.9: Access controls and managing user access
 A.10: Cryptographic technology
 A.11: Physical security of the organization's sites and equipment
 A.12: Operational security
 A.13: Secure communications and data transfer
 A.14: Secure acquisition, development, and support of information systems
 A.15: Security for suppliers and third parties
 A.16: Incident management
 A.17: Business continuity/disaster recovery (to the extent that it affects information
security)
 A.18: Compliance - with internal requirements, such as policies, and with external
requirements, such as laws.
International information
security standards
 From NIST Special Publication SP 800-53 revision 4.
 AC Access Control.
 AT Awareness and Training.
 AU Audit and Accountability.
 CA Security Assessment and Authorization. (historical abbreviation)
 CM Configuration Management.
 CP Contingency Planning.
 IA Identification and Authentication.
 IR Incident Response.
 MA Maintenance.
 MP Media Protection.
 PE Physical and Environmental Protection.
 PL Planning.
 PS Personnel Security.
 RA Risk Assessment.
 SA System and Services Acquisition.
 SC System and Communications Protection.
 SI System and Information Integrity.
 PM Program Management.
U.S. Federal Government
information security standards
Standards & Framework.ppt
Standards & Framework.ppt
Standards & Framework.ppt
Thank you

More Related Content

PPT
Introduction to Linux Kernel by Quontra Solutions
PPT
173-Anatomy-skeletal.ppt
DOCX
Swe notes
PPTX
Chapter five HCI
PPT
Ian Sommerville, Software Engineering, 9th Edition Ch 23
PPTX
Ch 4 components of the sqa system
PPTX
Social Application of Ethics- Professional Practices
PPTX
Service Oriented Architecture
Introduction to Linux Kernel by Quontra Solutions
173-Anatomy-skeletal.ppt
Swe notes
Chapter five HCI
Ian Sommerville, Software Engineering, 9th Edition Ch 23
Ch 4 components of the sqa system
Social Application of Ethics- Professional Practices
Service Oriented Architecture

What's hot (20)

PPT
Lecture# 7 midi file format
PPTX
IP tables,Filtering.pptx
PDF
Server Virtualization
PDF
Introduction to virtualization
PPTX
6 modeling system requirements
PPT
Slides 6 design of sw arch using add
PDF
Software Engineering Past Papers Notes
PPTX
Linux security
PPTX
Market oriented Cloud Computing
PDF
Hci activity#3
PPT
Linux presentation
PPTX
User and groups administrator
PPTX
Lec 01_Linux System Administration (1).pptx
PDF
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
PPT
Software engineering introduction
PPTX
Unix and shell programming | Unix File System | Unix File Permission | Blocks
PPTX
PDF
Systemd for developers
PPT
Linux Networking Commands
DOCX
Spm unit 2
Lecture# 7 midi file format
IP tables,Filtering.pptx
Server Virtualization
Introduction to virtualization
6 modeling system requirements
Slides 6 design of sw arch using add
Software Engineering Past Papers Notes
Linux security
Market oriented Cloud Computing
Hci activity#3
Linux presentation
User and groups administrator
Lec 01_Linux System Administration (1).pptx
Zephyr RTOS in One Hour | HARDWARIO @ IoT North UK
Software engineering introduction
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Systemd for developers
Linux Networking Commands
Spm unit 2
Ad

Similar to Standards & Framework.ppt (20)

PDF
Standards & Framework.pdf
PPTX
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
PDF
Chapter 10 security standart
PDF
Compare and Contrast Security Controls and Framework Types
PPTX
Overview on Information Security Awareness.pptx
PDF
Cyber security for manufacturers umuc cadf-ron mcfarland
DOCX
Policy InformationPolicy Name __________________________ ID _.docx
PPTX
Cyber Families - Incident Response.pptx
PPTX
the role of 27001 in cybersecurity pp.pptx
PDF
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
PPTX
DOC-20250530-WA0008.pptx.................
PDF
Cybersecurity Frameworks for DMZCON23 230905.pdf
PPT
zSecurity_L9_Standards and Policies.ppt
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
Is iso 27001, an answer to security
PPTX
Is iso 27001-an-answer-to-security
PDF
Complying with Cybersecurity Regulations for IBM i Servers and Data
PDF
1 info sec+risk-mgmt
PPTX
INFS2701 T2 2025 Lecture 1 Data Warehousing.pptx
PPTX
Week 1 - Introduction to CyberSecurity.pptx
Standards & Framework.pdf
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 10 security standart
Compare and Contrast Security Controls and Framework Types
Overview on Information Security Awareness.pptx
Cyber security for manufacturers umuc cadf-ron mcfarland
Policy InformationPolicy Name __________________________ ID _.docx
Cyber Families - Incident Response.pptx
the role of 27001 in cybersecurity pp.pptx
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
DOC-20250530-WA0008.pptx.................
Cybersecurity Frameworks for DMZCON23 230905.pdf
zSecurity_L9_Standards and Policies.ppt
Cybersecurity Risk Management Program and Your Organization
Is iso 27001, an answer to security
Is iso 27001-an-answer-to-security
Complying with Cybersecurity Regulations for IBM i Servers and Data
1 info sec+risk-mgmt
INFS2701 T2 2025 Lecture 1 Data Warehousing.pptx
Week 1 - Introduction to CyberSecurity.pptx
Ad

More from karthikvcyber (20)

PPTX
Security Incident machnism Security Incident machnismSecurity Incident machni...
PPTX
Security Information Event Management Security Information Event Management
PPTX
cybersecuritycybersecuritycybersecuritycybersecurity
PPTX
OSINT.pptx
PPTX
Encrypto.pptx
PPTX
PID-PPID.pptx
PPTX
Authentication.pptx
PPTX
SIEM.pptx
PPTX
VAPT_FINAL SLIDES.pptx
PPTX
cryptography-Final.pptx
PPTX
fileanddirectory-PID.pptx
PPT
CS_Tuto.ppt
PPT
Vuln.ppt
PPTX
IP_Subnet training.pptx
PPTX
Authorisation.pptx
PPTX
IPS NAT and VPN.pptx
PPT
CCNP.ppt
PPTX
subnet.pptx
PPTX
OSI TCP-IP.pptx
PPTX
Firewall & DMZ.pptx
Security Incident machnism Security Incident machnismSecurity Incident machni...
Security Information Event Management Security Information Event Management
cybersecuritycybersecuritycybersecuritycybersecurity
OSINT.pptx
Encrypto.pptx
PID-PPID.pptx
Authentication.pptx
SIEM.pptx
VAPT_FINAL SLIDES.pptx
cryptography-Final.pptx
fileanddirectory-PID.pptx
CS_Tuto.ppt
Vuln.ppt
IP_Subnet training.pptx
Authorisation.pptx
IPS NAT and VPN.pptx
CCNP.ppt
subnet.pptx
OSI TCP-IP.pptx
Firewall & DMZ.pptx

Recently uploaded (20)

PDF
V02-Session-4-Leadership-Through-Assessment-MLB.pdf
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Physical pharmaceutics two in b pharmacy
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PPTX
Environmental Sciences and Sustainability Chapter 2
PDF
Design and Evaluation of a Inonotus obliquus-AgNP-Maltodextrin Delivery Syste...
PDF
horaris de grups del curs 2025-2026 de l'institut
PDF
IS1343_2012...........................pdf
PDF
English 2nd semesteNotesh biology biopsy results from the other day and I jus...
PPTX
climate change of delhi impacts on climate and there effects
PPTX
PAIN PATHWAY & MANAGEMENT OF ACUTE AND CHRONIC PAIN SPEAKER: Dr. Rajasekhar ...
PDF
anganwadi services for the b.sc nursing and GNM
PPTX
Ppt obs emergecy.pptxydirnbduejguxjjdjidjdbuc
PPSX
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
PDF
New_Round_Up_6_SB.pdf download for free, easy to learn
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PPTX
Neurology of Systemic disease all systems
PDF
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
PPTX
Entrepreneurship Management and Finance - Module 1 - PPT
PDF
FYJC - Chemistry textbook - standard 11.
V02-Session-4-Leadership-Through-Assessment-MLB.pdf
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Physical pharmaceutics two in b pharmacy
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Environmental Sciences and Sustainability Chapter 2
Design and Evaluation of a Inonotus obliquus-AgNP-Maltodextrin Delivery Syste...
horaris de grups del curs 2025-2026 de l'institut
IS1343_2012...........................pdf
English 2nd semesteNotesh biology biopsy results from the other day and I jus...
climate change of delhi impacts on climate and there effects
PAIN PATHWAY & MANAGEMENT OF ACUTE AND CHRONIC PAIN SPEAKER: Dr. Rajasekhar ...
anganwadi services for the b.sc nursing and GNM
Ppt obs emergecy.pptxydirnbduejguxjjdjidjdbuc
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
New_Round_Up_6_SB.pdf download for free, easy to learn
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
Neurology of Systemic disease all systems
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
Entrepreneurship Management and Finance - Module 1 - PPT
FYJC - Chemistry textbook - standard 11.

Standards & Framework.ppt

  • 1. by Erlan Bakiev, Ph.D. Cyber security standards and Controls
  • 2.  Cybersecurity standards are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.  This environment includes:  users themselves  networks  devices  all software  processes  information in storage or transit  applications  services  systems that can be connected directly or indirectly to networks Cybersecurity standards
  • 3.  The principal objective:  to reduce the risks  including prevention or mitigation of cyber-attacks. These published materials consist of collections of:  tools,  Policies  security concepts  security safeguards  guidelines,  risk management approaches,  actions,  training,  best practices,  assurance and technologies. Cybersecurity standards cont.
  • 4.  Cyber security frameworks are sets of documents describing guidelines, standards, and best practices designed for cyber security risk management. The frameworks exist to reduce an organization's exposure to weaknesses and vulnerabilities that hackers and other cyber criminals may exploit. What is a Cyber Security Framework?
  • 5.  The NIST Cybersecurity Framework (NIST CSF) provides a policy framework of computer security guidance for how private sector organizations in the US can assess and improve their ability to prevent, detect, and respond to cyber attacks.  It provides a high level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes.  It is intended to help private sector organizations that provide critical infrastructure with guidance on how to protect it, along with relevant protections for privacy and civil liberties. NIST Cybersecurity Framework (NIST CSF)
  • 6.  SO/IEC 27001, part of the growing ISO/IEC 27000 family of standards, is an information security management system (ISMS) standard, of which the last revision was published in October 2013 by the International Organization for Standardization (ISO) and the International Electro technical Commission (IEC).  Its full name is ISO/IEC 27001:2013 – Information technology – Security techniques – Information security management systems – Requirements.  ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control. ISO/IEC 27001 and 27002
  • 7.  ISO/IEC 27002 incorporates mainly part 1 of the BS 7799 good security management practice standard.  The latest versions of BS 7799 is BS 7799-3.  ISO/IEC 27002 is a high level guide to cybersecurity.  It is most beneficial as explanatory guidance for the management of an organization to obtain certification to the ISO/IEC 27001 standard.  The certification once obtained lasts three years.  Depending on the auditing organization, no or some intermediate audits may be carried out during the three years. ISO/IEC 27001 and 27002 Cont.
  • 8.  The Payment Card Industry Data Security Standard (PCI DSS) is a global framework for any organization that processes, stores, or transmits cardholder information. Launched in 2004 by major credit card companies American Express, Discover, JCB, MasterCard, and VISA, the framework aims to keep cardholder information safe and reduce fraud.  To do this, PCI DSS outlines four compliance levels, depending on the organization’s transactions per annum, and 12 required steps that meet security best practices. PCI DSS
  • 9.  HIPAA cybersecurity frameworks for patients’ protected health information (PHI).  The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal legislation for healthcare compliance. An act of the US Congress created by lawyers and lawmakers, HIPAA applies to “covered entities,” including health providers, health plans and insurance companies, and health clearinghouses. Although there’s no official certification, HIPAA compliance is enforced by the US Department of Health and Human Services’ Office for Civil Rights (OCR). HIPPA
  • 10.  The Sarbane-Oxley IT General Controls (SOX ITGC) is a subset of the broader Sarbane-Oxley Act and sets financial report requirements for all companies preparing for an initial public offering (IPO) or publicly traded companies across all industries.  SOX ITGC attests to the integrity of the data and processes of internal financial reporting controls, including applications, operating systems, databases, and the supporting IT infrastructure. Controls in this framework encompass access to programs and data, program changes, computer operations, and program development. SOX
  • 11.  The General Data Protection Regulation (GDPR) is a framework passed by the European Union (EU) to protect the data privacy and security of its citizens. Enacted in 2016, the GDPR impacts all organizations that collect and process the data of EU citizens, regardless of where the company is located. GDPR
  • 12.  Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. Security controls
  • 13.  According to the time that they act, relative to a security incident:  Before the event, preventive controls are intended to prevent an incident from occurring e.g. by locking out unauthorized intruders;  During the event, detective controls are intended to identify and characterize an incident in progress e.g. by sounding the intruder alarm and alerting the security guards or police;  After the event, corrective controls are intended to limit the extent of any damage caused by the incident e.g. by recovering the organization to normal working status as efficiently as possible. Classification of Security controls
  • 14.  According to their nature:  Physical controls e.g. fences, doors, locks and fire extinguishers;  Procedural controls e.g. incident response processes, management oversight, security awareness and training;  Technical controls e.g. user authentication (login) and logical access controls, antivirus software, firewalls;  Legal and regulatory or compliance controls e.g. privacy laws, policies and clauses. Classification of Security controls Cont.
  • 15.  ISO/IEC 27001 specifies 114 controls in 14 groups:  A.5: Information security policies  A.6: How information security is organized  A.7: Human resources security - controls that are applied before, during, or after employment.  A.8: Asset management  A.9: Access controls and managing user access  A.10: Cryptographic technology  A.11: Physical security of the organization's sites and equipment  A.12: Operational security  A.13: Secure communications and data transfer  A.14: Secure acquisition, development, and support of information systems  A.15: Security for suppliers and third parties  A.16: Incident management  A.17: Business continuity/disaster recovery (to the extent that it affects information security)  A.18: Compliance - with internal requirements, such as policies, and with external requirements, such as laws. International information security standards
  • 16.  From NIST Special Publication SP 800-53 revision 4.  AC Access Control.  AT Awareness and Training.  AU Audit and Accountability.  CA Security Assessment and Authorization. (historical abbreviation)  CM Configuration Management.  CP Contingency Planning.  IA Identification and Authentication.  IR Incident Response.  MA Maintenance.  MP Media Protection.  PE Physical and Environmental Protection.  PL Planning.  PS Personnel Security.  RA Risk Assessment.  SA System and Services Acquisition.  SC System and Communications Protection.  SI System and Information Integrity.  PM Program Management. U.S. Federal Government information security standards