0% found this document useful (0 votes)
40 views16 pages

03 - Lec01 - Information Security Frameworks

The document discusses different types of information security frameworks including policies, standards, procedures and guidelines. It provides details on ISO and NIST frameworks, key ISO standards like ISO27001 and ISO27018, and an overview of the NIST Cybersecurity Framework.

Uploaded by

ashokabc2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views16 pages

03 - Lec01 - Information Security Frameworks

The document discusses different types of information security frameworks including policies, standards, procedures and guidelines. It provides details on ISO and NIST frameworks, key ISO standards like ISO27001 and ISO27018, and an overview of the NIST Cybersecurity Framework.

Uploaded by

ashokabc2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Information Security

CCS 1306

Kasunika Guruge
Lecturer (P)
School of IT & Computing
SLTC Research University
Information Security
CCS 1306

Information Security Frameworks


What are Policies ?
● The written aspect of governance (including security governance) is known as
policy.
● Policies are documents published by promoted or distributed by senior
management describing the organization’s goals.
● Security policies are the policies that address the security goals of an organization.
● Typically, policies are drafted by subject matter experts, shared among
stakeholders for review and comment, revised then presented to senior
management for final approval.
● Example policies :
IT Security Policy
Password Policy
Disaster Recovery Policy 3
What are Standards ?
● Standards contain technical specifications or other precise criteria designed to be
used consistently as a rule or guideline.
● Also known as frameworks.
● Standards can either come from within the organization or from external sources.
● Standards organizations :
ISO –International Organization for Standardization
NIST -National Institute of Standards & Technology
ISOC –Internet Society …… etc.

4
What are Procedures ?

● Procedures are explicit, repeatable activities to accomplish a specific task.


● Procedures can address one-time or infrequent actions or common, regular
occurrence.
● Proper documentation of procedures and training personnel how to locate and
perform procedures is necessary for the organization to derive benefit of
procedures.
● Procedures described the actual actions that need to be taken by the personnel
in the organization.

5
What are Guidelines ?

● Guidelines are like standards that they describe practices and expectations of
activity to best accomplish tasks and attain goals.

● Unlike standards, guideline s are not mandate but rather recommendations and
suggestions.

● Guidelines may be created internally, for use by the organization, or come from
external sources.

6
Hierarchy

● Policies are in the top of the hierarchy. Senior management dictates policy, so all
activity within the organization should confirm with policy.
● Standards are next; the organization’s policies should specify which standards
the organization adheres to.
● Guidelines inform the organization how to conduct activities. Guidelines are not
mandatory.
● Procedures are the least powerful of hierarchy, but they are the most detailed.

7
Information Security Frameworks

8
ISO –International Organization for Standardization
● ISO is an international standard-setting body composed of representatives
from various national standards organizations.
● The organization promotes worldwide proprietary, industrial, and commercial
standards
● ISO information security related standards are commonly known as ISO27k
standards. Because all the information security related standards are started
from ISO27001
● Examples for information security related standards:
- ISO/IEC 27001 -Information security management systems
- ISO/IEC 27005 -Information security risk management
- ISO/IEC 27018 -Code of practice for controls to protect personally identifiable
information processed in public cloud computing services 9
ISO/IEC 27001
● ISO/IEC 27001 -Information security management systems.
● This standard is to provide requirements for
✓ establishing
✓ Implementing
✓ maintaining and
✓ continually improving an information security management system.
● Standard states the adequate security controls to protect the information
assets.
● ISO/IEC standards are under copyright and cannot be redistributed without
purchase.

10
ISO/IEC 27018
● ISO/IEC 27018 -Code of practice for controls to protect personally identifiable
information(PII) processed in public cloud computing services
● This standard ensures that a cloud service provider has appropriate
procedures in place for handling PII.
● Example:
Requirements for the encryption of PII in transit, when stored and also on
any removable physical media

11
NIST –National Institute of Standards and Technology
● NIST is a United States based federal technology agency that works with
industry to develop and apply technology, measurements and standards.

● NIST Computer Security Division (CSD) focuses on providing measurements


and standards to protect information systems.

12
NIST Cybersecurity Framework
● The NIST Cybersecurity Framework provides a policy framework of computer
security guidance for how private sector organizations in the United States can
assess and improve their ability to prevent, detect, and respond to cyber
attacks.

● Identify – Develop an organizational


understanding to manage cybersecurity risk to
systems, people, assets, data, and capabilities.

● Protect – Develop and implement appropriate


safeguards to ensure delivery of critical services.
13
NIST Cybersecurity Framework
● Detect - Develop and implement appropriate activities to identify the occurrence
of a cybersecurity event.
● Respond – Develop and implement appropriate activities to take action
regarding a detected cybersecurity incident
● Recover – Develop and implement appropriate activities to maintain plans for
resilience and to restore any capabilities or services that were impaired due to a
cybersecurity incident.

● Refer for more details: https://www.nist.gov/cyberframework

14
Activity -03

● Find more information about other security frameworks.

15
QUESTIONS?

Thank You!

16

You might also like