4) Common Types of Security Frameworks
Is a globally recognized, independent, non-governmental organization that develops and publishes standards for a wide range of industries, including information
security, technology, quality management, and manufacturing. These standards provide consistency, reliability, and interoperability across businesses and countries.
The ISO/IEC 27000 series focuses on Information Security Management Systems (ISMS) and best practices for organizational security:
- ISO/IEC 27001: Requirements for implementing and maintaining an ISMS.
- ISO/IEC 27002: Provides security controls (guidelines).
- ISO/IEC 27005: Risk management in the context of ISMS.
- ISO/IEC 27017: Providing guidelines for information security in cloud computing.
- ISO/IEC 27018: Protection of personally identifiable information (PII) in the cloud.
When would an organization use it?
- When formal governance and documentation are required.
- When customers or partners require ISO certification.
- When operating in multinational or regulated environments
- When security must be managed as an ongoing business process.
Is it certifiable or voluntary?
- There is an official certification.
Is part of the U.S. Department of Commerce and is widely respected for its work in cybersecurity frameworks. These frameworks are designed to help organizations
manage and reduce cybersecurity risk.
- Govern: Establishing and monitoring cybersecurity risk management strategy, roles, policies, and oversight aligned with business objectives.
- Identify: Understanding the business environment and cybersecurity risks.
- Protect: Developing safeguards to ensure critical systems and data are protected.
- Detect: Implementing processes to detect cybersecurity events.
- Respond: Taking action when a cybersecurity event occurs.
- Recover: Ensuring a resilient recovery from cybersecurity incidents.
When would an organization use it?
- When building or improving a cybersecurity program.
- When needing a flexible, non-prescriptive framework.
- When communicating cyber risk to leadership and stakeholders
- When aligning security activities without formal certification requirements.
Is it certifiable or voluntary?
- There is no official certification for NIST CSF.
Is a documented set of best IT security practices crafted by ISACA to help organizations align their IT practices with business goals and guide executives and
managers on managing technology effectively. the Six Key Principles of COBIT:
- Meeting stakeholder needs: Ensures IT delivers value to all stakeholders (customers, employees, management).
- Enabling a holistic approach: Considers all components of the governance system, including processes, people, and technology.
- Adopting dynamic governance: The governance system stays responsive to changing business needs, threats, and opportunities.
- Separate governance from management:
- Governance: Sets direction, monitors performance, and ensures objectives are met.
- Management: Plans, builds, runs, and monitors activities to implement governance.
- Tailored to Enterprise Needs: COBIT can be customized to fit unique organizational goals, risk profiles, and regulatory environments.
- Cover the enterprise end-to-end: Covers all functions and processes across the enterprise, not just the IT department.
When would an organization use it?
- At the executive or board level.
- When focusing on IT governance and accountability.
- When integrating security into enterprise governance structures.
- When measuring IT and security performance.
Is it certifiable or voluntary?
- Organizations are not certified, but individuals can obtain COBIT certifications.
Is a comprehensive framework and methodology for designing and managing risk-driven security architectures that align with business goals. It is widely recognized for
its holistic and business-focused approach to enterprise security. Key Aspects of SABSA Include:
- Risk-Focused: Security controls and architectures are developed based on risk assessments that align with business requirements.
- Business-Driven: Security must support and enable business processes and objectives.
- Layered Approach SABSA:
- Business Context: Strategic objectives, business processes, and risk drivers.
- Conceptual Architecture: High-level security policies and control frameworks.
- Logical Architecture: Security services and controls mapped to business needs.
- Physical Architecture: Implementation of security systems and technology.
- Component Architecture: Specific security mechanisms and tools.
- Operational Architecture: Day-to-day management, monitoring, and improvement of security controls.
When would an organization use it?
- When designing or restructuring enterprise security architecture.
- When aligning business drivers with technical security decisions.
- When security must be embedded by design, not added later.
Is it certifiable or voluntary?
- Organizations are not certified, but SABSA certifications exist for professionals.
Is a proprietary information security standard designed to ensure that all companies that accept, transmit, or store any card payment information maintain a secure
environment. It is administered by the Payment Card Industry Security Standards Council. Its main key Components:
- Data Security: Sets strict guidelines for the secure handling of payment card data, including cardholder names, primary account numbers (PANs), expiration dates, and card verification values (CVVs).
- Network Security: Mandates the implementation of robust network security practices to protect cardholder data during transmission. This includes the use of firewalls, encryption, and access controls.
- Access Control: Organizations are required to restrict access to cardholder data on a need-to-know basis.
- Regular Monitoring and Testing: Continuous monitoring of systems and applications that process cardholder data is essential to detect and respond to security threats.
- Information Security Policies: Organizations must develop and maintain comprehensive information security policies and procedures that guide employees in secure practices related to payment card data.
- Vulnerability Management: Emphasizes the timely identification and remediation of security vulnerabilities, involving regular updates, security patches, and addressing known vulnerabilities.
- Physical Security: Includes requirements for the physical security of cardholder data, ensuring restricted access to servers, storage, and point-of-sale (POS) devices.
- Incident Response: Having a robust incident response plan is essential for responding promptly and effectively to security incidents and data breaches.
- Compliance Audits: Organizations that handle payment card data are required to undergo regular PCI DSS compliance audits. Conducted by independent Qualified Security Assessors (QSAs) or Internal Security Assessors (ISAs) certified to assess compliance
When would an organization use it?
- When handling credit or debit card transactions.
- When required by payment brands or acquiring banks.
- When operating in e-commerce or payment processing environments.
Is it certifiable or voluntary?
- Organizations must demonstrate PCI DSS compliance; failure can result in penalties.
Is a U.S. government-wide program that standardizes the security assessment, authorization, and continuous monitoring of cloud products and services used by federal
agencies. It ensures that cloud service providers (CSPs) meet stringent security requirements to protect sensitive federal data.
When would an organization use it?
- When offering cloud services to U.S. federal agencies.
- When operating in regulated government cloud environments.
- When needing a unified federal authorization process.