Cyber Security Framework

Jeevesh W
4 min readJan 11, 2024

--

A cybersecurity framework is a set of guidelines and best practices designed to help organizations manage and enhance their cybersecurity posture.

These frameworks provide a structured approach to identifying, protecting, detecting, responding to, and recovering from cyber threats. Several widely recognized cybersecurity frameworks exist, each offering a comprehensive set of controls and recommendations.

Here are some of the prominent cybersecurity frameworks:

  1. NIST Cybersecurity Framework (CSF):
  • Developed by the National Institute of Standards and Technology (NIST), the CSF is widely adopted and provides a risk-based approach to managing cybersecurity. It consists of five core functions: Identify, Protect, Detect, Respond, and Recover.
NIST Cybersecurity Framework

2. ISO/IEC 27001:

  • The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) developed this standard. ISO/IEC 27001 provides a systematic approach to managing sensitive company information, including cybersecurity.
ISO 27001 Framework
  • The standard provides a comprehensive set of controls that organizations can use to establish and maintain an effective ISMS.
  • To achieve ISO 27001 certification, an organization must implement an ISMS that meets the requirements set out in the standard. The process typically involves a comprehensive risk assessment, development of policies and procedures, implementation of security controls, and ongoing monitoring and improvement of the system. Certification is awarded by an accredited certification body, following a rigorous audit of the organization’s ISMS.
ISMS implementation

3. CIS Critical Security Controls (CIS Controls):

  • Developed by the Center for Internet Security (CIS), this framework offers a prioritized set of actions designed to mitigate the most prevalent cyber threats. It is structured into three implementation groups based on an organization’s size and resources.
  • The Center for Internet Security (CIS) Critical Security Controls is a security standard centered on a list of 20 technical controls that organizations can implement to better defend themselves from cyber-attacks. The controls take a prioritized approach, making them different from security risk management frameworks such as NIST 800–53, ISO 27001, and COBIT.
CIS Control list

4. COBIT (Control Objectives for Information and Related Technologies):

  • Developed by the Information Systems Audit and Control Association (ISACA), COBIT is a framework that provides a comprehensive governance and management structure for enterprise IT. It addresses cybersecurity as part of its broader focus on IT governance.
COBIT Key Principles

5. FAIR (Factor Analysis of Information Risk):

  • FAIR is a framework for risk management that focuses on quantifying and measuring information risk. It provides a structured methodology for understanding, analyzing, and quantifying cyber risk.

6. MITRE ATT&CK Framework:

  • The Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework, developed by MITRE, focuses on understanding the actions and behaviors of cyber adversaries. It provides a comprehensive matrix of tactics and techniques used by attackers.
  • As an important knowledge base, MITRE ATT&CK enables anyone on the cyber defense team to review and contrast attacker activity, and then understand the best options for defense.
  • The MITRE ATT&CK framework provides a comprehensive taxonomy to post-exploitation cyber attacker behavior. A detailed focus on attacker behavior, such as provided by MITRE ATT&CK, is the best way to find and stop an ongoing attack before data exfiltration or destructive behavior can be achieved. This helps you balance your defensive measures against the steps an attacker will take.

7. NIST Special Publication 800–53:

  • A publication by NIST, SP 800–53 provides a catalog of security controls for federal information systems and organizations. It is widely used in government and is also adopted by private-sector organizations.

8. GDPR (General Data Protection Regulation):

  • While not strictly a cybersecurity framework, GDPR is a set of regulations governing data protection and privacy for individuals within the European Union. Compliance with GDPR includes implementing cybersecurity measures to protect personal data.

Conclusion-

When implementing a cybersecurity framework, organizations should tailor the controls and practices to their specific industry, risk profile, and operational environment. Regular assessments, audits, and updates are essential to ensuring ongoing effectiveness in addressing evolving cyber threats. Additionally, organizations may choose to align with multiple frameworks to achieve a more comprehensive and customized cybersecurity strategy.

--

--

Jeevesh W

Forward-thinking entrepreneur with a passion for leveraging technology to drive innovation. With a keen eye for emerging trends in the IT landscape. DenwoIT.com