This article may be confusing or unclear to readers. Please help clarify the article. There might be a discussion about this on the talk page. (January 2012) (Learn how and when to remove this message)

Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.[1] In the field of information security, such controls protect the confidentiality, integrity and availability of information.

Systems of controls can be referred to as frameworks or standards. Frameworks can enable an organization to manage security controls across different types of assets with consistency.

Types of security controls

Security controls can be classified by various criteria. For example, controls are occasionally classified by when they act relative to a security breach:

Security controls can also be classified according to their characteristics, for example:

For more information on security controls in computing, see Defense in depth (computing) and Information security

Information security standards and control frameworks

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Some of the most well known standards are outlined below.

International Standards Organization

ISO/IEC 27001:2022 was released in October 2022. All organizations certified to ISO 27001:2013 are obliged to transition to the new version of the Standard within 3 years (by October 2025).

The 2022 version of the Standard specifies 93 controls in 4 groups:

It groups these controls into operational capabilities as follows:

The previous version of the Standard, ISO/IEC 27001, specified 114 controls in 14 groups:

U.S. Federal Government information security standards

The Federal Information Processing Standards (FIPS) apply to all US government agencies. However, certain national security systems, under the purview of the Committee on National Security Systems, are managed outside these standards.

Federal information Processing Standard 200 (FIPS 200), "Minimum Security Requirements for Federal Information and Information Systems," specifies the minimum security controls for federal information systems and the processes by which risk-based selection of security controls occurs. The catalog of minimum security controls is found in NIST Special Publication SP 800-53.

FIPS 200 identifies 17 broad control families:

National Institute of Standards and Technology

NIST Cybersecurity Framework

A maturity based framework divided into five functional areas and approximately 100 individual controls in its "core."

NIST SP-800-53

Main article: NIST Special Publication 800-53

A database of nearly one thousand technical controls grouped into families and cross references.

Commercial Control Sets

COBIT5

A proprietary control set published by ISACA.[2]

CIS Controls (CIS 18)

Formerly known as the SANS Critical Security Controls now officially called the CIS Critical Security Controls (COS Controls).[3] The CIS Controls are divided into 18 controls.

The Controls are divided further into Implementation Groups (IGs) which are a recommended guidance to prioritize implementation of the CIS controls.[4]

Telecommunications

Main article: Security service (telecommunication)

In telecommunications, security controls are defined as security services as part of the OSI Reference model

These are technically aligned.[5][6] This model is widely recognized.[7] [8]

Data liability (legal, regulatory, compliance)

The intersection of security risk and laws that set standards of care is where data liability are defined. A handful of databases are emerging to help risk managers research laws that define liability at the country, province/state, and local levels. In these control sets, compliance with relevant laws are the actual risk mitigators.

Business control frameworks

There are a wide range of frameworks and standards looking at internal business, and inter-business controls, including:

See also

References

  1. ^ "What are Security Controls?". www.ibm.com. Retrieved 2020-10-31.
  2. ^ "COBIT Framework | Risk & Governance | Enterprise IT Management - ISACA". cobitonline.isaca.org. Retrieved 2020-03-18.
  3. ^ "The 18 CIS Controls". CIS. Retrieved 2022-11-08.
  4. ^ "CIS Critical Security Controls Implementation Groups". CIS. Retrieved 2022-11-08.
  5. ^ X.800 : Security architecture for Open Systems Interconnection for CCITT applications
  6. ^ ISO 7498-2 (Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture)
  7. ^ William Stallings Crittografia e sicurezza delle reti Seconda edizione ISBN 88-386-6377-7 Traduzione Italiana a cura di Luca Salgarelli di Cryptography and Network security 4 edition Pearson 2006
  8. ^ Securing information and communications systems: principles, technologies, and applications Steven Furnell, Sokratis Katsikas, Javier Lopez, Artech House, 2008 - 362 pages
  9. ^ "Security Breach Notification Chart". Perkins Coie. Retrieved 2020-03-18.
  10. ^ "Security Breach Notification Laws". www.ncsl.org. Retrieved 2020-03-18.
  11. ^ "ts jurisdiction". Threat Sketch. Retrieved 2020-03-18.