Search This Blog

Tuesday, September 12

Let's Discuss: NIST 800 -53





Q1. How flexible is NIST Special Publication (SP) 800-53?

 NIST SP 800-53, a regulatory body of standards, establishes security control guidelines for information systems within the United States Confederacy (Tariq et al., 2017). This framework, NIST SP 800-53, offers adaptable guidelines that enable organizations to implement suitable controls and manage risk in alignment with their mission, processes, and technological infrastructure. These controls find application across both private and public sectors, catering to the needs of organizations throughout the United States, including federal government agencies, states, and the private sector. Notably, NIST SP 800-53 is available in two versions, Rev 4 and Rev 5, both of which have played a pivotal role in risk mitigation. The latest iteration, Rev 5, was developed in September 2020, and it delivers updated guidance on privacy and security controls, reflecting the most current standards and practices in the field.


Q2 What controls are essential to prevent cybersecurity threats?

Various controls play a crucial role in mitigating cybersecurity threats, including NIST SP 800-53, COBIT, CIS controls, HITRUST, and the ISO/IEC 27000-series.

(i) NIST SP 800-53: This resource encompasses a comprehensive list of 20 controls that aid in the development of secure information systems within the United States federal sector. 

(ii) COBIT: Serving as a framework, COBIT facilitates effective communication among IT professionals, top management, and auditors by providing a common language to discuss IT controls, goals, objectives, and desired outcomes.

(iii) CIS Controls: These controls consist of prescriptive and prioritized sets of cybersecurity best practices and defensive measures, effectively thwarting the most perilous cyberattacks. The CIS Controls comprise a group of 20 cybersecurity recommendations focused on enhancing organizational security.

(iv) HITRUST: HITRUST is both an organization and a cybersecurity framework. It holds certification status and offers comprehensive guidance on regulatory compliance and risk management, providing organizations with detailed information (Akinsanya, Papadaki & Sun 2019).

(v) ISO/IEC 27000-series: This series offers a collection of best practices designed to enhance an organization's information security. It establishes a globally recognized standard framework for information security management, providing the world with a set of best practices in this critical domain, (Meriah & Rabai, 2019).



                                                   References

Tariq M.I Tayyaba, S. Ashraf, M. W., & Rasheed, H. (2017). Risk-based NIST effectiveness analysis for cloud security. Bahria University Journal of Information & Communication Technologies(BUJICT), 10(Special Is).

 Meriah, I., &Rabai, L. B.A. (2019). Comparative study of ontologies-based ISO 27000 series standards. Procedia Computer Science, 160, 85-92.

Akinsanya, O. O., Papadaki, M., & Sun, L. (2019). Current cybersecurity maturity models: How effective in the healthcare cloud? In CERC (pp. 211-222)


No comments:

Post a Comment

Let's Discuss: NIST 800 -53

Q1. How flexible is NIST Special Publication (SP) 800-53?   NIST SP 800-53, a regulatory body of standards, establishes security control gui...