Q1. How flexible is NIST Special Publication (SP) 800-53?
Q2
What controls are essential to prevent cybersecurity threats?
Various controls play a crucial role in mitigating cybersecurity threats, including NIST SP 800-53, COBIT, CIS controls, HITRUST, and the ISO/IEC 27000-series.
(i) NIST SP 800-53: This resource encompasses a comprehensive list of 20 controls that aid in the development of secure information systems within the United States federal sector.
(ii) COBIT: Serving as a framework, COBIT facilitates effective communication among IT professionals, top management, and auditors by providing a common language to discuss IT controls, goals, objectives, and desired outcomes.
(iii) CIS Controls: These controls consist of prescriptive and prioritized sets of cybersecurity best practices and defensive measures, effectively thwarting the most perilous cyberattacks. The CIS Controls comprise a group of 20 cybersecurity recommendations focused on enhancing organizational security.
(iv) HITRUST: HITRUST is both an organization and a cybersecurity framework. It holds certification status and offers comprehensive guidance on regulatory compliance and risk management, providing organizations with detailed information (Akinsanya, Papadaki & Sun 2019).
(v) ISO/IEC 27000-series: This series offers a collection of best practices designed to enhance an organization's information security. It establishes a globally recognized standard framework for information security management, providing the world with a set of best practices in this critical domain, (Meriah & Rabai, 2019).
References
Tariq M.I Tayyaba, S. Ashraf, M. W., & Rasheed, H. (2017). Risk-based NIST effectiveness analysis for cloud security. Bahria University Journal of Information & Communication Technologies(BUJICT), 10(Special Is).
Meriah, I., &Rabai, L. B.A. (2019). Comparative study of ontologies-based ISO 27000 series standards. Procedia Computer Science, 160, 85-92.
Akinsanya, O. O., Papadaki, M., & Sun, L. (2019). Current cybersecurity maturity models: How effective in the healthcare cloud? In CERC (pp. 211-222)
No comments:
Post a Comment