Information security
Information security
Contents
Definition of Information Security Standards ............................. 2
Key Objectives ............................................................................ 2
Why Standards Are Important .................................................... 2
Standards:................................................................................... 2
2. NIST Frameworks (U.S.) .......................................................... 3
3. PCI DSS (Payment Card Industry Data Security Standard) ...... 3
4. COBIT (Control Objectives for Information and Related
Technology) ................................................................................ 3
5. GDPR (General Data Protection Regulation) .......................... 4
6. HIPAA (Health Insurance Portability and Accountability Act) . 4
7. SOC (Service Organization Controls) ....................................... 4
8. ITIL (Information Technology Infrastructure Library) ............. 4
1|Page
Information Security Standards
Definition of Information Security Standards
Information security standards are a set of policies, procedures, and best practices designed to protect
an organization’s data and systems from threats such as unauthorized access, data breaches, or
cyberattacks. These standards provide a framework for managing security risks and ensuring the
confidentiality, integrity, and availability of information.
Key Objectives
The primary goal of security standards is to uphold the CIA triad:
1. Confidentiality: Ensuring that information is accessible only to authorized individuals.
2. Integrity: Maintaining the accuracy and trustworthiness of data throughout its lifecycle.
3. Availability: Ensuring that information and systems are accessible when needed by authorized users.
Standards:
1. ISO/IEC Standards
The ISO/IEC standards are global frameworks created by the International Organization for
Standardization (ISO) and International Electrotechnical Commission (IEC).
ISO/IEC 27001
A globally recognized standard for managing information security.
It focuses on creating an *Information Security Management System (ISMS)* to protect data
confidentiality, integrity, and availability.
Companies implement policies, procedures, and risk assessments to meet this standard.
ISO/IEC 27002
Provides detailed *best practices* for implementing security controls in areas like access control,
encryption, and incident response.
It’s often used alongside ISO 27001.
ISO/IEC 27005
Focuses specifically on *risk management*.
2|Page
Guides organizations in identifying, assessing, and addressing information security risks.
ISO/IEC 27701
An *extension to ISO 27001* that focuses on *privacy information management*.
It ensures compliance with privacy regulations like GDPR.
ISO/IEC 22301
Focuses on *business continuity management*.
Helps organizations plan for and recover from disruptions like cyberattacks or natural disasters.
3|Page
Helps organizations align their IT goals with business goals.
It has five domains:
Evaluate, Direct, and Monitor.
Align, Plan, and Organize.
Build, Acquire, and Implement.
Deliver, Service, and Support.
Monitor, Evaluate, and Assess.
4|Page