How Cybersecurity Frameworks differ from each other?

How Cybersecurity Frameworks differ from each other?

Whenever we have something important, it is human instinct to protect it from external harm or danger. Be it money, jewelry, or property, we ensure that everything is protected and intact by implementing the appropriate security measures. As a result, security guards' sighting is not a big deal, as the planet is full of essential items that need to be covered. This was the case for valuable physical objects, so what about tech.

As technology has grown tremendously in the last few decades, data and apps have become even more vital. With the aid of data and apps, we will perform different activities to generate money and become a significant revenue source for companies worldwide.

Therefore, it is essential to maintain a stringent security practice that leads to an increase in cybersecurity, the technology sector that deals with data and online information security. Several different compliances and frameworks need to be implemented to ensure robust data and device security.

No alt text provided for this image

What is Cybersecurity Frameworks??

The Cybersecurity Framework is a voluntary guideline built on principles, protocols, and best practices for the different organizations to effectively handle and reduce cybersecurity threats. The Cyber Security Framework is a combined initiative between business and government that includes initiatives, laws, and procedures that demonstrate that security is an essential cornerstone.

However, finding the best framework for cybersecurity is not a small matter. The first move is to differentiate between CSFs that are detailed and structured to meet a particular goal. The latter group covers systems such as the Health Information Trust Alliance (HITRUST), used in healthcare, and the Cloud Security Alliance Cloud Controls Matrix (CCM), unique to cloud computing.

Let's look at the top categories of comprehensive cybersecurity frameworks and how they stack against each other

No alt text provided for this image

NIST Cybersecurity Framework

The framework for cyber protection developed by the National Institute of Standards and Technology (NIST) is the most commonly adopted by American companies. The NIST system is split into five prominent roles. The following functions are: Identity, Protect, Detect, Respond, Recover. According to the Tenable IT Professionals report, 70% said they followed the NIST CSF system because they believe it to be best practice. NIST provides comprehensive advice on issues from risk management and ongoing reporting to response and awareness-raising. NIST has a detailed data management and risk control strategy and methodology for mitigating the effects of adverse events.

Businesses using the NIST should be assured that they are applying a system that is not just scalable and versatile but still frequently revised and government-approved, drawing on the collective experience and particular perspectives of the nation's federal capital. Another NIST bonus is the enormous library of information open to those who need it.

NIST 800-53 is a framework expressly intended to refer to U.S. Federal Government Departments compared to the NIST Cyber Security Framework. NIST 800-53 is more than ten times as long (453 pages compared to the NIST Cybersecurity Framework at 41 pages).

ISO Series Cybersecurity Framework

ISO offers a mechanism for achieving a certified level of compliance with data protection that satisfies external evaluation requirements. ISO is being established by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Organizations use this mechanism to control records' confidentiality, such as financial documents, personnel data, intellectual property, and secure communication to third parties.

The ISO series is a fully international system intended to accompany decades-old ISO quality assurance requirements in other fields such as production (ISO 9000) and environmental conservation (ISO 14000). Like NIST, the ISO sequence provides various subsets (i.e., ISO 27799, specifying healthcare standards) that reduce the need to create hybrid frameworks. Businesses with some international operating presence could be essential to consider using ISO as a base when developing a cybersecurity framework.

No alt text provided for this image

ISO 27001 defines focus areas such as organizational context, leadership, strategy, support, reporting, process, performance assessment, and enhancement essential for developing a security program. ISO 27001 is a structure that describes standards and practices that include both regulatory, physical, and technological restrictions contained in the information risk management processes of an organization.

CIS? Cybersecurity Framework

CIS is an acronym for Centre of Internet Security. The CIS Framework was initially created in 2008 to help small and medium-sized businesses deal with challenging cybersecurity requirements.

No alt text provided for this image

CIS providing relative organizational simplicity and a focus on security and prevention, CIS could be more oriented than NIST or ISO, but not less effective. NIST uses CIS principles in some data privacy standards. CIS was developed by high-level IT experts rather than policymakers or administrators; many consider the CIS framework the most realistic cybersecurity system. Also, organizations that focus on security and prevention are respected to resolve risk efficiently and improve resilience against future cyber-attacks.

The CIS Control Framework consists of 20 essential actions referred to as the CSC (Critical Security Controls). These controls are intended to be adopted by companies eager to mitigate or block established cyber-attacks. The specified rules are categorized as Basic, Foundational, and Organizational, where the first six controls are necessary, the next ten is foundational, and the last four are organizational controls. Their key objectives are to exploit cyber-crime, educate cybersecurity, and concentrate on high payoff areas. CIS maintains that defense investments stay concentrated on addressing the most severe challenges. They strive to optimize the use of automation, implement security measures, and eradicate human error.

Summary

Last but not least, we have seen various security frameworks available in the existing market to use and start building up their security infrastructure. However, no one security framework is enough to create a real-time security strategy since each organization is different. It is a fundamental explanation that there are no universal security frameworks set as standards.

In the above article, I only highlighted some of the cybersecurity frameworks that have not been identified in detail due to the limitations of the article's words. If someone wants me to describe some framework separately, please include it in the comments section.

Kashif A

Cybersecurity Expert | Helping Businesses Achieve SOC2 & Compliance | vCISO | Conference Speaker

4 年
Syed Khaja Afzal Hussain CCDE, 2xCCIE?, PgMP?, TOGAF?

Technical Director Network Security & Cloud Infrastructure, Cloud Architect Consultant, Information and Cyber Security Expert

4 年

Cybercrime increasing at a rapid pace and they need cyber security expert in the domain of cloud, network and application...... SCyWF (NCA SAUDI ARABIA) SAMA Interesting article Faysal Sahab.....

要查看或添加评论,请登录

Faysal A. Ghauri的更多文章

社区洞察

其他会员也浏览了