What Is the Relation Between Cybersecurity Capability, Control, and Function?
Deepayan C.
Cybersecurity Strategy, Architecture & Governance | Author | AI ML Advocate for Cybersecurity | Board Advisor | Cybersecurity Startup Mentor | Conference Speaker | Licensed Drone Pilot
We as security professionals regularly use the terms, Cybersecurity Capability, Cybersecurity Controls and Cybersecurity Function (no it is not the same as people, process and technology). And what you will also interestingly find is that these three terms have different meanings in different organizations, and many a times its incorrectly interpreted. Here is an example, We often hear about maturity assessment of security posture, what we actually do is that we assess Security Controls and determine how mature those controls are. Is there anything wrong with that approach? No, absolutely not, but that only gives us half the picture and a tactical view, it does not provide us with the holistic picture at a capability level and a strategic view. This gap in the layered applicability of these terms leads to various issues, ranging from building the right set of reference architecture, allocation and usage of resources (technology/finances/personnel) or assessing the maturity at all levels (not just tactical maturity).
You may have already come across varying theories and justifications with regards to the similarities or differences or how they are even related to each other. Cybersecurity capability. Cybersecurity control and Cybersecurity Functions are undoubtedly related concepts, but they have different hierarchies, meanings, and applications.?
Let’s take a closer look by understanding one by one how they are different, and then how they are related !
Here is an attempt to define these terms
Therefore, while we can say that cybersecurity capability, cybersecurity controls, and cybersecurity functions are individually distinct concepts, but they are also strongly interconnected and have interdependencies in determining an organization's ability to build cyber defence against cyber threats and to maintain an overall cybersecurity posture.
领英推荐
It may be important to point out that the cybersecurity capability comprises of security controls that are integrated through the cybersecurity function(s) to provide an organization with the ability to protect its information from cyber threats.
Diana Kelley , CISO at ProtectAI explains, "An organization's ability to protect, defend, and respond to attacks requires a strategic architecture and operating model that incorporates security controls and resource planning. Planning and architecture provide context for controls and functions to ensure optimal, best-fit security operations."
Let’s sum it up with two example cybersecurity capabilities:
Agnidipta Sarkar , Evangelist Emeritus, & Current Group CISO at Biocon mentions, "In a world where change is the only constant, keeping up with cyber security capability of a constantly changing digital landscape demands clarity of thought, a clear understanding of security controls and the components of a security function."
In summary, cybersecurity capability, security controls, and security functions are interconnected and work together to protect the organization's information and technology assets from cyber threats, but they differ in their specific focus areas and responsibilities. Cybersecurity capability refers to an organization's overall readiness to deal with security threats, security controls are the specific measures used to reduce the risk of a cyber-attack, and the security function is responsible for implementing and maintaining those security controls. And in case you want to arrange them in hierarchical order then, cybersecurity capability comes first in that order, followed by security controls and then the security functions.
Project Manager at Advania
5 个月Interesting post, thanks for sharing. And it would be even more interesting to see how someone has managed to implement a Cyber Security structure across the organization, with capability, control and functions, regardless of whether the structure is oriented top-down or bottom-up (as I understand Sam Graflund Wallentin is arguing). I really would like to see an example of such a Cyber Security Fabric, with all three terms, where the relations can be n:n in all directions. I also would like your opinion about Cybersecurity Measures and Cybersecurity Services, not always in 1:1 relation to a specific control. How to consider Network segmentation, a Network Monitoring Service, a SOC? How to consider the time frame, the service levels? And, finally; where should a company or business that has nothing in place today start? The Capability, the Functions or the Controls?
Head of Security Governance p? Swedbank
7 个月Thank you! We are currently discussing these things at this very moment. I would like to argue for a different interpretation. According to NIST, the function is the highest level of structure of cyber security activities, put together to fulfil a particular purpose. Other security standards and regulations on the matter have adopted this notion. Eg in EU Dora it is called an ICT risk management function. it is also sad that a function contains a set of predefined security capabilities, and can categorise a set of related control objectives. The function of govern contains a set of capabilities, so does protect, and recover and so. NIST also says that the security capability is a set of mutually reinforcing set of control controls implemented across people process technology, and that a security control is an activity or means putting in place to meet a particular control of objective. Overall, the concept of cyber Security core functions also resonate with common control attributes, e.g. preventive, detective, and responsive. I think there will be a conversation at some point on whether there are more types of controls, following the NIST logic, and to be applicable for risk management in general.
Join our 10th Anniversary at B2B Global Conference on 25th of October at Parramatta | Up to 50 exibitors | 10 plus sponsor | 200+ Attendees
1 年Deepayan, thanks for sharing!