Relationship between frameworks and controls

In this article, we'll go over security frameworks, controls, and design principles in greater depth, as well as how they can be used in security audits to help protect organizations and people.

The relationship between frameworks and controls. Before we get there, let's define frameworks and controls.

Plans are put in place in an organization to protect against a wide range of threats, risks, and vulnerabilities. However, the requirements for protecting organizations and people frequently overlap. As a result, organizations use security frameworks as a starting point for developing their own security policies and procedures.

Let us begin by quickly defining frameworks. Security frameworks are guidelines for developing plans to reduce risk and threats to data and privacy. Frameworks aid organizations in adhering to compliance laws and regulations. For example, the healthcare industry uses frameworks to comply with the Health Insurance Portability and Accountability Act (HIPAA) of the United States, which requires medical professionals to keep patient information secure. 

Security controls are safeguards that are intended to mitigate specific security risks. Organizations use security controls to reduce risk and threats to data and privacy. For example, requiring patients to use multi-factor authentication (MFA) to access their medical records is a control that can be used in conjunction with frameworks to ensure a hospital's HIPAA compliance. It is unethical to use a measure like MFA to validate someone's identity is one way to help mitigate potential risks and threats to private data.



Specific Framework and control which helps to understand the relationship between Framework and control.


Organizations can use a variety of frameworks and controls to stay compliant with regulations and achieve their security objectives. The Cyber Threat Framework (CTF) and the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001 are two frameworks covered in this reading. Several common security controls that are used in conjunction with these types of frameworks are also discussed. 


CTF stands for Cyber Threat Framework.

According to the Office of the Director of National Intelligence, the CTF was created by the United States government to provide "a common language for describing and communicating information about cyber threat activity." The CTF assists cybersecurity professionals in more efficiently analyzing and sharing information by providing a common language for communicating information about threat activity. This enables businesses to improve their response to the constantly evolving cybersecurity landscape and threat actors' many tactics and techniques.

International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001


ISO/IEC 27001 is a globally recognized and widely used framework. The ISO 27000 family of standards enables organizations of all sizes and sectors to manage the security of assets such as financial information, intellectual property, employee data, and third-party information. This framework defines the requirements for an information security management system, as well as best practices and controls that help an organization manage risks. Although the ISO/IEC 27001 framework does not mandate the implementation of specific controls, it does provide a set of controls that organizations can use to improve their security posture.

Controls


Controls are used alongside frameworks to reduce the possibility and impact of a security threat, risk, or vulnerability. Controls can be physical, technical, and administrative and are typically used to prevent, detect, or correct security issues.


Examples of physical controls/safeguards:

  • Gates, fences, and locks
  • Security guards
  • Closed-circuit television (CCTV), surveillance cameras, and motion detectors
  • Access cards or badges to enter office spaces.

Examples of technical controls/safeguards:

  • Firewalls
  • MFA
  • Antivirus software


Examples of administrative controls/safeguards:

  • Separation of duties
  • Authorization
  • Asset classification

To learn more about controls, particularly those used to protect health-related assets from a variety of threat types, review the U.S. Department of Health and Human Services’ -Physical Access Control Presentation.


Final Thoughts:


Cybersecurity frameworks and controls are used in tandem to determine a company's security posture. They also help an organization meet security objectives and comply with laws and regulations. Despite the fact that these frameworks and controls are typically voluntary, organizations are strongly encouraged to implement and use them to help ensure the safety of critical assets.


Comments

Popular posts from this blog

What are 8 CISSP Domains and How to Crack the Exam Like a Boss?

Security Controls: Types with Examples and Best Practices

Cybersecurity, Common Key Security Terminologies and Key Roles and Responsibilities