Skip to content

Latest commit

 

History

History
259 lines (167 loc) · 11.7 KB

File metadata and controls

259 lines (167 loc) · 11.7 KB

Security Frameworks & Standards

Comprehensive collection of security frameworks, compliance standards, and threat analysis models used across the cybersecurity industry.

NIST Framework Suite

The National Institute of Standards and Technology (NIST) publishes comprehensive cybersecurity frameworks and guidelines.

Core Frameworks

Security Controls

Risk Management

Specialized Guidelines


ISO/IEC Standards

International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) security standards.

Information Security Management

  • ISO/IEC 27001 - Information security management systems (ISMS) requirements
  • ISO/IEC 27002 - Code of practice for information security controls

Specialized ISO Standards


Industry Security Frameworks

Threat Intelligence & Attack Frameworks

MITRE Corporation:

Attack Models:

Application Security

Security Controls & Best Practices

  • CIS Controls - Critical security controls for effective cyber defense
  • CIS Benchmarks - Configuration best practices for various technologies

Cloud Security


Compliance & Regulatory Frameworks

Financial Services

Payment Card Industry:

  • PCI-DSS - Payment Card Industry Data Security Standard
    • Requirements for securing credit card transactions
    • Applies to all entities that store, process, or transmit cardholder data

Banking & Finance:

Healthcare

  • HIPAA Security Rule - Health Insurance Portability and Accountability Act
    • Protects electronic protected health information (ePHI)
    • Administrative, physical, and technical safeguards
  • HITECH Act - Health Information Technology for Economic and Clinical Health

Privacy Regulations

International:

United States:

Canada:

  • PIPEDA - Personal Information Protection and Electronic Documents Act

Federal & Government

United States Federal:

Defense:

Industry Standards

  • SOC 2 Type II - Service Organization Control 2
    • Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, Privacy
    • Common for SaaS and cloud service providers

Incident Response Frameworks

Response Methodologies

NIST Incident Response:

  • Preparation
  • Detection and Analysis
  • Containment, Eradication, and Recovery
  • Post-Incident Activity

SANS Incident Response:

  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned

Risk Management Frameworks

Enterprise Risk

IT Risk


Security Architecture Frameworks

Enterprise Architecture

Zero Trust


Industry-Specific Frameworks

Critical Infrastructure

  • NERC CIP - North American Electric Reliability Corporation Critical Infrastructure Protection
  • TSA Security Directives - Transportation security requirements

Manufacturing & IoT


Threat & Vulnerability Frameworks

Vulnerability Databases

Scoring Systems


Data Breach & Incident Frameworks

Incident Documentation


Maturity Models

Security Maturity

Governance Maturity

  • COBIT - Control Objectives for Information and Related Technologies
    • IT governance and management framework
    • Published by ISACA

Additional Resources

Framework Implementation Guides

Framework Mapping


Back to Resources | Back to Main