CyberFrameworks Flashcards
COBIT
is a documented set of best IT security practices crafted by
the Information Systems Audit and Control Association (ISACA). It prescribes goals and requirements for security controls and encourages the mapping of IT security ideals to business objectives.
COBIT (6 principles)
■ Provide Stakeholder Value
■ Holistic Approach
■ Dynamic Governance System
■ Governance Distinct from Management
■ Tailored to Enterprise Needs
■ End-to-End Governance System
NIST 800-53 Rev. 5
U.S. government–sourced general recommendations for organizational security.
Center for Internet Security (CIS)
provides OS, application, and hardware security configuration guides
NIST Risk Management Framework (RMF)
establishes mandatory requirements for federal agencies. The
RMF has six phases: Categorize, Select, Implement, Assess, Authorize, and Monitor
NIST Cybersecurity Framework (CSF)
is designed for critical infrastructure and commercial organizations, and consists of five functions:
Identify,
Protect,
Detect,
Respond,
Recover.
It is a prescription of operational activities that are to
be performed on an ongoing basis for the support and improvement of security over time
ISO 27000
an international standard that can be the basis of implementing organizational security and related management practices
Information Technology Infrastructure Library (ITIL)
rafted by the British government, is a set of recommended best practices for optimization of IT services to support business growth, transformation, and change. ITIL focuses
on understanding how IT and security need to be integrated with and aligned to the
objectives of an organization. ITIL and operational processes and is often used as a
starting point for the crafting of a customized IT security solution within an established
infrastructure
threat modeling framework
assets/attackers/software, STRIDE, PASTA, VAST, diagramming, reduction/decomposing, and DREAD.
STRIDE
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege
PASTA
Process for Attack Simulation and Threat Analysis .
. PASTA is a risk-centric approach that aims at selecting or developing
countermeasures in relation
VAST
Visual, Agile, and Simple Threat.
is a threat modeling concept that integrates
threat and risk management into an Agile programming environment on a scalable basis