14 Domains of ISO 27001: Cybersecurity Career Launcher
14 Domains of ISO 27001: Cybersecurity Career Launcher
14 Domains of ISO 27001: Cybersecurity Career Launcher
Assignment Day - 16
Name – Deepak C K
Assignment – 1
ISO 27001
It is the leading international standard focused on information security, published
by the International Organization for Standardization (ISO), in partnership with
the International Electrotechnical Commission (IEC). Both are leading
international organizations that develop international standards.
3. A.7. Human resource security: The controls in this section ensure that
people who are under the organization’s control are hired, trained, and managed
in a secure way; also, the principles of disciplinary action and terminating the
agreements are addressed.
SOC Experts
Cybersecurity Career Launcher
6. A.10. Cryptography: The controls in this section provide the basis for
proper use of encryption solutions to protect the confidentiality, authenticity,
and/or integrity of information.
8. A.12. Operations security: The controls in this section ensure that the
IT systems, including operating systems and software, are secure and protected
against data loss. Additionally, controls in this section require the means to record
events and generate evidence, periodic verification of vulnerabilities, and make
precautions to prevent audit activities from affecting operations.
11. A.15. Supplier relationships: The controls in this section ensure that
outsourced activities performed by suppliers and partners also use appropriate
information security controls, and they describe how to monitor third-party
security performance.
The ISO 27001 controls (also known as safeguards) are the practices to be
implemented to reduce risks to acceptable levels. Controls can be technical,
organizational, legal, physical, human, etc.
There are 114 ISO 27001 information security controls listed in the current 2013
revision of the standard (compared to 133 from the previous 2005 revision of the
standard). Here is a breakdown of what type of controls are included:
The General Data Protection Regulation (GDPR) is a legal framework that sets
guidelines for the collection and processing of personal information from
individuals who live in the European Union (EU). Since the Regulation applies
regardless of where websites are based, it must be heeded by all sites that attract
European visitors, even if they don't specifically market goods or services to EU
residents.
GDPR requirements apply to each member state of the European Union, aiming to
create more consistent protection of consumer and personal data across EU
nations. Some of the key privacy and data protection requirements of the GDPR
include:
HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) sets the
standard for sensitive patient data protection. Companies that deal with protected
health information (PHI) must have physical, network, and process security
measures in place and follow them to ensure HIPAA Compliance. Covered entities
(anyone providing treatment, payment, and operations in healthcare) and
business associates (anyone who has access to patient information and provides
support in treatment, payment, or operations) must meet HIPAA Compliance.
Other entities, such as subcontractors and any other related business associates
must also be in compliance.
The HHS requires physical and technical safeguards for organizations hosting
sensitive patient data. These physical safeguards include…
• Limited facility access and control with authorized access in place
• Using unique user IDS, emergency access procedures, automatic log off,
and encryption and decryption
• Audit reports or tracking logs that record activity on hardware and software
Other technical policies for HIPAA compliance need to cover integrity controls, or
measures put in place to confirm that ePHI is not altered or destroyed. IT disaster
recovery and offsite backup are key components that ensure that electronic media
errors and failures are quickly remedied so that patient health information is
recovered accurately and intact. One final technical safeguard is network, or
transmission security that ensures HIPAA compliant hosts protect against
unauthorized access to ePHI. This safeguard addresses all methods of data
transmission, including email, internet, or private networks, such as a private
cloud.
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) is required by the
contract for those handling cardholder data, whether you are a start-up or a global
enterprise. Your business must always be compliant, and your compliance must
be validated annually. It is generally mandated by credit card companies and
discussed in credit card network agreements.
CCPA
The Security Governance, Risk and Compliance (GRC) Analyst will focus on
facilitating the review, development, implementation, and documentation of EIS
security policies, procedures, processes, programs and practices to guide the
organization towards continuous compliance with ISO27001, DFARS/NIST 800-
171, and GDPR framework guidelines. The analyst will work with the overall
Enterprise Information Security team and internal business units to understand
our security, disaster recovery, and continuity posture for both third parties and
NetApp IT. Duties include collecting supporting evidences, identifying gaps in
expectations /capabilities, and drafts externally facing responses.
Duties and Responsibility
• Identifies security and continuity risks with the third-party relationships and
escalates as appropriate to business and risk stakeholders.
• Develops process documentation for completing third party reviews and
assessments.
• Leverages third party scanning software to assist in review of third parties
• Defines and delivers appropriate EIS GRC metrics, analytics, and scorecards.
• Collaborate with the internal business units to provide evidence and /or
information for internal and external audits.
Infosec analyst