APPENDIX B

Standards and Good Practice Guidelines

In this Appendix, we shall cover two areas that provide detailed information. The first area is that of Standards, which are divided into two principle types:

In some cases, organizations can be independently assessed for compliance with requirement standards—for example ISO/IEC 27001, and the accreditation they then enjoy can be used as a benefit when tendering for business.

Standards are generally developed at a national or international level. For example, in the United States, the NIST is the body responsible; in the United Kingdom, it is the British Standards Institute (BSI); while international standards are developed by these and other standards bodies within the wider ISO. It is worth noting that NIST standards are downloadable at no cost, but many national standards and ISO standards must be purchased.

The second area is that of good practice guidelines. These tend to be developed by the organizations that are the main source of knowledge for the subject matter. While there are many commercial organizations developing good practice guidelines for cybersecurity, these often tend to be product-specific, and the wider-ranging advice generally appears at a governmental level, or from a noncommercial independent body such as the Information Security Forum (ISF), the Business Continuity Institute, or the Disaster Recovery Institute.

Other relevant standards include the American government’s Federal Information Processing (FIPS) standards, the Internet Engineering Task Force, Requests For Comment, and the International Telecommunications Union standards.

ISO/IEC 27000 Series Standards

There are more than 50 information security-related standards from ISO. Not all may be immediately relevant to the reader, but I have included them for completeness. You should also be beware that the ISO standards portfolio is growing rapidly, and by the time you read this book, more may have been produced. However, I have made best efforts to ensure that the list is up-to-date at the time of writing. Where appropriate, a brief description of the standard has been included.

ISO/IEC 27000:2017—Information technology—Security techniques—Information security management systems (ISMS)—Overview and vocabulary

Apart from providing definitions of commonly used terms, this standard describes how an ISMS should work, and goes on to mention some of the standards listed herewith.

ISO/IEC 27001:2017—Information technology—Security techniques—ISMS—Requirements

Although it covers areas beyond pure cybersecurity, this is the main standard, and it is against this that organizations can be accredited. Sections 4 to 10 describe the mandatory elements of the standard, and the abbreviated list of controls in its Annex A are described in much greater detail in ISO/IEC 27002:2017.

ISO/IEC 27002:2017—Information technology—Security techniques—Code of practice for information security controls

This standard provides detailed descriptions of the controls listed in Annex A of ISO/IEC 27001:2017.

ISO/IEC 27003:2017—Information technology—Security techniques—ISMS implementation guidance

This standard provides guidance on planning an ISMS aligned to ISO/IEC 27001.

ISO/IEC 27004:2016—Information technology—Security techniques—Information security management measurements

This standard covers the types of metric and measurements that can be applied to an ISO/IEC 27001 program.

ISO/IEC 27005:2011—Information technology—Security techniques—Information security risk management

This is the main standard used when conducting an information risk management program, and can form a major input to ISO/IEC 27001.

ISO/IEC 27006:2015—Information technology—Security techniques—Requirements for bodies providing audit and certification of ISMS

Although this standard is less relevant to individual organizations looking to attain ISO/IEC 27001 certification, it does illustrate the guidance for those bodies that provide the certification.

ISO/IEC 27007:2017—Information technology—Security techniques—Guidelines for ISMS auditing

As with the previous example, this standard is somewhat less relevant to organizations wishing to develop an ISMS program, but has been included for completeness.

ISO/IEC 27008:2011—Information technology—Security techniques—Guidelines for auditors on information security controls

This standard provides a slightly different aspect of the ISMS audit function—this time dealing with guidance on specific controls.

ISO/IEC 27009:2016—Information technology—Security techniques—Sector-specific application of ISO/IEC 27001—Requirements

This standard defines how to apply BS ISO/IEC 27001:2017 in a sector (field, application area, or market area) that has common security requirements, but where those requirements are unique to that sector.

ISO/IEC 27010:2015—ISMS—Information security management for intersector and interorganizational communications

This standard was developed with the express intention of exchanging information securely between organizations, especially when concerned with sharing information on security issues.

ISO/IEC 27011:2016—Information technology—Security techniques—Information security management guidelines for telecommunications organizations based on ISO/IEC 27002

The standard is for telecommunication organizations and will enable them to meet baseline the ISMS requirements of confidentiality, integrity, availability, and any other relevant security properties of telecommunication services.

ISO/IEC 27013:2015—Information technology—Security techniques—Guidance on the implementation of ISO/IEC 27001 and ISO/IEC 20000–1

This standard provides guidance on what organizations need to do in order to build a management system that integrates ISO/IEC 27001 and also ISO/IEC 20000, which is concerned with service management.

ISO/IEC 27014:2013—Information technology—Security techniques—Governance of information security

This standard allows organizations to make decisions about information security issues in support of the strategic organizational objectives.

ISO/IEC 27015:2012—ISMS—Information security management guidelines for financial services

This standard is important for any organization planning to offer financial services covered by an ISMS. It may also be useful to consumers of such services.

ISO/IEC 27016:2014—Information technology—Security techniques—Information security management—Organizational economics

This standard will be useful when making information security investment decisions, as will those who have to prepare the business cases for information security investment.

ISO/IEC 27017:2015—Information technology—Security techniques—Code of practice for information security controls based on ISO/IEC 27002 for cloud services

This standard will be useful to organizations wishing to become providers or users of cloud services, both by identifying their responsibilities to ensure the certification of related security controls and as a checklist to ensure that potential providers of the cloud service have the necessary security policies, practices, and controls in place.

ISO/IEC 27018:2014—Information technology—Security techniques—Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

This standard is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, which provide information processing services as PII processors via cloud computing under contract to other organizations.

ISO/IEC 27019:2017—Information technology—Security techniques—Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry

This standard is important for any organization in the energy utility sector planning to operate an ISMS. It may also be useful to related organizations such as utility plant suppliers, systems integrators, and auditors.

BS ISO/IEC 27021:2017—Information technology. Security techniques. Competence requirements for ISMS professionals

ISO/IEC 27031:2011—Information technology—Security techniques—Guidelines for information and communication technology readiness for business continuity

This standard provides guidelines for the preparation of information and communications technology systems in meeting business continuity requirements, and relates to ISO 22301.

ISO/IEC 27032:2012—Information technology—Security techniques—Guidelines for cybersecurity

This standard will be of much greater value to those organizations that are investing in protection against cybersecurity problems. It provides a detailed framework for identifying cybersecurity issues and a high-level set of controls for dealing with them.

ISO/IEC 27033–1:2015—Information technology—Security techniques—Network security—Overview and concepts

The first of five standards relating to network security, this standard deals with the main issues that organizations are likely to face.

ISO/IEC 27033–2:2012—Information technology—Security techniques—Guidelines for the design and implementation of network security

This standard takes matters to the next level and defines the network security requirements that are likely to be needed, and provides a checklist.

ISO/IEC 27033–3:2010—Information technology—Security techniques—Network security—Reference networking scenarios—Threats, design techniques, and control issues

This standard deals with security network design principles, and examines the threats and possible controls associated with them.

ISO/IEC 27033–4:2014—Information technology—Security techniques—Network security—Securing communications between networks using security gateways

This standard provides guidance on securing communications between networks using security gateways and firewalls, and introduces the concept of both intrusion detection systems (IDS) and intrusion prevention systems (IPS).

ISO/IEC 27033–5:2013—Information technology—Security techniques—Network security—Securing communications across networks using Virtual Private Networks (VPNs)

The final part of this standard deals with securing network interconnections and how to connect remote users by providing VPNs.

BS ISO/IEC 27033-6:2016—Information technology Security techniques Network security Securing wireless IP network access

ISO/IEC 27034–1:2011—Information technology—Security techniques—Application security—Overview and concepts

This standard sets the scene for the secure development of applications, and in particular, deals with the application of security management process.

ISO/IEC 27034–2:2015 – Information technology—Security techniques—Application security—Organization normative framework

This standard follows on from ISO/IEC 27034-1, and provides more detailed guidance on the implementation of application security, including a detailed description of the application security life cycle reference model.

ISO/IEC 27035:2011—Information technology—Security techniques—Information security incident management

This standard deals with the management of cybersecurity incidents.

ISO/IEC 27034-5:2017—Information technology—Security techniques—Application security—Protocols and application security controls data structure

ISO/IEC 27034-6:2016—Information technology—Security techniques—Application security—Case studies

ISO/IEC 27035-1:2016—Information technology—Security techniques—Information security incident management—Principles of incident management

ISO/IEC 27035-2:2016—Information technology—Security techniques—Information security incident management—Guidelines to plan and prepare for incident response

ISO/IEC 27036–1:2014—Information technology—Security techniques—Information security for supplier relationships—Overview and concepts

This series of three standards examines the security requirements for the relationship between organizations and their suppliers. A fourth standard is currently under development which will cover cloud supplier relationships.

ISO/IEC 27036–2:2014—Information technology—Security techniques—Information security for supplier relationships—Requirements

This standard goes into greater detail regarding the technical security requirements that must be agreed and managed between an organization and its suppliers.

ISO/IEC 27036–3:2013—Information technology—Security techniques—Information security for supplier relationships—Guidelines for information and communication technology supply chain security

Frequently, supply chains are multilayered and global, and this third standard in the series provides guidance on managing the complex risk environment.

ISO/IEC 27037:2016—Information technology—Security techniques—Guidelines for the identification, collection, acquisition, and preservation of digital evidence

When cyber incidents occur, it may be necessary to preserve evidence of the fact, and this standard provides guidelines for the forensic preservation of evidence.

ISO/IEC 27038:2016—Information technology—Security techniques—Specification for digital redaction

When organizations require to anonymize information within a document or to redact it completely, this standard provides guidelines on the process and techniques, and may be useful in information-sharing situations.

ISO/IEC 27039:2015—Information technology—Security techniques—Selection, deployment, and operations of IDPS

IDPS can provide an analysis of host and network traffic and/or audit trails for attack signatures or specific patterns that usually indicate malicious or suspicious intent. This Standard provides guidelines for effective IDPS selection, deployment, and operation, as well as fundamental knowledge about IDPS.

ISO/IEC 27040:2016—Information technology—Security techniques—Storage security

This standard applies to all data owners, ICT managers, and security officers from small enterprises to global organizations, as well as manufacturers of general and specialized data storage products, and is particularly relevant to data destruction services.

ISO/IEC 27041:2016—Information technology—Security techniques—Guidance on assuring the suitability and adequacy of incident investigative method

This standard contains an assurance model with details of how to validate the methods used for investigations and shows how internal and external resources can be used to carry out assurance.

ISO/IEC 27042:2016—Information technology—Security techniques—Guidelines for the analysis and interpretation of digital evidence

This standard provides a detailed framework for investigation, giving guidance on how to structure and prioritize investigative stages in order to produce analysis and reports that can be used to improve security in the future.

ISO/IEC 27043:2016—Information technology. Security techniques. Incident investigation principles and processes

This standard is intended to aid in digital investigations, with the aim that a suitably skilled investigator should obtain the same result as another similarly skilled investigator, working under similar conditions.

ISO/IEC 27050-3:2017—Information technology—Security techniques—Electronic discovery—Code of practice for electronic discovery

ISO/IEC 27050-3:2017—Information technology—Security techniques—Electronic discovery—Code of practice for electronic discovery

Other Relevant ISO Standards

ISO/IEC 17788:2014—Information technology—Cloud computing—Overview and vocabulary, and

ISO/IEC 17789:2014—Information technology—Cloud computing—Reference architecture

These two standards should appeal to all kinds of cloud customers—from small enterprises to global organizations—and to all kinds of cloud providers and partner organizations such as software developers and auditors.

ISO/IEC 24762:2008—Information technology—Security techniques—Guidelines for information and communications technology disaster recovery services

This standard takes us into the area of disaster recovery, and is aimed at aiding the operation of an ISMS by providing guidance on the provision of information and communications technology disaster recovery services as part of business continuity management.

ISO/IEC 29100:2011—Information technology—Security techniques—Privacy framework

This standard provides a high-level framework for the protection of PII within ICT systems.

ISO/IEC 29101:2013—Information technology—Security techniques—Privacy architecture framework

The guidance in this standard is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering, and operating ICT systems that process PII. It focuses primarily on ICT systems that are designed to interact with PII principles.

ISO/IEC 29147:2014—Information technology—Security techniques—Vulnerability disclosure

This standard provides guidelines for vendors to be included in their business processes when receiving information about potential vulnerabilities and distributing vulnerability resolution information.

ISO/IEC 29190:2015—Information technology—Security techniques—Privacy capability assessment model

This standard provides guidance for organizations in producing an overall “score” against a simple capability assessment model; a set of metrics indicating assessment against key performance indicators; and the detailed outputs from privacy process management audits and management practices.

ISO/IEC 30111:2013—Information technology—Security techniques—Vulnerability handling processes

This standard describes processes for vendors to handle reports of potential vulnerabilities in products and online services.

Business Continuity Standards

The following is a list of the most relevant standards and good practice guidelines, and includes standards relating to incident and crisis management, both of which may be required as part of a business continuity program, and especially in response to a cybersecurity incident.

ISO 22300:2014—Societal security—Terminology

ISO 22301:2014 Societal security—Business continuity management systems—Requirements. It specifies the requirements to

ISO 22313:2014—Societal security—Business continuity management systems—Guidance

ISO 22316:2017—Security and resilience—Organizational resilience—Principles and attributes. It provides terminology relating to, and the principles for, organizational resilience. It identifies attributes and activities that support an organization in enhancing its organizational resilience.

PD ISO/TS 22317:2015—Societal security—Business continuity management systems—Guidelines for business impact analysis

ISO 22318:2015—Societal security—Business continuity management systems—Guidelines for supply chain continuity

ISO 22320:2011 Ed 1—Societal security—Emergency management—Requirements for incident response

ISO 22322:2015—Societal security—Emergency management—Guidelines for public warning

ISO 22325:2016—Security and resilience—Emergency management—Guidelines for capability assessment

ISO/IEC 24762:2008—Information technology. Security techniques. Guidelines for information and communications technology disaster recovery services

ISO/IEC 27031:2011 Guidelines for information and communication technology readiness for business continuity

ISO 22324:2015—Societal security—Emergency management—Guidelines for color-coded alerts

PD 25111:2010—Business continuity management—Guidance on the human aspects of business continuity

PD 25666:2010—Business continuity management. Guidance on exercising and testing for continuity and contingency programs

BS 11200:2014—Crisis management. Guidance and good practice

PAS 77:2006 IT Service Continuity Management—Code of Practice.

All the aforementioned BS and ISO standards can be purchased in either hard copy or electronic form (pdf) from the ANSI Webstore at https://webstore.ansi.org (payment in US Dollars), from the ISO Store https://www.iso.org/store.html (payment in Swiss Francs), and from the BSI Online Shop at: http://shop.bsigroup.com (payment in Sterling).

NIST Standards

At the time of writing, there are around 185 NIST SP 800 series standards relating to information security—there are rather too many to list individually here and the list is being added to all the time, and can be found at: https://csrc.nist.gov/publications/sp800

Also at the time of writing, there are 11 NIST Draft Cyber Security guides in the SP-1800 series at: https://csrc.nist.gov/publications/sp1800. Some of these are still in draft form.

 

SP 1800-1 Securing Electronic Health Records on Mobile Devices
SP 1800-2 Identity and Access Management for Electric Utilities
SP 1800-3 Attribute Based Access Control (2nd Draft)
SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds
SP 1800-5 IT Asset Management: Financial Services
SP 1800-6 Domain Name System-Based Electronic Mail Security
SP 1800-7 Situational Awareness for Electric Utilities
SP 1800-8 Securing Wireless Infusion Pumps in Healthcare Delivery Organizations
SP 1800-9 Access Rights Management for the Financial Services Sector
SP 1800-11 Data Integrity: Recovering from Ransomware and Other Destructive Events
SP 1800-12 Derived Personal Identity Verification (PIV) Credentials

 

The Federal Information Processing (FIPS) Standards

These are nine relevant FIPS Standards, available at https://csrc.nist.gov/publications/fips

 

FIPS 140-2 Security Requirements for Cryptographic Modules
FIPS 180-4 Secure Hash Standard
FIPS 186-4 Digital Signature Standard
FIPS 197 Advanced Encryption Standard
FIPS 198-1 The Keyed-Hash Message Authentication Code
FIPS 199 Standards for Security Categorization of Federal Information and Information
FIPS 200 Minimum Security Requirements for Federal Information and Information
FIPS 201-2 PIV of Federal Employees and Contractors

 

Good Practice Guidelines

There are many examples of good practice guidelines on the Internet, making it an impossible task to list them all. However, the following are of particular note, and will direct the reader to those guidelines of interest and will provide the level of detail required.

NIST

Details of the NIST Framework for Improving Critical Infrastructure Cybersecurity can be found at https://www.nist.gov/cyberframework

NIST has also published a document entitles Small Business Information Security: The Fundamentals, which can be downloaded from: https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.7621r1.pdf

US-CERT (United States Computer Emergency Readiness Team)

US-CERT is tasked with responding to major incidents, analyzing threats, and exchanging critical cybersecurity information with trusted partners around the world in addition to providing its users with alerts, current activity, bulletins, and tips. https://www.us-cert.gov/ncas

Information Security Forum (ISF)

Organizations that are members of the ISF have access to the Forum Standard of Good Practice, the most recent version being from 2013. See https://www.securityforum.org/tool/the-isf-standardrmation-security/

CESG

CESG (National Technical Authority for Information Assurance, formerly Communications-Electronics Security Group), the Information Security Arm of the UK’s GCHQ has produced a document entitled “10 Steps to Cyber Security.”