Final
Final
Information security in
8 A.5.8 project management
Inventory of information
9 A.5.9 and other associated assets BAI09
Information security in
19 A.5.19 supplier relationships
Response to information
26 A.5.26 security incidents
Confidentiality or non-disclosure
43 A.6.6 agreements
44 A.6.7 Remote working
45 A.6.8 Information security event reporting
Management of technical
67 A.8.8 vulnerabilities DSS05.07
68 A.8.9 Configuration management
69 A.8.10 Information deletion
70 A.8.11 Data masking
71 A.8.12 Data leakage prevention
Redundancy of information
73 A.8.14 processing facilities
74 A.8.15 Logging
Installation of software on
78 A.8.19 operational systems
79 A.8.20 Network controls
80 A.8.21 Security of network services
81 A.8.22 Segregation in networks
82 A.8.23 Web filtering
83 A.8.24 Use of cryptography
94 EDM02
95 EDM03
96 EDM04
97 EDM 05
98 APO02
99 APO03
100 APO04
101 APO05
102 APO06
103 APO07
104 APO08
105 APO09
106 APO10
107 APO11
108 APO12
109 APO14
110 BAI01
111 BAI02
112 BAI04
113 BAI05
114 BAI06
115 BAI07
116 BAI10
117 BAI11
118 DSS03
119 DSS06
120 MEA01
121 MEA02
122 MEA04
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
]
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
170
171
172
Comarison of ISO 27001 and COB
Information
Security
Management
Purpose System (ISMS)
Focused on
information
security
(confidentiality
, integrity,
Scope availability)
International
standard
Control c Framework Type (certifiable)
Security risk
management,
controls,
Primary Focus compliance
4 Themes
(Organizational
, People,
Physical,
Technological)
Structure and 93 controls
Central and
Risk Management mandatory
Organizations
can be certified
(ISO-accredited
certification
Certification bodies)
Limited
governance
Governance Focus focus
ISO 27002
provides
detailed
Implementation Guidance guidance
Control-based
with some
Process Orientation processes
Emphasizes
auditing and
continuous
improvement
Auditing & Monitoring (PDCA model)
Security
officers, risk
managers, IT
compliance
Target Audience teams
Establishes a
robust,
certifiable
security
Key Benefit baseline
CONCLUSION
Information Protection
PR.IP Processes and Procedures
Business Environment
ID.BE
Expectations of stakeholders
GV.OC and contractual requirementd
ID.GV Governance
ID.RM
GV.RM
GV.IM Improvement
ID.GV Governance
ID.RM
ID.SC Supply Chain Risk Management
PR.MA Maintenance
PR.PT Protective Technology
DE.DP Detection Processes
Response Planning
RS.RP
RS.CO Communications
RS.IM Improvements
RC.RP Recovery Planning
RC.CO Communications
01 and COBIT Comparison of ISO 27001 and NIST
COBIT Feature/Area
Enables enterprise-level IT
governance and strategic alignment Framework Type
Structure
Governance & Risk
Security Perspective
Incident Management
Service Continuity
Asset Management
Implementation Guidance
Certification
CONCLUSION
Conclusion
Information Security
5.1.3 Management csm.1
csm.13
csm.19
Access Management pro.2
pro.20
pro.19
det.9
csm.16
csm.17
csm.2
imp.2
Workforce and Talent
5.1.14 Management pro.14
pro.1
det.6
csm.7
det.7
det.8
IT Asset Management /
Service Continuity
5.2.12 Management pro.18
det.1
det.5
Software Development
5.3.3 and Management pro.0
res.6
res.7
rec.3
res.8
imp.1
imp.4
imp.5
imp.3
Architecture Management
Continual Improvement
Knowledge Management
Portfolio Management
Project Management
Relationship Management
Strategy Management
Supplier Management
Availability Management
Business Analysis
Release Management
Service Design
Service Desk
Deployment Management
pro.15
pro.21
pro.3
pro.5
pro.6
pro.7
pro.8
pro.10
pro.12
pro,.13
csm.8
csm.10
csm.11
csm.12
csm.14
csm.15
csm.18
csm.19
det.2
det.3
res.1
res.3
res.4
res.5
res.9
res.10
res.11
rec.2
1 and NIST
ISO/IEC
27001 NIST CSF 2.0
Management
system +
controls Framework with core functions
Certification,
compliance Risk-based improvement roadmap
93 controls in
4 themes 106 subcategories in 6 functions
Central to
planning Embedded across all functions
Leadership &
planning
clauses Dedicated "Govern" function in 2.0
Formal and
prescriptive Flexible and outcome-based
Can be
mapped to
NIST CSF Official crosswalks exist
ITIL
(Information
Technology
Infrastructur ISO/IEC 27001 (Information Security
e Library) Management System)
IT Service
Management
(ITSM) Information Security Management (ISMS)
Deliver high-
quality IT
services
aligned with
business Protect confidentiality, integrity, and availability of
needs information
Best-practice
framework
(not
certifiable by
itself) International standard (certifiable)
Service
lifecycle:
Service
Strategy,
Design,
Transition,
Operation,
and Continual 4 control themes and 93 controls in Annex A
Improvement (Organizational, People, Physical, Technical)
Covers
governance
and risk
lightly
through
service
continuity
and
availability Strong emphasis on risk management and
management governance
Includes
security
management
as a process
within service
design and Security is the primary focus across the whole
operations management system
Detailed
process for
managing IT
service Control for managing information security
incidents incidents (A.16)
IT Service
Continuity
Management
(SCM) Information Security Continuity (A.17)
Service Asset
and
Configuration
Management
(SACM) Asset management (A.5 and A.8)
Detailed
guidance
through
practices and
roles Guidance through ISO 27002
No direct
certification
for ITIL;
organizations
certify in ISO
20000 Organizations can certify to ISO/IEC 27001
vices efficiently, with some security elements.
a comprehensive approach:
Control Name
Physical security controls are monitored for possible cyber security incidents
Communication mechanism with stakeholders and agencies is clearly defined for incident resolution
Contact details of Ministries, stakeholders,
vendors and agencies like NCIIPC & CERTIn for
incident resolutions are up to date
and documented