Information Security Standards
Information Security Standards
eu
Abstract: The use of standards is unanimously accepted and gives the possibility of comparing a personal
security system with a given frame of reference adopted at an international level. A good example is the ISO
9000 set of standards regarding the quality management system, which is a common reference regardless of the
industry in which a certain company activates. Just like quality control standards for other industrial processes
such as manufacturing and customer service, information security standards demonstrate in a methodical and
certifiable manner that an organization conforms to industry best practices and procedures. This article offers a
review of the world’s most used information security standards.
Key-Words: Information Security Standards, ISO/IEC 27001, ISO/IEC 27002, ISO/IEC 17799, COBIT, NIST SP-
800 series, Federal Office for Information Security (BSI), ISF – Standard of good practice for Information
Security.
128
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011
ISSN 2067 – 4074
130
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011
ISSN 2067 – 4074
131
www.jmeds.eu
2. Computer security is a central element companies, from North America, Asia, and
of sound management other locations around the world. Groups
3. Computer security should be cost of members are organized as chapters
throughout Europe, Africa, Asia, the Middle
effective
East, and North America. The ISF is
4. Computer security responsibilities and headquartered in London, England, but
accountability should be made explicit also has staff based in New York City.
5. System owners have security The membership of the ISF is international
responsibilities outside their own and includes large organizations in
organizations transportation, financial services,
6. Computer security requires a chemical/pharmaceutical, manufacturing,
government, retail, media,
comprehensive and integrated
telecommunications, energy,
approach transportation, professional services, and
7. Computer security should be other sectors.
periodically reassessed The Standard of Good Practice (SoGP)
8. Computer security is constrained by was first released in 1996 by the
societal factors Information Security Forum (ISF) and it
The document, along with the rest of the represents a detailed documentation of
series, goes on to outline in detail the best practice for information security. The
specific strategies, procedures and controls Standard is published and revised
by which security issues can be addressed biannually.
in compliance with these principles. They Standard of Good Practice, which is freely
cover areas such as Guidelines on available, derives from the ISO/IEC 27002
Electronic Mail Security (SP800-45), and COBIT v4.1. standards and outlines a
Building an Information Technology functional information security
Security Awareness and Training Program methodology based on both research and
(SP800-50), Electronic Authentication real world experience. The standard is
Guidelines (SP800-63) and Guidelines for centered around the following six key
Secure Web Services (SP800-95) to aspects:
mention just a few. By explaining 1. Computer installations. This aspect is
important concepts, cost considerations, targeted chiefly at IT specialists, and
and interrelationships of security controls addresses the hardware and software
the handbook provides assistance in that supports the critical business
securing computer-based resources applications.
(including hardware, software, and 2. Critical business applications. These
information).
are the applications on which the
Although NIST doesn't itself provide a
certification program, it provides support organization's activities depend. This
for a range of initiatives in the areas of aspect is primarily targeted at the CBA
awareness, training and education. owners, the individuals in charge of
business processes and systems
5. ISF Standard of Good Practice integrators.
for Information Security 3. Security management. The security
management aspect is targeted at
The Information Security Forum (ISF) is an security decision makers and auditors.
international, independent, non-profit It handles management level decision
organization dedicated to benchmarking making in relation to security
and best practices in information security.
implementations across the
It was established in 1989 as the European
Security Forum but expanded its mission organization.
and membership in the 1990s, so that it 4. Networks. Networks form a special
now includes hundreds of members, category due to their unique security
including a large number of Fortune 500 vulnerabilities. Its target is typically
132
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011
ISSN 2067 – 4074
133
www.jmeds.eu
134
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011
ISSN 2067 – 4074
best practice for information security [3] National Institute for Standards and
management such as the standards Technology, An introduction to Computer
described above. By implementing one of Security – The NIST Handbook – SP 800-
these standards organizations can benefit 12, NIST 1995, http://csrc.nist.gov.
from common best practice at an
[4] Information Security Forum, The
international level, and can prove the
Standard of Good Practice for Information
protection of their business processes and
Security, ISF 2007,
activities in order to satisfy business
https://www.isfsecuritystandard.com/SOG
needs. The only problem is to choose
P07/index.htm.
which of the standards is appropriate for
an organization judging by the nature and [5] Erik Guldentops, Tony Betts, Gary
field of activity. Although there are a Hodgkiss, Aligning COBIT, ITIL and ISO
number of information security standards 17799 for Business Benefit,
available, an organization can only benefit http://www.isaca.org 2007
if those standards are implemented
[6] Jimmy Heschl, Cobit Mapping:
properly. Security is something that all
Overview Of International IT Guidance -
parties should be involved in. Senior
2nd edition, IT Governance Institute USA
management, information security
http://www.isaca.org 2007
practitioners, IT professionals and users all
have a role to play in securing the assets [7] Federal Office for Information Security
of an organization. The success of (BSI), BSI Standard 100-1 Information
information security can only be achieved Security Management System,
by full cooperation at all levels of an http://www.bsi.de/english/publications/bsi
organization, both inside and outside. _st andards/index.htm 2008
[8] Federal Office for Information Security
(BSI), BSI Standard 100-2 IT-Grundschutz
References Methodology,
[1] International Organization for http://www.bsi.de/english/publications/bsi
Standardization - International _st andards/index.htm 2008
Electrotechnical Commission Joint
Technical Committee1, ISO/IEC 27002- [10] Federal Office for Information
Information technology -- Security Security (BSI), BSI Standard 100-3 Risk
techniques -- Information security Analysis based on IT-Grundschutz,
management systems -- Requirements, http://www.bsi.de/english/publications/bsi
2007. _st andards/index.htm 2008.
135