Page 39 - CISSO_Prep_ Guide
P. 39

Use of a Framework

            The use of a framework is an excellent way to ensure that the
            security program is complete and thorough. A framework
            provides a skeleton that can be adapted for use in many
            organizations, even in different regions of the world. The use of
            a structure that is internationally recognized may provide more
            assurance to auditors or reviewers. This often adds additional
            assurance that the security program is complete and did not miss
            any critical issues. Some examples of common frameworks are
            shown here:



            ISO/IEC27002:2013 Information Technology - Security
            Techniques - Code of Practice for Information Security
            Management
            The ISO/IEC27002 outlines best practices and guidelines for
            Information Security Management. It, like most other best
            practices in the information security field, is based on the
            principles of risk management. It outlines the requirement to
            assess and treat security risks through a risk assessment
            methodology that balances business risk with the cost or
            expenditure of controls to manage the risk of harm to the
            business.

            The ISO/IEC27002 breaks controls into 14 security control
            categories with control objectives and 114 security controls that
            can be applied to meet the control objectives. The fourteen
            security control clauses are:
            - Information security policies
            - Organizing of information security
            - Human resources security
            - Asset management
   34   35   36   37   38   39   40   41   42   43   44