As well as the ISO27k standards, there are many other ISO/IEC and non-ISO/IEC standards and methods relating to information security, risk management and similar fields. Here is a selection of the most widely known and relevant standards and methods, drawing in part on an excellent summary of security standards in the draft APEC-TEL Information Systems Security Standards Handbook (unfortunately no longer readily available online). THIS IS NOT A COMPLETE, COMPREHENSIVE OR DEFINITIVE LIST! [If you know of other security standards, or if we have incorrectly described any here, do please let us know. Thank you to those who have taken the trouble to provide up-to-date information and commentary.]
Security-related ISO standards
ISO 9000 and related SDLC/QA standards
The ISO 9000 family of quality management standards define quality as the features of a product or service which are required by the customer. Quality management is what an organization does to ensure that its products or services satisfy the customers’ quality requirements and comply with applicable regulations.
The following standards cover the application of quality management principles specifically to the Software Development Life Cycle:
ISO/IEC 7498 Open Systems Interconnect (OSI) security model
This multi-partite standard defines the OSI reference model, describing an architecture to secure network communications through security services (access control, authentication, data integrity, data confidentiality and non-repudiation) and security mechanisms (encipherment, digital signature, access control, data integrity, authentication exchange, traffic padding, routing control and notarization).
ISO/IEC 10181 Security frameworks
This eight-part standard addresses the application of security services in an OSI environment with ODP, databases and distributed applications. The eight parts cover:
Through core concepts such as security domains, security authorities, security policies, trust and trusted third parties, the standard describes the basic concepts of the specific security service, identifies mechanisms to support the service, defines the management and supporting services and identifies functional requirement for protocols (but without actually specifying the protocols).
ISO/IEC 13335 IT security management
ISO/IEC 13335 (which started life as a Technical Report TR before becoming a full ISO/IEC standard) comprises a set of guidelines for the management of IT security, focusing primarily on technical security control measures:
ISO/IEC 13335-1:2004 Information technology – Security techniques – Management of information and communications technology security – Part 1: Concepts and models for information and communications technology security management explains the concepts and models for information and communications technology security management. (ISO/IEC TR 13335 parts 1 and 2 were combined into the revised ISO/IEC 13335-1:2004)
ISO/IEC 13335-2 - withdrawn and replaced by an updated part 1.
ISO/IEC TR 13335-3
:1998 Information technology – Guidelines for the Management of IT Security – Part 3: Techniques for the management of IT Security
covers techniques for the management of IT security. This part of the standard has been withdrawn and replaced by ISO/IEC 27005
ISO/IEC TR 13335-4
:2000 covers the selection of safeguards
(meaning technical security controls). This part of the standard has also been withdrawn and replaced by ISO/IEC 27005
ISO/IEC TR 13335-5
:2001 provides management guidance on network security. This part of the standard has been withdrawn and replaced by ISO/IEC 18028-1 which will presumably become part of ISO/IEC 27033
in due course.
ISO TR 13569 Financial services - information security guidelines
ISO TR 13569:2005 guides financial services organizations on the development of an information security programme with advice on policies, organization and structure, plus legal and regulatory compliance. The selection and implementation of security controls necessary to manage information security risks are discussed in the context of the business environment, practices and procedures.
ISO/IEC 13888 Non-repudiation
This tripartite standard describes non-repudiation mechanisms based on digital certificates generated using symmetric or asymmetric encryption, used to generate evidence and resolve disputes.
ISO/IEC 13888-1: General model
ISO/IEC 13888-2: Mechanisms using symmetric techniques
ISO/IEC 13888-3: Mechanisms using asymmetric techniques
ISO 15292 Protection profile registration procedures
A Protection Profile is an implementation-independent set of security requirements for a category of IT products or systems, which meet specific consumer needs. ISO 15292 defines the procedures to be applied by a Registration Authority in operating a Register of Protection Profiles and ‘packages’ (reusable sets of functional or assurance components combined together to satisfy a set of identified security objectives) for the purposes of IT security evaluation.
ISO 15408 Common Criteria
ISO 15408:1999 is a multipartite standard describing the Common Criteria for Information Technology Security Evaluation. Products that are evaluated against the Common Criteria (CC) have a defined level of assurance as to their information security capabilities that is recognized in most of the world. Unfortunately, the evaluation process is extremely costly and slow, and is therefore not widely used outside of the government and defense markets. It also impedes product development since patching can invalidate the certified assurance.
ISO/IEC 15408-1: Introduction and general model defines general concepts and principles of IT security evaluation and presents a general model of evaluation. Part 1 also presents constructs for expressing IT security objectives, for selecting and defining IT security requirements, and for writing high-level specifications for products and systems. In addition, the usefulness of each part of the CC is described in terms of each of the target audiences.
ISO/IEC 15408-2: Security functional requirements establishes a set of security functional components as a standard way of expressing the security functional requirements for Targets of Evaluation (TOEs). It catalogues the functional components, families and classes.
ISO/IEC 15408-3: Security assurance requirements establishes a set of assurance components as a standard way of expressing the assurance requirements for TOEs. It catalogues the set of assurance components, families and classes, defines evaluation criteria for Protection Profiles (PPs) and Security Targets (STs), and presents Evaluation Assurance Levels (EALs), the CC’s scale for rating assurance for TOEs. [Sorry about the alphabet soup, it’s an occupational hazard in this field.]
ISO 15408 also provides two useful threat-related definitions:
ISO 15489 Records management
ISO 15489:2001 is a records management standard in two parts:
Part 1 describes a “high level framework for recordkeeping and specifically addresses the benefits of records management, regulatory considerations affecting its operation and the importance of assigning of responsibilities for recordkeeping. It also discusses high level records management requirements, the design of recordkeeping systems and actual processes involved in records management, such as record capture, retention, storage, access etc. It concludes with a discussion of records management audit operations and training requirements for all staff of an organisation.”
Part 2 provides “practical and more detailed guidance about how to implement the framework outlined in Part 1. For example it provides specific detail about the development of records management policy and responsibility statements and outlines the DIRKS process for developing recordkeeping systems. Part 2 also provides practical guidance about the development of records processes and controls and specifically addresses the development of key recordkeeping instruments such as thesauri, disposal authorities and security and access classification schemes. It then discusses the use of these tools to capture, register, classify, store, provide access to and otherwise manage records. Part 2 also provides specific guidance about the establishment of monitoring, auditing and training programs to promote and effectively implement records management within an organisation.”
ISO/IEC 17021 Conformity assessment -- requirements for bodies providing audit and certification of management systems
A new edition of this standard was released in 2011. It defines generic requirements for audit and certification bodies in relation to assessing and certifying management systems. The 2006 edition identified the need for auditor impartiality, competence, responsibility, openness, confidentiality, and complaint handling. The 2011 version expands on auditor competence and the management of certification auditors, stressing consistency of process.
ISO/IEC 17021 is referenced as a normative standard by ISO/IEC 27006, meaning that it is considered essential for users of ’27006.
ISO/IEC 18028 IT network security
ISO/IEC 18028 is a 5-part standard that expands on the details of ISO/IEC 27002 sections 10.6 and 11.4 and extends the IT security management guidelines provided in ISO/IEC 13335 by detailing the specific operations and mechanisms needed to implement network security safeguards and controls in a wider range of network environments, providing a bridge between general IT security management issues and network security technical implementations:
:2006 Information technology. Security techniques. IT network security. Network security management.
Provides detailed guidance on the security aspects of the management, operation and use of IT networks and interconnections. Defines and describes the concepts associated with, and provides management guidance on, network security - including on how to identify and analyze the communications-related factors to be taken into account to establish network security requirements, with an introduction to the possible control areas and the specific technical areas of concern.
:2005 Information technology. Security techniques. IT network security. Network security architecture.
Defines a network security architecture for providing end-to-end network security. The architecture can be applied to various kinds of networks where end-to-end security is a concern and independently of the network's underlying technology. Serves as a foundation for developing the detailed recommendations for the end-to-end network security.
:2005 Information technology. Security techniques. IT network security. Securing communications between networks using security gateways.
Provides an overview of security gateways through a description of different architectures, outlining the techniques for security gateways to analyze network traffic i.e. packet filtering, stateful packet inspection, application proxy, network address translation and content analysis and filtering. Provides guidelines for the selection and configuration of security gateways.
:2005 Information technology. Security techniques. IT network security. Securing remote access.
Provides guidance for securely using remote access - a method to remotely connect a computer either to another computer or to a network using public networks - and its implication for IT security. Introduces the remote access protocols, discusses authentication.
:2006 Information technology. Security techniques. IT network security. Securing communications across networks using virtual private networks.
Provides detailed guidance on the security aspects of the management, operation and use of IT networks, and their inter-connections. Defines techniques for securing inter-network connections using virtual private networks (VPNs). Supports IT network managers, administrators, technicians and IT security officers choosing the appropriate VPN. Describes general principals of organization, structure, framework and usage of a VPN. Discusses functional area, used standards and network protocols, the various types of VPN, their respective requirements, characteristics and other aspects.
The five-part ISO/IEC 18028 is being adopted into the ISO27k family as ISO/IEC 27033, a seven-part standard (clearly this is more than a simple re-numbering).
ISO/IEC 18043 Selection, deployment and operations of Intrusion Detection Systems (IDS)
ISO/IEC 18043:2006 focuses on the security principles behind unauthorized intrusion into computer systems/networks and how organizations can establish frameworks to enable comprehensive Intrusion Detection Systems (IDS). It addresses IDS selection, deployment and operation to help IT managers set up standard, and hence interoperable, IDS configurations.
ISO/IEC TR 18044 Security incident management
Please see the page on ISO/IEC 27035 for information on this standard.
ISO 19011 Guidelines for auditing management systems
ISO 19011:2011 provides an introduction to compliance auditing against various ISO management systems standards. Although ISO27k is not covered explicitly, Annex A uses ISMS as an example of the discipline-specific knowledge and skills expected of auditors. The 2011 edition clarifies the relationship between ISO 19011 and ISO 17021:2011 - Conformity assessment - Requirements for bodies providing audit and certification of management systems, focusing on SMEs and internal audit. The concept of risk in auditing is addressed and guidance on auditing combined management systems (for example, ISMS and quality) is provided. Guidance on competence and evaluation of auditors is provided in line with ISO 27011:2011. Annex B introduces the concept of remote audits, acknowledging the universality of ICT. It is recommended reading for ISMS internal auditors as well as certification auditors and other IT auditors.
ISO/IEC 19770 Software asset management
ISO/IEC 19770-1:2006 promotes the implementation of an integrated set of software asset management processes, using good practices for efficient software management. Contents:
Scope, terms and definitions;
Field of application;
General Software Asset Management processes;
Control environment for Software Asset Management;
Planning and implementation;
Verification and compliance processes;
Operations management processes and interfaces;
Life cycle process interfaces.
ISO/IEC 20000 IT service management
“ITIL (IT Infrastructure Library) is the most widely accepted approach to IT service management in the world. ITIL provides a cohesive set of best practice, drawn from the public and private sectors internationally. It is supported by a comprehensive qualifications scheme, accredited training organisations, and implementation and assessment tools.” While ISO 20000 is not strictly the same as ITIL, ITIL became BS 15000 and became ISO/IEC 20000, a two part standard, in 2005:
ISO/IEC 20000 Part 1:2005 Information technology service management. Specification for Service Management describes the requirements for IT service management against which organizations may be independently certified.
ISO/IEC 20000 Part 2:2005 Information technology service management. Code of Practice for Service Management gives more practical guidance to implementers, a suite of best practices for IT service management.
Read more about ISO/IEC 20000 on the IT Service Management Forum (itSMF) website.
Please note: the ITIL security book was thoroughly revised for ITIL version 3, for example being better aligned with ISO27k.
ISO 21827 Systems Security Engineering Capability Maturity Model (SSE CMM)
Like other Capability Maturity Models (CMMs), the Systems Security Engineering (SSE) CMM defines the essential characteristics of SSE processes, emphasizing those which indicate process maturity. The model covers the entire systems development lifecycle from concept definition to decommissioning. It applies to those developing or integrating secure products/systems, and those providing specialist security services such as security engineering. Read more about the SSE CMM. It was published as ISO 21827 in 2002.
ISO 22301:2012 Societal security - Business continuity management systems - Requirements
ISO 22301 formally specifies a Business Continuity Management System (BCMS) for any type or size of organization. Organizations may choose to be certified compliant with the standard by accredited certification bodies, or simply use the standard to develop their BCMS. The standard was developed from - and replaced - British Standard BS 25999-2 and draws on other business continuity standards.
ISO 22313:2012 Societal security - Business continuity management systems - Guidance
In the same way that ISO/IEC 27002 builds on ISO/IEC 27001, ISO 22313 accompanies and expands on ISO 22301. It was developed from - and replaced - British Standard BS 25999-1.
ISO/PAS 22399 Societal security - Guideline for incident preparedness and operational continuity management
ISO/PAS 22399:2007 provides general guidance for private, governmental, and nongovernmental organizations to develop specific performance criteria for incident preparedness and operational continuity, and design appropriate management systems. It provides a basis for understanding, developing and implementing continuity of operations and services within the organization and to provide confidence in business, community, customer, first responder and organizational interactions. It also enables the organization to measure its resilience in a consistent and recognized manner.
ISO/IEC 24762 Guidelines for information and communications technology disaster recovery services
ISO/IEC 24762:2008 offers guidance on Information and Communications Technology Disaster Recovery (ICT DR) within the context of business continuity management. It supports the operation of an ISMS by addressing the information security and availability aspects of business continuity management in times of crisis. A business continuity plan comprises an organization’s strategies to prepare for future national, regional or local crises that could jeopardize its capacity to continue with its core mission, as well as its long term stability. Business continuity management is an integral part of holistic risk management that involves:
Identifying potential threats that may cause adverse impacts on an organization’s business operations, and associated risks;
Providing a framework for building resilience for business operations;
Providing capabilities, facilities, processes, action task lists, etc., for effective responses to disasters and failures.
Using the standard, organizations can build greater resilience into their ICT infrastructure supporting critical business activities and complementing their business continuity management and information security management activities.
ISO/PAS 28000 Specification for security management systems for the supply chain
ISO/PAS 28000:2005 specifies the requirements for a security management system [as opposed to an information security management system - see the ISO27k standards for that], including those aspects critical to security assurance of the supply chain such as financing, manufacturing, information management and the facilities for packing, storing and transferring goods between modes of transport and locations. Security management is linked to many other aspects of business management. These other aspects should be considered directly, where and when they have an impact on security management, including transporting goods along the supply chain.
ISO/PAS 28000 is applicable to all sizes of organizations, from small to multinational, in manufacturing, service, storage or transportation at any stage of the production or supply chain that wishes to:
1. Establish, implement, maintain and improve a security management system;
2. Assure compliance with stated security management policy;
3. Demonstrate such compliance to others;
4. Seek certification/registration of its security management system by an accredited certification body or self-declare compliance with ISO/PAS 28000. Organizations that choose certification demonstrate that they are contributing significantly to supply chain security.
ISO 31000 Risk management — Principles and guidelines
ISO 31000:2009 supersedes AS/NZS 4360, a widely respected and used Australia/New Zealand risk management standard. “This International Standard recognizes the variety of the nature, level and complexity of risks and provides generic guidelines on principles and implementation of risk management. To apply these generic guidelines in a specific situation, this International Standard sets out how an organization should understand the specific context in which it implements risk management.” In other words, ISO 31000 covers risk management in the broad, not specifically information security or even IT risks.
Note: please don’t confuse ISO 31000:2009 with the deprecated British Standard BS31100:2008 Risk Management Code of Practice. ISO 31000 is a current standard whereas BS31100 has been withdrawn.
ISO/IEC 31010 Risk management – Risk assessment techniques
ISO/IEC 31010:2009 treats risk assessment as an integral part of risk management, helping managers understand risks that could affect the achievement of business objectives and assess the adequacy and effectiveness of various risk mitigation controls. It covers risk assessment concepts as well as processes and a range of techniques. It is aimed at risk management professionals and novices through a set of good practices.
ISO/IEC 38500 Corporate governance of information technology
ISO/IEC 38500:2008 was developed from Australian Standard AS 8015:2005. It “provides guiding principles for directors of organizations (including owners, board members, directors, partners, senior executives, or similar) on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations. [The standard] applies to the governance of management processes (and decisions) relating to the information and communication services used by an organization. These processes could be controlled by IT specialists within the organization or external service providers, or by business units within the organization. It also provides guidance to those advising, informing, or assisting directors. They include:
members of groups monitoring the resources within the organization;
external business or technical specialists, such as legal or accounting specialists, retail associations, or professional bodies;
vendors of hardware, software, communications and other IT products;
internal and external service providers (including consultants);
The governance model appears relatively simple: senior managers evaluate the organization’s requirements and make plans, cascade them through the organization as directives, policies etc., and monitor their implementation, revising the plans or directives where necessary. This is similar in style to the plan-do-check-act cycle of ISO/IEC 27001 and ISO 9001.
ANSI sells a single-user PDF version of ISO/IEC 38500 for US$86.
One of the six governance principles from AS 8015 is to ‘Ensure ICT performs well, whenever required’. This specifically requires Directors to evaluate risks to information and direct that ICT supports the business and is protected, specifically invoking the ISMS standards and monitor that policies are properly followed. Another principle (‘Ensure ICT conforms to formal rules’) implies the need for compliance in ISMS terms. An itSMF pocket guide gives more information on AS 8015.
ISO/IEC Guide 73:2009 Risk management – Vocabulary – Guidelines for use in standards
Guide 73, first published in 2002 and updated in 2009, is not formally an ISO/IEC standard but a glossary of risk-related terms that was originally written as an internal guide to encourage the consistent use of terminology by ISO/IEC committees writing risk-related standards.
In recognition of the variety of specialist terms in the field of risk management, Guide 73 lays out specific interpretations of more than 50 terms in 16 pages in order that ISO/IEC risk management standards are consistent in their use of the terminology. As an example, ‘risk assessment’ and ‘risk analysis’ are often used loosely and interchangeably by practitioners. Guide 73 defines risk assessment as the overall process of identifying, analyzing and evaluating risks, putting risk analysis is a sub-component of risk assessment. ‘Residual risk’ is another example that has a variety of meanings in common use. Guide 73 defines it specifically as “risk remaining after risk treatments”, with notes pointing out that residual risk includes risks than have not been identified, and is also known as ‘retained risk’ (although ‘risk retention’ is also defined separately).
ISO/IEC JTC1/SC 27 Standing Document 6 (SD6) - Glossary of IT Security Terminology
SD6 is another glossary of information and IT security terms used in ISO27k and other security standards developed by SC 27. Like Guide 73, SD6 is intended as an internal guideline for the committee, not a formal ISO/IEC standard. Unlike Guide 73, however, SD6 has over 2,000 entries (!) and is being actively maintained by DIN.
Back to top
Non-ISO information security standards and methods
... is the Australian Government’s Information and Communications Technology Security Manual, the unclassified version of which is available on the web.
ANSI American National Standards Institute
ANSI publishes a range of technical security standards under the X.9 series e.g. ANSI X9.43 Key archiving and retrieval explains why cryptographic keys need to be archived and describes the archival and retrieval mechanisms.
AS/NZS 4360 Risk management
This Australia/New Zealand standard defines a risk management process which involves:
Establishing the context;
Identification, analysis, evaluation, treatment, monitoring and review of the risks; and
Consultation and communication with stakeholders.
BITS Shared Assessments
Shared Assessments is a scheme from BITS - a US financial services industry body - that claims to be aligned with ISO/IEC 27002, PCI-DSS, COBIT, NIST (presumably the SP800 and/or FIPS standards), FFIEC Guidance, the AICPA/CICA Privacy Framework, and other privacy/regulatory guidance. Shared Assessments involve the Agreed Upon Procedures, a 91-page information security standard, worded as a series of information security control objectives, controls and compliance assessment/audit procedures, plus a further set of compliance questionnaires which are (mostly) closed questions anticipating simple yes/no answers.
BSI = British Standards Institute
BS 7799, of course, was the progenitor - the granddaddy of the ISO/IEC 27000 family. The code of practice for information security management now known as ISO/IEC 27002 was originally published as a DTI guide and became BS 7799 in 1995. When the accompanying certification standard that later became ISO/IEC 27001 was released as BS 7799 part 2 in 1999, the original standard was renamed BS 7799 part 1.
Although BS 7799 parts 1 and 2 have both been withdrawn and replaced by ISO/IEC standards, BS 7799 part 3 Information security management systems - guidelines for information security risk management is technically still current. It was published in 2006 and costs ~£70 from BSI. Now that ISO/IEC 27005 has been released, BS 7799 looks set to fade into the history books for good. Long live BS 7799!
BS 10008:2008 Evidential weight and legal admissibility of electronic information. Specification specifies requirements electronic information management systems and the electronic transfer of information between computers. It addresses data authenticity, integrity and availability issues including identity verification through electronic signatures and electronic copyright.
BS 25999 part 1, a Code of Practice for Business Continuity Management, established the process, principles and terminology of Business Continuity Management plus a comprehensive set of best practice BCM controls covering the whole BCM lifecycle. It was based on PAS56 was replaced by ISO 22313. BS 25999 part 2, the Specification for Business Continuity Management, formally specified a management system for business continuity, against which organizations may be audited for compliance. It became ISO 22301. [By the way, the '999' part of BS 25999 is equivalent to '911' in the 'States or '111' in New Zealand, in other words the emergency services phone number.]
BSI = Bundesamt fur Sicherheit in der Informationstechnik
The German federal office for information security publishes some of its publications in English, and is well known for its IT-Grundschutz [IT baseline protection] manual, originally released in 1994. This painstakingly detailed manual describes an ISMS comprising a governance structure and suite of information security controls ranging from technological, organizational and sociological to infrastructural (physical) in nature. It has now been divided to separate the methods (which are gradually being aligned with ISO27k) from the huge catalogue of threats and controls (which is like an extreme version of ISO/IEC 27002).
While in various places it claims to be based on ISO27k, IT-Grundshutz has in reality been adapted slightly to reflect some aspects of ISO27k. There are some oddities as a consequence of shoehorning the German standard into the ISO27k mold, for instance noting that it uses the term ‘IT security’ instead of ‘information security’ “because it is equivalent but shorter” whereas in fact, these are subtly different concepts. The main difference is that IT-Grundshutz recommends the adoption of a standardized and pragmatic de facto security baseline as a starting point rather than ISO27k’s pure de novo risk-based and somewhat theoretical approach. Neither approach is necessarily right or wrong - both have their merits.
BSI Standard 100-1 Information Security Management Systems (ISMS) is a 38-page overview of the IT-Grundshutz approach to developing and implementing an ISMS, not dissimilar to ISO/IEC 27000’s introduction to ISO27k.
BSI Standard 100-2 IT-Grundschutz Methodology is 93 pages long and loosely equivalent to ISO/IEC 27001, in the sense that it is basically about governance of information security within the organization using an ISMS. It explains how to develop and operate an ISMS, for example how to establish an information security management body, develop an information security policy, select appropriate information security controls etc. It uses worked examples based on a fictitious government agency to demonstrate certain aspects of the approach. It makes little if any reference to PDCA, and runs out of steam at the ISMS implementation stage (neglecting ISMS maintenance, audits/management reviews, risk/control updates etc.).
BSI Standard 100-3 Risk Analysis Based on IT-Grundschutz is 23 pages long and vaguely resembles ISO/IEC 27005. In contrast to ISO27k, the IT-Grundschutz baseline approach uses the catalogues to specify security controls for ‘normal’ systems that are assumed to have ‘normal’ risks, using risk analysis only to identify additional risk and control requirements for ‘high’ or ‘very high’ systems (which, in military and government organizations, presumably equate to unclassified, secret and top secret systems, respectively).
BSI Standard 100-4 Business Continuity Management is 128 pages long. It explains how to establish and maintain a BCM system, based on IT-Grundschutz. It incorporates a useful summary of several other BCM standards and, like most of them, it is purely concerned with preparing for activities that will be necessary in the event of a crisis or disaster affecting critical business operations and/or the supporting IT systems and networks, rather than attempting to avoid or avert such crises and disasters (for example through resilience, redundancy, high-availability systems etc.).
BSI IS audit guideline [unnumbered] Information Security Audit (IS Audit) - a guideline for IS audits based on IT-Grundschutz is primarily aimed at IS auditors working for German federal agencies. It is, however, a solid and well-written description of the performance of typical IS audits in 38 pages, although rather light on the strategic planning of a portfolio of IS audits (e.g. IS audits are normally conducted by IT auditors, who often audit various aspects of information security in the course of other audits, or by certification auditors, who have to follow strict processes laid down by the certification bodies).
IT-Grundschutz Catalogues, updated annually in German but slightly out-of-date versions have been released in English too. Contains over 4,000 pages (!) of excruciatingly detailed advice on information security threats, controls etc., and hence are roughly the same as ISO/IEC 27002 but much more specific (e.g. recommending WEP for WiFi security!). “One of the most important objectives of IT-Grundschutz is to reduce the expense of the information security process by offering reusable bundles of familiar procedures to improve information security. In this manner, the IT-Grundschutz Catalogues contain standard threats and security safeguards for typical business processes and IT systems which can be used in your organisation, if necessary. Through appropriate application of the standard technical, organisational, personnel, and infrastructural security safeguards recommended for IT-Grundschutz, a security level is reached for the business processes being analysed that is appropriate and adequate to protect business-related information having normal protection requirements. Furthermore, the safeguards in the IT-Grundschutz Catalogues not only form a basis for IT systems and applications requiring a high level of protection, but also provide an even higher level of security in many areas.” The idea is basically for users to thumb through the catalogue and select standard controls for the situations they face, forming the baseline onto which additional security controls may then be added where necessary.
If you are clever enough to understand German (if not Swedish and Estonian!), there are several more IT/information security publications on the BSI site.
COBIT Control OBjectives in IT
COBIT from ISACA (formerly known as the IS Audit and Control Association and still known as a professional body representing IT auditors) has matured from quite modest beginnings as a guide for computer auditors on best practice IT management controls into a comprehensive model or tool to guide the implementation of sound IT governance processes/systems.
The current incarnation, COBIT v4, is described by ISACA as “an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout organizations ... [It] emphasizes regulatory compliance, helps organizations to increase the value attained from IT, enables alignment and simplifies implementation of the COBIT framework.”
GAISP Generally Accepted Information Security Practices
GAISP developed from and consolidated earlier works such as GASSP Generally Accepted System Security Practices. It was allegedly at one time being reworked by ISSA (the Information Systems Security Association) but the project floundered, having been largely overtaken by events such as the release of ISO/IEC 27002.
GAIT (Guide to the Assessment of IT risk)
GAIT is the Institute of Internal Auditors’ top-down method/guidance to identify key IT risks (such as SOX-relevant IT-related risks that could materially impact the financial statements, and those covered by PCI-DSS, HIPAA etc.) and assess the associated IT controls within the organization. It is only available to IIA members :-(
IEEE Institute of Electrical and Electronic Engineers
The IEEE’s Security in Storage Working Group (SISWG) drafted IEEE 1619, a standard for the use of shared storage (hard disk) encryption. IEEE P1363:2000 contains Standard Specifications for Public-Key Cryptography.
ISF Information Security Forum
The Information Security Forum (ISF) was originally the European Security Forum (ESF) before it broadened its horizons. Its Standard of Good Practice for Information Security has long been well regarded as a broadly-scoped pragmatic standard for information security. It is available free of charge as a PDF from the ISF website and provides a useful crosscheck on the coverage and content of security policies and procedures written to follow ISO/IEC 27002 or other standards.
The latest version of the ISF standard was released in October 2007.
ITU International Telecommunications Union
The ITU’s ICT Security Standards Roadmap outlines the ITU’s work on security standards.
The ITU Telecommunication Standardization Sector (ITU-T), formerly known as the CCITT, is the part of ITU which publishes the X-series standards for the telecomms industry, including X.1051 (also known as ISO/IEC 27011).
NFPA National Fire Protection Association
NFPA 1600, the Standard on Disaster/Emergency Management and Business Continuity Programs, advises on disaster management structures/governance.
See below - they are so good and so numerous, they get their own section!
NSW DoC GCIO Information security guideline
The Government Chief Information Office of the Department of Commerce of the New South Wales government in Australia, publishes their Information security guideline. It is basically an interpretation of ISO/IEC 27001 and 27002, with some useful additions such as a generic catalogue of information security vulnerabilities and threats, and a classification of the ISO/IEC 27002 controls into preventive, detective, corrective etc. ...
OECD Organization for Economic and Cultural Development
The OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security (2002) presented some useful high level principles for information security (which are quoted in the current draft of ISO/IEC 27000).
OECD Guidelines for Cryptography Policy (1997) focused on cryptography, strangely enough.
PAS56 (Publicly Accessible Specification 56) was a Guide to Business Continuity Management produced jointly by the British Standards Institute (BSI) and Business Continuity Institute (BCI) in March 2003. It was superseded by BS 25999 part 1, while BS 25999 part 1 eventually became ISO 22301. [Before you ask, we have no idea what became of PAS 1 through 55, nor 57 through 76. Try Google.]
PAS77 (Publicly Accessible Specification 77) is a generic framework and guideline on IT Service Continuity Management, developed by the BSI in partnership with Adam Continuity, Dell Corporation, Unisys and SunGard. Contents: Scope; Terms and definitions; Abbreviations; IT service continuity management; IT service continuity strategy; Understanding risks and impacts within your organization; Conducting business critically and risk assessments; IT service continuity plan; Rehearsing an IT service continuity plan; Solutions architecture and design consideration; Buying continuity services. Price ~£49 from BSI.
PCI DSS Payment Card Industry Data Security Standard
American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International collaborated through the PCI Security Standards Council to release PCI DSS. The standard imposes specific cardholder data security control requirements on merchants and banks handling cards and/or card data. Structured compliance activities, including routine independent security assessments by accredited PCI experts, are intended to enforce the standards and protect the whole credit card industry.
PCI DSS version 2 (which, despite the numbering, is a minor update, mostly ‘clarifications’ of earlier requirements) came into effect on January 11th 2011. Future PCI revisions are due on a 3 year cycle which could be interesting as security technologies are turning over rapidly ...
RFCs Requests For Comment
Many RFCs are a throwback to the early days of the Internet when proposals for new protocols etc. were circulated to the relatively small Internet user community for comments and input. The RFC mechanism remains and is still used although a wealth of standards bodies now dominate Internet and Web development.
RFC 1281 Guidelines for the Secure Operation of the Internet (1991), for example, may be of historical interest and embodies security principles that many would argue remain valid today but it’s hardly cutting-edge.
Nevertheless, many current Internet security-related protocols (such as S/MIME and MD5) were first defined as RFCs. Indeed, the TCP/IP family was conceived as RFCs and some fundamental security issues in the original architecture plague us to this day.
SAA/SNZ HB 231 Information Security Risk Management Guidelines
The handbook provides guidance on an information security risk management process suitable for a wide range of organizations.
SAA/SNZ HB 240 Guidelines for managing risk in outsourcing utilizing the AS/NZS 4360 process
Specific guidance for managing the risks associated with outsourcing, using the risk management model from AS/NZS 4360. Includes case studies and a checklist.
SAS70 Statement on Auditing Standards #70, Service Organizations, SSAE16 Statement on Standards for Attestation Engagements #16, Reporting on Controls at a Service Organization and ISAE 3402, Assurance reports on controls at a service organization
SAS70 is an auditing or attestation standard, meaning a method for auditors to check and then attest to the control status of their financial services industry clients. SSAE16 is its replacement that will come into effect on June 15th 2011. Both SAS70 and SSAE16 belong to AICPA, the Auditing Standards Board of the American Institute of Certified Public Accountants (CPAs).
SSAE16 is aligned with the International Standard on Assurance Engagements ISAE 3402, Assurance Reports on Controls at a Service Organization, produced by the International Auditing and Assurance Standards Board (IAASB) of the International Federation of Accountants (IFAC). ISAE 3402 is essentially an international version of the US-only SAS70/SSAE16.
The purpose of SAS70/SSAE16 is to reduce the need for interdependent financial services companies to audit each other’s security arrangements incessantly: confirming that a partner company has received a positive SAS70/SSAE16 report from a trustworthy auditor is generally taken as due diligence, without the need to conduct their own controls audit. However, the truth is that risks, risk perceptions and risk appetites vary: management of any organization that is dependent on another are well advised to review their risks explicitly for business continuity reasons and implement suitable controls, of which SAS70/SSAE16 might be just a part. Contingency plans are never a bad idea, not least given that the systematic risk of global economic meltdown has become a reality of late.
SEI Software Engineering Institute
OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation) from Carnegie Mellon University’s Software Engineering Institute defines a systematic, context-driven information security risk evaluation process. Through a self-directed three-phase approach, risk assessors come to understand the risks and make informed risk management decisions. OCTAVE examines organizational and technical issues, building up a comprehensive picture of the organization’s information security requirements.
STIGs Security Technical Implementation Guides
NIST, NSA and DISA/DoD have jointly developed several STIGs and related documents. These form an excellent basis for corporate technical security standards and are highly recommended.
A compilation of STIGs plus the associated checklists and scripts is available as a downloadable ISO CD image covering: Active Directory, application security, biometrics, database security, desktop applications, DNS, DSN (Defense Switched Network), enclave security, network infrastructure, Secure Remote Computing (SRC), Sharing Peripherals Across the Network (SPAN), UNIX & Linux & various flavours of Windows, VoIP, Web server and wireless networking.
TickIT is a software Quality Assurance (QA) framework built upon the foundations of ISO 9001 and ISO 12207. [QA is extremely relevant to software security: software must meet confidentiality, integrity and availability requirements (which means being free of bugs that create security vulnerabilities) and deliver necessary security operations and audit functionality (such as event logging and analysis, and access rights management) in order to be ‘fit for purpose’. The patching treadmill clearly demonstrates that even well designed, developed and tested mass-market commercial software often fails to meet perfectly reasonable quality objectives :-( ]
Back to top
NIST Special Publications
The US National Institute of Standards and Technology (NIST) is renowned for producing a wide range of well-written, clear and comprehensive technical standards and (unlike the ISO27k standards) they are available to all free of charge. The standards are primarily intended for US Government, military and commercial use but are well worth the trouble of downloading and adopting or considering in other contexts. If you want to know the professional way to ‘do’ information security, check the NIST Special Publications.
Below is a selection of some of NIST’s universally excellent SP 800-series standards that are relevant to information security management in general (please note: there are many more NIST SP 800 standards - see NIST’s roadmap for the overview or their website for the full nine yards including numerous cryptographic, identification & authentication, and technical security standards not listed here, plus new standards and updates not yet reflected in our list):
(Oct 1995) An Introduction to Computer Security: The NIST Handbook
may be getting a bit long-in-the-tooth but serves as a general introduction to, for example, security policies and procedures. At 290 pages, this is no lightweight overview (like most NIST Special Publications). The section explaining how to structure security policies
is particularly useful.
(Feb 2006) Guide for Developing Security Plans for Information Technology Systems
guides the design and documentation of IT security controls.
(June 2004) Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
(Oct 2001) Guidelines on Active Content and Mobile Code
(July 2002) Risk Management Guide for Information Technology Systems
guides the assessment and control of IT risks.
(June 2002) Contingency Planning Guide for Information Technology Systems
(Oct 2003) Guide to Information Technology Security Services
(Oct 2003) Guide to Selecting Information Security Products
(May 2004) Guide for the Security Certification and Accreditation of Federal Information Systems
provides guidance on security certification, accreditation and authorization of information systems.
(Mar 2011) Managing Information Security Risk - Organization, Mission, and Information System View.
This is the flagship document for the FISMA-related security standards and guidelines developed by NIST. As well as other NIST SP800 standards, it references the ISO27k standards and ISO 31000. It advises on the management of risks at three levels: whole organization (Tier 1), mission/business processes (Tier 2) and information systems (Tier 3).
(Nov 2005) Creating a Patch and Vulnerability Management Program
SP 800-44 v2
(Sep 2007) Guidelines on Securing Public Web Servers.
SP 800-45 v2
(Jun 2007) Guidelines on Electronic Mail Security
SP 800-46 rev 1
(Jun 2009) Guide to Enterprise Telework and Remote Access Security.
(Aug 2002) Security Guide for Interconnecting Information Technology Systems
(Nov 2002) Wireless Network Security: 802.11, Bluetooth, and Handheld Devices
(Oct 2003) Building an Information Technology Security Awareness and Training Program
is recommended reading for anyone planning a professional approach to security awareness, training and education activities.
SP 800-53 v3
(July 2009) Recommended Security Controls for Federal Information Systems
, in effect another ISMS standard, contains a handy cross-reference table comparing its control coverage to that of standards such as ISO/IEC 27002
, Government Audit Office Federal Information System Controls Audit Manual, Department of Defense Instruction 8500.2, Information Assurance Implementation
and Director of Central Intelligence Directive (DCID) 6/3 Policy and Manual Protecting Sensitive Compartmented Information within Information Systems
. It explains the process of implementing and then building on a security baseline. SP 800-53A
(Jun 2008) is the accompanying Guide for Assessing the Security Controls in Federal Information Systems.
(July 2008) Performance Measurement Guide for Information Security.
“This document is a guide to assist in the development, selection, and implementation of measures be used at the information system and program levels. These measures indicate the effectiveness of security controls applied to information systems and supporting information security programs.”
(Jan 2005) Security Considerations for Voice Over IP Systems
(Aug 2008) Guide for Mapping Types of Information and Information Systems to Security Categories
guides the categorization of computer systems and data.
(Jan 2004) Computer Security Incident Handling Guide
(Apr 2006) Electronic Authentication Guideline
(Oct 2008) Security Considerations in the Information System Development Life Cycle
. “The most effective way to protect information and information systems is to integrate security into every step of the system development process, from the initiation of a project to develop a system to its disposition ...” Right on NIST!
(Jan 2005) Integrating Security into the Capital Planning and Investment Control Process
(Mar 2005) An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
(Oct 2005) Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
(Feb 2011) National Checklist Program for IT Products--Guidelines for Checklist Users and Developers
comprises a set of technical security baselines for a variety of operating system platforms (Windows, AIX, Solaris, HP-UX, Redhat Linux etc
(Nov 2004) Guidelines on PDA forensics
(June 2011) Guide to Industrial Control Systems (ICS) Security.
Guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability and safety requirements.
(Nov 2005) Guide to Malware Incident Prevention and Handling.
(Sep 2006) Guidelines for Media Sanitization.
Vital information if you have unsanitary computer media covered in nasty viruses ... or murky secrets.
(Sep 2006) Guide to Computer Security Log Management.
(Aug 2007) Guide to Secure Web Services.
(Feb 2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i.
(Oct 2006) Information Security Handbook: a Guide for Managers.
(May 2007) Guidelines on Cell Phone Forensics.
(Oct 2008) Technical Guide to Information Security Testing
helps with the planning and execution of technical information security tests, analyzing findings and developing mitigation strategies. Provides practical recommendations for designing, implementing and maintaining test processes. Overviews key elements of security testing with an emphasis on technical testing techniques, the benefits and limitations of each technique, and recommendations for their use.
(July 2008) Guide to General Server Security
lays out a set of generic principles that can readily be converted to corporate policy statements in, say, a server hardening policy, and supported by a suite of platform-specific server hardening standards and procedures (see also SP 800-70
and the CIsecurity.org
(Dec 2011) Guidelines on Security and Privacy in Public Cloud Computing
gives an introduction to cloud security issues.
(Sep 2011) A NIST Definition of Cloud Computing
is an attempt to scope or get a handle on cloud computing, an inherently nebulous concept.
Like ISO and BSI, NIST has published various other security-related standards over the years in addition to those in the SP 800 series, including Federal Information Processing Standards (FIPS) Publication standards such as:
(Feb 2004) Standards for Security Categorization of Federal Information and Information Systems.
(Mar 2006) Minimum Security Requirements for Federal Information and Information Systems.
(June 2006) Personal Identity Verification for Federal Employees and Contractors.
Finally, NIST identifies aspects of information security that deserve further research and perhaps standardization in its NISTIRs (Interagency/Internal Reports), including:
(Feb 2011) Glossary of Key Information Security Terms
is over 200 pages long. It reproduces terms and definitions found in various NIST standards but, unlike ISO/IEC 27000
, makes no attempt to rationalize them and address the discrepancies.
(Aug 2009) Directions in Security Metrics Research
covers a wide brief, drawing on metrication practices from other fields and with six pages of references to deepen your knowledge still further.
(Aug 2009) Small Business Information Security - The Fundamentals
is an admirable but arguably misguided attempt to provide generic guidance on basic information security controls for small organizations. [The trouble is that many organizations are substantially different and some are unique in terms of their information security risks and hence control requirements. ISO27k deals with this issue by insisting that all organizations first identify their information security risks before selecting and then implementing the controls. However, the costs involved in ISO27k’s comprehensive approach undoubtedly deters some small businesses. ISSA-UK is actively developing an SME security standard - watch this space.]
Back to top