8 Domains of information Security for Your ISMS

Image : Guru99
According to CISSP, organizations face information security threats need consideration of following 8 domains in their security strategy. The ISMS framework is focused in ensuring security in them.

  1. Security & Risk Management 
  2. Asset Security 
  3.  Security Engineering
  4.  Communication & Network Security
  5.  Identity & Access Management 
  6.  Security Assessment & Testing
  7.  Security Operations
  8. Software Development Security

1 Security & Risk Management :

Establishes the security policies, procedures, guidelines, structures and standards to protect information assets and to review the effectiveness of the security controls.

2 Asset Security :

Establishes the procedures, structures & standards, and controls used to secure and monitor assets to enforce confidentiality, integrity and availability.

3 Security Engineering:

Establishes the  concepts, structures & standards to design and implement  secure systems, networks and applications to enforce confidentiality, integrity and availability.

4 Communication & Network Security:

Encompasses the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity and availability for communications over private and public networks and media to ensure confidentiality, integrity and availability.

5 Identity & Access Management :

Access controls encompass securing access to business operations,  systems and information assets.

6 Security Assessment & Testing

Describes various methods based used to determine vulnerabilities & associated risk evaluation.

7 Security Operations 

Identifies critical Information and measures that will eliminate or reduce  exploitation of the information. Includes controls, access privileges, monitoring and auditing processes.

8 Software Development Security:

Enforce  security controls in the software development life-cycle to ensure software security.?

Niranjan Meegammana 


Comments

Popular posts from this blog

ISO 27001 ISMS in a Nutshell

How easily the data breaches occur? 5 ways to be aware of.

Best Practices for secure Software Development