NIST, CIS/SANS 20, ISO 27001: What's the difference? - Hitachi Systems Security (2024)

Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime, and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves as the best practice frameworks for organizations to assess their current IT security maturity and set goals to improve the procedures that they use to protect sensitive data, perform change management, and provide access to critical assets.

Unfortunately, implementing security controls using even the simplest security control framework can be daunting. CISOs or Security Directors don’t know where to start even with the most basic of security control self-assessments. The sheer volume of individual controls within many of the cybersecurity control frameworks makes implementing the framework time-consuming, confusing and, in many cases, causes IT security staff to lose focus on protecting the critical areas of the business.

We’ve gathered today’s most common security control frameworks down below to simplify the complex world of compliance for you, and help you improve your security maturity and overall defense posture.

NIST Special Publication 800-53, Revision 5

The U.S. National Institute of Standards and Technology (NIST) published Special Publication 800-53 as part of the Special Publication 800-series as a catalog of 20 security and privacy control groups. It outlines controls for federal information systems and organizations in the United States to satisfy privacy and security requirements in the Privacy Act of 1974, the Federal Information Security Modernization Act (FISMA), OMB Policies, etc.

The so-called security and privacy control families outlined by NIST 800-53 are flexible, customizable and can be implemented by organizations as part of their overall risk management strategy. The controls cover areas such as access control, security awareness training, formal risk assessments, incident response or continuous monitoring to support organizational risk management.

Currently, Special Publication 800-53 is undergoing its fifth revision Security and Privacy Controls for Information Systems and Organizations (exact title to be confirmed). Initially, NIST Special Publication 800-53 (Revision 5) was scheduled to be released on March 28, 2017, which has been delayed until December 2017.

According to NIST, “Revision 5 of this foundational NIST publication represents a one-year effort to develop the next generation security and privacy controls that will be needed to accomplish the above objectives”. The objectives of this draft publication are:

  • to provide both public and private organizations with guidance and safeguarding measures to make information systems more resistant to cyberattacks,
  • to protect the confidentiality, integrity, and availability of the organizations’ information system,
  • to limit their negative impact when cyberattacks occur,
  • to make these information systems more survivable and resilient in general, etc.

CIS Critical Security Controls

Developed by the SANS™ Institute, “the CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks”. There are 20 controls in total, spanning priority areas such as secure hardware and software configurations, malware defenses, data recovery, account monitoring and control, incident response and management, penetration tests and Red Team exercises.

Unlike more comprehensive control frameworks such as the NIST Cybersecurity Framework or PCI DSS, the 20 Critical Security Controls were developed to provide organizations with a smaller, prioritized number of actionable controls that should be implemented first to yield immediate results. Rather than implementing dozens of controls, this prioritized approach will help organizations focus on what’s important first to establish a baseline for protection and cyber defense.

Want to learn more about the CIS Critical Security Controls? The SANS™ Institute has put together a handy-dandy “Critical Security Controls Poster” that you can bookmark or pin on your wall for quick reference.

ISO 27001

Developed by the International Standards Organization (ISO), the ISO 27001 standard provides organizations with requirements for how to manage and secure their sensitive corporate information with a so-called Information Security Management System (ISMS). Its latest revision was published in 2013, and the full name of the standard is now ISO/IEC 27001:2013. The ISMS is a risk management framework which helps identify, analyze and address an organization’s information risks to protect against cyberthreats and data breaches, similar in design to management systems for quality assurance (the ISO 9000 series) and environmental protection (the ISO 14000 series).

Unlike NIST 800-171, which is specific to federal agencies in the U.S., or PCI DSS, which is specific to organizations processing credit card payments, the ISO 27001 standard applies to all types organizations, public or private, profit or non-profit, regardless of their size or industry. It is based on a six-step planning process that involves collaboration between several different departments within an organization:

  1. Define a security policy.
  2. Define the scope of the ISMS.
  3. Conduct a risk assessment.
  4. Manage identified risks.
  5. Select control objectives and controls to be implemented.
  6. Prepare a statement of applicability.

In Summary

If you’re not sure about which security compliance framework applies to your organization, keep in mind that all of them are designed for different purposes, industries or geographies:

  • NIST Special Publication 800-53, Revision 5 proposes a catalog of 20 different privacy and security control groups to help U.S. federal agencies and organizations better manage their risk.
  • The 20 CIS Critical Security Controls are independent of industry type and geography and provide a priority-based and rather technical approach for immediate, high-impact results.
  • The ISO 27001 standard is a less technical, more risk management-based approach that provides best practice recommendations for companies of all types and sizes in six defined phases.
  • The PCI DSS compliance standard outlines 12 best-practice data security regulations for organizations that process and store payment card details.

No matter which security compliant framework your organization is subject to, a dedicated compliance program can help your organization manage its risks, improve your security posture and demonstrate commitment to quality and continuous improvement.

NIST, CIS/SANS 20, ISO 27001: What's the difference? - Hitachi Systems Security (2024)

FAQs

What is the difference between ISO 27001 and CIS 20? ›

The CIS20 framework provides a set of critical security controls that can be used to secure networks and systems, while ISO 27001 provides a comprehensive framework for information security management that covers a wide range of topics.

What is the difference between ISO 27001 and NIST? ›

ISO 27001 is an international standard to improve an organization's information security management systems, while NIST CSF helps manage and reduce cybersecurity risks to their networks and data. Both ISO 27001 and NIST CSF effectively contribute to a stronger security posture.

What is the difference between CIS and NIST security? ›

The main difference between CIS (Center for Internet Security) and NIST Cybersecurity Framework is that CIS provides cybersecurity best practices and benchmarks, while NIST develops comprehensive standards and guidelines for various areas, including cybersecurity.

What are CIS 20 critical security controls? ›

The CIS Critical Security Controls

Identify devices on your organization's network, update them, and maintain an inventory of assets that store or process information. Use software inventory tools to automate all software documentation to prevent unauthorized software from executing on assets.

What is the difference between ISO and CIS? ›

Comparison: Scope: CIS Benchmarks are very technical and specific to system configurations. SOC and ISO provide broader frameworks for organizational processes and controls, with ISO being more comprehensive. PCI DSS is specifically focused on payment card data security.

What is the difference between NIST and SANS? ›

In terms of detection and analysis, both frameworks focus on the timely detection and analysis of incidents. However, the SANS framework places a greater emphasis on triage and prioritization, while the NIST framework focuses more on monitoring systems and escalation procedures.

What is NIST security standards? ›

NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data. The Framework is voluntary.

What is the new name for ISO 27001? ›

ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements. This standard has 1 amendment.

Why is the NIST framework the best? ›

The NIST CSF comes from a risk-based approach, which executives understand very well. This approach enables an integrated cyber risk management approach to cybersecurity aligned with business goals. The result is better communication and decision-making throughout your organization.

What is the difference between CIS and SANS? ›

The CIS Controls (formerly known as Critical Security Controls) are a recommended set of prioritized cyber defense best practices. They provide specific and actionable ways to protect against today's most pervasive and dangerous attacks. SANS provides CIS Controls v8 training, research, and certification.

What does CIS stand for in computer security? ›

What are the CIS Critical Security Controls? The Center for Internet Security (CIS) publishes the CIS Critical Security Controls (CSC) to help organizations better defend against known attacks by distilling key security concepts into actionable controls to achieve greater overall cybersecurity defense.

What are CIS standards? ›

A CIS benchmark contains guidance from the Center for Internet Security (CIS) on best practices for configuring IT systems, networks, and software. The CIS has released over 140 benchmarks with the support of cybersecurity professionals and subject matter experts in communities worldwide.

What is the difference between ISO 27001 and CIS Critical Security Controls? ›

ISO27001 has a greater focus on compliance, while CIS Controls place more emphasis on effective security implementation. In addition, ISO27001 includes additional controls for business continuity and information security management.

What are the three 3 types of security controls? ›

The three main types of security controls—management, operational, and physical—work together to form a strong security program.

What is Sans 20? ›

The SANS 20 Security Controls, published by the Center for Strategic International Studies (CSIS), are prioritized mitigation steps that your organization can use to improve cyber security.

What is the difference between ISO IEC 20000 and 27001? ›

In addition to information security, ISO 20000 gives an overall view on the service, including financial aspects, design, release, and deployment of the IT service. While ISO/IEC 20000 specifies a standard for service management, ISO/IEC 27001 focuses on risk assessment.

What is ISO 27001 vs 20022? ›

ISO 27001 is the main standard against which organisations are certified, whereas ISO 27002 provides guidance on implementing Annex A security controls.

What is the difference between ISO 27001 and SOC 2 certification? ›

The main difference is that SOC 2 is primarily focused on proving you've implemented security controls that protect customer data, whereas ISO 27001 also asks you to prove you have an operational Information Security Management System (ISMS) in place to manage your InfoSec program on a continual basis.

What is equivalent to ISO 27001? ›

Both SOC 2 and ISO 27001 have security controls that involve processes, policies and technologies to safeguard sensitive information. One study suggests that the two frameworks share 96% of the same security controls. The difference is which of those security controls you implement.

Top Articles
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated:

Views: 5905

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.