Several years ago, former National Security Agency Director Fred Chang described a simple and foolproof approach for ensuring computer security: “Turn it off, disconnect it from the Internet, encase it in cement and bury it 100 feet below the ground.”
Of course, that won’t work very well for all of us who actually need to use computers, networks, applications and data to run our businesses and do our jobs. We need a more practical approach for dealing with daily threats of ransomware, denial of service attacks and data breaches.
IT security frameworks support a realistic solution. They create the structure for designing, implementing and maintaining a secure IT environment. Based on industry best practices, frameworks help organizations establish a methodical and repeatable approach for managing cyber risk and reducing vulnerabilities.
There are hundreds of different security frameworks used globally. Although they may have been developed for different audiences, they have some shared aims that make them appropriate for many different industries. At a basic level, they establish a structured approach for identifying vulnerabilities, detecting threats, assessing risk, controlling access and recovering from any attack.
Some of the more widely used frameworks include:
One of the great benefits of following a framework is that it allows you to define and prioritize cybersecurity initiatives instead of continually reacting to the latest threat. Security tools can generate overwhelming numbers of security alerts, and IT teams must have a logical way to determine which require immediate attention.
According to a recent Pulse survey, 86 percent of IT security executives say they primarily rely on third-party vulnerability severity data to prioritize vulnerabilities. That’s not always a reliable approach, however. An unpatched collaboration application might be a critical vulnerability for some companies but a minor inconvenience for others.
Frameworks establish a well-defined risk evaluation process to help ensure your remediation efforts and investments are directed toward the most significant threats for your organization. For example, the NIST framework suggests organizations develop a risk register — a centralized database for identifying and prioritizing cyber risks. Vulnerabilities are ranked by risk potential, noting how they might be exploited and the potential damage that might result. This removes the guesswork from deciding which vulnerabilities require fast action.
Cybersecurity has never been more difficult, but shovels and cement aren’t the answer. IT security frameworks provide a valuable guidebook for building and maintaining a robust security environment. Our cybersecurity team can help you evaluate all of the major frameworks and develop a strategy for minimizing your risk.