In today's ever-evolving digital landscape, organizations face a multitude of sophisticated and persistent cyber threats that can compromise their sensitive data, disrupt operations, and damage their reputation. To effectively combat these threats, a robust Detection Engineering Framework is essential.
This comprehensive guide aims to provide security professionals, incident responders, and IT teams with a holistic understanding of the key principles, strategies, and best practices involved in building and maintaining an effective detection engineering response program.
This document is intended for:
| π€ Role | π― Focus Area |
|---|---|
| π Security Managers | Strategic oversight and governance |
| π SOC Managers | Operational management and coordination |
| π¨βπ» SOC Analysts | Day-to-day monitoring and analysis |
| βοΈ Detection Engineers | Technical development and implementation |
| π‘οΈ Security Professionals | Overall security operations |
We hope that this guide will serve as a valuable reference and practical companion for security professionals, incident responders, and IT teams as they navigate the challenging landscape of security monitoring and incident response.
This Detection Engineering Framework was built to address the detection of cyber threats & attack tactics techniques and procedures appropriate to the SOC. The objective of building a Detection Engineering Framework is to better protect the organization's valuable assets by designing and developing detection use cases using a holistic approach that connects Risk, Threat & compliance requirements.
graph LR
A[π― Risk] --> D[π‘οΈ Detection Framework]
B[β οΈ Threat] --> D
C[π Compliance] --> D
D --> E[π Detection Use Cases]
style A fill:#693e00,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#640d04,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#3c1e70,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#161b22,stroke:#fff,stroke-width:3px,color:#fff
style E fill:#f0f6fc,stroke:#fff,stroke-width:2px,color:#000
β οΈ Disclaimer: Following the guidelines and recommendations in this document does not guarantee a secure environment, or that all security incidents will be prevented. Absolute security is impossible to achieve on any open network. However, security risks can be reduced by establishing a good security policy together with sound administration practices; monitoring and responding to security incidents; testing and evaluating security; and improving, securing and managing security weaknesses on an on-going basis.
This framework provides a structured approach to enhancing an organization's cybersecurity posture through systematic threat detection and response. It integrates several key concepts to ensure comprehensive and effective security operations.
-
Cybersecurity Use Case: In the context of cybersecurity, a use case refers to a specific scenario or example where security measures are implemented to prevent, detect, or respond to cyber threats. It outlines how a system or process is applied to address a particular cybersecurity challenge. Use cases serve as the foundation, defining the specific threats and scenarios the framework aims to address.
-
Detection Engineering: Detection engineering refers to the process of designing and developing effective methods and techniques to identify, detect and respond to security threats and incidents. It is a specialized and systematic discipline focused on building, implementing, and continuously refining mechanisms to identify malicious activities, anomalies, or indicators of compromise within an organization's systems and networks. It applies an engineering mindset to threat detection, moving beyond simply writing static detection rules.
-
Response Playbooks: Response playbooks provide predefined steps and actions to be taken in response to specific security events or incidents. They are crucial for ensuring a consistent, rapid, and effective reaction once a threat is detected.
The Detection Engineering Framework combines these core concepts to create a comprehensive and structured approach for developing, managing, and continuously improving security monitoring and incident response capabilities.
At its core, the framework is driven by well-defined cybersecurity use cases, which articulate the specific threats and attack scenarios relevant to the organization. These use cases directly inform the detection engineering process, guiding the design, development, and refinement of robust detection mechanisms. Crucially, this engineering effort also encompasses the creation and integration of response playbooks, as effective detection is only truly valuable when paired with a clear, predefined plan for action and mitigation. This ensures that every identified threat has a corresponding, actionable plan for mitigation and remediation.
This framework emphasizes the importance of proactive identification, continuous monitoring, and orchestrated response to security threats, enabling organizations to build a more resilient and adaptive defense against the evolving threat landscape.
Essentially, use cases describe manifestations of threats from a high level (the modus operandi of the cyber criminals) to the lowest level (concrete security events in the infrastructure such as exploits, failed logins, etc.). Use cases also describe follow-up actions (incident response) and are tied with business drivers to show how security monitoring reduces risk in the organization.
graph TD
A[π― High Level Threats] --> B[π Mid Level Indicators]
B --> C[π Low Level Events]
C --> D[π¨ Incident Response]
D --> E[πΌ Business Value]
style A fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#FF9800,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#4CAF50,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#9C27B0,stroke:#fff,stroke-width:2px,color:#fff
Within the complexity of the security architecture, framework can provide structure and overview. Such frameworks enable control over the development of the use cases and provide insight into identify how well an organization can defend against cyber threats.
π― The Detection Engineering Framework should allow the SOC:
- β To ensure stakeholder objectives are met uniformly
- β To capture gaps and challenges early on during the creation of use cases or detections
- β To have a holistic "frame of reference" where detection use cases can be categorized into
- β To engineer detection capabilities in a consistent & methodological manner
- β To quickly see where use cases or detections are lacking and need more attention
- β To facilitate a phased approach of expanding new use cases based on a large variety of inputs and priorities in the form of Use Case Roadmap
graph TB
A[πΌ Business-Driven] --> B[π‘οΈFramework]
C[β οΈ Risk-Aligned] --> B
D[π Compliance-Focused] --> B
E[π Systematic] --> B
F[π Visibility-Enabling] --> B
G[π― Anti-Ad-hoc] --> B
H[π Efficiency-Driven] --> B
I[π State-Aware] --> B
style A fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#9C27B0,stroke:#fff,stroke-width:3px,color:#fff
style C fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#FF9800,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#4CAF50,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
style G fill:#795548,stroke:#fff,stroke-width:2px,color:#fff
style H fill:#607D8B,stroke:#fff,stroke-width:2px,color:#fff
style I fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
The key principles driving this framework:
- π― Business-Driven: The creation of use cases should be driven by the organisation's business requirements
- βοΈ Risk-Aligned: The use cases must align with the business's risk appetite over any form of asset
- π Compliance-Focused: The use case framework should provide structured control over the compliance requirements of the organisation
- π Systematic: The creation of use cases must follow a systematic process to eliminate or reduce errors
- π Visibility-Enabling: The use case framework should create a foundation for the ability to assess the state of visibility and detection capability
- π― Anti-Ad-hoc: The use case framework must reduce the ad hoc detection of threats for the organisation
- π Efficiency-Driven: The use case framework should eliminate redundant & duplicate methods of managing use cases
- π State-Aware: The management of the use cases must articulate the state of the use cases at any given point of time
The framework includes:
| π§© Component | π Description |
|---|---|
| π― Fundamentals | How business risk, threats and compliance requirements drive the framework |
| π Lifecycle | Practical Use Case & Detection Engineering lifecycle management process |
| βοΈ Development Guide | Practical guide to develop correlation and detection rules |
| π Catalog Guide | Suggested guide to maintain use cases and detection rules in catalog format |
| π Templates | Series of templates, processes and conventions that support the framework |
graph TB
A[β οΈ Use Case Challenges] --> B[π¦ Split Coverage]
A --> C[π·οΈ No Naming Conventions]
A --> D[π― Attack-Centric Bias]
A --> E[π€ SOAR Integration Issues]
A --> F[π’ Vendor Lock-in]
style A fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#FF9800,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#FFC107,stroke:#000,stroke-width:2px,color:#000
style E fill:#FFEB3B,stroke:#000,stroke-width:2px,color:#000
style F fill:#CDDC39,stroke:#000,stroke-width:2px,color:#000
-
π¦ Split Coverage: Most out-of-the-box use cases are split up from each other based on their rule content package which can be put (after some analysis of the detection logic) under the same "use case" as they have the same detection scope.
-
π·οΈ Naming Issues: Most SIEM out-of-the-box (and later custom added rules) do not have an overarching naming convention over all rules.
-
π― Detection Bias: Most use case approaches have an Attack-centric or quantitative detection bias. Most SIEM Vendors have attempted to organize use cases in a Use Case Framework that primarily focuses on a single limited threat model (kill chain or ATT&CK Framework) this misses critical categories like Self-monitoring, localized anomaly detection (that is not attack centric) and distinctions between quantitative threat modelling and qualitative threat modelling.
-
π€ SOAR Integration: Use Cases are hard to align with a SOAR playbooks platform without a framework. Most vendors fail to accommodate the emergence of SOAR technologies that are trying to connect automated or semi-automated playbooks to SIEM use cases.
-
π’ Vendor Complexity: SIEM Vendor Taxonomy overly complex or not generalizable. Many SIEM vendors have attempted to standardize detection through taxonomy of detection categories, but these categories are generally limited only to the SIEM vendor itself and hard to generalize to other detection technologies of other vendors like IDS, IPS, UBA and others.
Before going any further, it is important to provide a definition of use cases. This is necessary, because of the fact that the term is used to describe a variety of elements in different publications.
π Definition: "A use case in the context of this framework is a security monitoring scenario aimed at detecting manifestations of cyber threats, managing risk, and aligning with compliance requirements; if any of these are actualized, the use case also guides our response."
In taddition to this a use case also has a strategical, tactical and operational component. This definition emphasizes the fact that the focus of the framework is on the 'detect' and 'respond' phase of the NIST cybersecurity framework.
graph LR
A[π― Strategic] --> D[π‘οΈ Use Case]
B[βοΈ Tactical] --> D
C[βοΈ Operational] --> D
D --> E[π Detect]
D --> F[π¨ Respond]
style A fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#9C27B0,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#FF9800,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#2196F3,stroke:#fff,stroke-width:3px,color:#fff
style E fill:#4CAF50,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
Naturally, the events and incidents that flow from the security monitoring architecture can be used to improve protection mechanisms or further refine the threat identification. While threats are a core driver for security monitoring, they are not the only driver. Other aspects of the organizational environment must be considered as well such as risk and compliance obligations.
Developing the right use cases or detection rules, and having an effective development and implementation process, is more than half the battle in reducing response time to a potential attack and minimizing its impact.
π― Use cases must be customized for each organization, reflecting:
- π’ Organization's current unique requirements and risk, threat and compliance profile
- π Current threat landscape, based on the organization's industry vertical
- πΎ Types of assets owned
- π Organization's operating regions, applications and services used
graph TB
A[β οΈ Risks] --> D[π‘οΈ Security Monitoring]
B[π― Threats] --> D
C[π Compliance] --> D
A --> A1[π° Financial Loss]
A --> A2[π’ Reputation Damage]
A --> A3[βοΈ Operational Disruption]
B --> B1[π External Actors]
B --> B2[π€ Internal Actors]
B --> B3[π¦ Malware]
C --> C1[π International Standards]
C --> C2[ποΈ National Regulations]
C --> C3[π Industry Requirements]
style D fill:#9C27B0,stroke:#fff,stroke-width:3px,color:#fff
style A fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#FF9800,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style A1 fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style A2 fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style A3 fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style B1 fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style B2 fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style B3 fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style C1 fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
style C2 fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
style C3 fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
Cybersecurity risk is the probability of exposure or loss resulting from a cyber-attack or data breach on your organization. A better, more encompassing definition is the potential loss or harm related to technical infrastructure, use of technology or reputation of an organization.
Organizations are becoming more vulnerable to cyber threats due to the increasing reliance on computers, networks, programs, social media and data globally. Data breaches, a common cyber-attack, have massive negative business impact and often arise from insufficiently protected data.
π― Threats
Any potential occurrence that may cause an undesirable or unwanted outcome for an organization or for a specific asset is a threat. Threats are any action or inaction that could cause damage, destruction, alteration, loss, or disclosure of assets or that could block access to or prevent maintenance of assets.
Cyber threats refer to the possibility of a successful cyber-attack that aims to gain unauthorized access, damage, disrupt, or steal an information technology asset, computer network, intellectual property or any other form of sensitive data.
π Compliance
As the number and severity of cyber-attacks increases, industry standards organizations and governments seek to enforce cybersecurity by establishing more stringent compliance requirements. In cybersecurity, compliance means creating a program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.
Organizations subject to industry or regional cybersecurity regulations are required by law to meet compliance and take the prescribed actions following the discovery of a data breach.
Each line of business has their own risks and threats. For example, the threats of banking firm is not the same as a healthcare or Government entity. So, understanding the line of business would help well in plotting the threat actors and attack motivation.
graph TD
A[π’ Business Objectives] --> B[π» Technology Decisions]
B --> C[πΎ IT Assets]
C --> D[π₯ People]
C --> E[π Data]
F[β οΈ Vulnerabilities] --> G[π― Threat Agents]
G --> H[π₯ Exploitation]
C --> F
D --> F
E --> F
I[π‘οΈ Safeguards] --> J[π Risk Mitigation]
J --> C
J --> D
J --> E
style A fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#9C27B0,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#607D8B,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#795548,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style G fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style H fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style I fill:#4CAF50,stroke:#fff,stroke-width:2px,color:#fff
style J fill:#8BC34A,stroke:#fff,stroke-width:2px,color:#fff
It's important to understand what the organisation business objectives are specifically for a given period of time. As these business objectives influence and shape the technology decisions. The technology decisions in turn become the assets in the shape of IT equipment, People and Data that must be safeguarded every single day because they are bound to have vulnerabilities that possess the risk of being exploited by Threat agents.
π Cyber Elements Relationship:
- π― Threats exploit
β οΈ vulnerabilities, which results in π exposure - π Exposure is
β οΈ risk, andβ οΈ risk is mitigated by π‘οΈ safeguards - π‘οΈ Safeguards protect πΎ assets that are endangered by π― threats
flowchart TB
A[π― Threats] -->|exploit| B[β οΈ Vulnerabilities]
B -->|results in| C[π Exposure]
C -->|is| D[β οΈ Risk]
D -->|mitigated by| E[π‘οΈ Safeguards]
E -->|protect| F[πΎ Assets]
F -->|endangered by| A
style A fill:#b62324,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#bb8009,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#db6d28,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#db61a2,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#2ea043,stroke:#fff,stroke-width:2px,color:#fff
Businesses also evolve continuously. Thus, it is possible that changes to the business layer of the use case may be required. These changes may also need to be reflected in operational implementation. For example, changes in demands regarding use case output may lead to new assets being monitored or new monitoring rules being implemented.
π Defining Threats and Risks - Click to expand
Defining Threats and Risks:
To grasp the essence of threats and risks, let's start by defining each concept individually. In the realm of cybersecurity, a threat refers to a specific type of malicious actor, an entity, or an event that has the potential to exploit vulnerabilities and compromise the security of computer systems, networks, or data. These threats may come in the form of hackers, malware, viruses, phishing attacks, or social engineering tactics.
On the other hand, a risk is the potential for loss, harm, or negative consequences resulting from the exploitation of vulnerabilities by threats. Risks encompass assessing the likelihood and potential impact of threats on an organization's information assets, including data confidentiality, integrity, and availability.
Threats: The 'What' of Cybersecurity:
Imagine a medieval castle fortified with high walls, towers, and guards. In the context of cybersecurity, threats can be likened to the external forces attempting to breach the castle's defenses. These forces could be hostile invaders, spies, or even traitors within the castle walls. Similarly, cybersecurity threats are the specific instances of potential harm, often associated with intentional malicious activities or accidental occurrences.
Risks: The 'How' and 'Why' of Cybersecurity:
While threats focus on the external forces attempting to breach our digital defenses, risks provide a broader perspective by considering the overall uncertainty and potential impact to our information assets. In our castle analogy, risks can be compared to the assessment of the castle's vulnerability, the potential impact of an invasion, and the consequences for the kingdom.
The Interplay Between Threats and Risks:
While threats and risks are distinct concepts, they are intertwined and mutually influence each other in the realm of cybersecurity. Threats are specific manifestations of potential harm, often originating from intentional malicious activities or accidental occurrences. Risks, on the other hand, encompass a broader range of potential threats, vulnerabilities, and their associated consequences.
All IT systems have risk. There is no way to eliminate 100 percent of all risks. Instead, upper management and key stakeholders must decide which risks are acceptable and which are not. Determining which risks are acceptable requires detailed and complex asset and risk assessments.
graph LR
A[π Risk Assessment] --> B[π Quantitative]
A --> C[π Qualitative]
B --> D[π° Monetary Figures]
C --> E[π Subjective Values]
D --> F[π Hybrid Analysis]
E --> F
style A fill:#FF9800,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#9C27B0,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#4CAF50,stroke:#fff,stroke-width:2px,color:#fff
There are two risk assessment methodologies:
- π Quantitative: Assigns real monetary figures to the loss of an asset
- π Qualitative: Assigns subjective and intangible values to the loss of an asset
Both methods are necessary for a complete risk analysis. Most environments employ a hybrid of both risk assessment methodologies in order to gain a balanced view of their security concerns.
π Types of Risk Drivers - Click to expand
π Quantitative & Qualitative Pertinence
The quantitative method results in concrete probability percentages. That means the end result is a report that has monetary figures for levels of risk, potential loss, cost of countermeasures, and value of safeguards. This report is usually fairly easy to understand, especially for anyone with knowledge of spreadsheets and budget reports.
Qualitative risk analysis is more scenario based than it is calculator based. Rather than assigning exact monetary figures to possible losses, you rank threats on a scale to evaluate their risks, costs, and effects. The method of combining quantitative and qualitative analysis into a final assessment of organizational risk is known as hybrid assessment or hybrid analysis.
πΌ Business Impact Analysis
Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency. A BIA is an essential component of an organization's business continuance plan.
One of the basic assumptions behind BIA is that every component of the organization is reliant upon the continued functioning of every other component, but that some are more crucial than others and require a greater allocation of time, effort and funds in the wake of a disaster.
Threat drivers are the factors or conditions that contribute to the emergence, growth, or impact of threats in the cybersecurity landscape. They provide insight into the motivations, capabilities, and techniques of threat actors, helping organizations understand the potential risks they face.
graph TB
A[π― Threat Drivers] --> B[π External Actors]
A --> C[π€ Internal Actors]
A --> D[β οΈ Vulnerabilities]
A --> E[π£ Exploits]
A --> F[π Social Engineering]
A --> G[π¦ Malware]
A --> H[π₯ Advanced Persistent Threats]
style A fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#9C27B0,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#673AB7,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
style G fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style H fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
Common threat drivers include:
| π― Threat Driver | π Description |
|---|---|
| π External Actors | Individuals, groups, or organizations outside the target organization |
| π€ Internal Actors | Individuals within an organization who pose a security risk |
| Weaknesses or flaws in software, hardware, or system configurations | |
| π£ Exploits | Tools, techniques, or malicious code that take advantage of vulnerabilities |
| π Social Engineering | Psychological manipulation techniques to deceive individuals |
| π¦ Malware | Malicious software designed to gain unauthorized access or disrupt systems |
| π₯ APTs | Sophisticated, targeted attacks by well-resourced threat actors |
π Types of Threat Drivers - Click to expand
π§ Threat Intelligence
Cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability, and analysed through rigorous and structured tradecraft techniques by those with substantive expertise and access to all-source information.
π― Threat Modelling
Threat modelling is a crucial component of any robust use case framework as it provides a systematic approach to identify, assess, and mitigate potential threats and risks. By incorporating threat modelling into the use case development process, organizations can enhance the security of their systems, applications, and infrastructure.
π Threat Hunting
Threat hunting is the proactive cybersecurity practice of searching for hidden threats already in an organization's environment. Threat hunting is necessary because many adversaries engineer their attacks to bypass an organization's perimeter and defences in order to sneak in undetected.
π Lessons Learned From Incident Response
Incident response activities originating from security alerts are also input into the use case management process. This loopback mechanism ensures that monitoring is effective and efficient. After all, breaches must be detected and false-positives should be avoided as much as possible.
Cybersecurity Compliance involves meeting various controls (usually enacted by a regulatory authority, law, or industry group) to protect the confidentiality, integrity, and availability of data.
graph TD
A[π’ Organization] --> B{Compliance Requirements}
B --> C[π Legal Requirements]
B --> D[ποΈ Regulatory Bodies]
B --> E[π Industry Groups]
C --> F[π Data Protection]
D --> F
E --> F
F --> G[π‘οΈ CIA Triad]
G --> H[π Confidentiality]
G --> I[β
Integrity]
G --> J[β‘ Availability]
style A fill:#F44336,stroke:#fff,stroke-width:2px,color:#fff
style B fill:#FF5722,stroke:#fff,stroke-width:2px,color:#fff
style C fill:#E91E63,stroke:#fff,stroke-width:2px,color:#fff
style D fill:#9C27B0,stroke:#fff,stroke-width:2px,color:#fff
style E fill:#673AB7,stroke:#fff,stroke-width:2px,color:#fff
style F fill:#3F51B5,stroke:#fff,stroke-width:2px,color:#fff
style G fill:#2196F3,stroke:#fff,stroke-width:2px,color:#fff
style H fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
style I fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
style J fill:#00BCD4,stroke:#fff,stroke-width:2px,color:#fff
Compliance requirements vary by industry and sector, but typically involve using an array of specific organizational processes and technologies to safeguard data. Controls come from a variety of sources including:
- ποΈ CIS (Center for Internet Security)
- πΊπΈ NIST Cybersecurity Framework
- π ISO 27001
β οΈ Important: Many of these standards impose rules that mandate monitoring key IT systems and security controls.
π Types of Compliance Drivers - Click to expand
Compliance standards adopted by organizations due to regulations that are not limited by national boundaries.
Examples:
- π ISO 27001 - Information Security Management
- πͺπΊ GDPR - General Data Protection Regulation
- π― Common Criteria - IT Security Evaluation
Compliance standards imposed or suggested by the government of the country.
Examples:
- πΆπ¦ Qatar CSF - Qatar Cybersecurity Framework
- π¬π§ Cyber Essentials - UK Government Scheme
- π©πͺ BSI IT-Grundschutz - German IT Security Standards
Industry-specific standards that organizations must follow to comply with obligations for business operations.
Examples:
- π³ PCI DSS - Payment Card Industry Data Security Standard
- β‘ IEC 62443 - Industrial Communication Networks Security
Organization-specific policies or set of rules mandated by the internal information security department.