Skip to main content

International Security Standards

  • Chapter
  • First Online:
IT Security Controls

Abstract

Organizations must increasingly demonstrate to their customers and regulatory authorities that they have sufficient protection, security, resilience, and privacy of their information, assets, and systems, based on best practices. International information security standards applicable for all organizations such as ISO 27000 series or industry-specific information security standards such as PCI DSS and SWIFT were created for that reason. When organizations show their compliance to these standards, their customers acknowledge that they understand their risks, perform risk mitigation actions, create baseline security, and manage the risk on their systems. This does not mean that compliant organizations are free of risks or vulnerabilities, but they certainly have a better security posture than non-compliant organizations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

eBook
EUR 17.99
Price includes VAT (Netherlands)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 70.84
Price includes VAT (Netherlands)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    www.iso.org/standard/54534.html

  2. 2.

    www.iso.org/standard/42103.html

  3. 3.

    www.iaf.nu/articles/Accreditation_Body_Members_by_Name/52

  4. 4.

    www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf

  5. 5.

    Seaman, Jim. PCI DSS: An Integrated Data Security Standard Guide. Apress, 2020.

  6. 6.

    PCI SSC has an FAQ on card data received from unintended channels. https://pcissc.secure.force.com/faq/articles/Frequently_Asked_Question/What-should-a-merchant-do-if-cardholder-data-is-accidentally-received-via-an-unintended-channel All related PCI DSS requirements are also applicable to those card data that are somehow stored in your system.

  7. 7.

    www.forcepoint.com/product/dlp-data-loss-prevention

  8. 8.

    www.broadcom.com/products/cyber-security/information-protection/data-loss-prevention

  9. 9.

    www.mcafee.com/enterprise/en-us/products/total-protection-for-data-loss-prevention.html

  10. 10.

    www.netskope.com/products/capabilities/data-loss-prevention

  11. 11.

    www.proofpoint.com/us/products/information-protection/enterprise-dlp

  12. 12.

    https://digitalguardian.com/products/data-discovery

  13. 13.

    www.groundlabs.com/card-recon/

  14. 14.

    www.spirion.com/products/sensitive-data-platform/sensitive-data-finder/#

  15. 15.

    www.fireeye.com/services/freeware/memoryze.html

  16. 16.

    https://github.com/obenkuyucu/panconstructor

  17. 17.

    www.pcisecuritystandards.org/documents/Tokenization_Guidelines_Info_Supplement.pdf

  18. 18.

    Based on definition of “Strong Cryptography” of PCI SSC Glossary, see www.pcisecuritystandards.org/pci_security/glossary#Strong%20Cryptography

  19. 19.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf

  20. 20.

    www.nartac.com/Products/IISCrypto

  21. 21.

    www.ssllabs.com/ssltest/

  22. 22.

    http://www.wireshark.org/

  23. 23.

    www.owasp.org/index.php/Main_Page

  24. 24.

    www.w3.org/Protocols/HTTP/1.0/spec.html

  25. 25.

    www.barracuda.com/products/webapplicationfirewall

  26. 26.

    www.indusface.com/web-application-firewall.php

  27. 27.

    www.f5.com/products/security/advanced-waf

  28. 28.

    www.stackpath.com/products/waf

  29. 29.

    www.imperva.com/products/web-application-firewall-waf/

  30. 30.

    https://sucuri.net/website-firewall/

  31. 31.

    www.fortinet.com/products/web-application-firewall/fortiweb

  32. 32.

    www.qualys.com/apps/web-app-firewall/

  33. 33.

    www.pcisecuritystandards.org/pdfs/Multi-Factor-Authentication-Guidance-v1.pdf

  34. 34.

    The use of generic usernames should be avoided as per requirement 8.5, however, some PAM tools are using these generic usernames on-the-fly. It is transparent to the user, but in the event logs, it generally shows the generic username. The PAM tool itself associates the individual’s PAM account with these generic user logins. Organizations using such processes need to make sure that they can identify the actual user.

  35. 35.

    www.pcisecuritystandards.org/pci_security/glossary#System-level%20object

  36. 36.

    For service providers, it is also essential to timely detect any faults and respond in the following security devices: firewalls, IDS / IPS, FIM, antivirus, physical access controls, logical access controls, audit logging mechanisms, segmentation controls

  37. 37.

    www.pcisecuritystandards.org/assessors_and_solutions/approved_scanning_vendors

  38. 38.

    www.pcisecuritystandards.org/documents/ASV_Program_Guide_v3.1.pdf

  39. 39.

    www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf

  40. 40.

    www.pcisecuritystandards.org/documents/Prioritized-Approach-for-PCI-DSS-v3_2_1.pdf

  41. 41.

    www.pcisecuritystandards.org/documents/Prioritized-Approach-Tool-v3_2_1.xlsx

  42. 42.

    www.swift.com/myswift/customer-security-programme-csp/find-external-support/directory-cyber-security-service-providers

  43. 43.

    www.swift.com/node/300831/directory-csp-assessment-providers

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Viegas, V., Kuyucu, O. (2022). International Security Standards. In: IT Security Controls. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7799-7_2

Download citation

Publish with us

Policies and ethics