Skip to main content

Corporate Information Security Processes and Services

  • Chapter
  • First Online:
IT Security Controls
  • 2254 Accesses

Abstract

This chapter addresses all the processes and services in the organization’s information security scope that should be implemented. Processes related to security awareness, training, and simulated attacks are addressed in the next chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

eBook
EUR 17.99
Price includes VAT (Netherlands)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 70.84
Price includes VAT (Netherlands)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Information Governance Initiative. IGI State of the Industry Report: Volume III. Washington, DC: IGI. https://iginitiative.com/wp-content/uploads/The-State-of-IG-Report-Volume-III-highres.pdf. 2018.

  2. 2.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf

  3. 3.

    www.iso.org/standard/74046.html

  4. 4.

    www.first.org/cvss/v3.1/specification-document

  5. 5.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf

  6. 6.

    www.iso.org/standard/75281.html

  7. 7.

    www.pcisecuritystandards.org/documents/PCI_DSS_Risk_Assmt_Guidelines_v1.pdf

  8. 8.

    www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/business-process-integration/the-enisa-rm-ra-framework

  9. 9.

    www.pmi.org/certifications/risk-management-rmp

  10. 10.

    www.isaca.org/credentialing/crisc

  11. 11.

    www.offensive-security.com/pwk-oscp/

  12. 12.

    www.offensive-security.com/pen300-osep

  13. 13.

    www.eccouncil.org/programs/certified-ethical-hacker-ceh/

  14. 14.

    www.eccouncil.org/programs/licensed-penetration-tester-lpt-master/

  15. 15.

    www.giac.org/certification/gpen

  16. 16.

    www.giac.org/certification/gwapt

  17. 17.

    www.giac.org/certification/gxpn

  18. 18.

    https://crest-approved.org

  19. 19.

    www.ncsc.gov.uk/information/check-penetration-testing

  20. 20.

    www.comptia.org/certifications/pentest

  21. 21.

    https://owasp.org/www-project-top-ten/

  22. 22.

    https://owasp.org/www-project-code-review-guide/assets/OWASP_Code_Review_Guide_v2.pdf

  23. 23.

    https://owasp.org/www-project-web-security-testing-guide/

  24. 24.

    https://owasp.org/www-project-mobile-security-testing-guide/

  25. 25.

    https://owasp.org/www-project-security-knowledge-framework/

  26. 26.

    https://owasp.org/www-project-zap/

  27. 27.

    https://nvd.nist.gov/vuln-metrics/cvss

  28. 28.

    https://nvd.nist.gov/

  29. 29.

    https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final

  30. 30.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf

  31. 31.

    For a curated list, go to https://github.com/jivoi/awesome-osint.

  32. 32.

    Please see Chapter 9.

  33. 33.

    https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final

  34. 34.

    NIST SP 800-37 Rev. 2 from NIST SP 800-160 Vol. 2

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Viegas, V., Kuyucu, O. (2022). Corporate Information Security Processes and Services. In: IT Security Controls. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7799-7_5

Download citation

Publish with us

Policies and ethics