Importancia de la seguridad de la información
¿Por qué crear un programa de seguridad de la información?
Objetivos del programa de seguridad de la información
Componentes clave de un programa de seguridad de la información
Componentes clave de un programa de seguridad de la información
Políticas de seguridad
Respuesta a incidentes
Gestión de vulnerabilidades
Gestión de riesgos
¿Qué se entiende por Riesgo?
Gestión del Riesgo
Evaluación del Riesgo
Gestión de Controles
Continuidad del negocio
Definiciones y términos
Análisis de impacto de negocio
Software seguro
Desarrollo o adquisición de software seguro
Introducción a OWASP
OWASP Top 10
Modelo de Madurez para el Aseguramiento del Software
Diseño del equipo
Roles, equipos y modelos de seguridad
Pirámide de crecimiento o criterio de contratación
Caso de estudio Platzi
La experiencia de Platzi con ISO27001
You don't have access to this class
Keep learning! Join and start boosting your career
To ensure security in an organization, it is vital to perform an adequate risk assessment that includes the review of controls. There are multiple references, standards and frameworks that guide us in this task. The ISO 27001 standard and the special document 800-53 of the National Institute of Standards and Technology of the United States stand out here.
ISO 27001 is a certifiable standard that establishes requirements for establishing, implementing, maintaining and improving an information security management system. Within its family is ISO 27002, which contains the controls necessary to meet the requirements of ISO 27001. If a control cannot be met because it is outside the scope of the business, it can be adequately justified in the Statement of Applicability (SoA).
NIST 800-53 provides detailed guidance on security and privacy controls that help mitigate risks to information systems. 800-53B also provides a baseline that varies depending on the impact assets have on systems. A practical example would be to implement inactivity logoff on systems with moderate to high impact, as indicated in this document.
800-53A is focused on control assessment. It provides methods for assessing the effectiveness of controls through specific questions and actions. It assists in preparing for audits by indicating which personnel to interview, what to validate and which documents to review.
The Statement of Applicability (SoA) is a document that lists the controls applied, justifying their implementation or exclusion. In an Excel sheet, it could contain:
This document is essential for auditors, facilitating the understanding of why a control is applied or not, and the implications of such decisions. It also serves to report to superiors and justify budgets, avoiding unnecessary investments in controls.
When applying controls, risks do not disappear completely. The resulting impact, known as residual risk, must be accepted or addressed. Risk management occurs throughout the organization, spanning from strategy to operations. It is a crucial element in any security program, enabling organizations to effectively minimize threats and consciously accept the risks that remain.
Contributions 8
Questions 0
Independiente de qué estándar se pueda seleccionar, lo importante es adoptarlo en serio y aplicarlo. Este tipo de marcos están hechos para detectar el riesgo, administrarlo, combatirlo y obtener insights para generar mejoras en el proceso. Estando en el área de la tecnología, no hay que ser genio para entender que los ataques se volverán cada vez más sofisticados gracias al uso de la IA, ya no basta tener un comité de profesionales inteligentes que sean expertos en programación o ciberseguridad, es casi literalmente pasarse al lado oscuro y pensar como hacker, actuar como hacker, vivir como hacker, ayudado por el potencial de la IA.
Want to see more contributions, questions and answers from the community?