Rhand Leal
May 2, 2016
Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of security issues, they are not exhaustive. Thus, ISO 27001 clauses 6.1.3 b) and c) note that an organization can go beyond the standard’s controls to set proper security levels, by developing its own solutions or using other knowledge sources.
This article will show you an alternative to ISO 27002 as guidance to support ISO 27001 controls implementation: the NIST SP 800 series. You will see what they are about and their general structure compared to those of ISO 27001 and ISO 27002.
The NIST SP 800 series is a set of free-to-download documents from the United States federal government, describing computer security policies, procedures, and guidelines, published by the NIST (National Institute of Standards and Technology), containing more than 130 documents.
Figure: NIST documentation structure
Like the ISO 27000 series, the SP 800 series provides information covering management and operational information security practices, but in a greater number of documents.
To provide specific guidance for integrating information security risk management with organizational operations, the NIST 800 SP series has the document SP 800-39 – Managing Information Security Risk.
For risk assessment, the SP 800 series has a documentation set created using a six-step risk methodology:
Since ISO 27001 requires, but does not prescribe any methodology (clause 6.1.2), this one can be adopted by your organization. If your organization already has a risk assessment methodology, you can keep it and use only the document’s security control catalogue.
The SP 800 series has numerous standards that cover 256 safeguards. This is where SP800-53 is very useful, because it organizes all those safeguards into 18 categories:
Family | Num. of controls | Family | Num. of controls |
Access Control | 25 | Media Protection | 8 |
Awareness and Training | 5 | Physical and Environmental Protection | 20 |
Audit and Accountability | 16 | Planning | 9 |
Security Assessment and Authorization | 9 | Personnel Security | 8 |
Configuration planning | 11 | Risk Assessment | 6 |
Contingency Planning | 13 | System and Services Acquisition | 22 |
Identification and Authentication | 11 | System and Communication Protection | 44 |
Incident Response | 10 | System and Information Integrity | 17 |
Maintenance | 6 | Program Management | 16 |
Table: Security control families and number of controls per family
Some useful documents in the SP 800 series that are referenced by SP 800-53 Rev.4 controls are:
The security implementation must have a holistic view to be effective, and for that, the more input to define the controls the better.
The SP 800 series documents provide a free alternative source of additional information to perform the risk assessment process and to design, implement, and manage security controls that can be matched to those of ISO 27001 and ISO 27002 and help your organization to better prepare its environment to face risks in a more reliable and cost-effective way.
To learn more about integrating other sources of security controls in your ISO 27001 implementation, try this free ISO 27001 Lead Implementer Online Course.