Last month I explained ISO 17799, IT Infrastructure Library and COBIT to some degree. Although this is a terrific question, I cannot really answer it and do it justice in this format. I am currently writing a series for SearchSecurity.com. The first installment will cover risk management and analysis, and the Octave methodology. The second will outline COBIT, ITL and ISO 17799, as well as how to use these methods in an integrated manner...
(mainly how to combine COBIT, ITIL and ISO 17799), which can be used to be compliant with SOX, GLBA, and HIPAA. The third installment will compare and contrast current risk management tools and technologies, explain which methodologies they follow as well as their benefits and hidden downfalls. Look for these tips which will be launching soon.
In the meantime, here is a quick and dirty answer to your question:
- ISO 17799 is the globally agreed upon way of setting up an organizational security program.
- COBIT has become the de facto standard of ensuring the right controls are put into place to protect IT assets and data.
- SOX and GLBA are built around COBIT, which means that the auditors will be following the COBIT methodology to verify if you are complaint with these regulations.
- HIPAA is built on NIST standards. NIST has their own standards on how to secure assets, but these best practices are not as detailed and structured as COBIT.
- Octave is a qualitative risk management methodology, which is integrated with many of the other listed standards, although usually not fully. Octave can be very time consuming, but if done right, it is very robust.
- COSO is a methodology to ensure that financial reporting is not done fraudulently and it defines controls and a criterion to protect assets.
- ITIL is a methodology of how to develop and implement business processes with the focus of how the IT group can best serve its internal customers.
If you have to be SOX or GLBA compliant, start learning COBIT. I also believe it is critical for all organizations to start learning risk management. Octave is a great approach and after you understand its basics, you can choose if you want to use the full methodology or just components of it. There is an Octave methodology for large organizations and another version for smaller organizations.
Also, it's important to note that while there are several methodologies and approaches, when you boil them all down, there's about a 60-70% overlap between them. Information security is information security. Each has its own focus (process-oriented, control-oriented, risk management oriented, financial records oriented, etc.). The real "gold" is to find how to use pieces and parts of them to provide the best approach for your organization's needs.
Related Q&A from Shon Harris, Contributor
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should ...continue reading
In today's security world, it's hard to keep track of each and every management standard and auditing procedure. In this SearchSecurity.com Q&A, ...continue reading
Before you begin putting the pieces of your security program together, you may want to have a look at ISO 27001. In this expert Q&A, Shon Harris ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.