Information security standards

[4] Cross-border, cyber-exfiltration operations by law enforcement agencies to counter international criminal activities on the dark web raise complex jurisdictional questions that remain, to some extent, unanswered.

[5][6] Tensions between domestic law enforcement efforts to conduct cross-border cyber-exfiltration operations and international jurisdiction will likely continue to provide improved cybersecurity norms.

These standards provide a globally recognized framework for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).

[8] The standard emphasizes a risk-based approach to managing information security, encouraging organizations to identify, assess, and mitigate risks specific to their operational environment.

Together, they form a comprehensive ecosystem that addresses everything from risk assessment and incident management to privacy controls and cloud security.

Alongside it, ISO/IEC 27018 focuses on protecting personally identifiable information (PII) in public cloud environments, helping organizations meet privacy regulations and maintain customer trust.

[20] The EU has adopted the European Cybersecurity Certification Scheme (EUCC), which is based on ISO/IEC 15408, to align with international standards while addressing regional requirements.

In coordination with the EU, the UNECE has created a Cyber Security Management System (CSMS) certification mandatory for vehicle-type approval.

[23] The ETSI EN 303 645 standard provides a set of baseline requirements for security in consumer Internet of Things (IoT) devices.

By aligning with the Radio Equipment Directive (2014/53/EU) and its accompanying Delegated Act, these standards support manufacturers and stakeholders in maintaining compliance and consistency across European markets.

They also establish common testing protocols, performance criteria, and security guidelines, thereby aiding cross-border interoperability and addressing evolving industry needs.

[28] Compliance with these standards is mandatory for power system operators and owners under NERC’s jurisdiction, with enforcement overseen by the Federal Energy Regulatory Commission (FERC) in the United States.

Initially created to ensure the security of federal information systems, NIST's standards have become globally influential, serving as foundational references for cybersecurity programs across industries and countries.

NIST's approach emphasizes a risk-based methodology, focusing on five core functions: Identify, Protect, Detect, Respond, and Recover.

While federal agencies are mandated to comply with NIST standards, private organizations across finance, healthcare, manufacturing, and other sectors often adopt them voluntarily due to their clarity, flexibility, and comprehensiveness.

Developed in response to growing cyber threats and the need for standardized practices, the CSF provides a risk-based approach to managing cybersecurity risks.

It is structured around five core functions: Identify, Protect, Detect, Respond, and Recover, each representing a critical phase in cybersecurity risk management.

It provides detailed requirements for organizations handling sensitive federal information, such as defense contractors and private sector partners.

These standards are legally binding for U.S. federal agencies and cover critical areas such as cryptography and secure data handling.

FIPS standards are not limited to federal use; they are frequently referenced in international compliance frameworks and form the basis for many commercial security products.

Cyber Essentials also includes an assurance framework and a simple set of security controls to protect information from threats coming from the internet.

Users from public authorities, companies, manufacturers, or service providers can use the BSI standards to make their business processes and data more secure.

The ISOC hosts the Requests for Comments (RFCs), including the Official Internet Protocol Standards and the RFC-2196 Site Security Handbook.

vectorial version
vectorial version