{"id":2843,"date":"2022-03-09T17:38:03","date_gmt":"2022-03-09T16:38:03","guid":{"rendered":"https:\/\/kalweit-its.de\/2022\/03\/the-overlooked-danger-selection-of-security-controls\/"},"modified":"2023-02-24T13:00:55","modified_gmt":"2023-02-24T12:00:55","slug":"the-overlooked-danger-selection-of-security-controls","status":"publish","type":"post","link":"https:\/\/kalweit-its.de\/en\/the-overlooked-danger-selection-of-security-controls\/","title":{"rendered":"The Overlooked Danger: Selection of Security Controls"},"content":{"rendered":"\n
There are so many fast routes to establish security management as well as controls that the risks of going by the book might be overlooked. It is easy to use frameworks, standards like ISO 27001 or other regulatory requirements and never get into the habit of continuous improvement. For this very reason, this articles explores the process for selecting security controls, the industry best practices and some experiences along the way.<\/p>\n\n
To lay out a plan for getting a strong table of security controls, we have written a whitepaper about this topic that explains the process of selecting security controls in detail based on the internationally used NIST Risk Management Framework and the Special Publication 800-53. This paper concludes all necessary steps to complete a list of selected controls, examples, industry experience and widely used misconceptions to optimally implement this process in your risk or information security processes as well as a full example on how the result of this process would look like. You can find the whitepaper following this link:<\/p>\n\n