Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • Frameworks
  • Example
  • Standards
  • Example
  • Guidelines
  • Example
  1. Obsidian
  2. Auditing Fundamentals

Standards, Frameworks & Guidelines

Frameworks

Frameworks provide a structured approach to implementing security practices, allowing organizations to customize their security measures based on specific needs. They are often flexible and adaptable to various industries, facilitating a tailored approach to security management.

Example

  • NIST Cybersecurity Framework (CSF): Helps organizations manage and reduce cybersecurity risks.

  • COBIT (Control Objectives for Information and Related Technologies): Focuses on IT governance and aligning IT with business goals.

  • ISO/IEC 27001: A framework for managing information security risks.

  • CIS Controls: Offers practical steps for securing IT systems and data.

  • ITIL (Information Technology Infrastructure Library): Improves IT service management.

Standards

Standards establish specific requirements and criteria that organizations must meet to achieve compliance. These are often mandatory in regulated industries, ensuring that organizations adhere to essential security practices and legal obligations.

Example

  • PCI DSS (Payment Card Industry Data Security Standard): Ensures secure handling of cardholder information.

  • HIPAA (Health Insurance Portability and Accountability Act): Regulates healthcare data security and privacy.

  • GDPR (General Data Protection Regulation): European Union regulation on data protection and privacy.

  • ISO/IEC 27002: Provides best practices for information security controls.

  • SOX (Sarbanes-Oxley Act): Focuses on financial controls and auditing requirements.

Guidelines

Guidelines offer recommended practices and advice to enhance security efforts. While they are generally not mandatory, they are considered best practices that organizations can adopt to improve their overall security posture.

Example

  • OWASP (Open Web Application Security Project) Guidelines: Provides recommendations for securing web applications.

  • NIST SP 800-53: Offers security controls for federal information systems and organizations.

  • CIS Benchmarks: Guidelines for secure configuration of various technologies.

  • Microsoft Security Development Lifecycle (SDL): Best practices for secure software development.

  • ISO/IEC 27005: Guidelines for managing information security risks.

Imagine you are planning a road trip.

  • Frameworks are like the overall route map you use to outline your journey. They provide a flexible structure, showing you various routes you can take depending on your preferences, such as scenic routes or highways.

  • Standards are like the traffic laws and regulations you must follow during your trip, such as speed limits and rules about when to stop at red lights. These requirements are non-negotiable and ensure safety on the road.

  • Guidelines are akin to travel tips and recommendations from experienced travelers, such as the best places to stop for food or rest. While not mandatory, these suggestions help you have a more enjoyable and safer trip.

PreviousGRCNextFrom Audit to Pentest

Last updated 8 months ago

🔷