<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yevhenii Kurii</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Opirskyy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>21</fpage>
      <lpage>32</lpage>
      <abstract>
        <p>Managing information security in the organization may be a daunting task, especially considering that it may encompass many areas from physical and network security to human resources security and management of suppliers. This may be especially hard for young specialists or not experienced enough specialists, who may miss some important areas due to lack of practical experience. This is where security frameworks come in handy and put formality into the process of the design and implementation of the security strategy. With a framework in place, it becomes much easier to define the processes and procedures that your organization must take to assess, monitor, and mitigate cybersecurity risk and apply proper controls to protect valuable information. But another problem came up when you are to choose the “just right” framework for your organization taking into account more business-specific characteristics like the context of the organization, area of operation, applicable laws, regulations and contractual obligations, as well as more general ones like framework's maturity, comprehensiveness or popularity. While there are a bunch of different information security frameworks out in the wild, the most commonly-found and preferred by security professionals worldwide are NIST SP 800-53 and ISO/IEC 27001:2013. They combine both the quite comprehensive set of security controls to cover the most important security areas and wide applicability which allows applying these frameworks to all kinds of organizations. But they also have a set of distinct features, that define their relevance to the particular organization. The article is aimed at giving a brief overview of these two most popular security frameworks as well as describing their key characteristics and providing a comparison of their controls.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Information security</kwd>
        <kwd>cybersecurity framework</kwd>
        <kwd>security controls</kwd>
        <kwd>information security management system</kwd>
        <kwd>ISMS</kwd>
        <kwd>ISO 27001</kwd>
        <kwd>NIST 800-53</kwd>
        <kwd>controls mapping</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>To successfully achieve the objectives of
implementing cybersecurity at different levels, a
range of procedures and standards should be
followed. Cybersecurity standards determine the
requirements that an organization should follow to
achieve cybersecurity objectives and facilitate
against cybercrimes [1] and ensure the ongoing
management of information security controls.</p>
      <p>Additionally, the framework establishes a
common language for defining a cybersecurity
program, enabling organizations to set risk-based
cybersecurity goals at the executive level that can
be translated to the operations team [2].</p>
      <p>
        These frameworks are a blueprint for managing
and reducing organizational risk. Information
security professionals use frameworks to define
and prioritize the tasks required to manage the
organization's security program. Frameworks are
also used to help prepare for compliance and other
IT and security audits. When you are choosing
from the number of leading information security
frameworks, you would primarily assess the
number of unique information security controls
(requirements) in each of them [
        <xref ref-type="bibr" rid="ref32 ref68">3–5</xref>
        ].
      </p>
      <p>
        The volume of these controls directly impacts
the number of domains covered by that
framework. The lesser number of controls in a
framework might make it easier to implement, but
it also might not provide the necessary coverage
that your organization needs from the perspective
of administrative, technical, and physical
information security practices [
        <xref ref-type="bibr" rid="ref5">6</xref>
        ].
      </p>
      <p>
        This is where defining the applicable and
relevant framework is primarily a business
decision [
        <xref ref-type="bibr" rid="ref18">7</xref>
        ], based on your organization's context
and risk profile, which needs to consider
applicable laws and regulations, that are required
to support existing or planned business processes.
      </p>
      <p>
        Commonly, this selection process generally
leads to adopting one of the following
frameworks:
 ISO 27001/002 [
        <xref ref-type="bibr" rid="ref50 ref6 ref7">8, 9</xref>
        ]
 NIST Special Publication 800-53 [
        <xref ref-type="bibr" rid="ref30 ref36">10</xref>
        ]
 NIST Cybersecurity Framework [11]
 PCI DSS [
        <xref ref-type="bibr" rid="ref19 ref2">12</xref>
        ]
 CIS Controls [
        <xref ref-type="bibr" rid="ref11 ref12 ref8 ref9">13, 14</xref>
        ]
 HITRUST Common Security Framework [15]
 HIPAA [16]
 CSA CCM [17]
 GDPR [
        <xref ref-type="bibr" rid="ref10 ref15 ref15 ref16 ref20 ref3 ref3 ref4">18</xref>
        ]
 ISO 27701 [19]
 AICPA Trust Services Criteria (SOC 2) [20]
 COBIT [21]
      </p>
      <p>Each information security framework has its
own unique specialization and depth of coverage.
However, understanding this can help you make
an informed decision on the most appropriate
framework for your needs. [22, 23] You may even
find you need to leverage a metaframework (e.g.,
the framework of frameworks) to address more
complex compliance requirements (e.g., when the
organization is holding the personal data of EU
citizens and process cardholder data, it should
comply with both GDPR and PCI DSS
requirements).</p>
      <p>A key consideration for choosing an
information security framework would be
understanding the level of content and robustness
each framework offers. This will directly impact
the available information security controls within
each framework [24].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Overview and between NIST SP ISO/IEC 27001:2013</title>
    </sec>
    <sec id="sec-3">
      <title>Comparison 800-53 and</title>
      <p>The Special Publication (SP) 800-53 Security
and Privacy Controls for Information Systems and
Organizations from the National Institute of
Standards and Technology (NIST) is currently in
its 5th revision (rev5) dated September 2020. It
was initially designed to protect the US federal
government, but quickly gained popularity among
private industry and now is considered as one of
the most popular and respectable information
security frameworks in the world. It was partially
caused due to the significant outsourcing to private
companies that do business with the US federal
government.</p>
      <p>According to the official web page of the
standard “This publication [Special Publication
(SP) 800-53] provides a catalog of security and
privacy controls for information systems and
organizations to protect organizational operations
and assets, individuals, other organizations, and
the Nation from a diverse set of threats and risks,
including hostile attacks, human errors, natural
disasters, structural failures, foreign intelligence
entities, and privacy risks” [25].</p>
      <p>SO 27001 is a well-respected international
information security standard that outlines the key
processes and approaches a business needs to
manage information security risk in a practical
way [26]. ISO 27001 consists of the main part and
Annex A, that contains the basic overview of the
security controls needed to build an Information
Security Management System (ISMS).
Additionally, there is a separate standard ISO
27002 that provides a detailed description of the
specific controls that are necessary to actually
implement ISO 27001 (essentially, you can't meet
ISO 27001 without implementing ISO 27002).
[27, 28]. The important thing about ISO is that it
provides the companies with the possibility to
undergo an external audit and get certified against
ISO 27001.
2.1.</p>
    </sec>
    <sec id="sec-4">
      <title>Detailed Mapping of Controls</title>
      <p>Table 2 provides a mapping from the security
controls in NIST Special Publication 800-53 to the
security controls in ISO/IEC 27001:2013 [29].
AC-6
AC-7
AC-8
AC-9
AC-10
AC-19
AC-20
AC-22
AC-23
AC-24
AT-1
AT-2
AT-3
AT-4
AT-5
AT-6</p>
      <p>Separation of Duties
Least Privilege
AU-2 Event Logging
AU-3
AU-4</p>
      <p>Content of Audit
Records
Audit Log Storage
Capacity</p>
      <p>Response to Audit
AU-5 Logging Process</p>
      <p>Failures</p>
      <p>Audit Record Review, A.12.4.1,
AU-6 Analysis, and A.16.1.2,</p>
      <p>Reporting A.16.1.4</p>
      <p>Audit Record
AU-7 Reduction and</p>
      <p>Report Generation
AU-8 Time Stamps</p>
      <p>Protection of Audit</p>
      <p>Information
AU-10 Non-repudiation</p>
      <p>AU-9
AU-11
AU-12
CA-1
CA-2
CA-3
CA-4
CA-5
CA-6
CA-7
CA-9
CA-8</p>
      <p>Penetration Testing</p>
      <p>None</p>
      <p>IR-10</p>
      <sec id="sec-4-1">
        <title>Withdrawn</title>
        <p>Identification and
Authentication
(Organizational
Users)
Device Identification
and Authentication
Identifier
Management
Authenticator
Management
Authentication
Feedback
Cryptographic
Module
Authentication
Identification and
Authentication (Non- A.9.2.1
Organizational Users)
Service Identification
and Authentication
Incident Response
Policy and
Procedures
Incident Response
Training
Incident Response
Testing
Incident Handling
Incident Monitoring
None
Incident Reporting
Incident Response
Assistance
Incident Response
Plan
Information Spillage
Response
A.9.2.1
None
A.9.2.1
MA-3 Maintenance Tools
MA-2
MA-4
MA-5</p>
        <p>Controlled
Maintenance
Nonlocal
Maintenance
Maintenance
Personnel
A.11.2.4*,
A.11.2.5*
None
None
None
MA-6 Timely Maintenance
A.11.2.4
MA-7 Field Maintenance
None
A.11.2.2*
A.11.1.4,
A.11.2.1,
A.11.2.2
A.11.1.4,
A.11.2.1,
A.11.2.2
A.6.2.2,
A.11.2.6,
A.13.2.1
A.8.2.3,
A.11.1.4,
A.11.2.1
A.11.1.4,
A.11.2.1</p>
        <p>PM-1</p>
        <p>Information Security
Program Plan
PM27
PM28
PM29
PM30
PM31
PM32
PS-1
PS-2
PS-3
PS-4
PS-5
PS-6
PS-7
PS-8
PS-9
PT-1
PT-2
PT-3
PT-4
PT-5
PT-6
PT-7
PT-8
Privacy Reporting
Risk Framing
Risk Management
Program Leadership
Roles
Supply Chain Risk
Management
Strategy
Continuous
Monitoring Strategy
Purposing
Personnel Security
Policy and
Procedures
Personnel
Termination
Personnel Transfer
Access Agreements
External Personnel
Security
Personally
Identifiable
Information
Processing and
Transparency Policy
and Procedures
Authority to Process
Personally
Identifiable
Information
Personally
Identifiable
Information
Processing Purposes
Consent
Privacy Notice
System of Records
Notice
Specific Categories of
Personally
Identifiable
Information
Computer Matching
Requirements
Position Risk
Designation
Personnel Screening
A.7.1.1
Personnel Sanctions
7.3, A.7.2.3
Position Descriptions A.6.1.1
None
4.3, 6.1.2, 6.2,
7.4, 7.5.1, 7.5.2,
7.5.3
Security
Categorization
Risk Assessment
SA-16</p>
        <p>Developer-Provided
Training
Developer Security
and Privacy
SA-17 Architecture and</p>
        <p>Design</p>
      </sec>
      <sec id="sec-4-2">
        <title>SA-18 Withdrawn</title>
      </sec>
      <sec id="sec-4-3">
        <title>SA-19 Withdrawn</title>
        <p>Customized
SA-20 Development of</p>
        <p>Critical Components
SA-21 Developer Screening A.7.1.1
SA-22</p>
        <p>Unsupported System</p>
        <p>Components
SA-23 Specialization
None
A.14.2.1,
A.14.2.5
Separation of System
and User
Functionality
Security Function
Isolation
Information In
Shared System
Resources
Denial-of
ServiceProtection</p>
        <p>Resource Availability None
SC-1
SC-2
SC-3
SC-4
SC-5
SC-6
SC-8
SC-7</p>
        <p>Boundary Protection
Transmission
Confidentiality and</p>
        <p>Integrity
SC-9</p>
      </sec>
      <sec id="sec-4-4">
        <title>Withdrawn</title>
        <p>SC-10 Network Disconnect
A.13.1.1
SC-11 Trusted Path</p>
        <p>Cryptographic Key
SC-12 Establishment and</p>
        <p>Management
SC-13</p>
        <p>Cryptographic</p>
        <p>Protection</p>
      </sec>
      <sec id="sec-4-5">
        <title>SC-14 Withdrawn</title>
        <p>Collaborative
SC-15 Computing Devices
and Applications
A.10.1.2
None
SI-4
SI-5
SI-6
SI-7
SI-8
SI-9
SI-10
SI-12
SI-13
SI-15
SC-23 Session Authenticity</p>
        <p>None
SC-24 Fail in Known State</p>
        <p>Operations
SI-19 De-identification
SI-20 Tainting
Confidentiality,
Integrity
Confidentiality,
Integrity
Confidentiality
Integrity
Confidentiality,
Integrity
Confidentiality,
Integrity
Integrity
Integrity
Integrity
SR-12 Component Disposal None
Confidentiality</p>
        <p>As may be seen from the table there is an
overlapping between the controls from ISO and
NIST frameworks. But the most important
specifics of these frameworks is that NIST 800-53
can be considered a super-set of ISO 27001. In
particular, all the controls from ISO 27001 can be
covered by NIST 800-53. However, ISO 27001
does not cover all of the areas of NIST 800-53.
From the coverage perspective, NIST 800-53 is
more comprehensive and contains much more
areas and controls than ISO 27001. While the
detailed analysis of the missing controls is out of
the scope of this investigation let’s take a look at a
few examples which would show in which areas
NIST, in contrast to ISO, provide more
comprehensive coverage of the security-related
areas.</p>
        <p>
          [AT-4 Training Records], [AT-6 Training
Feedback]. These two controls require the
organization to document and monitor
information security and privacy training
activities, including security and privacy
awareness training and specific role-based
security and privacy training, retain individual
training records, and gather feedback on
organizational training results [
          <xref ref-type="bibr" rid="ref30 ref36">10</xref>
          ]. These could
be important indicators of the awareness process
effectiveness in the organization. These controls
very often are audited by auditors during the ISO
27001 certification process; however, they are not
explicitly mentioned in ISO 27001.
        </p>
        <p>
          [CM-2 Baseline Configuration], [CM-6
Configuration Settings]. These controls force
organizations to develop, document, and maintain
under configuration control, a current baseline
configuration of the system, and configuration
settings for components. Baseline configurations
for systems and system components include
connectivity, operational, and communications
aspects of systems. Baseline configurations are
documented, formally reviewed, and agreed-upon
specifications for systems or configuration items
within those systems. Baseline configurations
serve as a basis for future builds, releases, or
changes to systems and include security and
privacy control implementations, operational
procedures, information about system
components, network topology, and logical
placement of components in the system
architecture [
          <xref ref-type="bibr" rid="ref30 ref36">10</xref>
          ]. These controls are important for
maintaining the integrity of the security
configurations for the systems and components
and ensuring the standard configuration for the
infrastructure systems and components. Again,
these aspects are not explicitly highlighted in the
ISO 27001 but commonly are checked during the
ISO certification process.
        </p>
        <p>
          [PE-6 Monitoring Physical Access], [PE-8
Visitor Access Records]. NIST 800-53 requires
from organizations to monitor physical access to
the facility where the system resides to detect and
respond to physical security incidents and to
maintain and periodically review visitor access
records to the facility where the system resides
[
          <xref ref-type="bibr" rid="ref30 ref36">10</xref>
          ]. These are other examples of controls that are
extremely relevant for the protection of the
organization’s assets. They are especially
important for small representative offices that
often are lacking baseline security controls
established within headquarters and are also quite
often emphasized during the ISO certification
audits. Nevertheless, they have been overlooked
for a quite long time until the issue of the revised
version of the ISO 27002 earlier this year (so they
should appear in the new version of the ISO 27001
as well).
        </p>
        <p>
          [RA-10 Threat Hunting]. Threat hunting is an
active means of cyber defense in contrast to
traditional protection measures, such as firewalls,
intrusion detection and prevention systems,
quarantining malicious code in sandboxes, and
Security Information and Event Management
technologies and systems. Cyber threat hunting
involves proactively searching organizational
systems, networks, and infrastructure for
advanced threats. The objective is to track and
disrupt cyber adversaries as early as possible in the
attack sequence and to measurably improve the
speed and accuracy of organizational responses.
[
          <xref ref-type="bibr" rid="ref30 ref36">10</xref>
          ]. Likewise the previous controls, this one has
been also overlooked by the ISO 27001
publications, despite its extreme importance and
relevance for the organizations. This
inconsistency should be partially eliminated with
the new version of the ISO 27001 standard - this
year's revised version of ISO 27002 already
contains a new control defining requirements for
threat intelligence which is an integral part of the
threat hunting process.
        </p>
        <p>[PM-18 Privacy Program Plan], [PT-1
Personally Identifiable Information Processing
and Transparency Policy and Procedures],
[PT-2 Authority to Process Personally
Identifiable Information], [PT-4 Consent],
[PT5 Privacy Notice] and other controls related to the
protection of personally identifiable information
(PII) processing. The defining characteristic of the
NIST 800-53 is that it contains a set of controls to
address privacy requirements for the processing of
PII while ISO 27001 does not specifically address
privacy beyond the inherent benefits provided by
maintaining the security of PII, therefore we can
assume that the ISO 27001 controls do not satisfy
privacy requirements with respect to PII
processing [29]. From this perspective, NIST has
an advantage over ISO 27001 in regard to the
protection of the PII processing and may be
considered a good basis for GDPR compliance.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>3. Conclusion</title>
      <p>Understanding both the differences and
similarities between these two the most known and
adopted security frameworks—ISO 27001 and
NIST 800-53 is crucial for implementing an
effective information security program that would
be tightened to the organization’s context and
needs and expectations of interested parties.</p>
      <p>A common misunderstanding is that
companies have to pick one or the other
framework and stick with it, or that one is better
than the other. In fact, both frameworks can be
applied to a single organization due to their
synergy and can greatly increase its information
security, risk management, and security program.</p>
      <p>It is not always necessary to choose between
NIST 800-53 and ISO 27001. In fact, the two are
complementary and can be used in the same
organization. However, if certification is your
goal, you should definitely look closer at ISO
27001. Being externally audited and achieving
accredited certification against ISO 27001’s
requirements would likely provide a higher level
of confidence among clients and stakeholders and
would be a prerequisite for securing certain
contracts. Accredited certification to ISO 27001
demonstrates that your organization follows
information security best practices, and delivers
an independent, expert assessment of whether
your valuable information and information assets
are adequately protected. At the same time, while
implementing the ISO 27001 requirements you
still can leverage NIST 800-53 to strengthen the
areas that are missing or not sufficiently covered
in the ISO.</p>
    </sec>
    <sec id="sec-6">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>Access Control Policy AA</article-title>
          ..
          <volume>56</volume>
          ..
          <volume>11</volume>
          ..
          <volume>11</volume>
          ,, AA..
          <volume>59</volume>
          ..
          <volume>11</volume>
          ..
          <volume>21</volume>
          ,, AC-1 and Procedures
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>12</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>18</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>18</year>
          .
          <article-title>2.2 AC-2 AMcacnoaugnetment AAA</article-title>
          ...
          <volume>999</volume>
          ...
          <volume>222</volume>
          ...
          <volume>361</volume>
          ,, AA..
          <volume>99</volume>
          ..
          <volume>22</volume>
          ..
          <volume>52</volume>
          ,,
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>6</year>
          .
          <issue>2</issue>
          .2,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>9</year>
          .
          <issue>1</issue>
          .2,
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>9</year>
          .
          <issue>4</issue>
          .1,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>9</year>
          .
          <issue>4</issue>
          .4,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>9</year>
          .
          <issue>4</issue>
          .5, AC-3
          <string-name>
            <given-names>Access</given-names>
            <surname>Enforcement</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>13</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>14</year>
          .
          <issue>1</issue>
          .2,
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>14</year>
          .
          <issue>1</issue>
          .3,
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>18</year>
          .
          <issue>1</issue>
          .
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>13</year>
          .
          <issue>1</issue>
          .3, AC-4
          <source>IEnnffoorrmceamtioenntFlow AA</source>
          ..
          <volume>1134</volume>
          ..
          <volume>21</volume>
          ..
          <volume>12</volume>
          ,,
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>14</year>
          .
          <issue>1</issue>
          .
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>System</given-names>
            <surname>Maintenance</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>5</year>
          .
          <issue>1</issue>
          .1,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>5</year>
          .
          <issue>1</issue>
          .2, MA-1
          <source>Policy and A.6.1</source>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Procedures A.</surname>
          </string-name>
          <year>12</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>18</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>18</year>
          .
          <issue>2</issue>
          .2
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>11</year>
          .
          <issue>1</issue>
          .4,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>11</year>
          .
          <issue>2</issue>
          .
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Development</surname>
            <given-names>SA</given-names>
          </string-name>
          -15
          <string-name>
            <surname>Process</surname>
          </string-name>
          , Standards,
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          7.5.
          <issue>2</issue>
          ,
          <issue>7</issue>
          .5.3,
          <string-name>
            <surname>System</surname>
            and
            <given-names>A.</given-names>
          </string-name>
          <year>5</year>
          .
          <issue>1</issue>
          .1,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>5</year>
          .
          <issue>1</issue>
          .2,
          <string-name>
            <given-names>Communications</given-names>
            <surname>Protection</surname>
          </string-name>
          Policy and
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>6</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>12</year>
          .
          <issue>1</issue>
          .1,
          <string-name>
            <surname>Procedures</surname>
            <given-names>A.</given-names>
          </string-name>
          <year>18</year>
          .
          <issue>1</issue>
          .1,
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>18</year>
          .
          <issue>2</issue>
          .
          <issue>2</issue>
          [1]
          <string-name>
            <given-names>H.</given-names>
            <surname>Taherdoost</surname>
          </string-name>
          , Understanding Cybersecurity
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Overview</surname>
          </string-name>
          ,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .3390/
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          electronics11142181. [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Conkle</surname>
          </string-name>
          , G. Witte, Improving
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>Cybersecurity</given-names>
            <surname>Framework</surname>
          </string-name>
          , in 9th
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>HMIT</surname>
          </string-name>
          , vol.
          <volume>3</volume>
          ,
          <issue>2015</issue>
          , pp.
          <fpage>2479</fpage>
          -
          <lpage>2486</lpage>
          . [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , P. Skladannyi,
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>Wireless</given-names>
            <surname>Systems</surname>
          </string-name>
          , in 8th International
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>(MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <year>2019</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          222-
          <fpage>233</fpage>
          . [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <source>Assessing Approaches of</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          IT Infrastructure Audit,
          <source>in IEEE 8th</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>Technology</surname>
            ,
            <given-names>PICST</given-names>
          </string-name>
          ,
          <year>2021</year>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          10.1109/picst54195.
          <year>2021</year>
          .
          <volume>9772181</volume>
          . [5]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kuzminykh</surname>
          </string-name>
          , et al.,
          <source>Investigation of the IoT</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          ,
          <year>2019</year>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          3-
          <fpage>030</fpage>
          -30859-
          <issue>9</issue>
          _
          <fpage>2</fpage>
          . [6]
          <string-name>
            <given-names>NIST</given-names>
            <surname>Cybersecurity</surname>
          </string-name>
          <article-title>Framework vs ISO</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <volume>27001</volume>
          /27002 vs NIST 800-53 vs Secure
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          800-
          <fpage>53</fpage>
          -vs-iso-27002
          <string-name>
            <surname>-</surname>
          </string-name>
          vs
          <article-title>-nist-csf-vs-scf [7]</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zahoor</surname>
          </string-name>
          , et al.,
          <source>Information Security</source>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <given-names>A Literature</given-names>
            <surname>Review</surname>
          </string-name>
          ,
          <year>2016</year>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          10.1016/j.ijinfomgt.
          <year>2015</year>
          .
          <volume>11</volume>
          .
          <issue>009</issue>
          [8] ISO/IEC 27001: Information Technology-
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <given-names>Management</given-names>
            <surname>Systems-Requirements</surname>
          </string-name>
          ,
          <year>2013</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>https://www.iso.org/standard/54534.html. [9] ISO/IEC 27002: Information Technology-</mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <string-name>
            <surname>Information Security Controls</surname>
          </string-name>
          ,
          <year>2013</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          https://www.iso.org/standard/54533.html. [
          <volume>10</volume>
          ]
          <article-title>(2020) Security and Privacy Controls for</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <given-names>Special</given-names>
            <surname>Publication</surname>
          </string-name>
          (SP)
          <fpage>800</fpage>
          -
          <lpage>53</lpage>
          Rev 5,
          <string-name>
            <surname>U.S.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <surname>Department</surname>
          </string-name>
          of Commerce,
          <year>2020</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>https://csrc.nist.gov/publications/detail/sp/8</mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          00-
          <fpage>53</fpage>
          /rev-5/final. [11]
          <article-title>Overview of the NIST Cybersecurity</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <surname>Framework</surname>
          </string-name>
          ,
          <year>2018</year>
          , https://1path2020b.
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <article-title>thenist-cybersecurity-framework</article-title>
          . [12]
          <string-name>
            <surname>PCI DSS Quick Reference</surname>
            <given-names>Guide</given-names>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          <string-name>
            <given-names>Data</given-names>
            <surname>Security Standard</surname>
          </string-name>
          ,
          <source>ver. 3.2.1</source>
          ,
          <year>2018</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <article-title>ments/PCI_DSS-QRG-v3_2_1</article-title>
          .pdf [13]
          <article-title>CIS Controls v8, Center for Internet Security,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>2021, https://www.cisecurity.org/controls/</mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          v8/. [14]
          <string-name>
            <given-names>CIS</given-names>
            <surname>Controls</surname>
          </string-name>
          <article-title>v8 Mapping to NIST SP 800-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          <issue>53 Rev 5</issue>
          , Center for Internet Security,
          <year>2021</year>
          . [15]
          <string-name>
            <surname>HITRUST CSF</surname>
          </string-name>
          <article-title>Framework</article-title>
          , HITRUST
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <string-name>
            <surname>Alliance</surname>
          </string-name>
          ,
          <year>2021</year>
          , https://hitrustalliance.net/
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          product-tool/hitrust-csf/ [16] HIPAA;
          <string-name>
            <surname>Pub</surname>
          </string-name>
          . L.
          <volume>104</volume>
          -
          <issue>191</issue>
          , 110 Stat.
          <year>1936</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          <source>enacted August 21</source>
          ,
          <year>1996</year>
          [17]
          <string-name>
            <given-names>Cloud</given-names>
            <surname>Controls</surname>
          </string-name>
          <string-name>
            <surname>Matrix</surname>
          </string-name>
          , Cloud Security
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          <string-name>
            <surname>Alliance</surname>
          </string-name>
          ,
          <year>2021</year>
          , https://cloudsecurityalliance.
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          <article-title>org/artifacts/cloud-controls-matrix-</article-title>
          <string-name>
            <surname>v4</surname>
          </string-name>
          / [18]
          <string-name>
            <surname>Regulation</surname>
          </string-name>
          (EU)
          <year>2016</year>
          /679 of the European
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          <source>Free Movement of Such Data</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          88. [19] ISO/IEC 27701:
          <year>2019</year>
          , Security Techniques
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>- Extension to ISO/IEC 27001 and ISO/IEC</mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>27002 for Privacy Information Management</mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          <source>- Requirements and Guidelines</source>
          ,
          <year>2019</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          https://www.iso.org/standard/71670.html [20]
          <string-name>
            <given-names>Trust</given-names>
            <surname>Services Criteria</surname>
          </string-name>
          <article-title>Issued by the AICPA</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>2017, https://www.aicpa.org/content/dam/</mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          <article-title>services-criteria.pdf [21] COBIT 5, A Framework for the Governance</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          <source>and Management of Enterprise IT</source>
          ,
          <year>2012</year>
          . [22]
          <string-name>
            <given-names>D.</given-names>
            <surname>Sulistyowati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Handayani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Suryanto</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          <article-title>ISO/IEC 27002</article-title>
          and
          <string-name>
            <surname>PCI</surname>
            <given-names>DSS</given-names>
          </string-name>
          , International
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          <source>Journal on Informatics Visualization</source>
          , vol.
          <volume>4</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          <source>no. 4</source>
          ,
          <issue>2020</issue>
          , pp.
          <fpage>225</fpage>
          -
          <lpage>230</lpage>
          . [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Siponen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Willison</surname>
          </string-name>
          , Information
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          <string-name>
            <surname>Management</surname>
          </string-name>
          , vol.
          <volume>46</volume>
          ,
          <year>2009</year>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>270</lpage>
          . [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , et al.
          <source>Synergy of Building</source>
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          <string-name>
            <given-names>Technology</given-names>
            <surname>Center</surname>
          </string-name>
          ,
          <year>2021</year>
          . [25]
          <string-name>
            <given-names>Computer</given-names>
            <surname>Security Resource</surname>
          </string-name>
          Center - SP
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          800-
          <fpage>53</fpage>
          Rev. 5. https://csrc.nist.gov/
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          publications/detail/sp/800-53/rev-5/final [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yaremko</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          Notes in Electrical Engineering, vol.
          <volume>831</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          2022. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>15</fpage>
          . [27]
          <string-name>
            <given-names>ISO</given-names>
            <surname>Official</surname>
          </string-name>
          website
          <article-title>-ISO/IEC 27001</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>https://www.iso.org/isoiec-27001-</mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          <article-title>information-security</article-title>
          .
          <source>html [28] Best Practice ISO 27001 Required</source>
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          <article-title>mentstudio.com/best-practice-</article-title>
          <string-name>
            <surname>iso-</surname>
          </string-name>
          27001-
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          <source>required-documentation/ [29] NIST SP 800-53</source>
          , Revision 5 Control
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          <string-name>
            <surname>Mappings to</surname>
            <given-names>ISO</given-names>
          </string-name>
          /IEC 27001 URL:
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>ns/sp/800-53/rev-5/final/documents/sp800-</mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          <article-title>53r5-to-iso-27001-mapping</article-title>
          .docx
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>