Використання шаблонів CIS Бенчмарк для виконання вимог міжнародного стандарту ISO/IEC 27001:2022
| dc.citation.epage | 98 | |
| dc.citation.issue | 1 | |
| dc.citation.journalTitle | Комп'ютерні системи та мережі | |
| dc.citation.spage | 89 | |
| dc.citation.volume | 6 | |
| dc.contributor.affiliation | Національний університет “Львівська політехніка” | |
| dc.contributor.affiliation | Національний університет “Львівська політехніка” | |
| dc.contributor.affiliation | Lviv Polytechnic National University | |
| dc.contributor.affiliation | Lviv Polytechnic National University | |
| dc.contributor.author | Курій, Є. О. | |
| dc.contributor.author | Опірський, І. Р. | |
| dc.contributor.author | Kurii, Y. | |
| dc.contributor.author | Opirskyy, I. | |
| dc.coverage.placename | Львів | |
| dc.coverage.placename | Lviv | |
| dc.date.accessioned | 2025-12-10T13:53:07Z | |
| dc.date.created | 2024-06-20 | |
| dc.date.issued | 2024-06-20 | |
| dc.description.abstract | Розглянуто проблему розвитку нових методів і векторів атак на критичну інфра- структуру і відповіді на загрози, які виникають через впровадження визнаних стандартів у галузі інформаційної безпеки, таких як ISO 27001. Проведено аналіз оновленої редакції міжнародного стандарту ISO/IEC 27001 2022 року і, зокрема, основних змін у контролях управління. Здійснено детальний аналіз нового контролю безпеки з Додатку А – A.8.9 – Управління налаштуваннями (Configuration management) і можливих способів його ефективного впровадження в організаціях. Запропоновано використання конфігураційних стандартів від Центру інтернет- безпеки (CIS – Center for Internet Security) CIS Бенчмарк (Benchmark) як одного з най- ефективніших способів забезпечення захисту активів організації і впровадження найкра- щих галузевих практик безпеки. Внаслідок проведеного аналізу і дослідження виявлено чіткий зв’язок і залежність між використанням CIS Бенчмарків і задоволенням вимог пункту A.8.9 – Управління на- лаштуваннями стандарту ISO/IEC 27001:2022. Наведено класифікацію CIS Бенчмарків та описано перелік основних моментів впровадження на прикладі серверної інфра- структури. | |
| dc.description.abstract | The problem of developing new methods and vectors of attacks on critical infrastructure and responding to emerging threats through the implementation of recognized standards in the field of information security, such as ISO 27001, was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and, in particular, the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A – A.8.9 – Configuration Management and possible ways of its effective implementation in organizations were carried out. The use of configuration standards CIS Benchmark from the Center for Internet Security (CIS) is proposed as an effective way to ensure the protection of the organization’s assets and the implementation of the best industry security practices. As a result of the conducted analysis and research, a clear connection and dependence between the use of the CIS Benchmark and compliance with the requirements of clause A.8.9 – ConfigurationManagement of the ISO/IEC 27001:2022 standard was revealed. The classification of CIS Benchmark is presented and the list of key implementation points is described using the example of server infrastructure. | |
| dc.format.extent | 89-98 | |
| dc.format.pages | 10 | |
| dc.identifier.citation | Курій Є. О. Використання шаблонів CIS Бенчмарк для виконання вимог міжнародного стандарту ISO/IEC 27001:2022 / Є. О. Курій, І. Р. Опірський // Комп'ютерні системи та мережі. — Львів : Видавництво Львівської політехніки, 2024. — Том 6. — № 1. — С. 89–98. | |
| dc.identifier.citation2015 | Курій Є. О., Опірський І. Р. Використання шаблонів CIS Бенчмарк для виконання вимог міжнародного стандарту ISO/IEC 27001:2022 // Комп'ютерні системи та мережі, Львів. 2024. Том 6. № 1. С. 89–98. | |
| dc.identifier.citationenAPA | Kurii, Y., & Opirskyy, I. (2024). Vykorystannia shabloniv CIS Benchmark dlia vykonannia vymoh mizhnarodnoho standartu ISO/IEC 27001:2022 [Overview of the CIS Benchmarks usage for fulfilling the requirements from international standard ISO/IEC27001:2022]. Computer Systems and Networks, 6(1), 89-98. Lviv Politechnic Publishing House. [in Ukrainian]. | |
| dc.identifier.citationenCHICAGO | Kurii Y., Opirskyy I. (2024) Vykorystannia shabloniv CIS Benchmark dlia vykonannia vymoh mizhnarodnoho standartu ISO/IEC 27001:2022 [Overview of the CIS Benchmarks usage for fulfilling the requirements from international standard ISO/IEC27001:2022]. Computer Systems and Networks (Lviv), vol. 6, no 1, pp. 89-98 [in Ukrainian]. | |
| dc.identifier.doi | DOI: https://doi.org/10.23939/csn2024.01.089 | |
| dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/123956 | |
| dc.language.iso | uk | |
| dc.publisher | Видавництво Львівської політехніки | |
| dc.publisher | Lviv Politechnic Publishing House | |
| dc.relation.ispartof | Комп'ютерні системи та мережі, 1 (6), 2024 | |
| dc.relation.ispartof | Computer Systems and Networks, 1 (6), 2024 | |
| dc.relation.references | 1. (2022) ISO/IEC 27001: Information security, cybersecurity and privacy protection – Information security management systems – Requirements. URL: https://www.iso.org/standard/82875.html (Accessed: 15 March 2024). | |
| dc.relation.references | 2. (2013) ISO/IEC 27001: Information Technology – Security Techniques – Information Security Management Systems – Requirements. URL: https://www.iso.org/standard/54534.html (Accessed: 15 March 2024). | |
| dc.relation.references | 3. Susukailo V., Opirsky I., Yaremko O. (2022). Methodology of ISMS Establishment Against Modern Cybersecurity Threats. In: Klymash M., Beshley M., Luntovskyy A. (eds.) Future Intent-Based Networking. Lecture Notes in Electrical Engineering, vol. 831. Springer, Cham. DOI: 10.1007/978-3-030-92435-5_15 | |
| dc.relation.references | 4. Kurii Y., Opirskyy I. (2021). Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013. Paper presented at the CEUR Workshop Proceedings, 3288, 21–32. | |
| dc.relation.references | 5. (2022) ISO/IEC 27002: Information security, cybersecurity and privacy protection – Information security controls. URL: https://www.iso.org/standard/75652.html (Accessed: 15 March 2024). | |
| dc.relation.references | 6. Alrehili Afnan A., Alhazmi Omar. (2024). ISO/IEC 27001 Standard: Analytical and Comparative Overview. In: Advances in Data-Driven Computing and Intelligent Systems. DOI: 10.1007/978-981-99-9524-0_12 | |
| dc.relation.references | 7. Which ISO standards are the most popular – Analysis of ISO 2019 survey. [Елекронний ресурс]. Resource Access Mode: https://advisera.com/articles/which-iso-standards-are-the-most-popular-analysis-of-iso-2019-survey/ (Accessed: 15 March 2024). | |
| dc.relation.references | 8. Kurii Y., Opirskyy I., Bortnik L. ISO/IEC 27001:2022 – Analysis оf Changes аnd Compliance Features оf The New Version Of The Standard // Materials of IXth International Scientific and Technical Conference Information Protection аnd Information Systems Security, May 25–26, 2023. Lviv, Ukraine, pp. 15–17, ISBN 978- 966-941-829-6 Resource Access Mode: https://ir.lib.vntu.edu.ua/bitstream/handle/123456789/37567/127406.pdf?sequence=2&isAllowed=y(Accessed: 16 March 2024). | |
| dc.relation.references | 9. What Are The ISO 27001 Changes In 2022. [Елекронний ресурс]. Resource Access Mode: https://bestpractice.biz/what-are-the-iso-27001-changes-in-2022/ (Accessed: 15 March 2024). | |
| dc.relation.references | 10. ISO 27002:2022, Control 8.9 – Configuration Management. [Елекронний ресурс]. Resource Access Mode: https://www.isms.online/iso-27002/control-8-9-configuration-management/ (Accessed: 15 March 2024). | |
| dc.relation.references | 11. CIS Critical Security Controls Version 8 [Елекронний ресурс]. Resource Access Mode:https://www.cisecurity.org/controls/v8 (Accessed: 15 March 2024). | |
| dc.relation.references | 12. CIS Controls v8 Mapping to ISO/IEC 27001:2022. [Елекронний ресурс]. Resource Access Mode: https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-iso-iec-27001-2022 (Accessed: 15 March 2024). | |
| dc.relation.references | 13. What are CIS Benchmarks? [Елекронний ресурс]. Resource Access Mode: https://aws.amazon.com/whatis/cis-benchmarks/#:~:text=CIS%20Benchmarks%20from%20the%20Center,and%20manage%20their%20cybersecurity%20defenses (Accessed: 15 March 2024). | |
| dc.relation.references | 14. CIS Benchmarks Community [Елекронний ресурс]. Resource Access Mode: https://www.cisecurity. org/communities/benchmarks (Accessed: 15 March 2024). | |
| dc.relation.references | 15. CIS Benchmarks List [Елекронний ресурс]. Resource Access Mode: https://www.cisecurity.org/cis-benchmarks (Accessed: 15 March 2024). | |
| dc.relation.references | 16. What is CIS Compliance?(and How to Apply CIS Benchmarks) [Елекронний ресурс]. Resource Access Mode:https://www.algosec.com/resources/cis-compliance/ (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 1. (2022) ISO/IEC 27001: Information security, cybersecurity and privacy protection – Information security management systems – Requirements. URL: https://www.iso.org/standard/82875.html (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 2. (2013) ISO/IEC 27001: Information Technology – Security Techniques – Information Security Management Systems – Requirements. URL: https://www.iso.org/standard/54534.html (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 3. Susukailo V., Opirsky I., Yaremko O. (2022). Methodology of ISMS Establishment Against Modern Cybersecurity Threats. In: Klymash M., Beshley M., Luntovskyy A. (eds.) Future Intent-Based Networking. Lecture Notes in Electrical Engineering, vol. 831. Springer, Cham. DOI: 10.1007/978-3-030-92435-5_15 | |
| dc.relation.referencesen | 4. Kurii Y., Opirskyy I. (2021). Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013. Paper presented at the CEUR Workshop Proceedings, 3288, 21–32. | |
| dc.relation.referencesen | 5. (2022) ISO/IEC 27002: Information security, cybersecurity and privacy protection – Information security controls. URL: https://www.iso.org/standard/75652.html (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 6. Alrehili Afnan A., Alhazmi Omar. (2024). ISO/IEC 27001 Standard: Analytical and Comparative Overview. In: Advances in Data-Driven Computing and Intelligent Systems. DOI: 10.1007/978-981-99-9524-0_12 | |
| dc.relation.referencesen | 7. Which ISO standards are the most popular – Analysis of ISO 2019 survey. [Elekronnii resurs]. Resource Access Mode: https://advisera.com/articles/which-iso-standards-are-the-most-popular-analysis-of-iso-2019-survey/ (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 8. Kurii Y., Opirskyy I., Bortnik L. ISO/IEC 27001:2022 – Analysis of Changes and Compliance Features of The New Version Of The Standard, Materials of IXth International Scientific and Technical Conference Information Protection and Information Systems Security, May 25–26, 2023. Lviv, Ukraine, pp. 15–17, ISBN 978- 966-941-829-6 Resource Access Mode: https://ir.lib.vntu.edu.ua/bitstream/handle/123456789/37567/127406.pdf?sequence=2&isAllowed=y(Accessed: 16 March 2024). | |
| dc.relation.referencesen | 9. What Are The ISO 27001 Changes In 2022. [Elekronnii resurs]. Resource Access Mode: https://bestpractice.biz/what-are-the-iso-27001-changes-in-2022/ (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 10. ISO 27002:2022, Control 8.9 – Configuration Management. [Elekronnii resurs]. Resource Access Mode: https://www.isms.online/iso-27002/control-8-9-configuration-management/ (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 11. CIS Critical Security Controls Version 8 [Elekronnii resurs]. Resource Access Mode:https://www.cisecurity.org/controls/v8 (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 12. CIS Controls v8 Mapping to ISO/IEC 27001:2022. [Elekronnii resurs]. Resource Access Mode: https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-iso-iec-27001-2022 (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 13. What are CIS Benchmarks? [Elekronnii resurs]. Resource Access Mode: https://aws.amazon.com/whatis/cis-benchmarks/#:~:text=CIS%20Benchmarks%20from%20the%20Center,and%20manage%20their%20cybersecurity%20defenses (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 14. CIS Benchmarks Community [Elekronnii resurs]. Resource Access Mode: https://www.cisecurity. org/communities/benchmarks (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 15. CIS Benchmarks List [Elekronnii resurs]. Resource Access Mode: https://www.cisecurity.org/cis-benchmarks (Accessed: 15 March 2024). | |
| dc.relation.referencesen | 16. What is CIS Compliance?(and How to Apply CIS Benchmarks) [Elekronnii resurs]. Resource Access Mode:https://www.algosec.com/resources/cis-compliance/ (Accessed: 15 March 2024). | |
| dc.relation.uri | https://www.iso.org/standard/82875.html | |
| dc.relation.uri | https://www.iso.org/standard/54534.html | |
| dc.relation.uri | https://www.iso.org/standard/75652.html | |
| dc.relation.uri | https://advisera.com/articles/which-iso-standards-are-the-most-popular-analysis-of-iso-2019-survey/ | |
| dc.relation.uri | https://ir.lib.vntu.edu.ua/bitstream/handle/123456789/37567/127406.pdf?sequence=2&isAllowed=y(Accessed: | |
| dc.relation.uri | https://bestpractice.biz/what-are-the-iso-27001-changes-in-2022/ | |
| dc.relation.uri | https://www.isms.online/iso-27002/control-8-9-configuration-management/ | |
| dc.relation.uri | https://www.cisecurity.org/controls/v8 | |
| dc.relation.uri | https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-iso-iec-27001-2022 | |
| dc.relation.uri | https://aws.amazon.com/whatis/cis-benchmarks/#:~:text=CIS%20Benchmarks%20from%20the%20Center,and%20manage%20their%20cybersecurity%20defenses | |
| dc.relation.uri | https://www.cisecurity | |
| dc.relation.uri | https://www.cisecurity.org/cis-benchmarks | |
| dc.relation.uri | https://www.algosec.com/resources/cis-compliance/ | |
| dc.rights.holder | © Національний університет „Львівська політехніка“, 2024 | |
| dc.rights.holder | © Курій Є. О., Опірський І. Р., 2024 | |
| dc.subject | інформаційна безпека | |
| dc.subject | кібербезпека | |
| dc.subject | фреймворк інформаційної безпеки | |
| dc.subject | фреймворк кібербезпеки | |
| dc.subject | ISO 27001 | |
| dc.subject | Центр інтернет-безпеки | |
| dc.subject | об’єкт критичної інфраструктури | |
| dc.subject | інформаційний актив | |
| dc.subject | управління налаштуваннями | |
| dc.subject | CIS Бенчмарк | |
| dc.subject | information security | |
| dc.subject | cybersecurity | |
| dc.subject | information security framework | |
| dc.subject | cybersecurity framework | |
| dc.subject | ISO 27001 | |
| dc.subject | Center for Internet Security | |
| dc.subject | critical infrastructure | |
| dc.subject | information asset | |
| dc.subject | configuration management | |
| dc.subject | CIS Benchmark | |
| dc.subject.udc | 004.057.2 | |
| dc.title | Використання шаблонів CIS Бенчмарк для виконання вимог міжнародного стандарту ISO/IEC 27001:2022 | |
| dc.title.alternative | Overview of the CIS Benchmarks usage for fulfilling the requirements from international standard ISO/IEC27001:2022 | |
| dc.type | Article |