Cyber Security
Theory and Best Practices
Theory and Best Practices
Standards as definitions are agreed-upon, documented rules or specifications developed by recognized bodies to ensure consistency, quality, safety, and interoperability in products, services, and processes.
Applying that on cybersecurity, it can be defined as following:
Security standards define minimum required controls and best practices to protect systems, data, and operations. They ensure a consistent security baseline across an enterprise and allow audit, certification, and compliance tracking.
The following sections will mention the detailed standards for cybersecurity as per area:
OWASP: Improve web/mobile app security During SDLC: design, coding, testing
CNCF: Cloud Native Computing Foundation – governs cloud-native ecosystems, Promote secure, scalable microservices
GDPR: A legal framework that sets standards for collecting, processing, storing & transferring personal data of EU citizens, giving them more control over their data.
ISO: International standard for Information Security Management Systems (ISMS) ,To build and certify a risk-based security program across people, process, tech, Implement controls from ISO 27002, perform risk assessments, audits, get certified
NIST (National Institute of Standards and Technology): U.S. government-backed standards (e.g., NIST CSF, 800-53, 800-171) , Public/private orgs wanting risk-based, modular security
ISACA: Global org for IT governance, author of COBIT, Risk IT, CSX, se COBIT for governance, CSX for cyber resilience, map to ISO/NIST/PCI
MITRE: U.S. nonprofit R&D org managing cybersecurity knowledge bases (e.g., ATT&CK, CVE) , To classify threats, adversary behaviors, and share vulnerability intelligence, Use MITRE ATT&CK for TTPs, CVE for known vulnerabilities, integrate with SIEM/EDR
STRIDE: By microsoft
CSA: Cloud Security Alliance – defines cloud security best practices, Secures cloud environments & services, Use in cloud design, vendor selection, and third-party risk assessments
CNCF: Cloud Native Computing Foundation, A Linux Foundation project that governs and supports cloud-native open-source technologies like Kubernetes, Prometheus, and Envoy. o standardize, secure, and scale modern applications using containers, microservices, and declarative APIs. It drives interoperability and vendor-neutral innovation.
DevSecOps
Inventory & Control of Enterprise Assets
Inventory & Control of Software Assets
Data Protection
Secure Configuration of Assets
Account Management
Access Control Management
Continuous Vulnerability Management
Audit Log Management
Email & Web Browser Protections
Malware Defenses
Data Recovery Capabilities
Network Infrastructure Management
Security Awareness & Skills Training
Security Operations Center (SOC) & Monitoring
Incident Response Management
Application Software Security
Penetration Testing
Service Provider Management
National Institute of Standards and Technology, A U.S. government agency (since 1901) under the Department of Commerce.
It develops standards, guidelines, and best practices for: cybersecurity, measurements, and industrial quality.
1. Identify
Asset Management
Governance
Risk Assessment
Supply Chain Risk Management
2. Protect
Identity Management & Access Control
Awareness & Training
Data Security
Protective Technology
3. Detect
Anomalies & Events
Continuous Security Monitoring
Detection Processes
4. Respond
Response Planning
Communications
Analysis
Mitigation
Improvements
5. Recover
Recovery Planning
Improvements
Communications
What is?
General Data Protection Regulation, The European Union’s data protection and privacy law.
It has been applied and Effective by 25 May 2018.
The objective of this standard is to protect the personal data & privacy of EU citizens.
Applies to any organization, anywhere, that processes data of EU residents.
GDPR Core principles:
Lawfulness, fairness & transparency: Why
Show a clear consent banner + privacy policy dialog before collecting data. Include just-in-time notices when collecting sensitive info.
Implement opt-out mechanisms for tracking
Unsubscribe
Do not save cookies
Purpose limitation: Secure
Architect your database so each data field is linked to a specific purpose flag. Deny use of data outside its intended scope.
Data minimization: Minimalization
Design forms & APIs to collect only required fields. Validate on backend that extra fields cannot be submitted.
Accuracy
Implement self-service profile management so users can update/correct their own data. Validate inputs properly.
Storage limitation
Automate deletion/anonymization routines after a defined retention period. Use CRON jobs or scheduled tasks to purge data.
Integrity & confidentiality
Use TLS for data in transit, AES-256 for data at rest, role-based access control (RBAC), audit logs & monitoring.
Accountability
Log all consent decisions, data access events & retention/deletion actions. Store evidence of compliance in an audit-friendly way.
In short:
Defense in depth = technical enforcement of GDPR.
Each GDPR principle ties back to at least one layer of defense.
This ensures privacy by design + security by default
GDPR Implementation Guidelines:
Highlight required data that will be used in the solution
Get Customer approval
Encrypt user data in transit and at rest
Encrypt communication channel
Log all user actions
Do not over-expose user data within FE or API
Have a concrete retention policy
Notify before saving any data on the cache
Dr. Ghoniem Lawaty
Tech Evangelist @TechHuB Egypt