The Information Security Model and the guidance Pragmentum draws heavily on comes from three widely used methods to manage cyber security: – the ISACA Information Security Managment model
– the NIST Cyber Security Framework (CSF), and
– the CIS Controls.

Scroll down to find out more …


The ISACA Domains

for Information Security Management

Governance

Controlling your program

Establishes the cybersecurity strategy, policies, and accountability framework to align security with business objectives and regulatory requirements.

Risk Management

Managing your asset’s risk

Identifies, evaluates, and mitigates cybersecurity risks to protect assets, ensuring informed decision-making and resilience.

The Program

How you protect your business

Designs, implements, and maintains the cybersecurity program, integrating controls, resources, and best practices to safeguard the organization.

Incident Response and Recovery

How you respond and recover

Prepares for, detects, and responds to security incidents, ensuring swift containment, investigation, and recovery to minimize impact and cost.


The NIST CSF

National Institute of Standards and Technolgy
Cyber Security Framework – utilized globally.

Identify

Catalog your assets

Understand and manage cybersecurity risks by identifying assets, vulnerabilities, and business impacts.

Protect

Implement controls

Implement safeguards, such as access controls and encryption, to secure assets and maintain operations.

Detect

Monitor for activity

Continuously monitor systems to quickly identify cybersecurity events and anomalies.

Respond

Develop a response plan

Take action against detected threats, containing incidents and mitigating damage.

Recover

Build recovery capability

Restore systems, data, and services after an incident to ensure business continuity and resilience.

Govern

The right amount of control for the program

Ensures that the cyber security program aligns with business objectives, legal requirements, and risk management. It covers leadership accountability, policies, roles, and oversight to drive a strong security culture and informed decision-making.


The CIS Controls

The Centre for Internet Security (CIS) top 18 controls – utilized globally.

Top 18 Controls

The CIS Top 18 Controls (formerly the Top 20) are a prioritized set of cyber security best practices developed by the Center for Internet Security (CIS) to help organizations improve their cyber security posture.

They are designed to be:

  • Actionable — clear steps to reduce risk
  • Prioritized — most impactful controls come first
  • Vendor-neutral — applicable to all environments


They are grouped into three implementation groups (IGs) based on organizational size, resources, and risk:

  • IG1 (basic): For small to medium-sized businesses
  • IG2: For organizations with moderate complexity and resources
  • IG3: For large or high-risk enterprises

The 18 controls are arranged in a logical order of implementation — from understanding assets, to protecting data, to detecting and responding to threats.