Appendix A
Comparison of Common Security Standards and Framework Requirements
Table A-1 shows the requirements addressed in this book and six of the most common IT security standards from which they are drawn. The subset of requirements identified here are those that would typically apply to the networking team or could be solved with a Cisco Meraki solution. Not all standards use the same language, time periods, and so on, so we’ve done our best to normalize them for easier comparison.
Table A-1 Similarities Between Common Security Standards and Frameworks
Requirement |
Essential Eight (Australia) |
NIST 800-53 (US, widely used globally) |
PCI DSS v4.0 (Global) |
HIPAA (US) |
ISO 27001 (Global) |
SOC2 (US) |
Chapter |
Topic |
---|---|---|---|---|---|---|---|---|
Security vulnerabilities ... |
Get Securing Enterprise Networks with Cisco Meraki now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.