ALL-IN-ONE GUIDE

Cybersecurity Standards

Last updated: January 23th, 2025


As service providers continue to handle sensitive data for clients across various industries, understanding and adhering to the correct cybersecurity frameworks and regulations is essential. This guide explores the most important cybersecurity standards, frameworks, and regulations that every service provider needs to be familiar with.

Cybersecurity frameworks like NIST CSF and SOC 2 provide structured approaches to managing risks, while regulations such as GDPR and HIPAA set legal requirements for data protection and privacy. By understanding the differences between frameworks and regulations—frameworks being voluntary and best-practice-based, and regulations being mandatory and legally enforceable—service providers can ensure both compliance and enhanced security measures.

Why Cybersecurity Standards Matter for Service Providers

In today’s digital world, the importance of cybersecurity cannot be overstated. Service providers—whether in IT, consulting, or any other sector—handle sensitive information that is often subject to strict compliance regulations. Adhering to recognized cybersecurity frameworks not only helps ensure the protection of client data but also establishes trust and credibility in the marketplace.

Differences Between Frameworks, Standards, and Regulations

In cybersecurity, frameworks, standards, and regulations are often misunderstood or used interchangeably, but they serve distinct purposes:

  • Frameworks provide flexible, high-level structures to guide security strategies, blending standards and guidelines (e.g., NIST CSF)
  • Standards set specific, measurable requirements for achieving consistent security outcomes (e.g., ISO 27001)
  • Regulations enforce mandatory legal compliance to protect data and ensure accountability (e.g., GDPR, HIPAA)

While these terms often overlap, they are not the same. Understanding their differences is critical to aligning your cybersecurity strategy with both best practices and legal requirements. For a detailed explanation, read the article about What is Governance?.

Standards & Frameworks

CIS Critical Security Controls

What are CIS Critical Security Controls?

The Center for Internet Security (CIS) has developed a set of cybersecurity best practices known as the CIS Critical Security Controls (CIS Controls). 

These controls are designed to provide service providers and other organizations with a practical framework to defend against common cyber threats.

Clip auto-start at: 7:33, Length: 12 min (This is part of our "Baseline Hardening With CIS Benchmarks" episode.)

CIS Control Implementation Groups

  • IG1 - Basic cyber hygiene: The minimum set of controls all organizations should implement to prevent basic cyber threats
  • IG2 - Advanced cyber defense: For organizations with more complex IT infrastructures
  • IG3 - Expert cybersecurity: For enterprises that manage sensitive data or face sophisticated threats

1-Jan-22-2025-09-14-23-6582-PM

As cybersecurity threats evolve, so do the tools to combat them. Discover What’s New in CIS Controls V8.1? to ensure your organization stays ahead of the curve.

Get Started with the CIS Controls v8 Guide for Service Providers (1)


 

NIST CSF

The NIST Cybersecurity Framework (CSF) provides a set of guidelines to help organizations manage and reduce cybersecurity risk. It is built around five core functions: Identify, Protect, Detect, Respond, and Recover, which collectively form a comprehensive approach to improving cybersecurity practices.

Clip auto-start at: 11:57, Length: 14 min (This is part of our "Using Generative AI as a Service Provider" episode.)

Core Functions:

  • The Identify function focuses on understanding cybersecurity risks, including identifying critical assets and vulnerabilities. It helps organizations assess potential risks to operations and security
  • The Protect function involves implementing safeguards like access controls and data security to reduce risks and prevent incidents from occurring
  • The Detect function ensures timely identification of cybersecurity events through continuous monitoring and alerting, helping organizations stay proactive
  • The Respond function outlines how to manage and mitigate cybersecurity incidents when they occur, including incident response planning and communication strategies
  • The Recover function emphasizes restoring capabilities affected by a cybersecurity event, ensuring organizations can recover and improve after an incident
  • The Govern function ensures that cybersecurity efforts align with organizational objectives, establishing policies, roles, and accountability to maintain oversight and compliance

NIST CSF Implementation:

NIST CSF is adaptable and can be tailored to fit an organization’s specific needs through Profiles and maturity Tiers, helping measure progress and alignment with business goals.

Choosing the right cybersecurity framework can be challenging. Compare CIS Controls and NIST CSF to understand their unique strengths and determine which one aligns best with your MSP’s needs. Read CIS Controls vs. NIST CSF: Which Framework Is Right for Your MSP? to make an informed decision.

Get Started with the NIST Guide for Service Providers


 

NIST SP 800-53: Security and Privacy Controls

What is NIST SP 800-53?

NIST SP 800-53 is a comprehensive framework that outlines security and privacy controls for information systems. It is designed to help federal agencies and contractors create secure information systems and ensure compliance with the Federal Information Security Modernization Act (FISMA).

NIST 800-53 provides specific security control families, such as access control, incident response, and media protection, to ensure that an organization's systems and data remain secure.

Clip auto-start at: 8:03, Length: 8 min (This is part of our "How to Communicate Risk to Business Clients" episode.)

Key Control Families in NIST 800-53:

  • AC - Access Control: Guidelines on managing who has access to data
  • IR - Incident Response: Provides steps for identifying and responding to cybersecurity incidents
  • CM - Configuration Management: Ensures that systems are securely configured to avoid vulnerabilities

NistCSF vs NIST 800-53


 

NIST 800-171: Protecting Controlled Unclassified Information

What is NIST 800-171?

NIST SP 800-171 is a framework developed by the National Institute of Standards and Technology (NIST) that outlines specific guidelines to protect Controlled Unclassified Information (CUI). Service providers who handle CUI, which includes sensitive data not classified under federal law but still crucial for national security, must adhere to these security controls.

This publication provides 14 families of security requirements that are designed to safeguard the confidentiality of CUI. NIST 800-171 is especially relevant for organizations dealing with federal agencies or contractors and is applicable to a wide range of industries, from healthcare to finance.

Clip auto-start at: 19:23, Length: 9 min (This is part of our "Cybersecurity Requirements for Your Clients in 2024" episode.)

Key Components of NIST 800-171:

  • Security Requirement Development Methodology: This outlines how NIST 800-171 has evolved in its revisions, offering increased clarity and alignment with other standards such as NIST 800-53 Rev. 5 (2020)
  • New Requirements in Rev 3: 19 new requirements have been added in the revised version, covering enhanced cybersecurity needs

As contractors and service providers navigate the latest changes to NIST 800-171, understanding these updates is critical to compliance. Learn about the most recent revisions and how they impact your organization in NIST 800-171 Updates: What Contractors Need to Know.


 

NIST CSF vs. NIST SP 800-53 vs. NIST 800-171: What’s the Difference?

While all of these frameworks aim to improve cybersecurity, they serve different purposes based on organizational size, maturity, and data sensitivity:

  • NIST CSF is a high-level framework for managing and reducing cybersecurity risk in a flexible, scalable way, making it suitable for small organizations or those with low maturity across all industries
  • NIST SP 800-53 is a comprehensive framework focused on federal and high-security systems. It provides a detailed catalog of controls, making it ideal for larger organizations or government entities requiring stringent security measures
  • NIST 800-171 is specifically tailored for federal contractors handling Controlled Unclassified Information (CUI). It provides explicit guidance for protecting sensitive, non-federal data

Understanding these differences helps you choose the right framework depending on your organization’s size, maturity, and the type of data you handle.


 

SOC 2: Trust Services Criteria for Service Providers

What is SOC 2?

SOC 2 is a framework developed by the AICPA to assess the security, availability, confidentiality, and processing integrity of a service provider’s systems. It is particularly relevant for SaaS businesses and other service providers that handle customer data.

SOC 2 compliance ensures that a service provider’s systems meet high standards for security and privacy.

Clip auto-start at: 7:54, Length: 12min (This is part of our "Using the Dark Web for Security" episode.)

SOC 2 Trust Service Criteria:

  • Security: Protecting systems from unauthorized access and data breaches
  • Availability: Ensuring that systems are available for operation and use
  • Confidentiality: Safeguarding the confidentiality of customer data

For a deeper dive into achieving and maintaining compliance, explore SOC 2 Compliance Essentials to learn the steps and strategies for meeting these critical requirements.


 

CMMC (Cybersecurity Maturity Model Certification)

CMMC (Cybersecurity Maturity Model Certification) is a framework designed to ensure cybersecurity across the Department of Defense's contractor base, with specific requirements for protecting Controlled Unclassified Information (CUI). 

CMMC (1)

Key principles of CMMC:

  1. Five levels of cybersecurity practices for different contractor needs
  2. Specific, enforceable security practices per contract
  3. Strict 72-hour timeline for incident reporting cybersecurity events
  4. Ongoing enhancement of cybersecurity practices
  5. CMMC evolves with NIST SP 800-171 revisions

Clip auto-start at: 8:51, Length: 9 min (This is part of our "3 Steps to Find Every Prospect in Your Target Market" episode.)

CMMC is built on NIST SP 800-171, integrating its controls and evolving as NIST updates its guidelines. This ensures CMMC remains aligned with current best practices and strengthens its relevance for contractors handling sensitive information.

For more details on the latest developments, read CMMC Compliance: Key Updates and What It Means.


 

Australia’s Essential 8: Cyber Defense Strategies

What is Essential 8?

The Australian Signals Directorate (ASD) introduced the Essential 8 as a set of strategies designed to mitigate cybersecurity risks, particularly in government and critical infrastructure sectors. These strategies focus on safeguarding IT networks and are among the most effective for addressing cyber threats.

Service providers in Australia or dealing with Australian clients should consider implementing the Essential 8 to improve their cybersecurity posture. For an in-depth guide to these strategies, read Australia Cyber Security Centre Essential 8.

Clip auto-start at: 17:33, Length: 7 min (This is part of our "The Anatomy of a Service Ticket" episode.)

The Essential 8 Principles:

  • Application control: Restrict the execution of unapproved applications
  • User application hardening: Secure applications by applying necessary patches
  • Multi-factor Authentication (MFA): Adds an extra layer of security to sensitive systems
  • Regular backups: Regularly back up critical data to prevent loss


 

Regulations

GDPR (General Data Protection Regulation)

The GDPR is the European Union’s comprehensive data protection regulation. It governs the processing of personal data and ensures the privacy of EU citizens.

Key principles include:

  • Data Minimization: Only collect necessary data
  • Transparency: Inform users about data collection practices
  • Security: Protect personal data with appropriate safeguards

HIPAA Compliance: Protecting Health Information

What is HIPAA Compliance?

HIPAA (Health Insurance Portability and Accountability Act) establishes rules and best practices to protect healthcare data, with a focus on privacy and security. The HIPAA Security Rule, introduced in 2003, was a milestone in addressing cybersecurity within the healthcare sector. It requires organizations to implement measures like data encryption and risk-based safeguards to secure sensitive information. However, the Security Rule offers flexibility, making only about 20 out of its 100 recommended measures mandatory, which often results in gaps in modern security practices.

Clip auto-start at: 10:32 Length: 12 min (This is part of our "The FBI's Long Fight" episode.)

HIPAA Privacy and Security Rules

  • Physical safeguards: Ensures that physical access to healthcare data is restricted to authorized personnel
  • Technical safeguards: Ensures that healthcare data is encrypted and protected from unauthorized access

For a detailed breakdown of privacy implications and compliance strategies, read The HIPAA Privacy Rule: What It Means for Healthcare Providers.


 

CJIS Security Policy: Protecting Criminal Justice Information

What is CJIS Security Policy?

The CJIS Security Policy is a set of security requirements developed by the FBI's Criminal Justice Information Services (CJIS) Division. These standards aim to protect sensitive law enforcement data, including criminal records, biometric data, and fingerprints.

Service providers who handle law enforcement data must adhere to the CJIS Security Policy to ensure compliance. It includes specific controls on incident response, security awareness, access control, and data protection.

Clip auto-start at: 13:23 Length: 12 min (This is part of our "Aligning MSP and Insurers to Communicate With Each Other" episode.)

Key Areas of CJIS Compliance:

  • Access control: Ensures that sensitive information is only accessible by authorized personnel
  • Incident response: Requires the development of a formal process for managing and responding to security incidents
  • Mobile device management: Includes security controls for mobile devices that access criminal justice information


 

POPIA Compliance Framework: Data Protection in South Africa

What is POPIA?

The Protection of Personal Information Act (POPIA) is a South African law that protects personal data by regulating how it is processed by private and public entities. Service providers who deal with South African clients must comply with POPIA to ensure the privacy of personal information.

POPIA mandates that organizations develop a compliance framework that includes the management, security, and processing of personal data. This framework also includes obligations for data breach notifications, ensuring that data subjects’ privacy rights are respected.

Clip auto-start at: 13:39 Length: 3 min (This is part of our "Cyber Insurance Blind Spots" episode.)

POPIA Compliance Framework

  • The three lines of defense: Management, Compliance, and Independent Assurance
  • Change management: Defines roles and responsibilities, establishes policies, and ensures continuous improvement to protect personal data.


 

Compliance Changes in 2025: Key Highlights

  1. NIST CSF 2.0: Released after delays, it has seen limited adoption compared to 1.1 due to complexity and unresolved issues. Many still prefer the older version
  2. SB11 Framework (2025): A practical cybersecurity model for SMBs, focusing on achievable safeguards and aligning with ISO 27001. It empowers MSPs to showcase cybersecurity maturity
  3. CIS IG1 Updates: Continues to mitigate over 80% of risks with updates emphasizing governance and blending technical, administrative, and physical safeguards
  4. Practical Focus: Frameworks now prioritize manageable actions like inventory tracking, making compliance more accessible
  5. Global Influence: International input adds complexity but broadens applicability in frameworks like NIST 2.0 and SB11

These updates emphasize scalable, evidence-based compliance, especially for SMBs, and position MSPs as key implementation partners.

Learn more about Compliance Changes in 2025: Key Highlights


 

Earn Client Trust with Proven Cybersecurity Protections

Cybersecurity standards are a critical part of the modern service provider's toolkit. They are essential pillars of a service provider’s operational success. From protecting sensitive client data to meeting compliance regulations, these frameworks and regulations serve as the foundation for building trust, ensuring business continuity, and staying competitive in an increasingly regulated world.

Each framework and regulation—whether it’s NIST CSF, SOC 2, or GDPR—addresses unique aspects of cybersecurity, but together they create a comprehensive roadmap for risk management, incident response, and long-term resilience. Service providers who invest in understanding and implementing these standards not only enhance their cybersecurity posture but also demonstrate a commitment to their clients' success.

The journey to compliance might seem complex, but with the right resources and tools, it becomes a manageable process. By focusing on continuous improvement, leveraging automation, and staying informed about evolving standards, you can transform compliance from a challenge into a strategic advantage.

Ready to elevate your cybersecurity strategy? Explore our in-depth guides, instructional videos, and expert insights to start building a safer, more secure future for your clients—and your business. Learn more.

 

COMPLIANCE STANDARD

ACSC Essential 8

Australia Cyber Security Centre Essential Information Security Manual

WEB GUIDE & EBOOK

Vulnerability Management 101

Using vulnerability insights to reduce cyber risk

LIVESTREAM

Conquering Cyber Price Objections

Demonstrating cybersecurity value amid budget constraints

WEB GUIDE

Red vs Blue

The role of attackers and defenders in cyber teams

Cybersecurity made simple, for humans.