πŸ” Cybersecurity Laws, Regulations & Standards Cheat Sheet

1️⃣ Cybersecurity Laws & Regulations

These laws govern data privacy, security, and compliance across industries.

Law/Regulation Region Industry Key Requirements
HIPAA (1996) πŸ‡ΊπŸ‡Έ US Healthcare Protects patient health information (PHI), requires encryption & security controls.
FERPA (1974) πŸ‡ΊπŸ‡Έ US Education Grants students/parents rights to access & modify education records.
GLBA (1999) πŸ‡ΊπŸ‡Έ US Finance Requires financial institutions to protect customer data and disclose privacy policies.
GDPR (2016) 🌍 EU All Sectors Strict data protection laws; includes Right to Be Forgotten, breach notification rules.
CCPA (2018) πŸ‡ΊπŸ‡Έ California Consumer Privacy Gives consumers right to know, opt-out, delete personal data from businesses.
Key Disclosure Laws πŸ‡¬πŸ‡§ UK, πŸ‡¦πŸ‡Ί AU Law Enforcement Allows governments to compel decryption key disclosure in investigations.

🚨 Takeaway


2️⃣ Cybersecurity Standards & Compliance Frameworks

These frameworks guide cybersecurity best practices.

Framework Purpose Key Focus Areas
PCI DSS Payment Security Protects credit card transactions, mandates encryption & access controls.
CIS Top 18 General Security 18 best practices for IT security & risk management.
NIST CSF Risk Management Five functions: Identify, Protect, Detect, Respond, Recover.
MITRE ATT&CK Threat Intelligence Catalogs adversary attack techniques for cyber defense.
MITRE D3FEND Defensive Security Counter-framework to ATT&CK; maps defensive measures.
Cyber Kill Chain Attack Lifecycle 7 phases from Reconnaissance β†’ Actions on Objectives.
ISA/IEC 62443 Industrial Security Protects Industrial Control Systems (ICS) & Operational Technology (OT).
FedRAMP Cloud Security Standardized security for US government cloud services.

πŸš€ Takeaway


3️⃣ Cybersecurity Strategies & Best Practices


πŸ”₯ Final Quick Summary

βœ”οΈ Laws like HIPAA, GDPR, and CCPA regulate data security & privacy.
βœ”οΈ Standards like NIST CSF, PCI DSS, and CIS Top 18 guide cybersecurity best practices.
βœ”οΈ Frameworks like MITRE ATT&CK & Cyber Kill Chain help understand cyber threats.
βœ”οΈ Security Strategies (Zero Trust, Defense in Depth) enhance protection.