欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ISO IEC 27007-2011 Information technology - Security techniques - Guidelines for information security management systems auditing《信息技术 安全性技术 信息安全管理系统审核指南》.pdf

    • 资源ID:1257159       资源大小:400.78KB        全文页数:34页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISO IEC 27007-2011 Information technology - Security techniques - Guidelines for information security management systems auditing《信息技术 安全性技术 信息安全管理系统审核指南》.pdf

    1、 Reference numberISO/IEC 27007:2011(E)ISO/IEC 2011INTERNATIONAL STANDARD ISO/IEC27007First edition2011-11-15Information technology Security techniques Guidelines for information security management systems auditing Technologies de linformation Techniques de scurit Lignes directrices pour laudit des

    2、systmes de management de la scurit de linformation ISO/IEC 27007:2011(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2011 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying

    3、and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland

    4、ii ISO/IEC 2011 All rights reservedISO/IEC 27007:2011(E) ISO/IEC 2011 All rights reserved iiiContents Page Foreword . v Introduction vi 1 Scope 1 2 Normative references 1 3 Terms and definitions . 1 4 Principles of auditing 1 5 Managing an audit programme 1 5.1 General . 1 5.1.1 IS 5.1 General . 2 5

    5、.2 Establishing the audit programme objectives . 2 5.2.1 IS 5.2 Establishing the audit programme objectives . 2 5.3 Establishing the audit programme 2 5.3.1 Role and responsibilities of the person managing the audit programme . 2 5.3.2 Competence of the person managing the audit programme 2 5.3.3 De

    6、termining the extent of the audit programme 2 5.3.4 Identifying and evaluating audit programme risks 3 5.3.5 Establishing procedures for the audit programme 3 5.3.6 Identifying audit programme resources 3 5.4 Implementing the audit programme 3 5.4.1 General . 3 5.4.2 Defining the objectives, scope a

    7、nd criteria for an individual audit . 3 5.4.3 Selecting the audit methods 4 5.4.4 Selecting the audit team members 4 5.4.5 Assigning responsibility for an individual audit to the audit team leader 5 5.4.6 Managing the audit programme outcome . 5 5.4.7 Managing and maintaining audit programme records

    8、 5 5.5 Monitoring the audit programme . 5 5.6 Reviewing and improving the audit programme 5 6 Performing an audit . 5 6.1 General . 5 6.2 Initiating the audit 5 6.2.1 General . 5 6.2.2 Establishing initial contact with the auditee. 5 6.2.3 Determining the feasibility of the audit . 5 6.3 Preparing a

    9、udit activities 6 6.3.1 Performing document review in preparation for the audit 6 6.3.2 Preparing the audit plan . 6 6.3.3 Assigning work to the audit team 6 6.3.4 Preparing work documents 6 6.4 Conducting the audit activities 6 6.4.1 General . 6 6.4.2 Conducting the opening meeting 6 6.4.3 Performi

    10、ng document review while conducting the audit 6 6.4.4 Communicating during the audit . 6 6.4.5 Assigning roles and responsibilities of guides and observers 6 6.4.6 Collecting and verifying information . 6 6.4.7 Generating audit findings . 7 6.4.8 Preparing audit conclusions 7 6.4.9 Conducting the cl

    11、osing meeting 7 ISO/IEC 27007:2011(E) iv ISO/IEC 2011 All rights reserved6.5 Preparing and distributing the audit report 7 6.5.1 Preparing the audit report .7 6.5.2 Distributing the audit report .7 6.6 Completing the audit .7 6.7 Conducting audit follow-up 7 7 Competence and evaluation of auditors .

    12、7 7.1 General 7 7.2 Determining auditor competence to fulfil the needs of the audit programme 7 7.2.1 General 7 7.2.2 Personal behaviour .8 7.2.3 Knowledge and skills 8 7.2.4 Achieving auditor competence 9 7.2.5 Audit team leader .9 7.3 Establishing the auditor evaluation criteria 9 7.4 Selecting th

    13、e appropriate auditor evaluation method .9 7.5 Conducting auditor evaluation .9 7.6 Maintaining and improving auditor competence 9 Annex A (informative) Practice Guidance for ISMS Auditing .10 Bibliography 27 ISO/IEC 27007:2011(E) ISO/IEC 2011 All rights reserved vForeword ISO (the International Org

    14、anization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the r

    15、espective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of infor

    16、mation technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft Internatio

    17、nal Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may

    18、 be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 27007 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. ISO/IEC 27007:2011(E) vi ISO/IEC 2011

    19、All rights reservedIntroduction This International Standard provides guidance on the management of an information security management system (ISMS) audit programme and the conduct of the internal or external audits in accordance with ISO/IEC 27001:2005, as well as guidance on the competence and eval

    20、uation of ISMS auditors, which should be used in conjunction with the guidance contained in ISO 19011. This International Standard does not state requirements. This guidance is intended for all users, including small and medium sized organizations. ISO 19011, Guidelines for auditing management syste

    21、ms provides guidance on the management of audit programmes, the conduct of internal or external audits of management systems, as well as on the competence and evaluation of management system auditors. The text in this International Standard follows the structure of ISO 19011, and the additional ISMS

    22、-specific guidance on the application of ISO 19011 for ISMS audits is identified by the letters “IS”. INTERNATIONAL STANDARD ISO/IEC 27007:2011(E) ISO/IEC 2011 All rights reserved 1Information technology Security techniques Guidelines for information security management systems auditing 1 Scope This

    23、 International Standard provides guidance on managing an information security management system (ISMS) audit programme, on conducting the audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011. This International Standard is applicable to those needing to

    24、understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the lates

    25、t edition of the referenced document (including any amendments) applies. ISO 19011:2011, Guidelines for auditing management systems ISO/IEC 27001:2005, Information technology Security techniques Information security management systems Requirements ISO/IEC 27000:2009, Information technology Security

    26、techniques Information security management systems Overview and vocabulary 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO 19011 and ISO/IEC 27000 apply. 4 Principles of auditing The principles of auditing from ISO 19011:2011, Clause 4 apply. 5 Manag

    27、ing an audit programme 5.1 General The guidelines from ISO 19011:2011, Clause 5.1, apply. In addition, the following ISMS-specific guidance applies. ISO/IEC 27007:2011(E) 2 ISO/IEC 2011 All rights reserved5.1.1 IS 5.1 General The ISMS audit1)programme should be developed based on the auditees inform

    28、ation security risk situation. 5.2 Establishing the audit programme objectives The guidelines from ISO 19011:2011, Clause 5.2, apply. In addition, the following ISMS-specific guidance applies. 5.2.1 IS 5.2 Establishing the audit programme objectives Objectives for audit programme(s) should be establ

    29、ished to direct the planning and conduct of audits and to ensure that the audit programme is implemented effectively. These objectives can be dependent on: a) identified information security requirements; b) requirements from ISO/IEC 27001; c) auditees level of performance, as reflected in the occur

    30、rence of information security failures, incidents and effectiveness measurements; and d) information security risks to the organization being audited. Examples of audit programme objectives may include the following: 1) verification of conformity with the identified legal and contractual requirement

    31、s and other requirements and their security implications; 2) Obtaining and maintaining confidence in the risk management capability of an auditee. 5.3 Establishing the audit programme 5.3.1 Role and responsibilities of the person managing the audit programme The guidelines from ISO 19011:2011, Claus

    32、e 5.3.1, apply. 5.3.2 Competence of the person managing the audit programme The guidelines from ISO 19011:2011, Clause 5.3.2, apply. 5.3.3 Determining the extent of the audit programme The guidelines from ISO 19011:2011, Clause 5.3.3, apply. In addition, the following ISMS-specific guidance applies.

    33、 5.3.3.1 IS 5.3.3 Determining the extent of the audit programme The extent of an audit programme can vary. Factors that can influence the extent of the audit programme are: a) the size of the ISMS, including 1. the total number of personnel working at each location and relationships with third-party

    34、 contractors working regularly at the location to be audited; 2. the number of information systems; 3. the number of sites covered by the ISMS; b) the complexity of the ISMS (including the number and criticality of processes and activities); c) the significance of the information security risks iden

    35、tified for the ISMS; d) the importance of information and related assets within the scope of the ISMS; 1) For the purpose of this document, whenever the term “audit” is used this refers to ISMS audits. ISO/IEC 27007:2011(E) ISO/IEC 2011 All rights reserved 3e) the complexity of the information syste

    36、ms to be audited on site, including complexity of information technology deployed; f) whether there are many similar sites; and g) the variations in ISMS complexity across the sites in scope. Consideration should be given in the audit programme to setting priorities based on information security ris

    37、ks and business requirements in respect of the ISMS areas that warrant more detailed examination. Further information about multi-site sampling can be found in ISO/IEC 27006:2007 and IAF MD 1:2007 (see Bibliography), where the information in these documents only relates to certification audits. 5.3.

    38、4 Identifying and evaluating audit programme risks The guidelines from ISO 19011:2011, Clause 5.3.4, apply. 5.3.5 Establishing procedures for the audit programme The guidelines from ISO 19011:2011, Clause 5.3.5, apply. 5.3.6 Identifying audit programme resources The guidelines from ISO 19011:2011, C

    39、lause 5.3.6, apply. In addition, the following ISMS-specific guidance applies. 5.3.6.1 IS 5.3.6 Identifying audit programme resources In particular, for all significant risks applicable to the auditee, auditors should be allocated sufficient time to verify the effectiveness of the corresponding risk

    40、 mitigation action. 5.4 Implementing the audit programme 5.4.1 General The guidelines from ISO 19011:2011, Clause 5.4.1, apply. In addition, the following ISMS-specific guidance applies. 5.4.1.1 IS 5.4.1 General Where applicable, confidentiality requirements of auditees and other relevant parties, i

    41、ncluding possible legal and contractual requirements, should be addressed in the implementation of an audit programme. 5.4.2 Defining the objectives, scope and criteria for an individual audit The guidelines from ISO 19011:2011, Clause 5.4.2, apply. In addition, the following ISMS-specific guidance

    42、applies. 5.4.2.1 IS 5.4.2 Defining the objectives, scope and criteria for an individual audit The audit scope should reflect the auditees information security risks, relevant business requirements and business risks. The audit objectives may in addition include the following: a) evaluation of whethe

    43、r the ISMS adequately identifies and addresses information security requirements; b) evaluation of the continual suitability of the ISMS objectives defined by management; and c) evaluation of the processes for the maintenance and effective improvement of the ISMS. ISO/IEC 27007:2011(E) 4 ISO/IEC 201

    44、1 All rights reservedPractical help Examples of audit criteria The following are topics for consideration as audit criteria: 1) the auditees information security risk assessment methodology and risk assessment and treatment results, and that these address all relevant requirements; 2) the version of

    45、 the Statement of Applicability, and its relation to the results of the risk assessment; 3) the effective implementation of controls to reduce risks: 4) measurement of the effectiveness of the implemented controls, and that these measurements have been applied as defined to measure control effective

    46、ness (see ISO/IEC 27004); 5) activities to monitor and review the ISMS processes and controls; 6) internal ISMS audits and management reviews and the organizations corrective actions; 7) information about the adequacy of and compliance with the objectives, policies, and procedures adopted by the aud

    47、itee; and 8) compliance with specific legal and contractual requirements and other requirements relevant to the auditee, and their information security implications. The audit team should ensure that the scope and boundaries of the ISMS of the auditee are clearly defined in terms of the characterist

    48、ics of the business, the organization, its location, assets and technology including details and justification of any exclusion to scope. The audit team should confirm that the auditee address the requirements stated in Clause 1.2 of ISO/IEC 27001:2005 within the scope of the ISMS. Auditors should t

    49、herefore ensure that the auditees information security risk assessment and risk treatment properly reflects its activities and extends to the boundaries of the scope. Auditors should confirm that this is reflected in the Statement of Applicability. Auditors should also ensure that interfaces with services or activities that are not completely within the scope of the ISMS are addressed within the ISMS and are included in the auditees information security risk assessment. An example of such a situation is the sha


    注意事项

    本文(ISO IEC 27007-2011 Information technology - Security techniques - Guidelines for information security management systems auditing《信息技术 安全性技术 信息安全管理系统审核指南》.pdf)为本站会员(lawfemale396)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开