ISO IEC TR 27019-2013 Information technology - Security techniques - Information security management guidelines based on ISO IEC 27002 for process control syste.pdf
《ISO IEC TR 27019-2013 Information technology - Security techniques - Information security management guidelines based on ISO IEC 27002 for process control syste.pdf》由会员分享,可在线阅读,更多相关《ISO IEC TR 27019-2013 Information technology - Security techniques - Information security management guidelines based on ISO IEC 27002 for process control syste.pdf(46页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/IEC TR 27019:2013(E) ISO/IEC 2013TECHNICAL REPORT ISO/IEC TR 27019 First edition 2013-07-15Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry Technologi
2、es de linformation Techniques de scurit Lignes directrices de management de la scurit de linformation fondes sur lISO/CEI 27002 pour les systmes de contrle des procds spcifiques lindustrie des oprateurs nergtiques ISO/IEC TR 27019:2013(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2013 All rights reserved
3、. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at
4、 the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2013 All rights reservedISO/IEC TR 27019:2013(E) ISO
5、/IEC 2013 All rights reserved iiiContents Page Foreword vi Introduction . vii 1 Scope 1 2 Normative references 1 3 Terms and definitions . 2 4 Overview . 3 4.1 Structure of this guideline 3 4.2 Information security management systems for energy supply utilities 4 4.2.1 Objectives 4 4.2.2 Security co
6、nsiderations for process control systems used by the energy utilities 4 4.2.3 Information assets to be protected . 4 4.2.4 Establishment of information security management 5 4.2.5 Critical success factors 5 5 Security policy . 5 6 Organization of information security 6 6.1 Internal organization . 6
7、6.1.1 Management commitment to information security 6 6.1.2 Information security coordination . 6 6.1.3 Allocation of information security responsibilities . 6 6.1.4 Authorization process for information processing facilities 6 6.1.5 Confidentiality agreements 6 6.1.6 Contact with authorities 6 6.1.
8、7 Contact with special interest groups 7 6.1.8 Independent review of information security . 7 6.2 External parties 7 6.2.1 Identification of risks related to external parties . 7 6.2.2 Addressing security when dealing with customers 7 6.2.3 Addressing security in third-party agreements . 8 7 Asset m
9、anagement 8 7.1 Responsibility for assets 8 7.1.1 Inventory of assets 8 7.1.2 Ownership of assets . 9 7.1.3 Acceptable use of assets . 9 7.2 Information classification . 9 7.2.1 Classification guidelines 9 7.2.2 Information labelling and handling 9 8 Human resource security . 10 8.1 Prior to employm
10、ent 10 8.1.1 Roles and responsibilities 10 8.1.2 Screening . 10 8.1.3 Terms and conditions of employment 10 8.2 During employment . 10 8.3 Termination or change of employment . 11 9 Physical and environmental security 11 9.1 Secure areas 11 9.1.1 Physical security perimeter 11 9.1.2 Physical entry c
11、ontrols . 11 ISO/IEC TR 27019:2013(E) iv ISO/IEC 2013 All rights reserved9.1.3 Securing offices, rooms and facilities .11 9.1.4 Protecting against external and environmental threats 11 9.1.5 Working in secure areas .11 9.1.6 Public access, delivery and loading areas 11 9.1.7 Securing control centers
12、 11 9.1.8 Securing equipment rooms 12 9.1.9 Securing peripheral sites 13 9.2 Equipment security .14 9.2.1 Equipment siting and protection 14 9.2.2 Supporting utilities 14 9.2.3 Cabling security .14 9.2.4 Equipment maintenance .15 9.2.5 Security of equipment off-premises 15 9.2.6 Secure disposal or r
13、euse of equipment 15 9.2.7 Removal of property 15 9.3 Security in premises of 3 rdparties .15 9.3.1 Equipment sited on the premises of other energy utility organizations 15 9.3.2 Equipment sited on customers premises 16 9.3.3 Interconnected control and communication systems .16 10 Communications and
14、 operations management .16 10.1 Operational procedures and responsibilities .16 10.1.1 Documented operating procedures .16 10.1.2 Change management 17 10.1.3 Segregation of duties 17 10.1.4 Separation of development, test and operational facilities .17 10.2 Third party service delivery management .1
15、7 10.3 System planning and acceptance 17 10.4 Protection against malicious and mobile code 17 10.4.1 Controls against malicious code .17 10.4.2 Controls against mobile code 18 10.5 Back-up .18 10.6 Network security management .18 10.6.1 Network controls 18 10.6.2 Security of network services 18 10.6
16、.3 Securing process control data communication .18 10.7 Media handling .19 10.8 Exchange of information .19 10.9 Electronic commerce services .19 10.10 Monitoring 19 10.10.1 Audit logging 19 10.10.2 Monitoring system use 19 10.10.3 Protection of log information .19 10.10.4 Administrator and operator
17、 logs 19 10.10.5 Fault logging 19 10.10.6 Clock synchronization 20 10.11 Legacy systems .20 10.11.1 Treatment of legacy systems .20 10.12 Safety functions .20 10.12.1 Integrity and availability of safety functions .21 11 Access control .21 11.1 Business requirement for access control .21 11.1.1 Acce
18、ss control policy 21 11.2 User access management .21 11.3 User responsibilities .21 11.3.1 Password use .21 11.3.2 Unattended user equipment .22 11.3.3 Clear desk and clear screen policy 22 11.4 Network access control 22 ISO/IEC TR 27019:2013(E) ISO/IEC 2013 All rights reserved v11.4.1 Policy on use
19、 of network services . 22 11.4.2 User authentication for external connections 22 11.4.3 Equipment identification in networks . 22 11.4.4 Remote diagnostic and configuration port protection 22 11.4.5 Segregation in networks . 22 11.4.6 Network connection control . 23 11.4.7 Network routing control 23
20、 11.4.8 Logical coupling of external process control systems . 23 11.5 Operating system access control 23 11.5.1 Secure log-on procedures 23 11.5.2 User identification and authentication 23 11.5.3 Password management system . 23 11.5.4 Use of system utilities . 23 11.5.5 Session time-out 24 11.5.6 L
21、imitation of connection time 24 11.6 Application and information access control 24 11.7 Mobile computing and teleworking . 24 12 Information systems acquisition, development and maintenance 24 12.1 Security requirements of information systems 24 12.1.1 Security requirements analysis and specificatio
22、n . 24 12.2 Correct processing in applications . 24 12.3 Cryptographic controls . 24 12.4 Security of system files 24 12.4.1 Control of operational software . 24 12.4.2 Protection of system test data . 25 12.4.3 Access control to program source code 25 12.5 Security in development and support proces
23、ses 25 12.6 Technical vulnerability management 25 13 Information security incident management 25 13.1 Reporting information security events and weaknesses 25 13.2 Management of information security incidents and improvements 25 14 Business continuity management . 25 14.1 Information security aspects
24、 of business continuity management . 25 14.1.1 Including information security in the business continuity management process . 25 14.1.2 Business continuity and risk assessment 25 14.1.3 Developing and implementing continuity plans including information security 25 14.1.4 Business continuity planning
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIECTR270192013INFORMATIONTECHNOLOGYSECURITYTECHNIQUESINFORMATIONSECURITYMANAGEMENTGUIDELINESBASEDONISOIEC27002FORPROCESSCONTROLSYSTEPDF

链接地址:http://www.mydoc123.com/p-1257427.html