BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf
《BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf(46页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards Publication BS ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communicationsBS ISO/IEC 27010:2015 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 27010:
2、2015. It supersedes BS ISO/IEC 27010:2012 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33/1, Information Security Management Systems. A list of organizations represented on this committee can be obtained on request to its secretary. This public
3、ation does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2015. Published by BSI Standards Limited 2015 ISBN 978 0 580 89580 7 ICS 35.040 Compliance with a British Standard cannot confer immunity
4、 from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 November 2015. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dBS ISO/IEC 27010:2015 Information technology Security techniques Information
5、 security management for inter-sector and inter-organizational communications Technologies de linformation Techniques de scurit Gestion de la scurit de linformation des communications intersectorielles et interorganisationnelles INTERNATIONAL STANDARD ISO/IEC 27010 Reference number ISO/IEC 27010:201
6、5(E) Second edition 2015-11-15 ISO/IEC 2015 BS ISO/IEC 27010:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or
7、 by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8
8、 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 27010:2015(E)BS ISO/IEC 27010:2015ISO/IEC 27010:2015(E)Foreword vi Introduction vii 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 C onc epts and justific
9、ation 1 4.1 Introduction 1 4.2 Information sharing communities . 2 4.3 Community management 2 4.4 Supporting entities 2 4.5 Inter-sector communication . 2 4.6 Conformity 3 4.7 Communications model 4 5 Information security policies 4 5.1 Management direction for information security . 4 5.1.1 Policie
10、s for information security 4 5.1.2 Review of the policies for information security 5 6 Organization of information security . 5 7 Human resource security 5 7.1 Prior to employment 5 7.1.1 Screening 5 7.1.2 Terms and conditions of employment . 5 7.2 During employment 5 7.3 Termination and change of e
11、mployment . 5 8 Asset management . 5 8.1 Responsibility for assets . 5 8.1.1 Inventory of assets . 5 8.1.2 Ownership of assets 5 8.1.3 Acceptable use of assets 6 8.1.4 Return of assets 6 8.2 Information classification 6 8.2.1 Classification of information . 6 8.2.2 Labelling of information 6 8.2.3 H
12、andling of assets . 6 8.3 Media handling . 6 8.4 Information exchanges protection . 7 8.4.1 Information dissemination . 7 8.4.2 Information disclaimers 7 8.4.3 Information credibility . 7 8.4.4 Information sensitivity reduction . 8 8.4.5 Anonymous source protection . 8 8.4.6 Anonymous recipient prot
13、ection . 8 8.4.7 Onwards release authority 9 9 Access control 9 10 Cryptography 9 10.1 Cryptographic controls 9 10.1.1 Policy on the use of cryptographic controls . 9 10.1.2 Key management . 9 11 Physical and environmental security 9 ISO/IEC 2015 All rights reserved iii Contents PageBS ISO/IEC 27010
14、:2015ISO/IEC 27010:2015(E)12 Operations security . 9 12.1 Operational procedures and responsibilities . 9 12.2 Protection from malware 10 12.2.1 Controls against malware 10 12.3 Backup .10 12.4 Logging and monitoring .10 12.4.1 Event logging 10 12.4.2 Protection of log information .10 12.4.3 Adminis
15、trator and operator logs 10 12.4.4 Clock synchronization 10 12.5 Control of operational software 10 12.6 Technical vulnerability management .10 12.7 Information systems audit considerations 10 12.7.1 Information systems audit controls .10 12.7.2 Community audit rights 10 13 Communications security 1
16、1 13.1 Network security management .11 13.2 Information transfer .11 13.2.1 Information transfer policies and procedures 11 13.2.2 Agreements on information transfer 11 13.2.3 Electronic messaging 11 13.2.4 Confidentiality or non-disclosure agreements .11 14 System acquisition, development and maint
17、enance 11 15 Supplier relationships .12 15.1 Information security in supplier relationships 12 15.1.1 Information security policy for supplier relationships .12 15.1.2 Addressing security within supplier agreements 12 15.1.3 Information and communication technology supply chain .12 15.2 Supplier ser
18、vice delivery management 12 16 Information security incident management 12 16.1 Management of information security incidents and improvements .12 16.1.1 Responsibilities and procedures .12 16.1.2 Reporting information security events .12 16.1.3 Reporting information security weaknesses 13 16.1.4 Ass
19、essment of, and decision on, information security events .13 16.1.5 Response to information security incidents .13 16.1.6 Learning from information security incidents 13 16.1.7 Collection of evidence . 13 16.1.8 Early warning system .13 17 Information security aspects of business continuity manageme
20、nt .13 17.1 Information security continuity 13 17.1.1 Planning information security continuity .13 17.1.2 Implementing information security continuity .14 17.1.3 Verify, review and evaluate information security continuity .14 17.2 Redundancies 14 18 Compliance 14 18.1 Compliance with legal and contr
21、actual requirements .14 18.1.1 Identification of applicable legislation and contractual requirements 14 18.1.2 Intellectual property rights .14 18.1.3 Protection of records .14 18.1.4 Privacy and protection of personally identifiable information 14 18.1.5 Regulation of cryptographic controls .14 18.
22、1.6 Liability to the information sharing community .14 18.2 Information security reviews 15 Annex A (informative) Sharing sensitive information 16 iv ISO/IEC 2015 All rights reservedBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E)Annex B (informative) Establishing trust in information exchanges 21 Annex C
23、 (informative) The T r affic Lig ht Pr ot oc ol 25 Annex D (informative) Models for organizing an information sharing community 26 Bibliography .32 ISO/IEC 2015 All rights reserved vBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) Foreword ISO (the International Organization for Standardization) and IEC (
24、the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with part
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC270102015INFORMATIONTECHNOLOGYSECURITYTECHNIQUESINFORMATIONSECURITYMANAGEMENTFORINTERSECTORANDINTERORGANIZATIONALCOMMUNICATIONS

链接地址:http://www.mydoc123.com/p-396676.html