BS ISO IEC 27034-1-2011 Information technology Security techniques Application security Overview and concepts《信息技术 安全技术 应用程序安全 概况与概念》.pdf
《BS ISO IEC 27034-1-2011 Information technology Security techniques Application security Overview and concepts《信息技术 安全技术 应用程序安全 概况与概念》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 27034-1-2011 Information technology Security techniques Application security Overview and concepts《信息技术 安全技术 应用程序安全 概况与概念》.pdf(86页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards Publication BS ISO/IEC 27034-1:2011 Information technology Security techniques Application security Part 1: Overview and concepts Incorporating corrigendum January 2014BS ISO/IEC 27034-1:2011 National foreword This British Standard is the UK implementation of ISO/IEC 27034-1:2011, inco
2、rporating corrigendum January 2014. The start and finish of text introduced or altered by corrigendum is indicated in the text by tags. Text altered by ISO/IEC corrigendum January 2014 is indicated in the text by . The UK participation in its preparation was entrusted to Technical Committee IST/33,
3、IT - Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2
4、014. Published by BSI Standards Limited 2014 ISBN 978 0 580 84428 7 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 31 December 2011. Amendments/corr
5、igenda issued since publication Date Text affected 28 February 2014 Implementation of ISO/IEC corrigendum January 2014 BRITISH STANDARD Reference number ISO/IEC 27034-1:2011(E) ISO/IEC 2011INTERNATIONAL STANDARD ISO/IEC 27034-1 First edition 2011-11-15 Information technology Security techniques Appl
6、ication security Part 1: Overview and concepts Technologies de linformation Techniques de scurit Scurit des applications Partie 1: Aperu gnral et concepts BS ISO/IEC 27034-1:2011 ISO/IEC 27034-1:2011(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2011 All rights reserved. Unless otherwise specified, no par
7、t of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 5
8、6 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2011 All rights reservedBS ISO/IEC 27034-1:2011 ISO/IEC 27034-1:2011(E) ISO/IEC 2011 All rights reserved iiiContents Page FOREWORD . VII INTRODUCTION VIII 0.1
9、GENERAL VIII 0.2 PURPOSE . VIII 0.3 TARGETED AUDIENCES IX 0.3.1 General . ix 0.3.2 Managers ix 0.3.3 Provisioning and operation teams x 0.3.4 Acquirers . xi 0.3.5 Suppliers . xi 0.3.6 Auditors . xi 0.3.7 Users . xi 0.4 PRINCIPLES XI 0.4.1 Security is a requirement xi 0.4.2 Application security is co
10、ntext-dependent . xii 0.4.3 Appropriate investment for application security . xii 0.4.4 Application security should be demonstrated xii 0.5 RELATIONSHIP TO OTHER INTERNATIONAL STANDARDS . XIII 0.5.1 General . xiii 0.5.2 ISO/IEC 27001, Information security management systems Requirements xiii 0.5.3 I
11、SO/IEC 27002, Code of practice for information security management xiii 0.5.4 ISO/IEC 27005, Information security risk management . xiii 0.5.5 ISO/IEC 21827, Systems Security Engineering Capability Maturity Model (SSE CMM) xiii 0.5.6 ISO/IEC 15408-3, Evaluation criteria for IT security Part 3: Secur
12、ity assurance components . xiii 0.5.7 ISO/IEC TR 15443-1, A framework for IT security assurance Part 1: Overview and framework, and ISO/IEC TR 15443-3, A framework for IT security assurance Part 3: Analysis of assurance methods xiv 0.5.8 ISO/IEC 15026-2, Systems and software engineering Systems and
13、software assurance Part 2: Assurance case xiv 0.5.9 ISO/IEC 15288, Systems and software engineering System life cycle processes, and ISO/IEC 12207, Systems and software engineering Software life cycle process xiv 0.5.10 ISO/IEC 29193 (under development), Secure system engineering principles and tech
14、niques . xiv 1 SCOPE . 1 2 NORMATIVE REFERENCES . 1 3 TERMS AND DEFINITIONS . 1 4 ABBREVIATED TERMS 4 5 STRUCTURE OF ISO/IEC 27034 5 6 INTRODUCTION TO APPLICATION SECURITY . 6 6.1 GENERAL . 6 6.2 APPLICATION SECURITY VS SOFTWARE SECURITY 6 6.3 APPLICATION SECURITY SCOPE . 6 6.3.1 General 6 6.3.2 Bus
15、iness context 7 6.3.3 Regulatory context . 7 6.3.4 Application life cycle processes . 7 6.3.5 Processes involved with the application 7 BS ISO/IEC 27034-1:2011 ISO/IEC 27034-1:2011(E) iv ISO/IEC 2011 All rights reserved6.3.6 Technological context 8 6.3.7 Application specifications 8 6.3.8 Applicatio
16、n data . 8 6.3.9 Organization and user data . 8 6.3.10 Roles and permissions 8 6.4 APPLICATION SECURITY REQUIREMENTS . 8 6.4.1 Application security requirements sources 8 6.4.2 Application security requirements engineering . 9 6.4.3 ISMS 9 6.5 RISK . 9 6.5.1 Application security risk . 9 6.5.2 Appli
17、cation vulnerabilities 10 6.5.3 Threats to applications 10 6.5.4 Impact on applications . 10 6.5.5 Risk management . 10 6.6 SECURITY COSTS 10 6.7 TARGET ENVIRONMENT 10 6.8 CONTROLS AND THEIR OBJECTIVES 11 7 ISO/IEC 27034 OVERALL PROCESSES . 11 7.1 COMPONENTS, PROCESSES AND FRAMEWORKS 11 7.2 ONF MANA
18、GEMENT PROCESS . 12 7.3 APPLICATION SECURITY MANAGEMENT PROCESS . 13 7.3.1 General 13 7.3.2 Specifying the application requirements and environment . 13 7.3.3 Assessing application security risks 13 7.3.4 Creating and maintaining the Application Normative Framework . 13 7.3.5 Provisioning and operat
19、ing the application . 14 7.3.6 Auditing the security of the application 14 8 CONCEPTS . 14 8.1 ORGANIZATION NORMATIVE FRAMEWORK . 14 8.1.1 General 14 8.1.2 Components 15 8.1.3 Processes related to the Organization Normative Framework . 28 8.2 APPLICATION SECURITY RISK ASSESSMENT . 30 8.2.1 Risk asse
20、ssment vs risk management 30 8.2.2 Application risk analysis 31 8.2.3 Risk Evaluation 31 8.2.4 Applications Targeted Level of Trust 31 8.2.5 Application owner acceptation 31 8.3 APPLICATION NORMATIVE FRAMEWORK 32 8.3.1 General 32 8.3.2 Components 33 8.3.3 Processes related to the security of the app
21、lication 33 8.3.4 Applications life cycle . 34 8.3.5 Processes 34 8.4 PROVISIONING AND OPERATING THE APPLICATION . 34 8.4.1 General 34 8.4.2 Impact of ISO/IEC 27034 on an application project 35 8.4.3 Components 36 8.4.4 Processes 36 8.5 APPLICATION SECURITY AUDIT . 37 8.5.1 General 37 8.5.2 Componen
22、ts 38 BS ISO/IEC 27034-1:2011 ISO/IEC 27034-1:2011(E) ISO/IEC 2011 All rights reserved vANNEX A (INFORMATIVE) MAPPING AN EXISTING DEVELOPMENT PROCESS TO ISO/IEC 27034 CASE STUDY . 39 A.1 GENERAL . 39 A.2 ABOUT THE SECURITY DEVELOPMENT LIFECYCLE 39 A.3 SDL MAPPED TO THE ORGANIZATION NORMATIVE FRAMEWO
23、RK . 40 A.4 BUSINESS CONTEXT . 41 A.5 REGULATORY CONTEXT . 41 A.6 APPLICATION SPECIFICATIONS REPOSITORY 42 A.7 TECHNOLOGICAL CONTEXT . 42 A.8 ROLES, RESPONSIBILITIES AND QUALIFICATIONS . 43 A.9 ORGANIZATION ASC LIBRARY 44 A.9.1 Training 45 A.9.2 Requirements . 45 A.9.3 Design 46 A.9.4 Implementation
24、. 47 A.9.5 Verification . 47 A.9.6 Release 48 A.10 APPLICATION SECURITY AUDIT . 49 A.11 APPLICATION LIFE CYCLE MODEL . 51 A.12 SDL MAPPED TO THE APPLICATION SECURITY LIFE CYCLE REFERENCE MODEL 53 ANNEX B (INFORMATIVE) MAPPING ASC WITH AN EXISTING STANDARD . 55 B.1 ASC CANDIDATE CATEGORIES 55 B.1.1 C
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC2703412011INFORMATIONTECHNOLOGYSECURITYTECHNIQUESAPPLICATIONSECURITYOVERVIEWANDCONCEPTS 信息技术

链接地址:http://www.mydoc123.com/p-396690.html