ANSI INCITS ISO IEC TR 13335-4-2000 Information Technology - Guidelines for the Management of IT Security - Part 4 Selection of Safeguards (TECHNICAL REPORT).pdf
《ANSI INCITS ISO IEC TR 13335-4-2000 Information Technology - Guidelines for the Management of IT Security - Part 4 Selection of Safeguards (TECHNICAL REPORT).pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS ISO IEC TR 13335-4-2000 Information Technology - Guidelines for the Management of IT Security - Part 4 Selection of Safeguards (TECHNICAL REPORT).pdf(72页珍藏版)》请在麦多课文档分享上搜索。
1、 INCITS/ISO/IEC TR 13335-4-2000 (R2007) (ISO/IEC TR 13335-4:2000, IDT) Information Technology - Guidelines for the Management of IT Security - Part 4: Selection of Safeguards (TECHNICAL REPORT) INCITS/ISO/IEC TR 13335-4-2000 (R2007) PDF disclaimer This PDF file may contain embedded typefaces. In acc
2、ordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes
3、licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for pri
4、nting. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. Registered by INCITS (InterNational Committee for Information Technology
5、Standards) as an American National Standard. Date of Registration: 12/31/2006 Published by American National Standards Institute, 25 West 43rd Street, New York, New York 10036 Copyright 2006 by Information Technology Industry Council (ITI). All rights reserved. These materials are subject to copyrig
6、ht claims of International Standardization Organization (ISO), International Electrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council (ITI). Not for resale. No part of this publication may be reproduced in any form, including an ele
7、ctronic retrieval system, without the prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1101 K Street NW, Suite 610, Washington DC 20005. Printed in the United States of America ii ITIC 2006 All rights reserved Reference numberISO/IEC TR 13335-4:20
8、00(E)ISO/IEC 2000TECHNICALREPORTISO/IECTR13335-4First edition2000-03-01Information technology Guidelines forthe management of IT Security Part 4:Selection of safeguardsTechnologies de linformation Lignes directrices pour la gestion descurit IT Partie 4: Slection de sauvegardesISO/IEC TR 13335-4:2000
9、(E)PDF disclaimerThis PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall notbe edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading thisfile,
10、parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in thisarea.Adobe is a trademark of Adobe Systems Incorporated.Details of the software products used to create this PDF file can be found in the General Info relative
11、 to the file; the PDF-creation parameterswere optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely eventthat a problem relating to it is found, please inform the Central Secretariat at the address given below. ISO/IEC 200
12、0All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronicor mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member bodyin the country
13、 of the requester.ISO copyright officeCase postale 56 Gb7 CH-1211 Geneva 20Tel. + 41 22 749 01 11Fax + 41 22 734 10 79E-mail copyrightiso.chWeb www.iso.chPrinted in Switzerlandii ISO/IEC 2000 All rights reservedISO/IEC TR 13335-4:2000(E) ISO/IEC 2000 All rights reservediiiTable of ContentsFOREWORDvi
14、INTRODUCTION.vii1 SCOPE.12 REFERENCES.13 DEFINITIONS14 AIM15 OVERVIEW26 INTRODUCTION TO SAFEGUARD SELECTION AND THE CONCEPT OF BASELINESECURITY47 BASIC ASSESSMENTS 87.1 IDENTIFICATION OF THE TYPE OF IT SYSTEM .87.2 IDENTIFICATION OF PHYSICAL/ENVIRONMENTALCONDITIONS 87.3 ASSESSMENT OF EXISTING/PLANNE
15、D SAFEGUARDS .98 SAFEGUARDS.98.1 ORGANIZATIONAL AND PHYSICALSAFEGUARDS108.1.1 IT Security Management and Policies.108.1.2 Security Compliance Checking .108.1.3 Incident Handling118.1.4 Personnel. 118.1.5 Operational Issues.128.1.6 Business Continuity Planning .138.1.7 Physical Security.138.2 IT SYST
16、EM SPECIFIC SAFEGUARDS.188.2.1 Identification and Authentication (I ISO is currently developing several otherdocuments on network security.5OverviewClause 6 provides an introduction to safeguard selection and to the concept of baseline security.Clauses 7 to 10 deal with the establishment of baseline
17、 security for an IT system. In order to select theappropriate safeguards, it is necessary to make some basic assessments, no matter whether moredetailed risk analyses will follow later. These assessments are described in clause 7 which includes theconsideration of:Gb7 what type of IT system is invol
18、ved (e.g. a standalone PC, or connected to a network),Gb7 what are the IT systems location(s) and surrounding environmental conditions like,Gb7 what safeguards are already in place and/or planned, andGb7 whether the assessments made provide enough information to select baseline safeguards for the IT
19、system?Clause 8 provides an overview of safeguards to be selected, divided into organizational and physicalsafeguards (which are selected according to security relevant needs, concerns and constraints) and ITsystem specific safeguards, both grouped into safeguard categories. For each safeguard categ
20、ory, themost typical types of safeguards are described, including a brief explanation about the protection theyare aimed at providing. Specific safeguards within these categories, and their detailed description, canbe found in baseline security documents which are referenced in annexes A to H of thi
21、s document. Inorder to facilitate the use of these documents, a cross-reference between the safeguard categories ofthis document and the chapters of the various documents in the annexes is provided in a table for eachsafeguard category.If it is decided that the type of assessment described in clause
22、 7 is detailed enough for the selection ofsafeguards, clause 9 provides a list of applicable safeguards for each of the typical IT systemsdescribed in 7.1. If safeguards are selected based on the type of IT system, separate baselines might benecessary for standalone workstations, networked workstati
23、ons or servers. To achieve the requiredlevel of security, all that is necessary to select the safeguards applicable under the specificcircumstances, is to compare these with the safeguards already existing (or planned), and to implementthose which are not already implemented.If it is decided that a
24、more in-depth assessment is necessary for the selection of effective and suitablesafeguards, clause 10 provides support for that selection taking into account the high level view ofsecurity concerns (according to the importance of the information) and likely threats. Hence, in thissection, the safeg
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITSISOIECTR1333542000INFORMATIONTECHNOLOGYGUIDELINESFORTHEMANAGEMENTOFITSECURITYPART4SELECTIONOFSAFEGUARDSTECHNICALREPORTPDF

链接地址:http://www.mydoc123.com/p-436609.html