BS 16000-2015 Security management Strategic and operational guidelines《安全管理 战略与操作指南》.pdf
《BS 16000-2015 Security management Strategic and operational guidelines《安全管理 战略与操作指南》.pdf》由会员分享,可在线阅读,更多相关《BS 16000-2015 Security management Strategic and operational guidelines《安全管理 战略与操作指南》.pdf(30页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards PublicationBS 16000:2015Security management Strategic and operationalguidelinesPublishing and copyright informationThe BSI copyright notice displayed in this document indicates when the documentwas last issued. The British Standards Institution 2015Published by BSI Standards Limited 20
2、15ISBN 978 0 580 83490 5ICS 03.100.01; 13.310The following BSI references relate to the work on this document:Committee reference SSM/1Draft for comment 14/30285865 DCPublication historyFirst published, June 2015Amendments issued since publicationDate Text affectedBS 16000:2015 BRITISH STANDARDConte
3、ntsForeword iii0 Introduction 11 Scope 22 Terms and definitions 23 Understanding the organizations context 63.1 General 63.2 External context 63.3 Internal context 63.4 Deriving requirements for security management 84 Developing the security framework 84.1 General 84.2 Commitment to security managem
4、ent 84.3 Communication and awareness 84.4 Organization structure and roles and responsibilities 94.5 Security advice 105 Security risk assessment 105.1 General 105.2 Asset identification 105.3 Security threat and risk analysis 105.4 Risk register 116 Implementing security solutions 116.1 General 116
5、.2 Avoidance 126.3 Transfer/sharing 126.4 Elimination 126.5 Mitigation 126.6 Tolerance/acceptance 137 Implementing the security programme 137.1 Programme management and accountability 137.2 Security policies 137.3 Security programme 138 Security solutions 148.1 General 148.2 Physical security 158.3
6、Technical security 158.4 Manned security 158.5 Information security 168.6 Procedural security 168.7 Asset management 178.8 Personnel security 188.9 Security in procurement 189 Monitoring the security programme and solutions 189.1 General 189.2 Security monitoring and reporting 199.3 Regular reassess
7、ment of risks 199.4 Reviewing the security framework 199.5 Exercising and testing 199.6 Auditing 199.7 Management consideration of monitoring and review results 20Bibliography 21BRITISH STANDARD BS 16000:2015 The British Standards Institution 2015 iList of figuresFigure 1 Embedding security manageme
8、nt in the organization 1Summary of pagesThis document comprises a front cover, an inside front cover, pages i to iv,pages 1 to 22, an inside back cover and a back cover.BRITISH STANDARDBS 16000:2015ii The British Standards Institution 2015ForewordPublishing informationThis British Standard is publis
9、hed by BSI Standards Limited, under licence fromThe British Standards Institution, and came into effect on 30 June 2015. It wasprepared by Technical Committee SSM/1, Societal security management. A list oforganizations represented on this committee can be obtained on request to itssecretary.Use of t
10、his documentAs a guide, this British Standard takes the form of guidance andrecommendations. It should not be quoted as if it were a specification or a codeof practice and claims of compliance cannot be made to it.Presentational conventionsThe guidance in this standard is presented in roman (i.e. up
11、right) type. Anyrecommendations are expressed in sentences in which the principal auxiliaryverb is “should”.Commentary, explanation and general informative material is presented insmaller italic type, and does not constitute a normative element.Contractual and legal considerationsThis publication do
12、es not purport to include all the necessary provisions of acontract. Users are responsible for its correct application.Compliance with a British Standard cannot confer immunity from legalobligations.BRITISH STANDARD BS 16000:2015 The British Standards Institution 2015 iiiBRITISH STANDARDBS 16000:201
13、5This page deliberately left blankiv The British Standards Institution 20150 IntroductionSecurity management is a vitally important strategic capability for a modernorganization that supports the achievement of the organizations objectives byprotecting the organizations reputation and financial well
14、-being. Indeed,beyond simply reacting to threats and risks, effective security managementproactively supports both the capture and exploitation of opportunity andcompetitive or service delivery advantage.As a management discipline, security management is best delivered when itfollows a lifecycle pro
15、cess as shown in Figure 1.The application of the processes in Figure 1 to the various security domainsmight not all reside in any one area of the organization. Indeed, there are manydifferent ways in which responsibilities can be split across a larger organization.Increasingly, good practice in secu
16、rity management acknowledges the need forclose alignment between related security disciplines and, indeed, with otherdisciplines that rely upon, or are relied upon by, security, such as governance,resilience, risk management, business continuity and disaster recovery, assetmanagement and crisis mana
17、gement. To achieve this, especially whereconvergence of these disciplines is not adopted as a corporate objective, acommon understanding of the challenges in achieving security management isneeded to ensure that all efforts are complementary.Figure 1 Embedding security management in the organization
18、BRITISH STANDARD BS 16000:2015 The British Standards Institution 2015 1Successful security is not done “to” the organization “by” a security function. Itneeds to be embedded in the organizations strategy and processes, such thatsecurity is done “by” the organization, which is supported by the securi
19、tyfunction. Everyone has a role to play in ensuring effective security within theorganization.Security management is one of the major responses to the risks identified by theorganization. By definition, therefore, as every organizations risk appetitevaries, it follows that the security management un
20、dertaken by the organizationis bespoke. Security management does not necessarily involve either significanttechnology adoption and/or significant capital or revenue expenditure.1 ScopeThis British Standard gives guidance on security management for anyorganization, whether large or small, public or p
21、rivate, to support its viability,productivity, reputation, sustainability and, ultimately, success. The standardclarifies the basic principles of security management and demonstrates howsecurity can be embedded in an organization.An organization might already have implemented security solutions that
22、 haveaddressed some or all of its requirements, and this standard can be used to assistin the monitoring and review of the organizations security management and todetermine how it might be improved.2 Terms and definitionsFor the purposes of this British Standard, the following terms and definitionsa
23、pply.2.1 countermeasureaction taken to counter or offset another action2.2 governing bodyindividual or group of people ultimately responsible and accountable for thelong-term direction and control of the organizationSOURCE: BS 13500:2013, 2.82.3 likelihoodchance of something happeningNOTE 1 In risk
24、management terminology, the word “likelihood” is used to refer tothe chance of something happening, whether defined, measured or determinedobjectively or subjectively, qualitatively or quantitatively, and described using generalterms or mathematically (such as a probability or a frequency over a giv
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BS160002015SECURITYMANAGEMENTSTRATEGICANDOPERATIONALGUIDELINES 安全管理 战略 操作 指南 PDF

链接地址:http://www.mydoc123.com/p-542786.html