BS 7799-3-2006 Information security management systems - Guidelines for information security risk management《信息安全管理系统 信息安全性风险管理指南》.pdf
《BS 7799-3-2006 Information security management systems - Guidelines for information security risk management《信息安全管理系统 信息安全性风险管理指南》.pdf》由会员分享,可在线阅读,更多相关《BS 7799-3-2006 Information security management systems - Guidelines for information security risk management《信息安全管理系统 信息安全性风险管理指南》.pdf(56页珍藏版)》请在麦多课文档分享上搜索。
1、BS 7799-3:2006Information security management systems Part 3: Guidelines for information security risk managementICS 35.020; 35.040NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBRITISH STANDARDLicensed Copy: Wang Bin, na, Mon May 15 04:08:52 BST 2006, Uncontrolled Copy, (c) B
2、SIPublishing and copyright informationThe BSI copyright notice displayed in this document indicates when the document was last issued. BSI 17 MARCH 2006ISBN 0 580 47247 7The following BSI references relate to the work on this standard:Committee reference BDD/2Draft for comment 05/30125021 DCPublicat
3、ion historyFirst published March 2006Amendments issued since publicationAmd. no. Date Text affectedBS 7799-3:20067Licensed Copy: Wang Bin, na, Mon May 15 04:08:52 BST 2006, Uncontrolled Copy, (c) BSI BSI MARCH 2006 iBS 7799-3:2006ContentsForeword iiIntroduction 11 Scope 42 Normative references 43 Te
4、rms and definitions 44 Information security risks in the organizational context 75 Risk assessment 96 Risk treatment and management decision-making 167 Ongoing risk management activities 21AnnexesAnnex A (informative) Examples of legal and regulatory compliance 26Annex B (informative) Information se
5、curity risks and organizational risks 30Annex C (informative) Examples of assets, threats, vulnerabilities and risk assessment methods 33Annex D (informative) Risk management tools 47Annex E (informative) Relationship between BS ISO/IEC 27001:2005 and BS 7799-3:2006 48Bibliography 49List of figuresF
6、igure 1 Risk management process model 1Figure C.1 Types of assets 33List of tablesTable C.1 Vulnerabilities related to human resources security 41Table C.2 Vulnerabilities related to physical and environmental security 42Table C.3 Vulnerabilities related to communications and operations management 4
7、2Table C.4 Vulnerabilities related to access control 43Table C.5 Vulnerabilities related to systems acquisition, development and maintenance 43Table C.6 Matrix with risk values 45Table C.7 Matrix ranking incidents by measures of risk 46Table E.1 Relationship between BS ISO/IEC 27001:2005 and BS 7799
8、-3:2006 48Summary of pagesThis document comprises a front cover, an inside front cover, pages i and ii, pages 1 to 50, an inside back cover and a back cover.Licensed Copy: Wang Bin, na, Mon May 15 04:08:52 BST 2006, Uncontrolled Copy, (c) BSIBS 7799-3:2006ii BSI MARCH 2006ForewordPublishing informat
9、ionThis British Standard was published by BSI and came into effect on 17 March 2006. It was prepared by Technical Committee BDD/2, Information security management.Relationship with other publicationsThis British Standard includes and replaces the existing BS 7799 guidance material provided in the BS
10、I publications PD 3002 and PD 3005.It is harmonized with other ISO/IEC work, in particular BS ISO/IEC 17799:2005 and BS ISO/IEC 27001:2005 (the revised version of BS 7799-2:2002) to ensure consistency of terminology and methods.Information about this documentThis British Standard provides guidance a
11、nd support for the implementation of BS 7799-2 and is generic enough to be of use to small, medium and large organizations. The guidance and advice given in this British Standard is not exhaustive and an organization might need to augment it with further guidance before it can be used as the basis f
12、or a risk management framework for BS ISO/IEC 27001:2005 (the revised version of BS 7799-2:2002).As a guide, this British Standard takes the form of guidance and recommendations. It should not be quoted as if it was a specification and particular care should be taken to ensure that claims of complia
13、nce are not misleading. Contractual and legal considerationsThis publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application.Compliance with a British Standard cannot confer immunity from legal obligations.Licensed Copy: Wang
14、Bin, na, Mon May 15 04:08:52 BST 2006, Uncontrolled Copy, (c) BSI BSI MARCH 2006 1BS 7799-3:20060Introduction0.1 GeneralThis British Standard has been prepared for those business managers and their staff involved in ISMS (Information Security Management System) risk management activities. It provide
15、s guidance and advice to specifically support the implementation of those requirements defined in BS ISO/IEC 27001:2005 that relate to risk management processes and associated activities. Table E.1 illustrates the relationship between the two documents.0.2 Process approachThis British Standard promo
16、tes the adoption of a process approach for assessing risks, treating risks, and ongoing risk monitoring, risk reviews and re-assessments. A process approach encourages its users to emphasize the importance of:a) understanding business information security requirements and the need to establish polic
17、y and objectives for information security;b) selecting, implementing and operating controls in the context of managing an organizations overall business risks;c) monitoring and reviewing the performance and effectiveness of the Information Security Management System (ISMS) to manage the business ris
18、ks;d) continual improvement based on objective risk measurement.See Figure 1.Figure 1 Risk management process modelThis risk management process focuses on providing the business with an understanding of risks to allow effective decision-making to control risks. The risk management process is an ongo
19、ing activity that aims to continuously improve its efficiency and effectiveness. Maintainand improve therisk controlsAssess andevaluatethe risksSelect, implementand operate controlsto treatthe risksMonitorand reviewthe risksClause 7 Ongoing riskmanagement activitiesClause 5 RiskassessmentClause 6 Ri
20、sktreatement andmanagementdecision makingClause 7 Ongoing riskmanagement activitiesLicensed Copy: Wang Bin, na, Mon May 15 04:08:52 BST 2006, Uncontrolled Copy, (c) BSIBS 7799-3:20062 BSI MARCH 2006The risk management process should be applied to the whole ISMS (as specified in BS ISO/IEC 27001:2005
21、), and new information systems should be integrated into the ISMS in the planning and design stage to ensure that any information security risks are appropriately managed. This document describes the elements and important aspects of this risk management process.The information security risks need t
22、o be considered in their business context, and the interrelationships with other business functions, such as human resources, research and development, production and operations, administration, IT, finance, and customers need to be identified, to achieve a holistic and complete picture of these ris
23、ks. This consideration includes taking account of the organizational risks, and applying the concepts and ideas of corporate governance. This, together with the organizations business, effectiveness, and the legal and regulatory environment all serve as drivers and motivators for a successful risk m
24、anagement process. These ideas are described in more detail in Clause 4.An important part of the risk management process is the assessment of information security risks, which is necessary to understand the business information security requirements, and the risks to the organizations business asset
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BS779932006INFORMATIONSECURITYMANAGEMENTSYSTEMSGUIDELINESFORINFORMATIONSECURITYRISKMANAGEMENT 信息 安全管理

链接地址:http://www.mydoc123.com/p-547051.html