ImageVerifierCode 换一换
格式:PDF , 页数:46 ,大小:2MB ,
资源ID:396676      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-396676.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf)为本站会员(ownview251)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf

1、BSI Standards Publication BS ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communicationsBS ISO/IEC 27010:2015 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 27010:

2、2015. It supersedes BS ISO/IEC 27010:2012 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33/1, Information Security Management Systems. A list of organizations represented on this committee can be obtained on request to its secretary. This public

3、ation does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2015. Published by BSI Standards Limited 2015 ISBN 978 0 580 89580 7 ICS 35.040 Compliance with a British Standard cannot confer immunity

4、 from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 November 2015. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dBS ISO/IEC 27010:2015 Information technology Security techniques Information

5、 security management for inter-sector and inter-organizational communications Technologies de linformation Techniques de scurit Gestion de la scurit de linformation des communications intersectorielles et interorganisationnelles INTERNATIONAL STANDARD ISO/IEC 27010 Reference number ISO/IEC 27010:201

6、5(E) Second edition 2015-11-15 ISO/IEC 2015 BS ISO/IEC 27010:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or

7、 by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8

8、 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 27010:2015(E)BS ISO/IEC 27010:2015ISO/IEC 27010:2015(E)Foreword vi Introduction vii 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 C onc epts and justific

9、ation 1 4.1 Introduction 1 4.2 Information sharing communities . 2 4.3 Community management 2 4.4 Supporting entities 2 4.5 Inter-sector communication . 2 4.6 Conformity 3 4.7 Communications model 4 5 Information security policies 4 5.1 Management direction for information security . 4 5.1.1 Policie

10、s for information security 4 5.1.2 Review of the policies for information security 5 6 Organization of information security . 5 7 Human resource security 5 7.1 Prior to employment 5 7.1.1 Screening 5 7.1.2 Terms and conditions of employment . 5 7.2 During employment 5 7.3 Termination and change of e

11、mployment . 5 8 Asset management . 5 8.1 Responsibility for assets . 5 8.1.1 Inventory of assets . 5 8.1.2 Ownership of assets 5 8.1.3 Acceptable use of assets 6 8.1.4 Return of assets 6 8.2 Information classification 6 8.2.1 Classification of information . 6 8.2.2 Labelling of information 6 8.2.3 H

12、andling of assets . 6 8.3 Media handling . 6 8.4 Information exchanges protection . 7 8.4.1 Information dissemination . 7 8.4.2 Information disclaimers 7 8.4.3 Information credibility . 7 8.4.4 Information sensitivity reduction . 8 8.4.5 Anonymous source protection . 8 8.4.6 Anonymous recipient prot

13、ection . 8 8.4.7 Onwards release authority 9 9 Access control 9 10 Cryptography 9 10.1 Cryptographic controls 9 10.1.1 Policy on the use of cryptographic controls . 9 10.1.2 Key management . 9 11 Physical and environmental security 9 ISO/IEC 2015 All rights reserved iii Contents PageBS ISO/IEC 27010

14、:2015ISO/IEC 27010:2015(E)12 Operations security . 9 12.1 Operational procedures and responsibilities . 9 12.2 Protection from malware 10 12.2.1 Controls against malware 10 12.3 Backup .10 12.4 Logging and monitoring .10 12.4.1 Event logging 10 12.4.2 Protection of log information .10 12.4.3 Adminis

15、trator and operator logs 10 12.4.4 Clock synchronization 10 12.5 Control of operational software 10 12.6 Technical vulnerability management .10 12.7 Information systems audit considerations 10 12.7.1 Information systems audit controls .10 12.7.2 Community audit rights 10 13 Communications security 1

16、1 13.1 Network security management .11 13.2 Information transfer .11 13.2.1 Information transfer policies and procedures 11 13.2.2 Agreements on information transfer 11 13.2.3 Electronic messaging 11 13.2.4 Confidentiality or non-disclosure agreements .11 14 System acquisition, development and maint

17、enance 11 15 Supplier relationships .12 15.1 Information security in supplier relationships 12 15.1.1 Information security policy for supplier relationships .12 15.1.2 Addressing security within supplier agreements 12 15.1.3 Information and communication technology supply chain .12 15.2 Supplier ser

18、vice delivery management 12 16 Information security incident management 12 16.1 Management of information security incidents and improvements .12 16.1.1 Responsibilities and procedures .12 16.1.2 Reporting information security events .12 16.1.3 Reporting information security weaknesses 13 16.1.4 Ass

19、essment of, and decision on, information security events .13 16.1.5 Response to information security incidents .13 16.1.6 Learning from information security incidents 13 16.1.7 Collection of evidence . 13 16.1.8 Early warning system .13 17 Information security aspects of business continuity manageme

20、nt .13 17.1 Information security continuity 13 17.1.1 Planning information security continuity .13 17.1.2 Implementing information security continuity .14 17.1.3 Verify, review and evaluate information security continuity .14 17.2 Redundancies 14 18 Compliance 14 18.1 Compliance with legal and contr

21、actual requirements .14 18.1.1 Identification of applicable legislation and contractual requirements 14 18.1.2 Intellectual property rights .14 18.1.3 Protection of records .14 18.1.4 Privacy and protection of personally identifiable information 14 18.1.5 Regulation of cryptographic controls .14 18.

22、1.6 Liability to the information sharing community .14 18.2 Information security reviews 15 Annex A (informative) Sharing sensitive information 16 iv ISO/IEC 2015 All rights reservedBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E)Annex B (informative) Establishing trust in information exchanges 21 Annex C

23、 (informative) The T r affic Lig ht Pr ot oc ol 25 Annex D (informative) Models for organizing an information sharing community 26 Bibliography .32 ISO/IEC 2015 All rights reserved vBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) Foreword ISO (the International Organization for Standardization) and IEC (

24、the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with part

25、icular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have esta

26、blished a joint technical committee, ISO/IEC JTC 1. The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. T

27、his document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identify

28、ing any or all such patent rights. Details of any patent rights identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenienc

29、e of users and does not constitute an endorsement. For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following URL: Foreword - Su

30、pplementary information The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 27, IT Security techniques. This second edition cancels and replaces the first edition (ISO/IEC 27010:2012), which has been revised for compatibility with ISO/IEC 27001:2013 and ISO/IEC 2

31、7002:2013.vi ISO/IEC 2015 All rights reservedBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) Introduction This International Standard is a sector-specific supplement to ISO/IEC 27001:2013 and ISO/IEC 27002:2013 for use by information sharing communities. The guidelines contained within this International

32、 Standard are in addition to, and complement, the generic guidance given within other members of the ISO/IEC 27000 family of standards. ISO/IEC 27001:2013 and ISO/IEC 27002:2013 address information exchange between organizations, but they do so in a generic manner. When organizations wish to communi

33、cate sensitive information to multiple other organizations, the originator must have confidence that its use in those other organizations will be subject to adequate security controls implemented by the receiving organizations. This can be achieved through the establishment of an information sharing

34、 community, where each member trusts the other members to protect the shared information, even though the organizations may otherwise be in competition with each other. An information sharing community cannot work without trust. Those providing information must be able to trust the recipients not to

35、 disclose or to act upon the data inappropriately. Those receiving information must be able to trust that information is accurate, subject to any qualifications notified by the originator. Both aspects are important, and must be supported by demonstrably effective security policies and the use of go

36、od practice. To achieve this, the community members must all implement a common management system covering the security of the shared information. This is an information security management system (ISMS) for the information sharing community. In addition, information sharing can take place between i

37、nformation sharing communities where not all recipients will be known to the originator. This will only work if there is adequate trust between the communities and their information sharing agreements. It is particularly relevant to the sharing of sensitive information between diverse communities, s

38、uch as different industry or market sectors. ISO/IEC 2015 All rights reserved viiBS ISO/IEC 27010:2015BS ISO/IEC 27010:2015Information technology Security techniques Information security management for inter-sector and inter-organizational communications 1 Scope This International Standard provides

39、guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. This International Standard provides controls and guidance specifically relating to initiating, implementing, maintaining, an

40、d improving information security in inter-organizational and inter- sector communications. It provides guidelines and general principles on how the specified requirements can be met using established messaging and other technical methods. This International Standard is applicable to all forms of exc

41、hange and sharing of sensitive information, both public and private, nationally and internationally, within the same industry or market sector or between sectors. In particular, it may be applicable to information exchanges and sharing relating to the provision, maintenance and protection of an orga

42、nizations or nation states critical infrastructure. It is designed to support the creation of trust when exchanging and sharing sensitive information, thereby encouraging the international growth of information sharing communities. 2 Normative references The following documents, in whole or in part,

43、 are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 27000:2014, Information technology Security

44、techniques Information security management systems Overview and vocabulary ISO/IEC 27001:2013, Information technology Security techniques Information security management systems Requirements ISO/IEC 27002:2013, Information technology Security techniques Code of practice for information security cont

45、rols 3 T erms a nd definiti ons For the purposes of this document, the terms and definitions in ISO/IEC 27000:2014 apply. 4 C onc epts and justi fication 4.1 Introduction ISMS guidance specific to inter-sector and inter-organizational communications has been identified in Clauses 5 to 18 of this Int

46、ernational Standard. ISO/IEC 27002:2013 defines controls that cover the exchange of information between organizations on a bilateral basis, and also controls for the general distribution of publicly available information. However, in some circumstances there exists a need to share information within

47、 a community of organizations where the information is sensitive in some way and cannot be made publicly available other than to INTERN A TION AL S T AND ARD ISO/IEC 27010:2015(E) ISO/IEC 2015 All rights reserved 1BS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) members of the community. Often the informa

48、tion can only be made available to certain individuals within each member organization, or may have other security requirements such as anonymization of information. This International Standard defines additional potential controls and provides additional guidance and interpretation of ISO/IEC 27001

49、:2013 and ISO/IEC 27002:2013 in order to meet these requirements. There are four informative annexes. Annex A describes the potential benefits from sharing sensitive information between organizations. Annex B provides guidance on how members of an information sharing community can assess the degree of trust that can be placed in information provided by other members. Annex C describes the Traffic Light Protocol, a mechanism widely used in information sharing communities to indic

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1