ImageVerifierCode 换一换
格式:PDF , 页数:118 ,大小:3.60MB ,
资源ID:682863      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-682863.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(DIN EN ISO IEC 27040-2017 Information technology - Security techniques - Storage security (ISO IEC 27040 2015) German version EN ISO IEC 27040 2016《信息技术 安全技术 存储安全(ISO IEC 27040-201.pdf)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

DIN EN ISO IEC 27040-2017 Information technology - Security techniques - Storage security (ISO IEC 27040 2015) German version EN ISO IEC 27040 2016《信息技术 安全技术 存储安全(ISO IEC 27040-201.pdf

1、March 2017 English price group 34No part of this translation may be reproduced without prior permission ofDIN Deutsches Institut fr Normung e. V., Berlin. Beuth Verlag GmbH, 10772 Berlin, Germany,has the exclusive right of sale for German Standards (DIN-Normen).ICS 35.030!%bVc“2635164www.din.deDIN E

2、N ISO/IEC 27040Information technology Security techniques Storage security (ISO/IEC 27040:2015);English version EN ISO/IEC 27040:2016,English translation of DIN EN ISO/IEC 27040:2017-03Informationstechnik ITSicherheitsverfahren Speichersicherheit (ISO/IEC 27040:2015);Englische Fassung EN ISO/IEC 270

3、40:2016,Englische bersetzung von DIN EN ISO/IEC 27040:2017-03Technologie de linformation Techniques de scurit Scurit de stockage (ISO/IEC 27040:2015);Version anglaise EN ISO/IEC 27040:2016,Traduction anglaise de DIN EN ISO/IEC 27040:2017-03www.beuth.deDocument comprises 118 pagesDTranslation by DIN-

4、Sprachendienst.In case of doubt, the German-language original shall be considered authoritative.03.17 DIN EN ISO/IEC 27040:2017-03 2 A comma is used as the decimal marker. National foreword This document (EN ISO/IEC 27040:2016) has been prepared by Technical Committee ISO/IEC JTC 1, Subcommittee SC

5、27 “IT Security techniques” (Secretariat: DIN, Germany). Based on a decision of CEN/BT, ISO/IEC 27040:2015 has been submitted to the Unique Acceptance Procedure (UAP) and taken over as EN ISO/IEC 27040:2016 without any modification. The responsible German body involved in its preparation was DIN-Nor

6、menausschuss Informationstechnik und Anwendungen (DIN Standards Committee Information Technology and selected IT Applications), Working Committee NA 043-01-27-04 AK IT-Sicherheitsmanahmen und Dienste. The DIN Standards corresponding to the International Standards referred to in this document are as

7、follows: ISO/IEC 17788:2014 DIN ISO/IEC 17788:2016-04 ISO/IEC 27000 DIN ISO/IEC 27000*)ISO/IEC 27001:2013 DIN ISO/IEC 27001:2015-03 National Annex NA (informative) Bibliography DIN ISO/IEC 17788, Information technology Cloud computing Overview and vocabulary E DIN ISO/IEC 27000, Information technolo

8、gy Security techniques Information security management systems Overview and vocabulary DIN ISO/IEC 27001, Information technology Security techniques Information security management systems Requirements (ISO/IEC 27001:2013 + Cor. 1:2014) *)In preparation. EUROPEAN STANDARD NORME EUROPENNE EUROPISCHE

9、NORM EN ISO/IEC 27040 August 2016 ICS 35.040 English Version Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) Technologie de linformation - Techniques de scurit - Scurit de stockage (ISO/IEC 27040:2015) Informationstechnik - IT-Sicherheitsverfahren - Speichersiche

10、rheit (ISO/IEC 27040:2015) This European Standard was approved by CEN on 19 June 2016. CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration. Up-t

11、o-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN and CENELEC member. This European Standard exists in three official versions (English, French, German). A version in any other language mad

12、e by translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the same status as the official versions. CEN and CENELEC members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech

13、Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EURO

14、PEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels 2016 CEN and CENELEC All rights of exploitation in any form and by any means reserved worldwide for CEN and CENELEC national Members. Ref.

15、 No. EN ISO/IEC 27040:2016 E Contents PageEuropean foreword .4Introduction 61 Scope . 72 Normative references 73 Terms and definitions . 74 Symbols and abbreviated terms . 135 Overview and concepts .175.1 General 175.2 Storage concepts . 185.3 Introduction to storage security . 185.4 Storage securit

16、y risks . 205.4.1 Background205.4.2 Data breaches 215.4.3 Data corruption or destruction 225.4.4 Temporary or permanent loss of access/availability 225.4.5 Failure to meet statutory, regulatory, or legal requirements 236 Supporting controls 236.1 General 236.2 Direct Attached Storage (DAS) . 236.3 S

17、torage networking 246.3.1 Background246.3.2 Storage Area Networks (SAN) . 246.3.3 Network Attached Storage (NAS) .296.4 Storage management 306.4.1 Background306.4.2 Authentication and authorization 326.4.3 Secure the management interfaces .336.4.4 Security auditing, accounting, and monitoring 346.4.

18、5 System hardening .366.5 Block-based storage . 376.5.1 Fibre Channel (FC) storage 376.5.2 IP storage . 376.6 File-based storage . 386.6.1 NFS-based NAS .386.6.2 SMB/CIFS-based NAS 396.6.3 Parallel NFS-based NAS . 396.7 Object-based storage 406.7.1 Cloud computing storage . 406.7.2 Object-based Stor

19、age Device (OSD) .416.7.3 Content Addressable Storage (CAS) .426.8 Storage security services . 436.8.1 Data sanitization .436.8.2 Data confidentiality 466.8.3 Data reductions 48DIN EN ISO/IEC 27040:2017-03 EN ISO/IEC 27040:2016 (E) 2Foreword 57 Guidelines for the design and implementation of storage

20、 security .497.1 General 497.2 Storage security design principles 497.2.1 Defence in depth .497.2.2 Security domains 507.2.3 Design resilience .517.2.4 Secure initialization517.3 Data reliability, availability, and resilience 517.3.1 Reliability 517.3.2 Availability527.3.3 Backups and replication .5

21、27.3.4 Disaster Recovery and Business Continuity 537.3.5 Resilience 547.4 Data retention . 547.4.1 Long-term retention 547.4.2 Short to medium-term retention 557.5 Data confidentiality and integrity 567.6 Virtualization . 587.6.1 Storage virtualization .587.6.2 Storage for virtualized systems 597.7

22、Design and implementation considerations 607.7.1 Encryption and key management issues .607.7.2 Align storage and policy .617.7.3 Compliance 617.7.4 Secure multi-tenancy 627.7.5 Secure autonomous data movement .63Annex A (normative) Media sanitization 65Annex B (informative) Selecting appropriate sto

23、rage security controls .81Annex C (informative) Important security concepts .101Bibliography . 114DIN EN ISO/IEC 27040:2017-03 EN ISO/IEC 27040:2016 (E) 3 European foreword The text of ISO/IEC 27040:2015 has been prepared by Technical Committee ISO/IEC JTC 1 “Information technology” of the Internati

24、onal Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) and has been taken over as EN ISO/IEC 27040:2016. This European Standard shall be given the status of a national standard, either by publication of an identical text or by endorsement, at the latest b

25、y February 2017, and conflicting national standards shall be withdrawn at the latest by February 2017. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all suc

26、h patent rights. According to the CEN-CENELEC Internal Regulations, the national standards organizations of the following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Maced

27、onia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. Endorsement notice The text of ISO/IEC 27040:2015 has been approved by

28、 CEN as EN ISO/IEC 27040:2016 without any modification. DIN EN ISO/IEC 27040:2017-03 EN ISO/IEC 27040:2016 (E) 4 ForewordISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. Nationa

29、l bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. O

30、ther international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.The procedures used to develop this document and those intende

31、d for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org

32、/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights identified during the development of the document

33、will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement.For an explanation on the meaning of ISO specific terms and expr

34、essions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following URL: Foreword - Supplementary informationThe committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 27,

35、 Security techniques.DIN EN ISO/IEC 27040:2017-03 EN ISO/IEC 27040:2016 (E) 5 IntroductionMany organizations face the challenge of implementing data protection and security measures to meet a wide range of requirements, including statutory and regulatory compliance. Too often the security associated

36、 with storage systems and infrastructure has been missed because of misconceptions and limited familiarity with the storage technology, or in the case of storage managers and administrators, a limited understanding of the inherent risks or basic security concepts. The net result of this situation is

37、 that digital assets are needlessly placed at risk of compromise due to data breaches, intentional corruption, being held hostage, or other malicious events.Data storage has matured in an environment where security has been a secondary concern due to its historical reliance on isolated connectivity,

38、 specialized technologies, and the physical security of data centres. Even as storage connectivity evolved to use technologies such as storage protocols over Transmission Control Protocol/Internet Protocol (TCP/IP), few users took advantage of either the inherent security mechanisms or the recommend

39、ed security measures.This International Standard provides guidelines for storage security in an organization, supporting in particular the requirements of an Information Security Management System (ISMS) according to ISO/IEC 27001. This International Standard recommends the information security risk

40、 management approach as defined in ISO/IEC 27005. It is up to the organization to define their approach to risk management, depending for example on the scope of the ISMS, context of risk management, or industry sector. A number of existing methodologies can be used under the framework described in

41、this International Standard to implement the requirements of an ISMS.This International Standard is relevant to managers and staff concerned with information security risk management within an organization and, where appropriate, external parties supporting such activities.The objectives for this In

42、ternational Standard are the following: help draw attention to the risks; assist organizations in better securing their data when stored; provide a basis for auditing, designing, and reviewing storage security controls.It is emphasized that ISO/IEC 27040 provides further detailed implementation guid

43、ance on the storage security controls that are described at a basic standardized level in ISO/IEC 27002.It should be noted that this International Standard is not a reference or normative document for regulatory and legislative security requirements. Although it emphasizes the importance of these in

44、fluences, it cannot state them specifically, since they are dependent on the country, the type of business, etc.DIN EN ISO/IEC 27040:2017-03 EN ISO/IEC 27040:2016 (E) 6 1 ScopeThis International Standard provides detailed technical guidance on how organizations can define an appropriate level of ris

45、k mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection (security) of information where it is stored and to the security of the information being transferred across

46、 the communication links associated with storage. Storage security includes the security of devices and media, the security of management activities related to the devices and media, the security of applications and services, and security relevant to end-users during the lifetime of devices and medi

47、a and after end of use.Storage security is relevant to anyone involved in owning, operating, or using data storage devices, media, and networks. This includes senior managers, acquirers of storage product and service, and other non-technical managers or users, in addition to managers and administrat

48、ors who have specific responsibilities for information security or storage security, storage operation, or who are responsible for an organizations overall security program and security policy development. It is also relevant to anyone involved in the planning, design, and implementation of the architectural aspects of storage network security.This International Standard provides an overview of storage security concepts and related definitions. It

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1