BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf

上传人:ownview251 文档编号:396676 上传时间:2018-10-18 格式:PDF 页数:46 大小:2MB
下载 相关 举报
BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf_第1页
第1页 / 共46页
BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf_第2页
第2页 / 共46页
BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf_第3页
第3页 / 共46页
BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf_第4页
第4页 / 共46页
BS ISO IEC 27010-2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications《信息技术 安全技术 部门间和组织间.pdf_第5页
第5页 / 共46页
亲,该文档总共46页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、BSI Standards Publication BS ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communicationsBS ISO/IEC 27010:2015 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 27010:

2、2015. It supersedes BS ISO/IEC 27010:2012 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33/1, Information Security Management Systems. A list of organizations represented on this committee can be obtained on request to its secretary. This public

3、ation does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2015. Published by BSI Standards Limited 2015 ISBN 978 0 580 89580 7 ICS 35.040 Compliance with a British Standard cannot confer immunity

4、 from legal obligations. This British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 November 2015. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dBS ISO/IEC 27010:2015 Information technology Security techniques Information

5、 security management for inter-sector and inter-organizational communications Technologies de linformation Techniques de scurit Gestion de la scurit de linformation des communications intersectorielles et interorganisationnelles INTERNATIONAL STANDARD ISO/IEC 27010 Reference number ISO/IEC 27010:201

6、5(E) Second edition 2015-11-15 ISO/IEC 2015 BS ISO/IEC 27010:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or

7、 by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8

8、 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 27010:2015(E)BS ISO/IEC 27010:2015ISO/IEC 27010:2015(E)Foreword vi Introduction vii 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 C onc epts and justific

9、ation 1 4.1 Introduction 1 4.2 Information sharing communities . 2 4.3 Community management 2 4.4 Supporting entities 2 4.5 Inter-sector communication . 2 4.6 Conformity 3 4.7 Communications model 4 5 Information security policies 4 5.1 Management direction for information security . 4 5.1.1 Policie

10、s for information security 4 5.1.2 Review of the policies for information security 5 6 Organization of information security . 5 7 Human resource security 5 7.1 Prior to employment 5 7.1.1 Screening 5 7.1.2 Terms and conditions of employment . 5 7.2 During employment 5 7.3 Termination and change of e

11、mployment . 5 8 Asset management . 5 8.1 Responsibility for assets . 5 8.1.1 Inventory of assets . 5 8.1.2 Ownership of assets 5 8.1.3 Acceptable use of assets 6 8.1.4 Return of assets 6 8.2 Information classification 6 8.2.1 Classification of information . 6 8.2.2 Labelling of information 6 8.2.3 H

12、andling of assets . 6 8.3 Media handling . 6 8.4 Information exchanges protection . 7 8.4.1 Information dissemination . 7 8.4.2 Information disclaimers 7 8.4.3 Information credibility . 7 8.4.4 Information sensitivity reduction . 8 8.4.5 Anonymous source protection . 8 8.4.6 Anonymous recipient prot

13、ection . 8 8.4.7 Onwards release authority 9 9 Access control 9 10 Cryptography 9 10.1 Cryptographic controls 9 10.1.1 Policy on the use of cryptographic controls . 9 10.1.2 Key management . 9 11 Physical and environmental security 9 ISO/IEC 2015 All rights reserved iii Contents PageBS ISO/IEC 27010

14、:2015ISO/IEC 27010:2015(E)12 Operations security . 9 12.1 Operational procedures and responsibilities . 9 12.2 Protection from malware 10 12.2.1 Controls against malware 10 12.3 Backup .10 12.4 Logging and monitoring .10 12.4.1 Event logging 10 12.4.2 Protection of log information .10 12.4.3 Adminis

15、trator and operator logs 10 12.4.4 Clock synchronization 10 12.5 Control of operational software 10 12.6 Technical vulnerability management .10 12.7 Information systems audit considerations 10 12.7.1 Information systems audit controls .10 12.7.2 Community audit rights 10 13 Communications security 1

16、1 13.1 Network security management .11 13.2 Information transfer .11 13.2.1 Information transfer policies and procedures 11 13.2.2 Agreements on information transfer 11 13.2.3 Electronic messaging 11 13.2.4 Confidentiality or non-disclosure agreements .11 14 System acquisition, development and maint

17、enance 11 15 Supplier relationships .12 15.1 Information security in supplier relationships 12 15.1.1 Information security policy for supplier relationships .12 15.1.2 Addressing security within supplier agreements 12 15.1.3 Information and communication technology supply chain .12 15.2 Supplier ser

18、vice delivery management 12 16 Information security incident management 12 16.1 Management of information security incidents and improvements .12 16.1.1 Responsibilities and procedures .12 16.1.2 Reporting information security events .12 16.1.3 Reporting information security weaknesses 13 16.1.4 Ass

19、essment of, and decision on, information security events .13 16.1.5 Response to information security incidents .13 16.1.6 Learning from information security incidents 13 16.1.7 Collection of evidence . 13 16.1.8 Early warning system .13 17 Information security aspects of business continuity manageme

20、nt .13 17.1 Information security continuity 13 17.1.1 Planning information security continuity .13 17.1.2 Implementing information security continuity .14 17.1.3 Verify, review and evaluate information security continuity .14 17.2 Redundancies 14 18 Compliance 14 18.1 Compliance with legal and contr

21、actual requirements .14 18.1.1 Identification of applicable legislation and contractual requirements 14 18.1.2 Intellectual property rights .14 18.1.3 Protection of records .14 18.1.4 Privacy and protection of personally identifiable information 14 18.1.5 Regulation of cryptographic controls .14 18.

22、1.6 Liability to the information sharing community .14 18.2 Information security reviews 15 Annex A (informative) Sharing sensitive information 16 iv ISO/IEC 2015 All rights reservedBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E)Annex B (informative) Establishing trust in information exchanges 21 Annex C

23、 (informative) The T r affic Lig ht Pr ot oc ol 25 Annex D (informative) Models for organizing an information sharing community 26 Bibliography .32 ISO/IEC 2015 All rights reserved vBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) Foreword ISO (the International Organization for Standardization) and IEC (

24、the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with part

25、icular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have esta

26、blished a joint technical committee, ISO/IEC JTC 1. The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. T

27、his document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identify

28、ing any or all such patent rights. Details of any patent rights identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenienc

29、e of users and does not constitute an endorsement. For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following URL: Foreword - Su

30、pplementary information The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 27, IT Security techniques. This second edition cancels and replaces the first edition (ISO/IEC 27010:2012), which has been revised for compatibility with ISO/IEC 27001:2013 and ISO/IEC 2

31、7002:2013.vi ISO/IEC 2015 All rights reservedBS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) Introduction This International Standard is a sector-specific supplement to ISO/IEC 27001:2013 and ISO/IEC 27002:2013 for use by information sharing communities. The guidelines contained within this International

32、 Standard are in addition to, and complement, the generic guidance given within other members of the ISO/IEC 27000 family of standards. ISO/IEC 27001:2013 and ISO/IEC 27002:2013 address information exchange between organizations, but they do so in a generic manner. When organizations wish to communi

33、cate sensitive information to multiple other organizations, the originator must have confidence that its use in those other organizations will be subject to adequate security controls implemented by the receiving organizations. This can be achieved through the establishment of an information sharing

34、 community, where each member trusts the other members to protect the shared information, even though the organizations may otherwise be in competition with each other. An information sharing community cannot work without trust. Those providing information must be able to trust the recipients not to

35、 disclose or to act upon the data inappropriately. Those receiving information must be able to trust that information is accurate, subject to any qualifications notified by the originator. Both aspects are important, and must be supported by demonstrably effective security policies and the use of go

36、od practice. To achieve this, the community members must all implement a common management system covering the security of the shared information. This is an information security management system (ISMS) for the information sharing community. In addition, information sharing can take place between i

37、nformation sharing communities where not all recipients will be known to the originator. This will only work if there is adequate trust between the communities and their information sharing agreements. It is particularly relevant to the sharing of sensitive information between diverse communities, s

38、uch as different industry or market sectors. ISO/IEC 2015 All rights reserved viiBS ISO/IEC 27010:2015BS ISO/IEC 27010:2015Information technology Security techniques Information security management for inter-sector and inter-organizational communications 1 Scope This International Standard provides

39、guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. This International Standard provides controls and guidance specifically relating to initiating, implementing, maintaining, an

40、d improving information security in inter-organizational and inter- sector communications. It provides guidelines and general principles on how the specified requirements can be met using established messaging and other technical methods. This International Standard is applicable to all forms of exc

41、hange and sharing of sensitive information, both public and private, nationally and internationally, within the same industry or market sector or between sectors. In particular, it may be applicable to information exchanges and sharing relating to the provision, maintenance and protection of an orga

42、nizations or nation states critical infrastructure. It is designed to support the creation of trust when exchanging and sharing sensitive information, thereby encouraging the international growth of information sharing communities. 2 Normative references The following documents, in whole or in part,

43、 are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 27000:2014, Information technology Security

44、techniques Information security management systems Overview and vocabulary ISO/IEC 27001:2013, Information technology Security techniques Information security management systems Requirements ISO/IEC 27002:2013, Information technology Security techniques Code of practice for information security cont

45、rols 3 T erms a nd definiti ons For the purposes of this document, the terms and definitions in ISO/IEC 27000:2014 apply. 4 C onc epts and justi fication 4.1 Introduction ISMS guidance specific to inter-sector and inter-organizational communications has been identified in Clauses 5 to 18 of this Int

46、ernational Standard. ISO/IEC 27002:2013 defines controls that cover the exchange of information between organizations on a bilateral basis, and also controls for the general distribution of publicly available information. However, in some circumstances there exists a need to share information within

47、 a community of organizations where the information is sensitive in some way and cannot be made publicly available other than to INTERN A TION AL S T AND ARD ISO/IEC 27010:2015(E) ISO/IEC 2015 All rights reserved 1BS ISO/IEC 27010:2015ISO/IEC 27010:2015(E) members of the community. Often the informa

48、tion can only be made available to certain individuals within each member organization, or may have other security requirements such as anonymization of information. This International Standard defines additional potential controls and provides additional guidance and interpretation of ISO/IEC 27001

49、:2013 and ISO/IEC 27002:2013 in order to meet these requirements. There are four informative annexes. Annex A describes the potential benefits from sharing sensitive information between organizations. Annex B provides guidance on how members of an information sharing community can assess the degree of trust that can be placed in information provided by other members. Annex C describes the Traffic Light Protocol, a mechanism widely used in information sharing communities to indic

展开阅读全文
相关资源
  • BS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdfBS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdf
  • BS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdfBS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdf
  • BS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdfBS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdf
  • BS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdfBS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdf
  • BS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdfBS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdf
  • BS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdfBS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdf
  • BS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdfBS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdf
  • BS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdfBS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdf
  • BS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdfBS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdf
  • BS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdfBS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1