BS PD ISO IEC TR 27016-2014 Information technology Security techniques Information security management Organizational economics《信息技术 安全技术 信息安全管理 组织经济学》.pdf

上传人:王申宇 文档编号:398682 上传时间:2018-10-19 格式:PDF 页数:42 大小:2MB
下载 相关 举报
BS PD ISO IEC TR 27016-2014 Information technology Security techniques Information security management Organizational economics《信息技术 安全技术 信息安全管理 组织经济学》.pdf_第1页
第1页 / 共42页
BS PD ISO IEC TR 27016-2014 Information technology Security techniques Information security management Organizational economics《信息技术 安全技术 信息安全管理 组织经济学》.pdf_第2页
第2页 / 共42页
BS PD ISO IEC TR 27016-2014 Information technology Security techniques Information security management Organizational economics《信息技术 安全技术 信息安全管理 组织经济学》.pdf_第3页
第3页 / 共42页
BS PD ISO IEC TR 27016-2014 Information technology Security techniques Information security management Organizational economics《信息技术 安全技术 信息安全管理 组织经济学》.pdf_第4页
第4页 / 共42页
BS PD ISO IEC TR 27016-2014 Information technology Security techniques Information security management Organizational economics《信息技术 安全技术 信息安全管理 组织经济学》.pdf_第5页
第5页 / 共42页
亲,该文档总共42页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、BSI Standards Publication PD ISO/IEC TR 27016:2014 Information technology Security techniques Information security management Organizational economicsPD ISO/IEC TR 27016:2014 PUBLISHED DOCUMENT National foreword This Published Document is the UK implementation of ISO/IEC TR 27016:2014. The UK partic

2、ipation in its preparation was entrusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are resp

3、onsible for its correct application. The British Standards Institution 2014. Published by BSI Standards Limited 2014 ISBN 978 0 580 74023 7 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This Published Document was published under the authority of the St

4、andards Policy and Strategy Committee on 28 February 2014. Amendments issued since publication Date Text affectedPD ISO/IEC TR 27016:2014 ISO/IEC 2014 Information technology Security techniques Information security management Organizational economics Technologies de linformation Techniques de scurit

5、 Management de la scurit de linformation conomie organisationnelle TECHNICAL REPORT ISO/IEC TR 27016 First edition 2014-03-01 Reference number ISO/IEC TR 27016:2014(E)PD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E)ii ISO/IEC 2014 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2014 All rig

6、hts reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from e

7、ither ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in SwitzerlandPD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) ISO

8、/IEC 2014 All rights reserved iii Contents Page Foreword iv Introduction v 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 Abbreviated terms 3 5 Structure of this Document . 3 6 Information Security Economic Factors . 4 6.1 Management Decisions 4 6.2 Business Cases . 4 6.3 Stakeh

9、older Interests 7 6.4 Economic Decision Review . 8 7 Economic Objectives . 8 7.1 Introduction 8 7.2 Information Asset Valuations . 8 8 Balancing Information Security Economics for ISM .10 8.1 Introduction .10 8.2 Economic Benefits .11 8.3 Economic Costs 11 8.4 Applying Economic Calculations to ISM .

10、12 Annex A (informative) Identification of Stak eholders and Objecti v es for S etting V alues 17 Annex B (informative) Economic Decisions and Key Cost Decision Factors .19 Annex C (informative) Economic Models Appropriate for Information Security .22 Annex D (informative) Business Cases Calculation

11、 Examples 26 Bibliography .31PD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO o

12、r IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,

13、governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directive

14、s, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the nat

15、ional bodies casting a vote. In exceptional circumstances, when the joint technical committee has collected data of a different kind from that which is normally published as an International Standard (“state of the art”, for example), it may decide to publish a Technical Report. A Technical Report i

16、s entirely informative in nature and shall be subject to review every five years in the same manner as an International Standard. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identi

17、fying any or all such patent rights. ISO/IEC TR 27016 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques.iv ISO/IEC 2014 All rights reservedPD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) Introduction This Technical Report pro

18、vides guidelines on information security economics as a decision making process concerning the production, distribution, and consumption of limited goods and services. Actions for the protection of an organizations information assets require resources, which otherwise could be allocated to alternati

19、ve non-information security related uses. The reader of this Technical Report is primarily intended to be executive management who have delegated responsibility from the governing body for strategy and policy, e.g. Chief Executive Officers (CEOs), Heads of Government Organizations, Chief Financial O

20、fficers (CFOs), Chief Operating Officers (COOs), Chief Information Officers (CIOs), Chief Information Security Officers (CISOs) and similar roles. Information security management is often seen as an information technology only approach using technical controls (e.g. encryption, access and privilege

21、management, firewalls, and intrusion and malicious code eradication). However, any application of information security is not effective without considering a broad range of other controls (e.g. physical controls, human resource controls, policies and rules, etc.). A decision has to be made to alloca

22、te sufficient resources to support a broad range of controls as part of information security management. This Technical Report supports the broad objectives of information security as provided in the ISO/IEC 27000 family of standards by introducing economics as a key component of the decision making

23、 process. Coupled with a risk management approach (ISO/IEC 27005 5 ) and the ability to perform information security measurements (ISO/IEC 27004 4 ), economic factors need to be considered as part of information security management when planning, implementing, maintaining and improving the security

24、of the organizations information assets. In particular, economic justifications are required to ensure spending on information security is effective as opposed to using the resources in a less efficient way. Typically, economic benefits of information security management concern one or more of the f

25、ollowing: a) minimizing any negative impact to the organizations business objectives; b) ensuring any financial loss is acceptable; c) avoiding requirements for additional risk capital and contingency provisioning. Information security management may also produce benefits that are not driven by fina

26、ncial concerns alone. While these non-financial benefits are important, they are usually excluded from financial based economic analysis. Such benefits need to be quantified and included as part of the economic analysis. Examples include: a) enabling the business to participate in high-risk endeavou

27、rs; b) enabling the business to satisfy legal and regulatory obligations; c) managing customer expectations of the organization; d) managing community expectations of the organization; e) maintaining a trusted organizational reputation; f) providing assurance of completeness and accuracy of financia

28、l reporting. Negative financial and non-financial economic impacts as a result of a failure by the organization to provide adequate protection of its information assets are increasingly becoming a business issue. The value of information security management includes identifying a direct relationship

29、 between the cost of controls to prevent loss, and the cost benefit of avoiding a loss. Increasing levels of competition are resulting in the need for organizations to focus on the economics of risk. ISO/IEC 2014 All rights reserved vPD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) This Technical Re

30、port supplements the ISO/IEC 27000 family of standards by overlaying an economic perspective on protecting an organizations information assets in the context of the wider societal environment in which an organization operates.vi ISO/IEC 2014 All rights reservedPD ISO/IEC TR 27016:2014TECHNICAL REPOR

31、T ISO/IEC TR 27016:2014(E) Information technology Security techniques Information security management Organizational economics 1 Scope This Technical Report provides guidelines on how an organization can make decisions to protect information and understand the economic consequences of these decision

32、s in the context of competing requirements for resources. This Technical Report is applicable to all types and sizes of organizations and provides information to enable economic decisions in information security management by top management who have responsibility for information security decisions.

33、 2 Normative references The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amen

34、dments) applies. ISO/IEC 27000, Information technology Security techniques Information security management systems Overview and vocabulary 3 T erms a nd definiti ons For the purposes of this document, the terms and definitions given in ISO/IEC 27000 and the following apply. 3.1 annualized loss expec

35、tancy ALE monetary loss (3.13) that can be expected for an asset due to a risk over a one year period Note 1 to entry: ALE is defined as: ALE = SLE ARO, where SLE is the Single Loss Expectancy and ARO is the Annualized Rate of Occurrence. 3.2 direct value value that can be determined by a value of a

36、n identical replacement or substitute in the event of an information asset or assets being harmed or lost Note 1 to entry: This value is positive as long as the information asset is not harmed but seen as loss if the event occurs. 3.3 economic factor item or information that affects an assets value

37、3.22) 3.4 economic comparison consideration of competing or alternative cases for the allocation of resource ISO/IEC 2014 All rights reserved 1PD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) 3.5 e c onom ic ju s t i f ic at ion element of business case desiged to enable the allocation of resource

38、3.6 economic value added measure that compares net operating profit to total cost of capital 3.7 economics efficient use of limited resources 3.8 expected value value estimated as an impact to the business by an information asset being harmed or lost Note 1 to entry: This value is positive as long a

39、s the information asset is not harmed but seen as loss if the event occurs. 3.9 extended value expected value times the number of times that value might occur 3.10 indirect value value that is estimated for the replacement or restoring in the event of an information asset or assets being harmed or l

40、ost Note 1 to entry: This value is positive as long as the information asset is not harmed but seen as negative if the event occurs. 3.11 information security economics efficient use of limited resources for information security management 3.12 information security management ISM managing the preser

41、vation of confidentiality, integrity and availability of information 3.13 loss reduction in the value (3.22) of an asset Note 1 to entry: In terms of information security economics (3.11), a loss may also be used in the context as a positive value. In this document a cost is always negative unless o

42、therwise stated. 3.14 m a rk e t v a l u e highest price that a ready, willing and able buyer will pay and the lowest price a seller will accept 3.15 net present value sum of the present values (3.16) of the individual cash flows of the same entity 3.16 present value current worth of a future sum of

43、 money or stream of cash flows given a specified rate of return 3.17 n o n e c o n o m i c b e n e f i t benefit for which no payment has been made2 ISO/IEC 2014 All rights reservedPD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) 3.18 opportunity cost future estimated cost for a certain information

44、security activity or activities 3.19 opportunity value future estimated positive value gained from a certain information security activity or activities 3.20 regulatory requirements mandatory resource demands associated with a specific market 3.21 return on investment measurement per period rates of

45、 return on value invested in an economic entity 3.22 societal value public distinction between right and wrong 3.23 value relative worth of an asset to other objects or a defined absolute value Note 1 to entry: In terms of information security economics (3.11) a value may be positive or negative. In

46、 this document a value is always positive unless otherwise stated. 3.24 v a l u e - a t- r i s k VA R summarizes the worst loss (3.13) over a target time that will not be exceeded with a given probability Note 1 to entry: Target time for example could be 1 year and the given probability could also b

47、e referred to as confidence level. 4 Abbreviated terms BVM Basic Value Model CIA ConfidentialityIntegrityAvailability ICT Information and Communications Technology IRP Interest Rate Parity ISMS Information Security Management System ROI Return On Investment 5 Structure of this Document Fundamental t

48、o the organizational economics of information security management is the ability to enable economic values to be presented to management thereby enabling better factual based decisions regarding the resources to be applied to the protection of the organizations information assets. In this Technical

49、Report Clause 6 descibes information security economic factors and their relevance in management decision making. Clause 7 describes the economic objectives in terms of asset evaluations. Clause 8 describes how to apply an economic balance using information security benefits and costs in an organizational context in general and using examples depending on the category of a business case. ISO/IEC 2014 All rights reserved 3PD ISO/IEC TR 27016:2014ISO/IEC TR 27016:2014(E) These clauses are supported by a num

展开阅读全文
相关资源
  • BS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdfBS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdf
  • BS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdfBS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdf
  • BS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdfBS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdf
  • BS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdfBS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdf
  • BS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdfBS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdf
  • BS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdfBS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdf
  • BS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdfBS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdf
  • BS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdfBS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdf
  • BS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdfBS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdf
  • BS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdfBS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1