ISO27001-2013-信息安全管理体系要求-中英对照版_第1页
ISO27001-2013-信息安全管理体系要求-中英对照版_第2页
ISO27001-2013-信息安全管理体系要求-中英对照版_第3页
ISO27001-2013-信息安全管理体系要求-中英对照版_第4页
ISO27001-2013-信息安全管理体系要求-中英对照版_第5页
已阅读5页,还剩77页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

ISO标准——IEC27001:2013信息安全管理体系——要求ReferencenumberISO/IEC27001:2013(E1范围1Scope本国际标准规定了在组织背景下建立、实施、维护和持续改进信息安全管理体系。本标准还包括信息安全风险评估和处置要求,可裁剪以适用于组织。本国际标准的要求是通用的,适用于所有的组织,不考虑类型、规模和特征。当组织声称符合本国际标准时,任何条款4-10的排除是不可接受的。ThisInternationalStandardspecifiestherequirementsforestablishing,implementing,maintainingandcontinuallyimprovinganinformationsecuritymanagementsystemwithinthecontextoftheorganization.ThisInternationalStandardalsoincludesrequirementsfortheassessmentandtreatmentofinformationsecurityriskstailoredtotheneedsoftheorganization.TherequirementssetoutinthisInternationalStandardaregenericandareintendedtobeapplicabletoallorganizations,regardlessoftype,sizeornature.ExcludinganyoftherequirementsspecifiedinClauses4to10isnotacceptablewhenanorganizationclaimsconformitytothisInternationalStandard.2规范性引用文件下列参考文件是本文件的标准参考,也是应用本文件必不可缺的。对于标注日期的引用文件,仅适用于引用版本。对于不标注日期的引用文件,适用于最新版本的引用文件。ISO/IEC27000,信息技术—安全技术—信息安全管理体系-简介和词汇表。2NormativereferencesThefollowingdocuments,inwholeorinpart,arenormativelyreferencedinthisdocumentandareindispensableforitsapplication.Fordatedreferences,onlytheeditioncitedapplies.Forundatedreferences,thelatesteditionofthereferenceddocument(includinganyamendmentsapplies.ISO/IEC27000,Informationtechnology—Securitytechniques—Informationsecuritymanagementsystems—Overviewandvocabulary3术语和定义ISO27000的术语和定义适用于本文件3TermsanddefinitionsForthepurposesofthisdocument,thetermsanddefinitionsgiveninISO/IEC27000apply.4.组织环境4.1理解组织及其环境组织应当确定与信息安全管理体系目的相关联及影响其实现预期结果能力的外部及内部环境。注:确定这些问题参考ISO31000:2009中5.3条款的建立组织外部和内部环境;4.2理解相关方的需求和期望组织应确定:a信息安全管理体系的利益相关方;b这些利益相关方的信息安全相关要求;注:利益相关方的要求可能包括法律、法规要求和合同责任。4.3确定信息安全管理体系范围组织应确定信息安全管理体系的边界和应用性,以建立其范围。当确定此范围时,组织应考虑:a4.1所提及的外部和内部问题;b4.2所提及的要求;c接口和组织执行的活动之间的依赖关系,以及其他组织执行的活动。范围应成为文件化信息。4.4信息安全管理体系组织应按照本国际标准的要求建立、实施、维护和持续改进信息安全管理体系。4Contextoftheorganization4.1UnderstandingtheorganizationanditscontextTheorganizationshalldetermineexternalandinternalissuesthatarerelevanttoitspurposeandthataffectitsabilitytoachievetheintendedoutcome(sofitsinformationsecuritymanagementsystem.NOTE:DeterminingtheseissuesreferstoestablishingtheexternalandinternalcontextoftheorganizationconsideredinClause5.3ofISO31000:2009.4.2UnderstandingtheneedsandexpectationsofinterestedpartiesTheorganizationshalldetermine:ainterestedpartiesthatarerelevanttotheinformationsecuritymanagementsystem;andbtherequirementsoftheseinterestedpartiesrelevanttoinformationsecurity.NOTE:Therequirementsofinterestedpartiesmayincludelegalandregulatoryrequirementsandcontractualobligations.4.3DeterminingthescopeoftheinformationsecuritymanagementsystemTheorganizationshalldeterminetheboundariesandapplicabilityoftheinformationsecuritymanagementsystemtoestablishitsscope.Whendeterminingthisscope,theorganizationshallconsider:atheexternalandinternalissuesreferredtoin4.1;btherequirementsreferredtoin4.2;andcinterfacesanddependenciesbetweenactivitiesperformedbytheorganisation,andthosethatareperformedbyotherorganisations.Thescopeshallbeavailableasdocumentedinformation.4.4InformationsecuritymanagementsystemTheorganizationshallestablish,implement,maintainandcontinuallyimproveaninformationsecuritymanagementsystem,inaccordancewiththerequirementsofthisInternationalStandard.5.领导力5.1领导力和承诺最高管理者应当展示关注信息安全管理体系的领导力和承诺,通过:a确保建立信息安全方针和信息安全目标,并与组织的战略方向兼容;b确保信息安全管理体系要求融合到组织的流程中;5Leadership5.1LeadershipandcommitmentTopmanagementshalldemonstrateleadershipandcommitmentwithrespecttotheinformationsecuritymanagementsystemby:aensuringtheinformationsecuritypolicyandtheinformationsecurityobjectivesareestablishedandarecompatiblewiththestrategicdirectionoftheorganization;bensuringtheintegrationoftheinformationsecuritymanagementc确保信息安全体系所需要的资源;d沟通有效信息安全管理的重要性,并符合信息安全管理体系的要求;e确保信息安全管理体系达到预期的成果;f指导和支持员工对信息安全管理体系的有效性做出贡献;g促进持续改进;h支持其他相关管理角色来展示其领导力,当适用其职责范围时。5.2方针最高管理层应建立一个信息安全方针:a与组织的目标相关适应;b包括信息安全目标(见6.2,或提供制定信息安全目标的框架;c包括满足适用信息安全要求的承诺;d包括信息安全管理体系持续改进的承诺;信息安全方针应:e成为文件化的信息;f在组织内部沟通;g适当时,提供给利益相关方;5.3组织角色、职责和权限最高管理层应确保信息安全相关角色的职责和权限的分配和沟通。最高管理层应指定责任和授权,以:a确保信息安全管理体系符合本国际标准的要求;b将信息安全管理体系绩效报告给最高管理层;注:最高管理层可以为组织内信息安全管理体系绩效报告指派职责和授权。systemrequirementsintotheorganization’sprocesses;censuringthattheresourcesneededfortheinformationsecuritymanagementsystemareavailable;dcommunicatingtheimportanceofeffectiveinformationsecuritymanagementandconformingtotheinformationsecuritymanagementsystemrequirements;eensuringthattheinformationsecuritymanagementsystemachievesitsintendedoutcome(s;fdirectingandsupportingpersonstocontributetotheeffectivenessoftheinformationsecuritymanagementsystem;gpromotingcontinualimprovement;andhsupportingotherrelevantmanagementrolestodemonstratetheirleadershipasitappliestotheirareasofresponsibility.5.2PolicyTopmanagementshallestablishaninformationsecuritypolicythat:aisappropriatetothepurposeoftheorganization;bincludesinformationsecurityobjectives(see6.2orprovidestheframeworkforsettinginformationsecurityobjectives;cincludesacommitmenttosatisfyapplicablerequirementsrelatedtoinformationsecurity;anddincludesacommitmenttocontinualimprovementoftheinformationsecuritymanagementsystem.Theinformationsecuritypolicyshall:ebeavailableasdocumentedinformation;fbecommunicatedwithintheorganization;andgbeavailabletointerestedparties,asappropriate.5.3Organizationalroles,responsibilitiesandauthoritiesTopmanagementshallensurethattheresponsibilitiesandauthoritiesforrolesrelevanttoinformationsecurityareassignedandcommunicated.Topmanagementshallassigntheresponsibilityandauthorityfor:aensuringthattheinformationsecuritymanagementsystemconformstotherequirementsofthisInternationalStandard;andbreportingontheperformanceoftheinformationsecuritymanagementsystemtotopmanagement.NOTE:Topmanagementmayalsoassignresponsibilitiesandauthoritiesforreportingperformanceoftheinformationsecuritymanagementsystemwithintheorganization.6.策划6.1针对风险和机会所采取的措施6.1.1总则当进行信息安全管理体系策划时,组织应6Planning6.1Actionstoaddressrisksandopportunities6.1.1GeneralWhenplanningfortheinformationsecuritymanagementsystem,theorganization当考虑在4.1条款中提到的事宜及4.2条款中规定的要求,并确定需要关注的风险和机会,以:a确保信息安全管理体系能够实现其预期结果b预防或降低不希望得到的影响c实现持续改进组织应当计划:d针对这些风险和机会所采取的措施,以及e如何1将这些措施整合进信息安全管理体系过程之中,2评价这些措施的有效性6.1.2信息安全风险评估组织应定义和应用信息安全风险评估流程,以:a建立和维护信息安全标准,包括1风险接受准则;2执行信息安全风险评估准则;b确保可重复的信息安全风险评估生成一致、有效和可比较的结果c识别信息安全风险1应用信息安全风险评估流程,识别ISMS范围内信息保密性、完整性和可用性损失的风险;2识别风险所有者;d分析信息安全风险1评估在6.1.2c1中识别风险导致的潜在后果2评估在6.1.2c1中识别风险发生的可能性3确定风险等级e评估信息安全风险1风险分析结果与6.1.2a中建立的风险准则进行比较2为风险处置,建立风险优先级和分析组织应保留文件化的信息安全风险评估流程信息shallconsidertheissuesreferredtoin4.1andtherequirementsreferredtoin4.2anddeterminetherisksandopportunitiesthatneedtobeaddressedto:aensuretheinformationsecuritymanagementsystemcanachieveitsintendedoutcome(s;bprevent,orreduce,undesiredeffects;andcachievecontinualimprovement.Theorganizationshallplan:dactionstoaddresstheserisksandopportunities,andehowto1integrateandimplementtheactionsintoitsinformationsecuritymanagementsystemprocesses;and2evaluatetheeffectivenessoftheseactions.6.1.2InformationsecurityriskassessmentTheorganizationshalldefineandapplyaninformationsecurityriskassessmentprocessthat:aestablishesandmaintainsinformationsecuritycriteriathatinclude:1theriskacceptancecriteria;and2criteriaforperforminginformationsecurityriskassessments;bensuresthatrepeatedinformationsecurityriskassessmentsproduceconsistent,validandcomparableresults.cIdentifytheinformationsecurityrisks.1Applytheinformationsecurityriskassessmentprocesstoidentifyrisksassociatedwiththelossofconfidentiality,integrityandavailabilityforinformationwithinthescopeoftheinformationsecuritymanagementsystem;and2Identifytheriskowners.dAnalysestheinformationsecurityrisks.1Assessthepotentialconsequencesthatwouldresultiftherisksidentifiedin6.1.2c1weretomaterialize.2Assesstherealisticlikelihoodoftheoccurrenceoftherisksidentifiedin6.1.2c1.and3Determinethelevelsofrisk.eEvaluatetheinformationsecurityrisks.1Comparetheresultsofriskanalysiswiththeriskcriteriaestablishedin6.1.2a;and2prioritizetheanalysedrisksforrisktreatment.Theorganizationshallretaindocumentedinformationabouttheinformationsecurityriskassessmentprocess.6.1.3信息安全风险处置组织应定义和应用信息安全风险处置流程,以:a选择适当的信息安全风险处置选项,考虑风险评估结果;b确定实施所选信息安全风险处置选项所需的所有控制措施;注:组织可设计所需的控制措施,或从任何来源中识别它们c比较6.1.3b中与附录A中的措施项,确认没有忽略必要的控制项;注1:附录A包含控制目标和控制措施的完整列表。本国际标准的用户应确保附录A的重要控制措施没有被忽略注2:控制目标隐含在所选择的控制项中。附录A中的控制目标和控制措施并不全面,可能还需要额外的控制目标和控制措施。d制作适用性声明,包括必要的控制措施(见6.1.3b和c和选择的理由,无论实施与否,应说明删减附录A中控制措施的理由;e制定信息安全风险处置计划;f获得风险所有者批准信息安全风险处置计划和残余信息安全风险接受标准;组织应保留信息安全风险处置过程的文件化信息。注:本国际标准中信息安全风险评估和处置过程与ISO31000中的原则和通用指南一致。6.2信息安全目标及实现其目标的策划组织应当在相关职能及层次上建立信息安全目标。信息安全目标应:a与信息安全方针保持一致;b是可测量的(如果可行;c考虑适用的信息安全要求,以及风险评估和风险处置的结果;d是可沟通的;6.1.3InformationsecurityrisktreatmentTheorganizationshalldefineandapplyaninformationsecurityrisktreatmentprocessto:aselectappropriateinformationsecurityrisktreatmentoptions,takingaccountoftheriskassessmentresults;bdetermineallcontrolsthatarenecessarytoimplementtheinformationsecurityrisktreatmentoption(schosen;NOTE:Organizationscandesigncontrolsasrequired,oridentifythemfromanysource.ccomparethecontrolsdeterminedin6.1.3babovewiththoseinAnnexAandverifythatnonecessarycontrolshavebeenomitted;NOTE1:AnnexAcontainsacomprehensivelistofcontrolobjectivesandcontrols.UsersofthisInternationalStandardaredirectedtoAnnexAtoensurethatnoimportantcontrolareoverlookedNOTE2:Controlobjectivesareimplicitlyincludedinthecontrolschosen.ThecontrolobjectivesandcontrolslistedinAnnexAarenotexhaustiveandadditionalcontrolobjectivesandcontrolsmayalsobeneeded.dproduceaStatementofApplicabilitythatcontainsthenecessarycontrols(see6.1.3bandcandjustificationforinclusions,whethertheyareimplementedornot,andthejustificationforexclusionsofcontrolsinAnnexA;eformulateaninformationsecurityrisktreatmentplan;andfobtainriskowner’sapprovaloftheinformationsecurityrisktreatmentplanandtheacceptanceoftheresidualinformationsecurityrisks.Theorganizationshallretaindocumentedinformationabouttheinformationsecurityrisktreatmentprocess.NOTE:TheinformationsecurityriskassessmentandtreatmentprocessinthisInternationalStandardalignswiththeprinciplesandgenericguidelinesprovidedinISO31000.6.2InformationsecurityobjectivesandplaningtoachievethemTheorganizationshallestablishinformationsecurityobjectivesatrelevantfunctionsandlevels.Theinformationsecurityobjectivesshall:abeconsistentwiththeinformationsecuritypolicy;bbemeasurable(ifpracticable;ctakeintoaccountapplicableinformationsecurityrequirements,andresultsfromriskassessmentandtreatmentresults;dbecommunicated,ande能适时更新;组织应当保持信息安全目标的文件化信息。当对实现其信息安全目标进行策划时,组织应当确定:f将要做什么g将需要什么资源h将由谁来做i将在何时完成j将如何对结果进行评价ebeupdatedasappropriate.Theorganizationshallretaindocumentedinformationontheinformationsecurityobjectives.Whenplanninghowtoachieveitsinformationsecurityobjectives,theorganizationshalldetermine:fwhatwillbedone;gwhatresourceswillberequired;hwhowillberesponsible;iwhenitwillbecompleted;andjhowtheresultswillbeevaluated.7.支持7.1资源组织应确定和提供信息安全管理体系的建立、实施、维护和持续改进所需的资源。7.2能力组织应:a确定影响组织信息安全绩效的员工在ISMS管控中工作的必备能力;b确保这些员工在适当的培育、培训和经验的基础上是能胜任的;c适当时,采取行动获取所需能力,并评估所采取行动的有效性;d保留适当文件化信息作为证据;注:适当的行动可能包括,如提供培训、指导、重新指派现有员工、或聘用或外包有能力的员工。7.3意识在组织控制中工作的人员应了解:a信息安全方针;b信息安全管理体系有效性的贡献,包括提高信息安全绩效的收益;c不符合信息安全管理体系要求的影响;7.4沟通组织应当确定与信息安全管理体系相关内部和外部沟通需求,包括:a需要沟通内容b何时进行沟通7Support7.1ResourcesTheorganizationshalldetermineandprovidetheresourcesneededfortheestablishment,implementation,maintenanceandcontinualimprovementoftheinformationsecuritymanagementsystem.7.2CompetenceTheorganizationshall:adeterminethenecessarycompetenceofperson(sdoingworkunderitscontrolthataffectsitsinformationsecurityperformance;bensurethatthesepersonsarecompetentonthebasisofappropriateeducation,training,orexperience;cwhereapplicable,takeactionstoacquirethenecessarycompetence,andevaluatetheeffectivenessoftheactionstaken;anddretainappropriatedocumentedinformationasevidenceofcompetence.NOTE:Applicableactionsmayinclude,forexample:theprovisionoftrainingto,thementoringof,orthere-assignmentofcurrentemployees;orthehiringorcontractingofcompetentpersons.7.3AwarenessPersonsdoingworkundertheorganization’scontrolshallbeawareof:atheinformationsecuritypolicy;btheircontributiontotheeffectivenessoftheinformationsecuritymanagementsystem,includingthebenefitsofimprovedinformationsecurityperformance;andctheimplicationsofnotconformingwiththeinformationsecuritymanagementsystemrequirements.7.4CommunicationTheorganizationshalldeterminetheneedforinternalandexternalcommunicationsrelevanttotheinformationsecuritymanagementsystemincluding:aonwhattocommunicate;c与谁进行沟通d谁应该沟通e有效沟通的流程7.5文件化信息7.5.1总则组织的信息安全管理体系应包括:a本国际标准所需要的文件化信息;b组织确定信息安全管理体系有效性所需要的信息;注:不同组织的信息安全管理体系文件化信息的程度取决于:1组织的规模、其活动类型、流程、产品和服务;2流程及其他交互的复杂性;3人员的能力;7.5.2创建和更新当创建和更新文件化信息时,组织应确保应当的:a识别和描述(如标题、日期、作者或参考号码;b格式(如语言、软件版本、图形和媒体(如纸张、电子;c评估和批准适当性和充分性。7.5.3文件化信息控制信息安全管理体系和本国际标准所要求的文件化信息应被管控,以确保:a需要时,文件是可用和适用的;b得到充分的保护(如保密性丧失、不当使用、或完整性丧失;对于文件化信息的控制,组织应制定下列活动(如适用:c分配、访问、检索和使用;d存储和保存,包括易读性的保存;bwhentocommunicate;cwithwhomtocommunicate;dwhoshallcommunicate;andetheprocessesbywhichcommunicationshallbeeffected.7.5Documentedinformation7.5.1GeneralTheorganization’sinformationsecuritymanagementsystemshallinclude:adocumentedinformationrequiredbythisInternationalStandard;andbdocumentedinformationdeterminedbytheorganizationasbeingnecessaryfortheeffectivenessoftheinformationsecuritymanagementsystem.NOTE:Theextentofdocumentedinformationforaninformationsecuritymanagementsystemcandifferfromoneorganizationtoanotherdueto:1thesizeoforganizationanditstypeofactivities,processes,productsandservices;2thecomplexityofprocessesandtheirinteractions;and3thecompetenceofpersons.7.5.2CreatingandupdatingWhencreatingandupdatingdocumentedinformationtheorganizationshallensureappropriate:aidentificationanddescription(e.g.atitle,date,author,orreferencenumber;bformat(e.g.language,softwareversion,graphicsandmedia(e.g.paper,electronic;andcreviewandapprovalforsuitabilityandadequacy.7.5.3ControlofdocumentedinformationDocumentedinformationrequiredbytheinformationsecuritymanagementsystemandbythisInternationalStandardshallbecontrolledtoensure:aitisavailableandsuitableforuse,whereandwhenitisneeded;andbitisadequatelyprotected(e.g.fromlossofconfidentiality,improperuse,orlossofintegrity.Forthecontrolofdocumentedinformation,theorganizationshalladdressthefollowingactivities,asapplicable:cdistribution,access,retrievalanduse;dstorageandpreservation,includingthepreservationoflegibility;e变更管理(如版本控制;f保留和处置;组织信息安全管理体系的规划和运作所需的外来文件化信息,应被适当的识别和管理;注:访问表示有权查看文件化信息,或获得权限或授权以查看和变更文件化信息等;econtrolofchanges(e.g.versioncontrol;andfretentionanddisposition.Documentedinformationofexternalorigin,determinedbytheorganizationtobenecessaryfortheplanningandoperationoftheinformationsecuritymanagementsystem,shallbeidentifiedasappropriate,andcontrolled.NOTE:Accessimpliesadecisionregardingthepermissiontoviewthedocumentedinformationonly,orthepermissionandauthoritytoviewandchangethedocumentedinformation,etc.8.运行8.1运行策划和控制组织应策划、实施和控制满足信息安全要求的流程,并实施在6.1中规定的措施。组织还应实施计划,以实现信息安全在6.2中确定的目标。组织应保存相关文件化信息,以保证流程已经按照计划实施。组织应控制计划变更,评审非计划变更的后果,如需要,采取适当措施减轻不良影响;组织应确保外包活动被确定和受控。8.2信息安全风险评估组织应在定期或发生重大变化时执行信息安全风险评估,将6.1.2中建立的标准纳入考虑范围。组织应保留信息安全风险评估结果的相关文件化信息。8.3信息安全风险处置组织应实施信息安全风险处置计划。组织应保留信息安全风险处置结果的文件化信息。8Operation8.1OperationalplanningandcontrolTheorganizationshallplan,implementandcontroltheprocessesneededtomeetinformationsecurityrequirements,andtoimplementtheactionsdeterminedin6.1.Theorganizationshallalsoimplementplanstoachieveinformationsecurityobjectivesdeterminedin6.2.Theorganizationshallkeepdocumentedinformationtotheextentnecessarytohaveconfidencethattheprocesseshavebeencarriedoutasplanned.Theorganizationshallcontrolplannedchangesandreviewtheconsequencesofunintendedchanges,takingactiontomitigateanyadverseeffects,asnecessary.Theorganizationshallensurethatoutsourcedprocessesaredeterminedandcontrolled.8.2InformationsecurityriskassessmentTheorganizationshallperforminformationsecurityriskassessmentsatplannedintervalsorwhensignificantchangesareproposedoroccur,takingaccountofthecriteriaestablishedin6.1.2a.Theorganizationshallretaindocumentedinformationoftheresultsoftheinformationsecurityriskassessments.8.3InformationsecurityrisktreatmentTheorganizationshallimplementtheinformationsecurityrisktreatmentplan.Theorganizationshallretaindocumentedinformationoftheresultsoftheinformationsecurityrisktreatment.9.绩效评价9.1监视、测量、分析和评价组织应评估信息安全绩效和信息安全管理体系的有效性。组织应当确定:a什么需要监控和测量,包括信息安全流程和控制9Performanceevaluation9.1Monitoring,measurement,analysisandevaluationTheorganizationshallevaluatetheinformationsecurityperformanceandtheeffectivenessoftheinformationsecuritymanagementsystem.Theorganizationshalldetermine:awhatneedstobemonitoredandmeasured,includinginformationsecurityprocessesandcontrols;b采用什么适宜方法来进行监控、测量、分析和评价,以确保结果有效注:生成可比较和可重复结果的所选方法被认为是有效的c何时应当进行监控和测量d谁执行监控和测量e何时应当对监控和测量结果进行分析和评价f谁执行分析和评估结果组织应当保持适当的文件化信息作为监控和测量结果的证据。9.2内部审核组织应按照计划的时间间隔进行内部审核,以确定信息安全管理体系:a符合1组织自身信息安全管理体系的要求;2本国际标准的要求b有效的实施和维护;组织应:c计划、建立、实施和维护审核方案,包括频率、方法、职责、规划要求和报告。审核方案应考虑相关过程和以往审核结果的重要性;d定义每次审核准则和范围;e选择审核员和执行审核,确保审核过程的客观和公正;f确保审核结果报告提交相关管理层;g保留审核方案和审核结果的文件化信息;9.3管理评审管理者应按计划的时间间隔评审组织的信息安全管理体系,以确保其持续的适宜性、充分性和有效性。管理评审应考虑:a以往管理评审措施的状态;b信息安全管理体系相关的内外部变化;c信息安全绩效的反馈,包括:bthemethodsformonitoring,measurement,analysisandevaluation,asapplicable,toensurevalidresults;NOTE:Themethodsselectedshouldproducecomparableandreproducibleresultstobeconsideredvalid.cwhenthemonitoringandmeasuringshallbeperformed;dwhoshallmonitorandmeasure;ewhentheresultsfrommonitoringandmeasurementshallbeanalysedandevaluated;andfwhoshallanalyseandevaluatetheseresults.Theorganizationshallretainappropriatedocumentedinformationasevidenceofthemonitoringandmeasurementresults.9.2InternalauditTheorganizationshallconductinternalauditsatplannedintervalstoprovideinformationonwhethertheinformationsecuritymanagementsystem:aconformsto1theorganization’sownrequirementsforitsinformationsecuritymanagementsystem;and2therequirementsofthisInternationalStandard;biseffectivelyimplementedandmaintained.Theorganizationshall:cplan,establish,implementandmaintainanauditprogramme(s,includingthefrequency,methods,responsibilities,planningrequirementsandreporting.Theauditprogramme(sshalltakeintoconsiderationtheimportanceoftheprocessesconcernedandtheresultsofpreviousaudits;ddefinetheauditcriteriaandscopeforeachaudit;eselectauditorsandconductauditstoensureobjectivityandtheimpartialityoftheauditprocess;fensurethattheresultsoftheauditsarereportedtorelevantmanagement;andgretaindocumentedinformationasevidenceoftheauditprogramme(sandtheauditresults.9.3ManagementreviewTopmanagementshallreviewtheorganization'sinformationsecuritymanagementsystematplannedintervalstoensureitscontinuingsuitability,adequacyandeffectiveness.Themanagementreviewshallincludeconsiderationof:athestatusofactionsfrompreviousmanagementreviews;bchangesinexternalandinternalissuesthatarerelevanttotheinformationsecuritymanagementsystem;cfeedbackontheinformationsecurityperformance,including1不符合和纠正措施;2监控和测量结果;3审核结果;4信息安全目标的实现;d相关方反馈;e风险评估结果和风险处置计划的状态;f持续改进的机会;管理评审的输出应包括持续改进机会和任何信息安全管理体系变更所需的相关决定;组织应保留管理评审结果的文件化信息作为证据;trendsin:1nonconformitiesandcorrectiveactions;2monitoringandmeasurementresults;3auditresults;and4fulfilmentofinformationsecurityobjectives;dfeedbackfrominterestedparties;eresultsofriskassessmentandstatusofrisktreatmentplan;andfopportunitiesforcontinualimprovement.Theoutputsofthemanagementreviewshallincludedecisionsrelatedtocontinualimprovementopportunitiesandanyneedsforchangestotheinformationsecuritymanagementsystem.Theorganizationshallretaindocumentedinformationasevidenceoftheresultsofmanagementreviews.10.改进10.1不合格和纠正措施当出现不符合项时,组织应:a对不符合项作出反应,适用时:1采取措施控制和纠正;2处理后果;b评估采取措施的必要性,以消除不符合项的原因,使其不再发生或在其他地方发生,通过:1评审不符合项;2确定不符合原因;3确定类似不符合性存在,或发生的可能;c实施所需的任何措施;d评审已采取纠正措施的有效性;e如需要,变更信息安全管理体系;纠正措施应适当的影响不符合项;组织应保留文件化信息,作为下列证据:f不符合项的特征和任何后续采取的措施;g任何纠正措施的结果;10.2持续改进组织应持续提高信息安全管理体系的适宜性、充分性和有效性;10Improvement10.1NonconformityandcorrectiveactionWhenanonconformityoccurs,theorganizationshall:areacttothenonconformity,andasapplicable:1takeactiontocontrolandcorrectit;and2dealwiththeconsequences;bevaluatetheneedforactiontoeliminatethecausesofnonconformity,inorderthatitdoesnotrecuroroccurelsewhere,by:1reviewingthenonconformity;2determiningthecausesofthenonconformity;and3determiningifsimilarnonconformitiesexist,orcouldpotentiallyoccur;cimplementanyactionneeded;dreviewtheeffectivenessofanycorrectiveactiontaken;andemakechangestotheinformationsecuritymanagementsystem,ifnecessary.Correctiveactionsshallbeappropriatetotheeffectsofthenonconformitiesencountered.Theorganizationshallretaindocumentedinformationasevidenceof:fthenatureofthenonconformitiesandanysubsequentactionstaken,andgtheresultsofanycorrectiveaction.10.2ContinualimprovementTheorganizationshallcontinuallyimprovethesuitability,adequacyandeffectivenessoftheinformationsecuritymanagementsystem.附录A(引用控制目标和控制措施表A.1所列的控制目标和控制措施是直接源自并与ISO/IEC27002:2013第5到18章一致,并运用于条款6.1.3的环境下。AnnexA(normativeReferencecontrolobjectivesandcontrolsThecontrolobjectivesandcontrolslistedinTableA.1aredirectlyderivedfromandalignedwiththoselistedinISO/IEC27002:2013Clauses5to18andaretobeusedincontextwithClause6.1.3.A.5安全方针A.5InformationsecuritypoliciesA.5.1管理信息安全方向控制目标:依据业务要求和相关法律法规提供管理指导并支持信息安全。A.5.1ManagementdirectionforinformationsecurityObjective:Toprovidemanagementdirectionandsupportforinformationsecurityinaccordancewithbusinessrequirementsandrelevantlawsandregulations.A.5.1.1信息安全方针控制措施一系列信息安全方针应被定义、并由管理者批准、发布并传达给员工和外部相关方。A.5.1.2信息安全方针评审控制措施宜按计划的时间间隔或当重大变化发生时进行信息安全方针评审,以确保它持续的适宜性、充分性和有效性。A.5.1.1PoliciesforinformationsecurityControlAsetofpoliciesforinformationsecurityshallbedefined,approvedbymanagement,publishedandcommunicatedtoemployeesandrelevantexternalpartiesA.5.1.2ReviewofthepoliciesforinformationsecurityControlThepoliciesforinformationsecurityshallbereviewedatplannedintervalsorifsignificantchangesoccurtoensuretheircontinuingsuitability,adequacyandeffectivenessA.6信息安全组织A.6OrganizationofinformationsecurityA.6.1内部组织控制目标:建立管理架构,启动和控制信息安全在组织内的实施;A.6.1InternalorganizationObjective:ToestablishamanagementframeworktoinitiateandcontroltheimplementationandoperationofinformationsecuritywithintheorganizationA.6.1.1信息角色和职责控制措施所有信息安全职责应被定义和分配;A.6.1.2责任分割控制措施冲突责任及职责范围加以分割,以降低未授权或无意识的修改或者不当使用组织资产的机会;A.6.1.3与政府部门的联系控制措施应保持与政府相关部门的适当联系;A.6.1.4与特定利益集团的联系控制措施应保持与特定利益集团、其他安全专家组和专业协会的适当联系;A.6.1.5项目管理中的信息安全控制措施无论项目类型,项目管理中均应描述信息安全;A.6.1.1InformationsecurityrolesandresponsibilitiesControlAllinformationsecurityresponsibilitiesshallbedefinedandallocatedA.6.1.2SegregationofdutiesControlConflictingdutiesandareasofresponsibilityshallbesegregatedtoreduceopportunitiesforunauthorizedorunintentionalmodificationormisuseoftheorganization’sassets.A.6.1.3ContactwithauthoritiesControlAppropriatecontactswithrelevantauthoritiesshallbemaintainedA.6.1.4ContactwithspecialinterestgroupsControlAppropriatecontactswithspecialinterestgroupsorotherspecialistsecurityforumsandprofessionalassociationsshallbemaintainedA.6.1.5InformationsecurityinprojectmanagementControlInformationsecurityshallbeaddressedinprojectmanagement,regardlessofthetypeoftheprojectA.6.2移动设备和远程工作控制目标:确保使用移动设备的使用及远程工作的安全;A.6.2MobiledevicesandteleworkingObjective:ToensurethesecurityofteleworkinganduseofmobiledevicesA.6.2.1移动设备策略控制措施应采用策略和相应的安全测量,以防范使用移动设备时所造成的风险;A.6.2.1MobiledevicepolicyControlApolicyandsupportingsecuritymeasuresshallbeadoptedtomanagetherisksintroducedbyusingmobiledevicesA.6.2.2远程工作控制措施应实施策略和相应的安全测量,以防保护信息的访问、处理和存储在远程站点;A.6.2.2TeleworkingControlApolicyandsupportingsecuritymeasuresshallbeimplementedtoprotectinformationaccessed,processedorstoredonteleworkingsitesA.7人力资源安全A.7HumanresourcesecurityA.7.1任用之前控制目标:建立管理框架,以启动和控制组织内信息安全的实施;A.7.1PriortoemploymentObjective:Toensurethatemployeesandcontractorsunderstandtheirresponsibilitiesandaresuitablefortherolesforwhichtheyareconsidered.A.7.1.1审查控制措施所有任用候选者的背景验证检查应按照相关法律法规、道德规范和对应的业务要求、被访问信息的类别和察觉的风险来执行;A.7.1.2任用条款和条件控制措施与员工和合同方的合同应声明他们和组织的信息安全职责;A.7.1.1ScreeningControlBackgroundverificationchecksonallcandidatesforemploymentshallbecarriedoutinaccordancewithrelevantlaws,regulationsandethicsandproportionaltothebusinessrequirements,theclassificationoftheinformationtobeaccessedandtheperceivedrisksA.7.1.2TermsandconditionsofemploymentControlThecontractualagreementswithemployeesandcontractorsshallstatetheirandtheorganization’sresponsibilitiesforinformationsecurityA.7.2任用中控制目标:确保雇员和合同方知悉和实施他们信息安全职责;A.7.2DuringemploymentObjective:Toensurethatemployeesandcontractorsareawareofandfulfiltheirinformationsecurityresponsibi

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论