ISO/IEC 27004 2016 信息技术 安全技术 信息安全管理监控、测量、分析和评估(西班牙语版).pdf

2016,27004,IEC,ISO,pdf,国外及港澳台标准
文档页数:68
文档大小:924.27KB
文档格式:pdf
文档分类:国外及港澳台标准
上传会员:
上传日期:
最后更新:

INTERNATIONAL STANDARD

Informationtechnology-Security management-Monitoring techniques-Informationsecurity measurement analysisandevaluation

Management de la securite de I'information - Technologies de l’information -Techniques de securite -Surveillance mesurage analyse et evaluation

COPYRIGHTPROTECTEDDOCUMENT

@ ISO/IEC 2016 Published in Switzerland

All rights reserved. Unless otherwise specified no part of this publication may be reproduced or utilized otherwise in any formor by any means electronic or mechanical including photocopying or posting on the internet or an intranet without prior written permission. Permission can be requested from either ISO at the address below or ISO's member body in the country ofthe requester.

ISO copyright officeCh. de Blandonnet 8 • CP 401 CH-1214 Vernier Geneva SwitzerlandTel. 41 22 749 01 11 Fax 41 22 749 09 47copyright@

Contents

Page

5.1 The need for measurement. 25.2 Fulfilling the ISO/IEC 27001requirements. Validity of results. 35.3 5.4 Benefits. 3

6.1 6.2 What to monitor. General. 4 46.3 6.4 What to measure. When to monitor measure analyse and evaluate. 56.5 Who will monitor measure analyse and evaluate. 6 6

.7

Types of measures. General.7.1 7.2 Performance measures. 7 77.3 Effectiveness measures. 8

Processes. 8.1 General. 6°8.2 8.3 Identify information needs. Create and maintain measures. 10 118.3.1 General. 118.3.2 8.3.3 Identify current security practices that can support information needs. Develop or update measures. 11 128.3.4 8.3.5 Keep management informed and engaged. Document measures and prioritize for implementation. 13 138.4 Establish procedures. 148.5 8.6 Monitor and measure. Analyse results. 14 158.7 8.8 es Review and improve monitoringmeasurement analysis and evaluation processes. 15 158.9 Retain and municate documented information. 15

Annex A (informative) An information security measurement model. 17

Bibliography 58

Foreword

ISO (the International Organization for Standardization) and IEC (the International ElectrotechnicalCommission) form the specialized system for worldwide standardization. National bodies that aremembers of ISO or IEC participate in the development of International Standards through technicalorganizations governmental and non-governmental in liaison with ISO and IEC also take part in the activity. ISO and IEC technical mittees collaborate in fields of mutual interest. Other internationalwork. In the field of information technology ISO and IEC have established a joint technical mittee ISO/IEC JTC 1.

The procedures used to develop this document and those intended for its further maintenance arethe different types of document should be noted. This document was drafted in accordance with theeditorial rules of the ISO/IEC Directives Part 2 (see

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent Attention is drawn to the possibility that some of the elements of this document may be the subjectIntroduction and/or on the ISO list of patent declarations received (see rights. Details of any patent rights identified during the development of the document will be in the

Any trade name used in this document is information given for the convenience of users and does notconstitute an endorsement.

For an explanation on the meaning of ISO specificterms and expressions related to conformity assessment as well as information about ISO's adherence to the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following URL:

SC 27 IT Security techniques.

This second edition of ISO/IEC 27004 cancels and replaces the first edition (ISO/IEC 27004:2009) which has been technically revised.

This edition includes the following significant changes with respect to the previous edition:

ISO/IEC 27001:2013 9.1 which at the time of the previous edition did not exist.

The concepts and processes have been modified and expanded. However the theoretical foundation(ISO/IEC i5939) remains the same and several of the examples given in the previous edition arepreserved albeit updated.

Introduction

This document is intended to assist organizations to evaluate the information security performanceand the effectiveness of an information security management system in orderto fulfilthe requirementsof ISO/IEC 27001:2013 9.1: monitoring measurement analysis and evaluation.

The results of monitoring and measurement of an information security management system (ISMS)continual improvement.

q aq o ppuau ae sadde pue sdau au uns ads sueuo qea ns o applicable but the particular measures that any particular organization requires depend on contextual

This document is remended for organizations implementing an ISMS that meets the requirementsof ISO/IEC 27001. However it does not establish any new requirements for ISMS which conform toISO/IEC 27001 or impose any obligations upon organizations to observe the guidelines presented.

资源链接请先登录(扫码可直接登录、免注册)
①本文档内容版权归属内容提供方。如果您对本资料有版权申诉,请及时联系我方进行处理(联系方式详见页脚)。
②由于网络或浏览器兼容性等问题导致下载失败,请加客服微信处理(详见下载弹窗提示),感谢理解。
③本资料由其他用户上传,本站不保证质量、数量等令人满意,若存在资料虚假不完整,请及时联系客服投诉处理。

投稿会员:匿名用户
我的头像

您必须才能评论!

手机扫码、免注册、直接登录

 注意:QQ登录支持手机端浏览器一键登录及扫码登录
微信仅支持手机扫码一键登录

账号密码登录(仅适用于原老用户)