ISO/IEC 27032 2023 网络安全-互联网安全指南(英文版).pdf

27032,IEC,ISO,国外及港澳台标准
文档页数:34
文档大小:8.07MB
文档格式:pdf
文档分类:国外及港澳台标准
上传会员:
上传日期:
最后更新:

INTERNATIONAL STANDARD

Internetsecurity Cybersecurity-Guidelinesfor

Cybersecurite - Lignes directrices relatives a la securite sur I’internet

COPYRIGHTPROTECTEDDOCUMENT

@ ISO/IEC 2023

Allrights reserved. Uless otherwise specified or required in the context of its imlementation o part of this publication maybe reproduced or utilized otherwise in any form or by any means electronic or mechanical including photocopying or posting on the intermet or an intranet without prior written permission. Permission can be requested from either ISO at the address belowor ISO's member body in the country of the requester.

ISO copyright officeCH-1214 Vernier Geneva CP 401 • Ch. de Blandonnet 8Email:copyright@ Phone: 41 22 749 01 11Website: in Switzerland

Contents

Page

7 Interested parties. .8

7.2 7.1 General. Users. 8 67.3 7.4 Coordinator and standardization organisations. Government authorities.. 10 107.5 Law enforcement agencies. 107.6 Internet service providers. 10

8.1 General. 118.2 8.3 Vulnerabilities. Threats 12 118.4 Attack vectors 12

9 Security guidelines fortheInternet. 13

9.1 9.2 Controls for Internet security. General. 13 149.2.1 9.2.2 General Policies for Internet security. 14 149.2.3 9.2.4 Education awareness and training. Access control. 149.2.5 Security incident management. 15 159.2.6 9.2.7 Supplier management. Asset management. 17 179.2.8 Privacy protection over the Internet. Business continuity over the Internet. 189.2.9 9.2.10 Vulnerability management. 18 199.2.11 9.2.12 Protection against malware. Network management. 20 219.2.13 Change management. 219.2.14 9.2.15 Use of cryptography Identification of applicable legislation and pliance requirements. 22 229.2.16 9.2.17 Application security for Internet-facing applications. Endpoint device management. 22 249.2.18 Monitoring 24

Annex A (informative) Cross-references between this document and ISO/IEC 27002. 25

27

Foreword

ISO (the International Organization for Standardization) and IEC (the International ElectrotechnicalCommission) form the specialized system for worldwide standardization. National bodies that aremittees established by the respective organization to deal with particular fields of technical members of ISO or IEC participate in the development of International Standards through technicalorganizations governmental and non-governmental in liaison with ISO and IEC also take part in the activity. ISO and IEC technical mittees collaborate in fields of mutual interest. Other internationalwork.

The procedures used to develop this document and those intended for its further maintenanceare described in the ISO/IEC Directives Part 1. In particular the different approval criteria needed for the different types of document should be noted. This document was drafted inaccordance with the editorial rules of the ISO/IEC Directives Part 2 (see or

ISO and IEC draw attention to the possibility that the implementation of this document may involve theuse of (a) patent(s). ISO and IEC take no position concerning the evidence validity or applicability ofhad not received notice of a)patent(s) whichmay be required to implement this document.However any claimed patent rights in respect thereof. As of the date of publication of this document ISO and IECimplementers are cautioned that this may not represent the latestinformation which may be obtainedfrom the patent database available at and ISO and IEC shall not be held responsible for identifying any or all such patent rights.

Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement.

For an explanation of the voluntary nature of standards the meaning of ISO specific terms and expressions related to conformity assessment as well as information about ISO's adherence tothe World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see in the IEC see

Submittee SC 27 information security cybersecurity and privacy protection. This document was prepared by Joint Technical Committee ISO/IEC JTC 1 Information technology

This second edition cancels and replaces the first edition (ISO/IEC 27032:2012) which has beentechnically revised.

The main changes are as follows:

- the structure of the document has been changed;the risk assessment and treatment approach has been changed with the addition of content onthreats vulnerabilities and attack vectors to identify and manage the Internet security risks;a mapping between the controls for Internet security cited in 9.2 and the controls contained in

--the title has been modified;

ISO/IEC 27002 has been added to Annex A

body. A plete listing of these bodies can be found at and Any feedback or questions on this document should be directed to the user's national standards

Introduction

The focus of this document is to address Internet security issues and provide guidance for addressingmon Internet security threats such as:

- social engineering attacks;--zero-day attacks;-hacking; and-the proliferation of malicious software (malware) spyware and other potentially unwanted

software.

The guidance within this document provides technical and non-technical controls for addressing theInternet security risks including controls for:

- detecting and monitoring attacks; and responding to attacks.

-preparing for attacks;

- preventing attacks;

to assist interested parties in playing an active role to address the Internet security challenges. The document also focuses on preservation of confidentiality integrity and availability of information overthe Internet and other properties such as authenticity accountability non-repudiation and reliability that can also be involved.

This includes Internet security guidance for:

roles;-policies;-methods;pue 'sassanoud---applicable technical controls.

technical specification standards and guidelines applicable to each area are referenced within thedocument for further guidance. See Annex A for the correspondence between the controls cited in thisdocument and those in ISO/IEC 27002.

supporting criticalinfrastructure ornational security.However most ofthe controlsmentioned in this This document does not specifically address controls that organizations can require for systemsdocument can be applied to such systems.

This document uses existing concepts from ISO/IEC 27002 the ISO/IEC 27033 series ISO/IEC TS 27100and ISO/IEC 27701 to illustrate:

-- the relationship between Internet security web security network security and cybersecurity;

detailed guidance on Internet security controls cited in 9.2 addressing cyber-security readiness for Internet-facing systems.

资源链接请先登录(扫码可直接登录、免注册)
①本文档内容版权归属内容提供方。如果您对本资料有版权申诉,请及时联系我方进行处理(联系方式详见页脚)。
②由于网络或浏览器兼容性等问题导致下载失败,请加客服微信处理(详见下载弹窗提示),感谢理解。
③本资料由其他用户上传,本站不保证质量、数量等令人满意,若存在资料虚假不完整,请及时联系客服投诉处理。

投稿会员:匿名用户
我的头像

您必须才能评论!

手机扫码、免注册、直接登录

 注意:QQ登录支持手机端浏览器一键登录及扫码登录
微信仅支持手机扫码一键登录

账号密码登录(仅适用于原老用户)