µ±Ç°Î»ÖãºÊ×Ò³ > ISO27001-2013±ê×¼
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
Informationtechnology-Securitytechniques
-Informationsecuritymanagementsystems-Requirements
ÐÅÏ¢¼¼Êõ-°²È«¼¼Êõ-ÐÅÏ¢°²È«¹ÜÀíÌåϵ-ÒªÇó
Foreword ǰÑÔ
ISO(theInternationalOrganizationforStandardization)andIEC(theInternationalElectrotechnicalCommission)formthespecializedsystemforworldwidestandardization.NationalbodiesthataremembersofISOorIECparticipateinthedevelopmentofInternationalStandardsthroughtechnicalcommitteesestablishedbytherespectiveorganizationtodealwithparticularfieldsoftechnicalactivity.ISOandIECtechnicalcommitteescollaborateinfieldsofmutualinterest.Otherinternationalorganizations,governmentalandnon-governmental,inliaisonwithISOandIEC,alsotakepartinthework.Inthefieldofinformationtechnology,ISOandIEChaveestablishedajointtechnicalcommittee,ISO/IECJTC1.
ISO£¨¹ú¼Ê±ê×¼»¯×éÖ¯£©ºÍIEC£¨¹ú¼Êµç¹¤Î¯Ô±»á£©ÊÇΪ¹ú¼Ê±ê×¼»¯Öƶ¨×¨ÃÅÌåÖÆµÄ¹ú¼Ê×éÖ¯¡£¹ú¼Ò»ú¹¹ÊÇISO»òIECµÄ³ÉÔ±£¬ËûÃÇͨ¹ý¸÷×ÔµÄ×éÖ¯½¨Á¢¼¼ÊõίԱ»á²ÎÓë¹ú¼Ê±ê×¼µÄÖÆ¶¨£¬À´´¦ÀíÌØ¶¨ÁìÓòµÄ¼¼Êõ»î¶¯¡£ISOºÍIEC¼¼ÊõίԱ»áÔÚ¹²Í¬¸ÐÐËȤµÄÁìÓòºÏ×÷¡£ÆäËû¹ú¼Ê×éÖ¯¡¢Õþ¸®ºÍ·ÇÕþ¸®µÈ»ú¹¹£¬Í¨¹ýÁªÂçISOºÍIEC²ÎÓëÕâÏ×÷¡£ISOºÍIECÒѾÔÚÐÅÏ¢¼¼ÊõÁìÓò½¨Á¢ÁËÒ»¸öÁªºÏ¼¼ÊõίԱ»áISO/IECJTC1¡£ InternationalStandardsaredraftedinaccordancewiththerulesgivenintheISO/IEC Directives,Part2.
¹ú¼Ê±ê×¼µÄÖÆ¶¨×ñÑISO/IECµ¼ÔòµÚ2²¿·ÖµÄ¹æÔò¡£
ThemaintaskofthejointtechnicalcommitteeistoprepareInternationalStandards.DraftInternationalStandardsadoptedbythejointtechnicalcommitteearecirculatedtonationalbodiesforvoting.PublicationasanInternationalStandardrequiresapprovalbyatleast75%ofthenationalbodiescastingavote.
ÁªºÏ¼¼ÊõίԱ»áµÄÖ÷ÒªÈÎÎñÊÇÆð²Ý¹ú¼Ê±ê×¼£¬²¢½«¹ú¼Ê±ê×¼²Ý°¸Ìá½»¸ø¹ú¼Ò»ú¹¹Í¶Æ±±í¾ö¡£¹ú¼Ê±ê×¼µÄ³ö°æ·¢ÐбØÐëÖÁÉÙ75%ÒÔÉϵijÉԱͶƱͨ¹ý¡£
Attentionisdrawntothepossibilitythatsomeoftheelementsofthisdocumentmaybethesubjectofpatentrights.ISOandIECshallnotbeheldresponsibleforidentifyinganyorallsuchpatentrights.
±¾ÎļþÖеÄijЩÄÚÈÝÓпÉÄÜÉæ¼°Ò»Ð©×¨ÀûȨÎÊÌ⣬ÕâÒ»µãÓ¦¸ÃÒýÆð×¢Òâ¡£ISOºÍIEC²»¸ºÔðʶ±ðÈκÎÕâÑùµÄרÀûȨÎÊÌâ¡£
ISO/IEC27001waspreparedbyJointTechnicalCommitteeISO/IECJTC1,Informationtechnology,SubcommitteeSC27,ITSecuritytechniques.
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
ISO/IEC27001ÓÉÁªºÏ¼¼ÊõίԱ»áISO/IECJTC1£¨ÐÅÏ¢¼¼Êõ£©·ÖίԱ»áSC27£¨°²È«¼¼Êõ£©Æð²Ý¡£
Thissecondeditioncancelsandreplacesthefirstedition(ISO/IEC27001:20KK),whichhasbeentechnicallyrevised.
µÚ¶þ°æ½øÐÐÁ˼¼ÊõÉϵÄÐÞ¶©£¬²¢È¡ÏûºÍÌæ´úµÚÒ»°æ£¨ISO/IEC27001:20KK£©¡£ 0Introduction ÒýÑÔ
0.1General 0.1×ÜÔò
ThisInternationalStandardhasbeenpreparedtoproviderequirementsforestablishing,implementing,maintainingandcontinuallyimprovinganinformationsecuritymanagementsystem.Theadoptionofaninformationsecuritymanagementsystemisastrategicdecisionforanorganization.Theestablishmentandimplementationofanorganization¡¯sinformationsecuritymanagementsystemisinfluencedbytheorganization¡¯sneedsandobjectives,securityrequirements,theorganizationalprocessesusedandthesizeandstructureoftheorganization.Alloftheseinfluencingfactorsareexpectedtochangeovertime.
±¾±ê×¼ÓÃÓÚΪ½¨Á¢¡¢ÊµÊ©¡¢±£³ÖºÍ³ÖÐø¸Ä½øÐÅÏ¢°²È«¹ÜÀíÌåϵÌṩҪÇó¡£²ÉÓÃÐÅÏ¢°²È«¹ÜÀíÌåϵÊÇ×éÖ¯µÄÒ»ÏîÕ½ÂÔÐÔ¾ö²ß¡£Ò»¸ö×éÖ¯ÐÅÏ¢°²È«¹ÜÀíÌåϵµÄ½¨Á¢ºÍʵʩÊÜÆäÐèÒªºÍÄ¿±ê¡¢°²È«ÒªÇó¡¢Ëù²ÉÓõĹý³ÌÒÔ¼°×éÖ¯µÄ¹æÄ£ºÍ½á¹¹µÄÓ°Ïì¡£ËùÓÐÕâЩӰÏìÒòËØ»á²»¶Ï·¢Éú±ä»¯¡£
Theinformationsecuritymanagementsystempreservestheconfidentiality,integrityandavailabilityofinformationbyapplyingariskmanagementprocessandgivesconfidencetointerestedpartiesthatrisksareadequatelymanaged.
ÐÅÏ¢°²È«¹ÜÀíÌåϵͨ¹ýÓ¦Ó÷çÏÕ¹ÜÀí¹ý³ÌÀ´±£³ÖÐÅÏ¢µÄ±£ÃÜÐÔ¡¢ÍêÕûÐԺͿÉÓÃÐÔ£¬ÒÔ³ä·Ö¹ÜÀí·çÏÕ²¢¸øÓèÏà¹Ø·½ÐÅÐÄ¡£
Itisimportantthattheinformationsecuritymanagementsystemispartofandintegratedwiththeorganization¡¯sprocessesandoverallmanagementstructureandthatinformationsecurityisconsideredinthedesignofprocesses,informationsystems,andcontrols.Itisexpectedthataninformationsecuritymanagementsystemimplementationwillbescaledinaccordancewiththeneedsoftheorganization.
ÐÅÏ¢°²È«¹ÜÀíÌåϵÊÇ×éÖ¯¹ý³ÌºÍÕûÌå¹ÜÀí½á¹¹µÄÒ»²¿·Ö²¢ÓëÆäÕûºÏÔÚÒ»ÆðÊǷdz£ÖØÒªµÄ¡£ÐÅÏ¢°²È«ÔÚÉè¼Æ¹ý³Ì¡¢ÐÅϢϵͳ¡¢¿ØÖÆ´ëʩʱ¾ÍÒª¿¼ÂÇÐÅÏ¢°²È«¡£°´ÕÕ×éÖ¯µÄÐèҪʵʩÐÅÏ¢°²È«¹ÜÀíÌåϵ£¬ÊDZ¾±ê×¼ËùÆÚÍûµÄ¡£
ThisInternationalStandardcanbeusedbyinternalandexternalpartiestoassesstheorganization¡¯sabilitytomeettheorganization¡¯sowninformationsecurityrequirements.
±¾±ê×¼¿É±»ÄÚ²¿ºÍÍⲿÏà¹Ø·½Ê¹Óã¬ÆÀ¹À×éÖ¯µÄÄÜÁ¦ÊÇ·ñÂú×ã×éÖ¯×ÔÉíÐÅÏ¢°²È«ÒªÇó¡£ TheorderinwhichrequirementsarepresentedinthisInternationalStandarddoesnotreflecttheirimportanceorimplytheorderinwhichtheyaretobeimplemented.Thelistitemsareenumeratedforreferencepurposeonly.
±¾±ê×¼ÖÐÒªÇóµÄ˳Ðò²¢²»ÄÜ·´Ó³ËûÃǵÄÖØÒªÐÔ»òÒâζ×ÅËûÃǵÄʵʩ˳Ðò¡£ÁоٵÄÌõÄ¿½öÓÃÓڲο¼Ä¿µÄ¡£
ISO/IEC27000describestheoverviewandthevocabularyofinformationsecuritymanagementsystems,referencingtheinformationsecuritymanagementsystemfamilyofstandards(includingISO/IEC27003[2],ISO/IEC27004[3]andISO/IEC27005[4]),withrelatedtermsanddefinitions.
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
ISO/IEC27000ÃèÊöÁËÐÅÏ¢°²È«¹ÜÀíÌåϵµÄ¸ÅÊöºÍ´Ê»ã£¬²Î¿¼ÁËÐÅÏ¢°²È«¹ÜÀíÌåϵ±ê×¼×壨°üÀ¨ISO/IEC27003¡¢ISO/IEC27004ºÍISO/IEC27005£©ÒÔ¼°Ïà¹ØµÄÊõÓïºÍ¶¨Òå¡£ 0.2Compatibilitywithothermanagementsystemstandards 0.2ÓëÆäËû¹ÜÀíÌåϵµÄ¼æÈÝÐÔ
ThisInternationalStandardappliesthehigh-levelstructure,identicalsub-clausetitles,identicaltext,commonterms,andcoredefinitionsdefinedinAnnexSLofISO/IECDirectives,Part1,ConsolidatedISOSupplement,andthereforemaintainscompatibilitywithothermanagementsystemstandardsthathaveadoptedtheAnnexSL.
±¾±ê×¼Ó¦ÓÃÁËISO/IECµ¼ÔòµÚÒ»²¿·ÖISO²¹³ä²¿·Ö¸½Â¼SLÖж¨ÒåµÄ¸ß²ã½á¹¹¡¢ÏàͬµÄ×ÓÕ½ڱêÌâ¡¢ÏàͬÎı¾¡¢Í¨ÓÃÊõÓïºÍºËÐ͍Òå¡£Òò´Ë±£³ÖÁËÓëÆäËü²ÉÓø½Â¼SLµÄ¹ÜÀíÌåϵ±ê×¼µÄ¼æÈÝÐÔ¡£
ThiscommonapproachdefinedintheAnnexSLwillbeusefulforthoseorganizationsthatchoosetooperateasinglemanagementsystemthatmeetstherequirementsoftwoormoremanagementsystemstandards.
¸½Â¼SL¶¨ÒåµÄͨÓ÷½·¨¶ÔÄÇЩѡÔñÔË×÷µ¥Ò»¹ÜÀíÌåϵ£¨¿ÉͬʱÂú×ãÁ½¸ö»ò¶à¸ö¹ÜÀíÌåϵ±ê×¼ÒªÇ󣩵Ä×éÖ¯À´ËµÊÇÊ®·ÖÓÐÒæµÄ¡£
Informationtechnology¡ªSecuritytechniques¡ª
Informationsecuritymanagementsystems¡ªRequirements ÐÅÏ¢¼¼Êõ-°²È«¼¼Êõ-ÐÅÏ¢°²È«¹ÜÀíÌåϵ-ÒªÇó 1Scope 1·¶Î§
ThisInternationalStandardspecifiestherequirementsforestablishing,implementing,maintainingandcontinuallyimprovinganinformationsecuritymanagementsystemwithinthecontextoftheorganization.
±¾±ê×¼´Ó×éÖ¯»·¾³µÄ½Ç¶È£¬Îª½¨Á¢¡¢ÊµÊ©¡¢ÔËÐС¢±£³ÖºÍ³ÖÐø¸Ä½øÐÅÏ¢°²È«¹ÜÀíÌåϵ¹æ¶¨ÁËÒªÇó¡£
ThisInternationalStandardalsoincludesrequirementsfortheassessmentandtreatmentofinformationsecurityriskstailoredtotheneedsoftheorganization.TherequirementssetoutinthisInternationalStandardaregenericandareintendedtobeapplicabletoallorganizations,regardlessoftype,sizeornature.ExcludinganyoftherequirementsspecifiedinClauses4to10isnotacceptablewhenanorganizationclaimsconformitytothisInternationalStandard. ±¾±ê×¼»¹¹æ¶¨ÁËΪÊÊÓ¦×éÖ¯ÐèÒª¶ø¶¨ÖƵÄÐÅÏ¢°²È«·çÏÕÆÀ¹ÀºÍ´¦ÖõÄÒªÇó¡£±¾±ê×¼¹æ¶¨µÄÒªÇóÊÇͨÓõģ¬ÊÊÓÃÓÚ¸÷ÖÖÀàÐÍ¡¢¹æÄ£ºÍÌØÐÔµÄ×éÖ¯¡£×éÖ¯Éù³Æ·ûºÏ±¾±ê׼ʱ£¬¶ÔÓÚµÚ4Õµ½µÚ10ÕµÄÒªÇó²»ÄÜɾ¼õ¡£ 2Normativereferences 2¹æ·¶ÐÔÒýÓÃÎļþ
Thefollowingdocuments,inwholeorinpart,arenormativelyreferencedinthisdocumentandareindispensableforitsapplication.Fordatedreferences,onlytheeditioncitedapplies.Forundatedreferences,thelatesteditionofthereferenceddocument(includinganyamendments)applies.
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
ÏÂÁÐÎļþµÄÈ«²¿»ò²¿·ÖÄÚÈÝÔÚ±¾ÎļþÖнøÐÐÁ˹淶ÒýÓ㬶ÔÓÚÆäÓ¦ÓÃÊDZز»¿ÉÉٵġ£·²ÊÇ×¢ÈÕÆÚµÄÒýÓÃÎļþ£¬Ö»ÓÐÒýÓõİ汾ÊÊÓÃÓÚ±¾±ê×¼£»·²ÊDz»×¢ÈÕÆÚµÄÒýÓÃÎļþ£¬Æä×îа汾£¨°üÀ¨ÈκÎÐ޸ģ©ÊÊÓÃÓÚ±¾±ê×¼¡£
ISO/IEC27000,Informationtechnology¡ªSecuritytechniques¡ª
Informationsecuritymanagementsystems¡ªOverviewandvocabulary ISO/IEC27000£¬ÐÅÏ¢¼¼Êõ¡ª°²È«¼¼Êõ¡ªÐÅÏ¢°²È«¹ÜÀíÌåϵ¡ª¸ÅÊöºÍ´Ê»ã 3Termsanddefinitions 3ÊõÓïºÍ¶¨Òå
Forthepurposesofthisdocument,thetermsanddefinitionsgiveninISO/IEC27000apply. ISO/IEC27000ÖеÄÊõÓïºÍ¶¨ÒåÊÊÓÃÓÚ±¾±ê×¼¡£
4Contextoftheorganization 4×éÖ¯»·¾³
4.1Understandingtheorganizationanditscontext 4.1Àí½â×éÖ¯¼°Æä»·¾³
Theorganizationshalldetermineexternalandinternalissuesthatarerelevanttoitspurposeandthataffectitsabilitytoachievetheintendedoutcome(s)ofitsinformationsecuritymanagementsystem.
×é֯Ӧȷ¶¨ÓëÆäÄ¿±êÏà¹Ø²¢Ó°ÏìÆäʵÏÖÐÅÏ¢°²È«¹ÜÀíÌåϵԤÆÚ½á¹ûµÄÄÜÁ¦µÄÍⲿºÍÄÚ²¿ÎÊÌâ¡£
NOTEDeterminingtheseissuesreferstoestablishingtheexternalandinternalcontextoftheorganizationconsideredinClause5.3ofISO31000:20KK[5].
×¢£ºÈ·¶¨ÕâЩÎÊÌâÉæ¼°µ½½¨Á¢×éÖ¯µÄÍⲿºÍÄÚ²¿»·¾³£¬ÔÚISO31000:20KK[5]µÄ5.3½Ú¿¼ÂÇÁËÕâÒ»ÊÂÏî¡£
4.2Understandingtheneedsandexpectationsofinterestedparties 4.2Àí½âÏà¹Ø·½µÄÐèÇóºÍÆÚÍû Theorganizationshalldetermine: ×é֯Ӧȷ¶¨£º
a)interestedpartiesthatarerelevanttotheinformationsecuritymanagementsystem;and b)therequirementsoftheseinterestedpartiesrelevanttoinformationsecurity. a)ÓëÐÅÏ¢°²È«¹ÜÀíÌåϵÓйصÄÏà¹Ø·½£» b)ÕâЩÏà¹Ø·½ÓëÐÅÏ¢°²È«ÓйصÄÒªÇó
NOTETherequirementsofinterestedpartiesmayincludelegalandregulatoryrequirementsandcontractualobligations.
×¢£ºÏà¹Ø·½µÄÒªÇó¿ÉÄܰüÀ¨·¨ÂÉ·¨¹æÒªÇóºÍºÏͬÒåÎñ¡£
4.3Determiningthescopeoftheinformationsecuritymanagementsystem 4.3È·¶¨ÐÅÏ¢°²È«¹ÜÀíÌåϵµÄ·¶Î§
Theorganizationshalldeterminetheboundariesandapplicabilityoftheinformationsecuritymanagementsystemtoestablishitsscope.
×é֯Ӧȷ¶¨ÐÅÏ¢°²È«¹ÜÀíÌåϵµÄ±ß½çºÍÊÊÓÃÐÔ£¬ÒÔ½¨Á¢Æä·¶Î§¡£ Whendeterminingthisscope,theorganizationshallconsider: µ±È·¶¨¸Ã·¶Î§Ê±£¬×éÖ¯Ó¦¿¼ÂÇ£º
a)theexternalandinternalissuesreferredtoin4.1; b)therequirementsreferredtoin4.2;and
¡¾MeiWei_81-ÓÅÖÊÊÊÓÃÎĵµ¡¿
¹²·ÖÏí92ƪÏà¹ØÎĵµ