µ±Ç°Î»ÖãºÊ×Ò³ > ISMS·çÏÕÆÀ¹ÀÊÖ²á
ÌṩµÄ¹¦ÄÜ¡£
1.4 ÐÅÏ¢°²È«ÓëÐÅÏ¢·çÏÕ£º
1.4.1 ÐÅÏ¢°²È«µÄ¶¨ÒåÓëÄ¿±ê
½öÒÔBS7799µÄ±ê×¼¶¨Òå×öΪ¼ò½é£¬¾ÍÊÇ¡¸ÐÅÏ¢¶Ô×éÖ¯¶øÑÔ¾ÍÊÇÒ»ÖÖ×ʲú£¬ºÍÆäËüÖØÒªµÄÓªÔË×ʲúÒ»ÑùÓмÛÖµ£¬Òò´ËÐèÒª³ÖÐø¸øÓèÍ×ÉÆ±£»¤¡£ÐÅÏ¢°²È«¿É±£»¤ÐÅÏ¢²»Êܸ÷ÖÖÍþв£¬È·±£³ÖÐøÓªÔË£¬½«ÓªÔËËðʧ½µµ½×îµÍ£¬µÃµ½×î·áºñµÄͶ×ʱ¨³êÂʺÍÉÌ»ú¡£¡¹
ÐÅÏ¢°²È«µÄÄ¿±êÔÚÓÚ±£»¤ÐÅÏ¢¼°ÆäÖ§³Ö´¦ÀíÉ豸¡¢ÏµÍ³ºÍÍøÂçµÄ»úÃÜÐÔ£¨Confidentiality£©¡¢ÍêÕûÐÔ£¨Integrity£¬»ò³ÆÕæÈ·ÐÔ£©ºÍ¿É»ñµÃÐÔ£¨Availability£¬»ò³Æ¿ÉÓÃÐÔ£©²»Êܵ½¸÷ÖÖ·½Ê½µÄÍþв£¬Ê¹¿ÉÄÜ·¢ÉúµÄÊÂÒµË𺦽µÖÁ×îµÍ£¬È·±£ÆóÒµµÄÓÀÐø¾Óª£»ÀýÈ磬³ÌÐòÉè¼ÆÊ¦Ð´Íê³ÌÐò±ØÐëÏòÉϼ¶¹«¿ªÔʼÂë¡¢ÆóÒµData Center±ØÐë½øÐÐÊý¾ÝÒìµØ±¸Ô®...µÈµÈ¶¼ÊÇ»ùÓÚ±£»¤ÐÅÏ¢°²È«µÄ¿¼ÂÇ¡£
1.4.2 ÐÅÏ¢°²È«¹ÜÀíµÄÒªËØ
ÓëÆäËü¹ÜÀíÒ»Ñù£¬°²È«¹ÜÀíÈýÒªËØÊÇPeople£¨ÈË£©¡¢Process£¨Á÷³Ì£©ÓëTechnology£¨¿Æ¼¼£©£¬ÒòΪÊÂÊÇÓÉÈË×ö³öÀ´µÄ£¬ÈËʰ²È«ÊÇËùÓа²È«µ±Öзdz£ÖØÒªµÄÒ»»·£¬ÆóÒµ»ò×éÖ¯ËùÄⶨ³öÀ´µÄ°²È«Õþ²ß»¹ÓÐÀµ¾ß±¸°²È«½ô¼±ÒâʶµÄ¡¸ÈË¡¹È¥×ñÑ£»¶øÆóÒµÈôÄÜÕÆÎÕProcess˳³©£¬¼´¿ÉÕÆÎÕ80©‡ÒÔÉϵݲȫ£»Technology²¢·Çµ¥Ö¸CCTV¡¢ÃŽûϵͳµÈÉ豸£¬¶ø×î½üÏ൱ÈÈÃŵÄÐÅÏ¢°²È«Ò²¾ø·Çµ¥Ö¸·À»ðǽÓë·À¶¾Èí¼þ¶øÒÑ¡£
ÐÅÏ¢°²È«º¸Ç·¶Î§Ï൱¹ã£¬²¢·Ç½öÖ¸ÒòÌØÍø£¬Ò²¾ø·ÇÖ»ÊÇ·À»ðǽ£¬ÒòΪÐÅÏ¢°²È«±ØÐëÒÔÈËÊ¡¢ÊµÌåÓë»·¾³°²È«Îª»ù´¡£¬ËùÓеĿƼ¼¶¼ÒÔÐÖú°²È«¹ÜÀíÕþ²ßΪĿµÄ£¬·ñÔò¿Æ¼¼Ö»ÊÇÒ»¸ö²úÆ·¡£ÀýÈ磬µ±¼ÆËã»úΪÁËÐÅÏ¢°²È«µÄÔµ¹Ê×°ÉÏ·À»ðǽ£¬È´¶ÔÆä°Ú·ÅλÖò»×öÊʵ±·À»¤£¬ÈçºÎ³ÆµÃÉϰ²È«£¿
1.4.3 ÐÅÏ¢·çÏյ͍ÒåÓëÒªËØ
ÐÅÏ¢·çÏÕϵָ¿ÉÄÜÓ°Ïì×ʲú¡¢Á÷³Ì¡¢×÷Òµ»·¾³»òÌØÊâÆóÒµ×éÖ¯Ö®Íþв£¬ÍþвÐÔÖʰüÀ¨²ÆÎñ¡¢·¨Áî¡¢²ßÂÔ¡¢¿Æ¼¼¡¢Êý¾ÝÔËÓü°¿ÉÄÜÓ°ÏìÆóÒµ»·¾³Ö®½á¹û¡£ÐÅÏ¢°²È«¹ÜÀíϵͳµÄ½¨ÖÃÈËÔ±Ó¦×ÅÖØÓÚÓëÐÅÏ¢°²È«¹ÜÀíÈýÒªËØÓйØÖ®·çÏյȼ¶£¬´ËµÈ·çÏյȼ¶Í¨³£ÈÝÒײúÉúÐÅÏ¢»úÃÜÐÔ¡¢ÍêÕûÐÔ»ò¿É»ñµÃÐÔÖ®Ëðʧ¡£
¶øÐÅÏ¢·çÏÕµÄÒªËØ¿É±íÏÖÓÚÏÂÁз½Ã棺
A. ÍⲿÍþв¡¢ÄÚ²¿Èõµã¡¢ÐèÒª±£»¤µÄ×÷Òµ»òÐÅÏ¢×ʲú¡£
B. ÒÀ¾Ý×ʲúÖ®Íþв¼°ÈõµãÖ®Ó°Ïì×ö³É³å»÷·ÖÎö(Impact Analysis)¡£
C. ÒÀ¹ÜÀíÄ¿±êÓëÏÖʵ״¿öËù×öÖ®²îÒì·ÖÎö(Gap Analysis)¼°ÆÀ¹À·çÏÕ¿ÉÄÜ·¢ÉúÖ®»úÂÊ¡£
1.5 ÐÅÏ¢·çÏÕµÄÖÖÀࣺ
Page:5 of 25 1.5.1 ÍêÕûÐÔ·çÏÕ£¨Integrity Risk£©£º
´Ë·çÏջᷢÉúÔÚÐÅÏ¢´¦ÀíµÄÁ½¸ö·¶³ë£¬·Ö±ðÊÇÐÅÏ¢»ù±¾¼Ü¹¹µÄ¹ÜÀí¡¢¼°Î¬³Ö×éÖ¯ÓªÔËËù±ØÐèµÄÓ¦ÓÃϵͳ¡£Æä·çÏÕÔÚÓÚÊý¾ÝµÄ´¦Àí¡¢ÓµÓС¢½Ò¶¾ùÎ¥·´ÁËÓªÔË¿ØÖƵÄʵÎñ£¬»òÐÅϢϵͳ֮Êä³ö¡¢ÈëÓë´¦ÀíµÄÕýÈ·ÔÔò¶Ë¿ØÖÆÁ÷³Ì£¬È磺Êý¾Ýת»»½Ó¿Ú³ö´í¡¢Êý¾ÝÄÚÈÝÔâÆÆ»µ£¬ÍøÒ³ÄÚÈÝÔâ¶ñÒâ´Ü¸Ä¡¢ÍøÂçÊý¾Ý½Ù¶á£¨Session Hijacking£©¼°Êý¾Ý½áËãÖ®´íÎó»ò¸ù±¾µÄ³ÌÐòÂß¼Óë¾ÓªÁ÷³Ì²»Ïà·û¡£
1.5.2 ÐÅÏ¢»ù´¡¼Ü¹¹·çÏÕ £¨Infrastructure Risk£©£º
´Ë·çÏÕϵÒò×é֯δÄܽ¨¹¹ÓÐЧÂʵÄÐÅÏ¢¿Æ¼¼»ù´¡¼Ü¹¹£¨ÈçÓ²¼þ¡¢ÍøÂç¡¢Èí¼þ¡¢ÈËÔ±¼°Á÷³Ì£©£¬»òδÄÜÔÚÓÐЧÂÊ¡¢¼°¿ØÖÆÁ¼ºÃµÄģʽÏ£¬Ö§³Ö×éÖ¯ÏÖÓм°Î´À´µÄÐèÇó¡£ÕâЩ·çÏÕÔÚÓڽ綨¡¢¿ª·¢¡¢Î¬»¤¼°¾ÓªÐÅÏ¢´¦Àí»·¾³£¨Èç¼ÆËã»úÓ²¼þ¡¢Èí¼þϵͳ¡¢ÍøÂçµÈ£©µÄÒ»Á¬´®ÐÅÏ¢¿Æ¼¼´¦Àí³ÌÐò¼°Ïà¹ØµÄÓªÔËÓ¦ÓÃϵͳ£¨ÀýÈç¿Í»§·þÎñ¡¢Ó¦ÊÕ¸¶ÕʿÉú²úÅų̡¢ÐÅÓô¦ÀíµÈµÈ£©Óйأ¬¾Ù·²´Ó²Ù×÷ϵͳƽ̨£¬Êý¾Ý¿âϵͳ¡¢ÍøÂçϵͳ¡¢ÊµÌå»·¾³µÈµÈ£¬ÌرðÊÇÏÖ½ñe»¯»·¾³¶ÔÍøÂçµÄÒÀÀµÐԷdz£¸ß£¬Òò´ËÐÅÏ¢»ù´¡½¨ÉèÖ®Í걸£¬´«ÊäÖ®±£È«ÊÇÖØÒªµÄ·çÏÕ¿ØÖƵ㡣
1.5.3 ¿É»ñµÃÐÔ·çÏÕ£¨Availability Risk£©£º
µ±ÐèÒªÐÅÏ¢Ö´ÐÐÓªÔ˾ö²ß»ò¾Óª»î¶¯Ê±£¬ÎÞ·¨¼°Ê±È¡µÃµÄ·çÏÕ£¬°üÀ¨£º
A. ÒòÐÅϢͨѶÖжÏËù²úÉúµÄËðʧ¡£ÀýÈ磺ÐÒé×è¶Ï·þÎñ¹¥»÷(Denial of Service)¡¢´«ÊäÏß·Öжϡ¢µç»°ÏµÍ³¶ÏÏß¡¢ÏµÍ³µ±»ú¡¢ÎÀÐǶÏѶ¡£
B. ´¦ÀíÐÅÏ¢µÄ»ù±¾ÄÜÁ¦Ö®É¥Ê§¡£ÀýÈ磺¼ÆËã»úϵͳЧÄܼ«µÍ£¬»ð¡¢Ë®ÔÖ¡¢¶Ïµç»òȱ·¦Êʵ±×¨ÒµÈËÔ±²Ù×÷ϵͳ¡£
C. ²Ù×÷ÉϵÄÀ§ÄÑ¡£ÀýÈ磺¿ØÖÆÈ¨ÔâÔ¶³Ì¿ØÖƳÌÐò½Ù¶á¡¢´ÅÅÌÇý¶¯Æ÷¹ÊÕÏ¡¢²Ù×÷ÈËԱʧÎóµÈ¡£
D. ÆóÒµ»ò×éÖ¯ÓªÔËÉϵÄÖжϡ£ÀýÈ磺ÌìÈ»ÔÖº¦¡¢¶ñÒâÆÆ»µ¡¢µ¡¹¤¡¢ÎÁÒß(½ñÄêËùÓöµ½µÄSARSÒßÇé±ãÊÇÒ»Àý)µÈ¡£
ÁíÍâÐÅÏ¢¿É»ñµÃÐÔ·çÏÕÓ¦×ÅÖØÒÔÏÂÈý¸ö²»Í¬µÄ²ãÃæ£º
A. ½åÓɼලЧÄܼ°ÔÚÎÊÌâ·¢Éúǰ²ÉȡԤ·À´ëÊ©£¬¿É±ÜÃâ´Ë·çÏÕ¡£ B. ¿ÉʹÓÃϵͳ»òÊý¾Ý»Ø¸´¼¼ÊõʹËðʧ½µÖÁ×îµÍ¡£
C. ÒòÌìÈ»ÔÖº¦¶øÔì³É³¤Ê±¼äÖ®ÖжÏËù²úÉúµÄ·çÏÕ£¬¿É͸¹ýÓ¦±ä¼Æ»®£¨Disaster Recovery Plan »ò Incident Handling Process£©¼°ÒµÎñ³ÖÐøÓªÔ˼ƻ®(Business Contingency Plan)ʹÐÅϢϵͳ¼õÉÙËðʧ¡£
1.5.4 »úÃÜÐÔ·çÏÕ¼°´æÈ¡·çÏÕ£¨Confidential Risk & Access Risk£©£º
´ËÀà·çÏÕ×ÅÖØÓÚ²»Êʵ±µÄ´æÈ¡ÐÅϢϵͳ¡¢Êý¾ÝºÍÐÅÏ¢Ö®·çÏÕ£¬Ëü°üÀ¨²»Êʵ±µÄȨÔð»®·Ö¡¢Êý¾ÝÓëÊý¾Ý¿âÕûºÏÖ®·çÏÕ¡¢ÒÔ¼°ÓëÐÅÏ¢»úÃÜÐÔÏà¹ØÖ®·çÏÕ£¬ÀýÈç²»Êʵ±µÄÈË¿ÉÄÜÈ¡µÃ»úÃÜÐÅÏ¢£¬¶øÊʵ±µÄÈËÈ´±»¾Ü¾ø´æÈ¡¡£
ÐÅÏ¢´æÈ¡µÄ·çÏÕÊÇÈ«ÃæÐԵģ¬Ò༴°üÀ¨ÒòÈκÎÄ¿µÄ¶øÈ¡µÃµÄÐÅÏ¢¡£ÁíÒ»ÀàÐÍÔòÈçʹÓÃÕßȨÏ޵IJ»Ïà·û£¬»òÊÇϵͳµ¼ÈëÖ®±ä¸ü£¬´«Í³Ö®²¿ÃżäÖ°ÄÜ·Ö¹¤×ª±äΪӦÓÃϵͳ½ÇÉ«¼°È¨ÏÞÖ®°çÑÝ£¬ÀýÈçÔ±¹¤¼æ¾ßÇ빺ÈËÔ±Óë²É
Page:6 of 25 ¹ºÈËԱ֮ȨÏÞ£¬¿ÉÄܵ¼Ö²»µ±ÊÚȨ½«µ¼ÖÂʹÓÃÕß´æÈ¡Î´¾ÊÚȨ֮Êý¾ÝÖ®·çÏÕ£¬»òÔì³É»úÃÜÊý¾ÝÍâй¼°Î´¾ÊÚȨ֮Ò춯¿ÉÄÜÐÔ¡£
1.5.5 Øü¹Ø·çÏÕ£¨Relevance Risk£©£º
Øü¹ØÐÔ·çÏÕϵָ¸ÃÐÅÏ¢ÓëËѼ¯¡¢Î¬»¤Óë´«´ïÐÅϢ֮ĿµÄÎ޹أ¬¸Ã·çÏÕϵÓëÐÅϢϵͳËù²úÉú»ò»ã×ÜÐÅÏ¢Ö®ÓÐÓÃÐÔÓëʱЧÐÔÓйء£ÒÀÐÔÖʶøÑÔ£¬ÐÅÏ¢µÄØü¹ØÐÔ·çÏÕÖ±½ÓÓ롸¾ö²ßÐÅÏ¢·çÏÕ¡¹Óйأ¬´Ë·çÏÕϵָÎÞ·¨½«¡¸ÕýÈ·¡¹Ö®Êý¾Ý»òÐÅÏ¢£¬´«´ï¸ø¡¸ÕýÈ·¡¹µÄ¾Óª¡¢Ïû·Ñ»ò¹ÜÀí¾ö²ßÕߣ¬ÔÚ¡¸ÕýÈ·¡¹µÄʱ¼äÄÚ×ö³ö¡¸ÕýÈ·¡¹Ö®¾ö²ß¡£´Ë·çÏÕÖ®·¢ÉúÖ÷ҪϵÒòδ³ä·ÖÁ˽âÐÅÏ¢ÐèÇó¼°È±·¦¶ÔʱЧÐÔµÄ×¢Ò⣬½ø¶øË𺦵½½»Ò×Ë«·½µÄÈ¨Òæ¡¢ÆóÒµ¾ºÕùµÄÓÅÊÆ»òÊǹÜÀíµÄÐ§ÒæÓëЧÂÊ¡£
2 ÐÅÏ¢·çÏÕ¹ÜÀí¶ÔÐÅÏ¢°²È«¹ÜÀíϵͳµÄÖØÒªÐÔ
2.1 ÐÅÏ¢°²È«¹ÜÀíϵͳµÄ½¨ÖóÌÐò
2.1.1 ×ÈÒÔBS7799ΪÀý£º
ÐÅÏ¢°²È«¹ÜÀíϵͳºÍISO9001£º2000Äê°æÒ»ÖµزÉÓᱼƻ®-Ö´ÐÐ-¼ì²é-Ðж¯¡±(Plan-Do-Check-Act£¬PDCA)֮ģʽ£¬²¢Ó¦ÓÃÓÚËùÓÐÐÅÏ¢°²È«¹ÜÀíϵͳ֮½¨Öùý³Ì¡£Í¼1ϵչʾÐÅÏ¢°²È«¹ÜÀíϵͳÈçºÎ²ÉÄÉÐÅÏ¢°²È«ÒªÇóÖ®ÊäÈë¼°Àûº¦¹ØÏµÍÅÌåÖ®ÆÚÍû×÷ΪÊäÈë¶Ë£¬¾Óɸ÷±ØÒª´ëÊ©¼°¹ý³Ì£¬²úÉú·ûºÏËùÐèÒªÇó¼°ÆÚÍûµÄÐÅÏ¢°²È«Êä³ö½á¹û¡£
ͼ1Ëùʾ֮PDCAģʽ£¬Í¬Ê±±íÏÖ×éÖ¯Ó¦ÔÚÕûÌåÒµÎñ»î¶¯Óë·çÏÕÏÂÖ´Ðпª·¢¡¢ÊµÊ©¡¢Î¬»¤¼°³ÖÐø¸Ä½øÐÅÏ¢°²È«¹ÜÀíϵͳ¡£PDCA¹ý³Ìģʽ²¢¿ÉÃèÊöÈçÏ£º P£º¼Æ»®£¨Plan£¬½¨Á¢ISMS£©£¬½¨Á¢°²È«Õþ²ß¡¢Ä¿±ê¡¢±êµÄ¡¢¹ý³Ì¼°Ïà¹Ø³ÌÐòÒÔ¹ÜÀí·çÏÕ¼°¸Ä½øÐÅÏ¢°²È«£¬Ê¹½á¹ûÓë×éÖ¯ÕûÌåÕþ²ßÓëÄ¿±êÏàÒ»Ö¡£ D£ºÖ´ÐУ¨Do£¬ÊµÊ©Óë²Ù×÷ISMS£©£¬°²È«Õþ²ß¡¢¿ØÖÆ´ëÊ©¡¢¹ý³ÌÓëÁ÷³Ì֮ʵʩÓë²Ù×÷¡£
C£º¼ì²é£¨Check£¬¼à¿ØÓëÉó²éISMS£©£¬ÒÀ¾Ý°²È«Õþ²ß¡¢Ä¿±êÓëʵ¼Ê¾Ñ飬ÒÔÆÀ¼ø¼°²âÁ¿(Êʵ±Ê±)¹ý³Ì¼¨Ð§£¬²¢½«½á¹û»Ø±¨¸ø¹ÜÀí½×²ã¼ÓÒÔÉó²é¡£ A£ºÐж¯£¨Act£¬Î¬³ÖÓë¸Ä½øISMS£©£¬ÒÀ¾Ý¹ÜÀí½×²ãÉó²é½á¹û²ÉÈ¡½ÃÕýÓëÔ¤·À´ëÊ©£¬ÒÔ´ï³É³ÖÐø¸Ä½øÐÅÏ¢°²È«¹ÜÀíϵͳ¡£
Page:7 of 25 ͼ1£ºISO±ê×¼Ëù²ÉÓÃÖ®PDCAģʽ
³ýÁËͼ1ËùʾISO±ê׼ģʽ֮Í⣬×Ƚ«Æä¸ÅÄîת»»³ÉÁíÒ»ÖÖ½¨ÖóÌÐòµÄ³ÊÏÖ(Ïêͼ2)£¬ÒÔÌṩ¶ÁÕß×öΪ½¨ÖÃÖ®²Î¿¼¡£
¶ÔÕÕPDCAµÄ¹ý³ÌÃèÊö£¬´ó¼Ò¿ÉÒÔ¿´µ½ÐÅÏ¢°²È«¹ÜÀíϵͳÓëÖÆ¶ÈÖ®½¨ÖÃÊÇÒ»¸öÑ»·²»¶ÏµÄ¹ý³Ì£¬ÆäÖеĻù´¡±ØÐëÏȽ¨Á¢Ä¿±êÓ밲ȫÕþ²ß¡£ÔÚÔË×÷¹ý³ÌÖÐÐèҪȡµÃÍêÕûµÄ¾ö²ßÐÅÏ¢(¿ÉÏë¶øÖª£¬ÈôÐÅÏ¢²»×ãʱÔòÆäÅжϽá¹û±ã»áÓÐÎó²î¡£ÔÙÀ´Õë¶Ô·çÏÕËù×öÖ®ÆóÒµ³ÖÐø²»¶ÏÖ®ÆÀ¹À¡¢¹ÜÀí¡¢¼à¶½ÐÞÕýµÈÐÐΪ½ÔÓëPDCAÓÐÖ±½Ó¹ØÁ¬¡£
½¨Á¢Ä¿±ê
IT Assets & Óë»ù´¡¼Ü¹¹ Security
Framework
Gap Analysis ÆÀ¹À·çÏÕ I.T. Audit Impact Analysis
³ÖÐøÐÔÐÞÕý ¹æ»®·çÏÕ ¾ö²ßÐÅÏ¢ ¹ÜÀí²ßÂÔ avoid / transfer/ reduce /accept ¼à¶½·çÏÕ¹ÜÀí Éè¼ÆÓëÖ´ÐÐ
³ÌÐò֮Ч¹û ·çÏտعܳÌÐò
I.T. Management IT Control & Security Policy
ͼ2£ºÐÅÏ¢°²È«¹ÜÀíϵͳ½¨ÖóÌÐò²Î¿¼Ê¾Òâͼ
2.1.2 ÐÅÏ¢°²È«¹ÜÀíϵͳ֮½¨Á¢²½Ö裺
A. ÒÀ¾ÝÒµÎñ¡¢×éÖ¯¡¢ËùÔÚλÖá¢×ʲú¼°¼¼ÊõµÈÌØÐÔ£¬¶¨ÒåÐÅÏ¢°²È«¹ÜÀíϵͳ֮·¶Î§¡£¼òµ¥µØËµ¾ÍÊÇÒª¾ö¶¨È«ÃæÊµÊ©»ò·Ö½×¶Î·Öµ¥Î»ÊµÊ©£¬´Ë¾Ù»áͬʱӰÏìÐÅÏ¢°²È«×ÊÔ´µÄ·ÖÅäÔËÓ㬶ԷçÏÕÆÀ¹ÀºóµÄ½ÓÊܶȣ¬ÒÔ¼°Ëù²ÉÓõķçÏÕ¹ÜÀí²ßÂÔ¡£ B. ÒÀ¾ÝÒµÎñ¡¢×éÖ¯¡¢ËùÔÚλÖá¢×ʲú¼°¼¼ÊõµÈÌØÐÔ£¬¶¨ÒåÐÅÏ¢°²È«¹ÜÀíϵͳ֮Õþ²ß£¬ÇÒÐ룺
Page:8 of 25
¹²·ÖÏí92ƪÏà¹ØÎĵµ