收藏 分享(赏)

ISO-IEC-27005-2018.pdf

上传人:益****师 文档编号:234748 上传时间:2023-03-14 格式:PDF 页数:59 大小:3.81MB
下载 相关 举报
ISO-IEC-27005-2018.pdf_第1页
第1页 / 共59页
ISO-IEC-27005-2018.pdf_第2页
第2页 / 共59页
ISO-IEC-27005-2018.pdf_第3页
第3页 / 共59页
ISO-IEC-27005-2018.pdf_第4页
第4页 / 共59页
ISO-IEC-27005-2018.pdf_第5页
第5页 / 共59页
ISO-IEC-27005-2018.pdf_第6页
第6页 / 共59页
亲,该文档总共59页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、INTERNATIONALISO/IECSTANDARD27005Third edition2018-07Information technology-Securitytechniques-Information securityrisk managementTechnologies de Iinformation-Techniques de securite-Gestiondes risques lies a la securite de linformationReference numberIEC1S0/1EC27005:2018(E)1S0/1EC2018Not for Resal,0

2、7/18/2018 02-25:28 MOTIS0/IEC27005:2018E)COPYRIGHT PROTECTED DOCUMENTIS0/1EC2018All rights reserved.Unless otherwise specified,or required in the context of its implementation,no part of this publication maybe reproduced or utilized otherwise in any form or by any means,electronic or mechanical,incl

3、uding photocopying or postingon the internet or an intranet,without prior written permission.Permission can be requested from either ISO at the addressbelow or ISOs member body in the country of the requester.IS0 copyright officeCP 401.Ch.de Blandonnet 8CH-1214 Vernier,GenevaPhone:+41227490111Fax+41

4、227490947Email:copyrightiso.orgWebsite:www.iso.orgPublished in SwitzerlandISO/IEC 2018-All rights reservedNot for Resale,07/18/2018 02-25:28 MDTIS0/1EC27005:2018E)ContentsPageForeword.VIntroduction1Scope12Normative references23Terms and definitions14Structure of this document1SBackground26Overview o

5、f the information security risk management process37Context establishment.57.1General considerations7.2Basic criteria.67.2.1Risk management approach67.2.2Risk evaluation criteria67.2.3Impact criteria67.2.4Risk acceptance criteria7.3Scope and boundaries.77.4Organization for information security risk

6、managementPInformation security risk assessment.8.1General description of information security risk assessment88.2Risk identification.8.2.1Introduction to risk identification98.2.2Identification of assets_98.2.3Identification of threats108.2.4Identification of existing controls108.2.5Identification

7、of vulnerabilities.118.2.6Identification of consequences128.3Risk analysis.128.3.1Risk analysis methodologies.128.3.2Assessment of consequences138.3.3Assessment of incident likelihood148.3.4Level of risk determination.158.4Risk evaluation.159Information security risk treatment.169.1General descripti

8、on of risk treatment169.2Risk modification189.3Risk retention.99.4Risk avoidance199.5Risk sharing.1910Information security risk acceptance2011Information security risk communication and consultation.2012Information security risk monitoring and review2112.1 Monitoring and review of risk factors2112.2

9、 Risk management monitoring,review and improvement.22Annex A(informative)Defining the scope and boundaries of the information security riskmanagement process.24Annex B(informative)Identification and valuation of assets and impact assessment28Annex C(informative)Examples of typical threats.37All righ

10、ts reserved进Na色Rsa鱼,071201m02Z8MDTIS0/IEC27005:2018EAnnex D(informative)Vulnerabilities and methods for vulnerability assessment.41Annex E(informative)Information security risk assessment approaches.45Annex F(informative)Constraints for risk modification.51Bibliography53a”watwwIS0/IEC 2018-All right

11、s reservedNa包Raak,07I18201a022益28MDTIS0/1EC27005:2018E)ForewordISO(the International Organization for Standardization)and IEC(the International ElectrotechnicalCommission)form the specialized system for worldwide standardization.National bodies that aremembers of ISO or IEC participate in the develo

12、pment of International Standards through technicalcommittees established by the respective organization to deal with particular fields of technicalactivity.ISO and IEC technical committees collaborate in fields of mutual interest.Other internationalorganizations,governmental and non-governmental,in

13、liaison with ISO and IEC,also take part in thework.In the field of information technology,ISO and IEC have established a joint technical committee,ISO/IEC ITC 1.The procedures used to develop this document and those intended for its further maintenance aredescribed in the ISO/IEC Directives,Part 1.I

14、n particular the different approval criteria needed forthe different types of document should be noted.This document was drafted in accordance with theeditorial rules of the ISO/IEC Directives,Part 2(see www.iso org/directives).Attention is drawn to the possibility that some of the elements of this

15、document may be the subjectof patent rights.ISO and IEC shall not be held responsible for identifying any or all such patentrights.Details of any patent rights identified during the development of the document will be in theIntroduction and/or on the ISO list of patent declarations received(see www.

16、iso,org/patents).Any trade name used in this document is information given for the convenience of users and does notconstitute an endorsement.For an explanation on the voluntary nature of standards,the meaning of ISO specific terms andexpressions related to conformity assessment,as well as informati

17、on about ISOs adherence to theiWorld Trade Organization(WTO)principles in the Technical Barriers to Trade(TBT)see the followingURL:www.iso.org/iso/foreword.html.This document was prepared by Technical Committee ISO/IEC JTC 1,Information technology,?Subcommittee SC 27,IT Security techniques.Any feedb

18、ack or questions on this document should be directed to the users national standards body.Acomplete listing of these bodies can be found at www.iso.org/members.html.This third edition cancels and replaces the second edition(ISO/IEC 27005:2011)which has beentechnically revised.The main changes from t

19、he previous edition are as follows:-all direct references to the ISO/IEC 27001:2005 have been removed;clear information has been added that this document does not contain direct guidance on theimplementation of the ISMS requirements specified in ISO/IEC 27001(see Introduction);ISO/IEC 27001:2005 has been removed from Clause 2;ISO/IEC 27001 has been added to the Bibliography;Annex G and all references to it have been removed;editorial changes have been made accordingly.All rights reservedNot for Resal,07/18/201802-25:28 MDT

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 专业资料 > 国外标准

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2