ISO IEC 27002:2013 pdf free download

06-30-2021 comment

ISO IEC 27002:2013 pdf free download.Information technology — Security techniques — Code of practice for information security controls.
ISO IEC 27002 Is designed for organizations to use as a reference for selecting controls within the process of ImplementIng an Information Security Management System (ISMS) based on lSO/IEC 270011i.Dl or as a guidance document for organizations implementing commonly accepted Information security controls. ISO IEC 27002 Is also Intended for use In developing industry- and organIzation-speciFic information security management guidelines, taking into consideration their specific information security risk environment(s).
Organizations nf all types and sizes (including public and private sector, commercial and non-profit) collect, process, store and transmit information in many forms including electronic, physical and verbal (e.g. conversations and presentations).
The value ofinformation goes beyond the written words, numbers and images: knowledge, concepts, ideas and brands are examples of intangible forms olinformation. In an interconnected world, information and related processes, systems, networksand personnel Involved in their operation. handlingand protection are assets that, like other important business assets, are valuable to an organization’s business and consequently deserve or require protection against various hazards.
Assets are subject to both deliberate and accidental threats while the related processes, systems, networks and people have inherent vulnerabilities. Changes to business processes and systems or other external changes (such as new laws and regulations) may create new Information security risks. Therefore, given the multitude of ways In which threats could take advantage of vulnerabllltles to harm the organization. Information security risks are always present, Effective information security reduces these risks by protecting the organization against threats and vulnerabilitles, and then reduces Impacts to its assets.
Information security is achieved by implementing a suitable set of controls, including policies, processes. procedures, organizational structures and software and hardware functions. These controls need to be established, implemented, monitored, reviewed nd improved, where necessary, to ensure that the specific security and business objectives of the organization are met. An ISMS such as that specified In ISO/IEC 27001111)1 takes a holistic, coordinated view of the organization’s Information security risks In order to Implement a comprehensive suite of Information security controls under the overall framework of a coherent management system.
Many information systems have not been designed to be secure in the senseof ISO/IEC 27001L1.Dl and this standard. The security that can be achieved through technical means is limited and should be supported by appropriate management and procedures. Identifying which controls should be in place requires careful planning and attention to detail. A successful ISMS requires support by all employees in the organization, It can also require participation from shareholders, suppliers or other external parties. Specialist advice from external parties can also be needed.
In a more general sense, effective Information security also assures management and other stakeholders that the organization’s assets are reasonably safe and protected against harm, thereby acting as a business enabler.
0.2 Information security requirements
It is essential that an organization Identifies Its security requirements, There are three main sources of security requirements;
a) the assessment of risks to the organization, taking Into account the organization’s overall business strategy and objectives. Through a risk assessment, threats to assets are identified, vulnerability to and likelihood of occurrence is evaluated and potential impact is estimated:
b) the legal, statutory, regulatory and contractual requirements that an organization, its trading partners, contractors and service providers have to satisfy, and their soclo-cultural environment;
access controls:
g) cryptographic techniques;
h) maiware protection;
i) remote disabling, erasure or lockout;
j) backups;
k) usage of web services and web apps.
Care should be taken when using mobile devices in public places, meeting rooms and other unprotected areas. Protection should be in place to avoid the unauthorized access to or disclosure of the information stored and processed by these devices, e.g. using cryptographic techniques (see CLauselO) and enforcing use of secret authentication information (see 92.4).
Mobile devices should also be physically protected against theft especially when left, for example, In cars and other forms of transport, hotel rooms, conference centres and meeting places. A specific procedure taking Into account legal, Insurance and other security requirements of the organization should be established for cases of theft or loss of mobile devices. Devices carrying important, sensitive or critical business information should not be left unattended and, where possible, should be physically locked away, or special locks should be used to secure the devices.
Training should be arranged for personnel using mobile devices to raise theirawareness ofthe additional risks resulting from this way olworking and the controls that should be implemented.
Where the mobile device policy aLlows the use of privately owned mobile devices, the policy and related security measures should also consider:
a) separation of private and business use of the devices, including using software to support such separation and protect business data on a private device;
b) providing access to business Information only after users have signed an end user agreement adcnowledglng their duties (physical protection, software updating, etc.). waiving ownership of business data, allowing remote wiping of data by the organization In case oltheft or loss of the device or when no longer authorized to use the service. This policy needs to take account oIprivacy legisLation.
Other information
Mobile device wireless connections are similarto other types of network connection, but have Important differences that should be considered when identifying controls. ‘l’plcal differences are:
a) some wireless security protocols arc Immature and have known weaknesses;
b) information stored on mobile devices may not be backed-up because of limited network bandwidth or because mobile devices may not be connected at the times when backups are scheduled.
Mobile devices generally share common functions, e.g. networking, Internet access, e-mail and file handling, with fixed use devices. Information security controls for the mobile devices generally consist of those adopted In the fixed use devices and those to address threats raised by their usage outside the organization’s premises.
6.2.2 Teleworklng Control
A policy and supporting security measures should be implemented to protect information accessed, processed oc stored at teleworking sites.
Appropriate and timely action should be taken in response to the identification of potential technical vulnerabilitles. The Following guidance should be fol owed to establish an effective management process for technical vulnerabilitles:
a) the organization should define and establish the roles and responsibilities associated with technical vulnerability management, including vulnerability monitoring, vulnerability risk assessment. patching, asset tracking and any coordination responsibilities required;
Li) information resources that will be used to identify relevant technical vutnerabilities and to maintain awareness about them should be identified for software and other technology (based on the asset inventory list, see UJ,.1); these information resources should be updated based on changes in the inventory or when other new or useful resources are found;
c) a timelinc should be defined to react to notifications of potentially relevant technical vulnerabilitics;
d) once a potential technical vulnerability has been identified, the organization should identify the associated risks and the actions to be taken; such action could involve patching of vulnerable systems or applying other controls;
e) depending on how urgently a technical vulnerability needs to be addressed, the actIon taken should be carried out according to the controls related to change management (see ILLZ) or by following information security incident response procedures (see IfL);
f) if a patch is avaibble from a legitimate source, the risks associated with installing the patch should be assessed (the risks posed by the vulnerability should be compared with the risk of installing the patch);
g) patches should be tested and evaluated before they are installed to ensure they are effective and do not result In side effects that cannot be tolerated; If no patch is available, other controls should be considered, such as;
1) turning off services or capabilities related to the vulnerability;
2) adapting or adding access controls. e.g. firewalls, at network borders (see lii);
3) Increased monitoring to detect actual attacks;
4) raIsing awareness of the vulnerability; h) an audit log should be kept far all procedures undertaken;
i) the technical vulnerability management process should be regularly monitored and evaluated in order to ensure Its effectiveness and efficiency;
j) systems at high risk should be addressed first;
k) an effective technic-al vulnerability management process should be aligned with incident management activities, to communicate data on vulnerabilities to the incident response function and provide technical procedures to he carried out should an incident occur;
l) define a procedure to address the sItuation where a vulnerability has been Identified but there is no suitable countermeasure, In this situation, the organization should evaluate risks relating to the known vulnerability and define appropriate detective and corrective actions.

Download infomation Go to download
Note: If you can share this website on your Facebook,Twitter or others,I will share more.

ISO 9885:1991 download free

ISO 9885:1991 download free.Wide-mouth glass containers - Deviation from flatness of top sealing surface - Test methods. ISO 9885 specifies two complementary test methods for the determination or the deviation from flatness of the top sealing surface...
Download Now

ISO 9009:1991 download

ISO 9009:1991 download.Glass containers — Height and non-parallelism of finish with reference to container base — Test methods. ISO 9009 specifies test methods for determining the height and the non-parallelism of finish with reference to the container...
Download Now

ISO 10076:1991 pdf free download

ISO 10076:1991 pdf free download.Metallic powders — Determination of particle size distribution by gravitational sedimentation in a liquid and attenuation measurement. The settling behaviour under gravity of a given mass of particles dispersed in an initially static...
Download Now

LEAVE A REPLY

Anonymous netizen Fill in information