ISO IEC 270322023.docx

上传人:田海滨 文档编号:521571 上传时间:2025-07-29 格式:DOCX 页数:15 大小:33.63KB
下载 相关 举报
ISO IEC 270322023.docx_第1页
第1页 / 共15页
ISO IEC 270322023.docx_第2页
第2页 / 共15页
ISO IEC 270322023.docx_第3页
第3页 / 共15页
ISO IEC 270322023.docx_第4页
第4页 / 共15页
ISO IEC 270322023.docx_第5页
第5页 / 共15页
点击查看更多>>
资源描述

1、INTERNATIONA1.STANDARDISO/IEC27032editionSecond2023-06CybersecurityGuide1.inesforInternetsecurityCybersecurity1.ignesdirectricesre1.atives1.a*curiCdsurin1.ernetReferencenumberISO/IEC27032:2023(E)ISO/IEC2023COPYRIGHTPROTECTEDDOCUMENTIS0/1EC2023IUirhM*hedbdi1.iUedotherwiseupdhi.o啪InyM1.tta0DmkfifiU81.

2、andonnet8CH-1214Vernier,GenevaPhone:M1.227490111觥ftte:丽丽BQrgPub1.ishedinSwitzer1.andContentsForewordIntroductionv2 Scope13 Normativereferences14 Termsanddefinitions5 崛阑8愕WatWeenIntemetsecurtty1Websecurity,networksecurityand4cybersecurity5OverviewofInternetsecurity7Interestedpart1.es871(Genera1.87.2U

3、se111J7.8CGafffatmiaitdauthoritiesstaDdardizationorganisations107.51.awenforcementagencies1037.6Internetserviceproviders10Internetsecurityriskassessmentandtreatment118.1Genero1.118.2ThreatsIISecurityguide1.inesfortheInternet1391Gccro1.-139.2Contro1.sforInternetsecurity149.2.2 ohci三iforInternetsecuri

4、ty.-149.2.3 Accesscontro1.149.2.4 Education,awarenessandtraining15强筋肝itym硼HWnagement59.2.7 Supp1.iermanagement179.2.8 BusinesscontinuityovertheInternet189.2.10 VffY3fi(ityprotectionman9f,et189.2.11 Networkmanagement209.2.12 Protectionagainstma1.ware21纥:也随IWcaUonm科娜肺Ie!egis1.atgnandComPIianCereqUirem

5、enH_9.2.15 USeOfCryPtOgraPhy229.2.16 App1.icationsecurityforInternet-facingapp1.ications.一.229.2.17 Endpointdevicemanagement9.2.18 Monitoring-24Annex(informative)Cross-referencesbetweenthisdocumentandISO/IEC2700225,三-一,-“B-,*-IntroductioncommonInternetsecuritythreats,suchas:-zerodayattacks;hacking;a

6、ndInternetguidancewithindocumentprovidestechnica1.andnon-technica1.contro1.sforaddressingthepreventingattacks;respondingtoattacks.documenta1.soandfocusesPreservationasconfidentia1.ityccountabi1.ity,non-repudiationinformationre1.iabi1.ityThisinc1.udesInternetsecurityguidancefor:-po1.icies;processes;a

7、ndtechnica1.specificationdocunient.andthegiiide!inesapp!icab1.earenecessari1.yarereferencedDetai1.edsupportingCritica1.doesinfrastnictureornationa1.security.However1OrganizationscontroIsmentionedsystemsThisdocument27701,i1.1.ustrate:ConCePtSfromISO/IEC27002,theISO/IEC27033series,ISO/IECTS27100Intern

8、et-facingSyStemSJntemetsecuritycontro1.scitedin-1K2,addressingcyber-securityreadinessforISOIEC2023-A1.1.rightsreservedhefocusofthisdocumentistoaddressInternetsecurityissuesandprovideguidanceforaddressing socia1.engineeringattacks; privacyattacks; thepro1.iferationofma1.icioussoftware(ma1.ware),spywa

9、reandotherpotentia1.1.yunwantedsoftware.Thesecurityrisks,thisinc1.udingcontro1.sfor: preparingforattacks; detectingandmonitoringattacks;andTheguidancefocusesonprovidingindustrybestpractices,broadconsumerandemp1.oyeeeducationtoassistinterestedpartiesinp1.ayinganactivero1.etoaddresstheInternetsecurity

10、cha1.1.enges.ThetheInternetotheronproperties,Suchofauthenticity,integrityandavai1.abi1.ityofandoverthatcana1.sobeinvo1.ved.-ro1.es; methods; app1.icab1.etechnica1.contro1.s.Giventhisstanda&scontro1.sprovidedtoeachataHigh-Ieve1.withinthedocumentforfurtherguidance.SeeAnnexAforthecorrespondencebetweent

11、hecontro1.scitedinthisdocumentandthoseinISO/IEC27002.Thisdocumentnotspecifica1.1.yaddresscontro1.sthatmostofthecanrequireforinthisdoCUrnentcanbeapp1.iedtosuchsystems.andISO/IECUsestoexisting there1.ationshipbetweenInternetsecurity,websecurity,networksecurityandcybersecurity;detai1.edguidanceonj3nmut

12、11xaei01a1.trarBfrk.aUscttjby1.owarrtahseMisncfu11B1.s.itiscritica1.toaddressthere1.evantsecurityrisks.CybersecurityGuide1.inesforInternetsecurity1ScopeThisdocumentprovides:anexp1.anationcybersecurity;ofthere1.ationshipbetweenInternetsecurity,websecurity,networksecurityandanoverviewofIntenietsecurit

13、y;identificationofinterestedpartiesandadescriptionOftheirro1.esinInternetsecurity;一high-1.eve1.guidanceforaddressingcommonInternetsecurityissues.?hi5南州WftiV七甲WhHEsorganizationsthatusetheInternet.2Ws回睡啊咻明即住9hisrt用ent.幅屈曲Hnre脑脸小将丽釉fteediH6na1.iSip1.ies.曲ftentundatedreferences,the1.atesteditionoftheref

14、erenceddocument(inc1.udinganyamendments)app1.ies.性济瞰T3P2ewm/0照0J岫脱次ZSecuritytechniquesInformationsecuritymanagement3TermsanddefinitionsForthepurposesofthisdocument,thetermsanddefinitionsgiveninISO/IEC27000,andthefo1.1.owingapp1.y.ISOandIECmaintaintermino1.ogydatabasesforuseinstandardizationatthefo1.

15、1.owingaddresses:ISOOn1.inebrowsingp1.atform:avai1.ab1.eatHp+WWwJso.erg/ObPj-jIECE1.ectropedia:avai1.ab1.eathttps:/www.e1.ectropedia.org/attackvectorpathormeansbywhichanattackercangainaccesstoacomputerornetrorkserverinordertode1.iverama1.iciousoutcomeEXAMP1.E1IoTdevices.P1.E2Smartphones.attackerpers

16、onde1.iberate1.yexp1.oitingvu1.nerabi1.itiesintechnica1.andnon-technica1.securitycontro1.sinordertostea1.orcompromiseinformationsystemsandnetworks,ortocompromiseavai1.abi1.ityto1.egitimateusersOfinformationsystemandnetworkresourcesSOURCE:ISO/IEC27033-1:2015,3.33.3b1.endedattack3.4botNotefonvardingor

17、sortingemai1.oftenusedtodescribeprograms,usua1.1.yrunonaserver,thatautomatetaskssuchsimu1.ateshumanaccesswebsitesand1.nternetthe1.rContentubiquitousengineIndeXeSprQgrams,a1.soca1.1.edspidersor3.5 botnetEXAMP1.EtoDistributeddenia1.-of-serice(DDoS)par(nodes.Coordinatedbotnetcontro1.1.ercandirecttheuse

18、rs3.6cybersecurityNote1toentry:Safeguardingmeanstokeepcyberriskatato1.erab1.e1.eve1.3.7 darknetNote1toentry:Thedarknetisa1.soknownasthedarkweb.deceptivesoftwareEXAMP1.E1Aprogramthathijacksuserconfigurations.EXAMP1.E3Adwareandspyware.hacking3.10hacktivism3.11InternetSOURCE:ISO/IEC27033-1:2015,3.14,mo

19、dified,thehasbeende1.etedfromtheterm.attackthatsee1.uu)maximizetheseverityofdamageandspeedofcontagionbycombiningmu1.tip1.eattackvectors(3.1)automatedsoftwareprogramusedtocarryoutspecifictasksas1toentry:ThiswordisNote2toentry:Abotisa1.sodescribedasaprogramthatoperatesasanagentforauseroranotherprogram

20、orcraw1.ers,awhichactivity.OnthegathermostforScarchbotsarctheco1.1.ectionofremote1.ycontro1.1.edma1.iciousbotsthatrunautonomous1.yorautomatica1.1.yoncompromisedcomputerscomputergeneratetraffictothird-part)rsiteasofawheretheDDoSattack.safeguardingofpeop1.e,society,organizationsandnationsfromcyberrisk

21、sSOURCE:1SOIECTS27100:2020,3.2networkofsecretwebsiteswithintheInternetthatcanon1.ybeaccessedwithspecificsoftware3.8softwarewhichperformsactivitiesonauserscomputerwithoutfirstnotifyingtheuserastoexact1.ywhatthesoftwarewi1.1.doonthecomputer,oraskingtheuserforconsenttotheseactionsEXAMP1.E2programthatca

22、usesend1.esspopupadvertisementswhichcannotbeeasi1.ystoppedbyCheuser.3.9intentiona1.1.yaccessingacomputersystemwithouttheauthorizationoftheuserortheownerhacking(3.9)forapo1.itica1.1.yorsocia1.1.ymotivatedpurposeg1.oba1.systemofinter-connectednetworksinthepub1.icdomainAnnexACross-referencesbetweenthis

23、documentandISO/IEC27002tshowsthecorrespondencebetweencontro1.sInternetcontainsthere1.evant5.1Po1.iciesforinfomadonsecuritysubc1.auseTab1.eA.1.Mappingbetweencontro1.sforInternetsecurity2Po1.iciesforInternetsecurityISOIIC2023-1.1.rightsreservedp1.ierservices(informative)Tab1.eA.1.andIhecontro1.scontai

24、nedin!SOIECthe27002.Eachforco1.umnsecuritycitedin9.2ofthisnumberandsubheading.ISO/IEC27032ISO/IEC27002:20225.18Accessrightsandpreparationevents5.25Assessmentanddecisiononinformationsecurity5.26 Responsetoinformationsecurityincidents5.27 1.earningfrominformationsecurityincidents25assetsagreementsChaM

25、5.21ManaginginformationsecurityintheICTsupp1.y5.22Monitoring,renewandchangemanagementofsup-5.23Informationsecurityforuseofc1.oudservicesTab1.e.1.(continued)1SOIEC270321SOIEC27002:2022BusinesscontinuityovertheInternet5.29 informationsecurityduringdisruption5.30 ICTreadinessforbusinesscontinuity8.25 S

26、ecuredeve1.opment1.ifecyc1.e8.26 App1.icationsecurityrequirementsp1.es8.27Securesystemarchitectureandengineeringprinci-9.2.18Monitoring8.151.ogging8.16MonitoringactivitiesBib1.iography1ISO9000:2015,Qua1.itymanagementsystemsFundamenta1.sandvocabu1.ary3ISO19101-1:2014,GeographicinformationReferencemod

27、e1.Part1:Fundamenta1.sRequirementsservicepartners(CSNs)securitymanagementsystemsRequirementssecuritycontro1.smanaginginformationsecurityrisksinformationsecuritycontro1.sbasedonISO/IEC27002forc1.oudservicesprotectionofpersona1.1.yidentifiab1.einformation(PII)inpub1.icc1.oudsactingasP1.1.processorsand

28、communicationtechno1.ogyreadinessforbusinesscontinuity13ISO/IEC27034(a1.1.parts),Informationtechno1.ogyApp1.icationsecurityincidentmanagement16ISO/IEC/TS27100:2020,Informationtechno1.ogyCybersecurityOverviewandconceptsprivacyinformationmanagementRequirementsandguide1.ines119management29146:2016,Info

29、rmationtechno1.ogySecuritytechniquesframeworkforaccess21ProCeSSeS30111:2019,Informationtechno1.ogySecuritytechniquesVu1.nerabi1.ityhand1.ing23on1.ineWEBAPP1.ICATIONSECURITYAvai1.ab1.eat(OWASP),OWASP.org/wwwSecurityTesting-security272ISO/IEC15408(a1.1.parts)4ISO22301:2019,Securityandresi1.ienceBusine

30、sscontinuitymanagementsystems14ISO1EC27035(a1.1.parts).Informationtechno1.ogySecuritytechniquesInformationsecurity17ISO/IEC27701:2019,SecuritytechniquesExtensiontoISO/IEC27001andISO1EC27002for1SOIEC20ISO/IEC29147:2018,Informationtechno1.ogySecuritytechniquesVu1.nerabi1.itydisc1.osureISO/IEC22ISO31000:2018,RiskmanagementGuide1.inesOPENviewed2020-12-03J.PROJECThttpsowaspVVeb-project-webGuide,testing-guide/24teaeWEBAv浦阉1.U1.k1.UoMSfiy触网口晚T(OWASP),OWASPTop10,on1.ineviewed2022-

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 行业资料 > 国内外标准规范

宁ICP备18001539号-1