ISO IEC 17799 2000 ARCHIVE
PLAIN ENGLISH OVERVIEW
OF |
ISO 17799 2000 is now OBSOLETE. See ISO IEC 27002 2013. |
3.1 Establish an information security policy. |
3.1.1 Develop an information security policy document.
|
3.1.2 Review and evaluate your information security policy.
|
4.1 Establish a security infrastructure. |
4.1.1 Set up a management information security forum.
|
4.1.2 Co-ordinate information security implementation.
|
4.1.3 Allocate information security responsibilities.
|
4.1.4 Establish an authorization process for new facilities.
|
4.1.5 Identify specialized information security advisors.
|
4.1.6 Maintain relationships with other organizations.
|
4.1.7 Perform independent security policy reviews.
|
4.2 Control third party access to facilities. |
4.2.1 Identify third party access risks. |
4.2.1.1 Consider types of third party access.
|
4.2.1.2 Establish special information access controls.
|
4.2.1.3 Control on-site contractor information access.
|
4.2.2 Use contracts to control third party access.
|
4.3 Control outsourced information processing. |
4.3.1 Use contracts to control outsourced services.
|
5.1 Make information asset owners accountable. |
5.1.1 Compile an inventory of all information assets.
|
5.2 Use an information classification system. |
5.2.1 Develop information classification guidelines.
|
5.2.2 Use information handling and labeling procedures.
|
6.1 Control your personnel recruitment process. |
6.1.1 Include security in your job descriptions.
|
6.1.2 Check the backgrounds of your job applicants.
|
6.1.3 Use confidentiality or non-disclosure agreements.
|
6.1.4 Use employment contracts to protect information.
|
6.2 Provide information security training. |
6.2.1 Control your information security training.
|
6.3 Respond to information security incidents. |
6.3.1 Report information security incidents.
|
6.3.2 Report security threats and weaknesses.
|
6.3.3 Control your software malfunctions.
|
6.3.4 Learn from your security incidents.
|
6.3.5 Develop a disciplinary process.
|
7.1 Use secure areas to protect facilities. |
7.1.1 Use perimeters to protect facilities.
|
7.1.2 Use entry controls to protect secure areas.
|
7.1.3 Use design strategies to protect secure areas.
|
7.1.4 Use work guidelines to protect secure areas.
|
7.1.5 Use holding areas to protect secure areas.
|
7.2 Protect equipment from hazards. |
7.2.1 Safeguard your equipment.
|
7.2.2 Protect your power supplies.
|
7.2.3 Secure your cables.
|
7.2.4 Maintain your equipment.
|
7.2.5 Control off-site equipment.
|
7.2.6 Control equipment disposal.
|
7.3 Control access to information and property. |
7.3.1 Establish a clear-desk and clear-screen policy.
|
7.3.2 Control the removal of property.
|
8.1 Establish operational procedures. |
8.1.1 Document your operating procedures.
|
8.1.2 Control changes to facilities and systems.
|
8.1.3 Establish incident management procedures.
|
8.1.4 Segregate control over key responsibilities.
|
8.1.5 Separate systems development and operations.
|
8.1.6 Control the management of external facilities.
|
8.2 Develop plans to provide future capacity. |
8.2.1 Monitor usage and meet future requirements.
|
8.2.2 Use acceptance criteria to test systems.
|
8.3 Protect against malicious software. |
8.3.1 Detect and prevent malicious software.
|
8.4 Establish housekeeping procedures. |
8.4.1 Back-up your information and software.
|
8.4.2 Maintain a log of operator activities.
|
8.4.3 Report and log system faults.
|
8.5 Safeguard your computer networks. |
8.5.1 Establish network security controls.
|
8.6 Protect and control computer media. |
8.6.1 Manage removable computer media.
|
8.6.2 Control the disposal of your media.
|
8.6.3 Control information handling and storage.
|
8.6.4 Protect your system documentation.
|
8.7 Control interorganizational exchanges. |
8.7.1 Develop information exchange agreements.
|
8.7.2 Safeguard the transportation of computer media.
|
8.7.3 Create controls to protect ecommerce.
|
8.7.4 Establish controls to protect email. |
8.7.4.1 Control the use of email.
|
8.7.4.2 Develop an email policy.
|
8.7.5 Protect your electronic office systems.
|
8.7.6 Control your public information systems.
|
8.7.7 Regulate external communications.
|
9.1 Control access to information. |
9.1.1 Develop a policy and rules to control access. |
9.1.1.1 Develop a policy to control information access.
|
9.1.1.2 Develop information access control rules.
|
9.2 Manage the allocation of access rights. |
9.2.1 Establish a user registration procedure.
|
9.2.2 Control the authorization of system privileges.
|
9.2.3 Establish a process to manage passwords.
|
9.2.4 Review user access rights and privileges.
|
9.3 Encourage responsible access practices. |
9.3.1 Encourage users to protect passwords.
|
9.3.2 Encourage users to protect equipment.
|
9.4 Control access to computer networks. |
9.4.1 Formulate a network use policy.
|
9.4.2 Use enforced paths to control access.
|
9.4.3 Authenticate remote user connections.
|
9.4.4 Use node authentication to control remote users.
|
9.4.5 Control remote access to diagnostic ports.
|
9.4.6 Segregate internal and external networks.
|
9.4.7 Restrict connection to shared networks.
|
9.4.8 Establish shared network routing controls.
|
9.4.9 Verify the security of network services.
|
9.5 Restrict access at operating system level. |
9.5.1 Use automatic terminal identification techniques.
|
9.5.2 Establish terminal log-on procedures.
|
9.5.3 Identify and authenticate all users.
|
9.5.4 Set up a password management system.
|
9.5.5 Control the use of all system utilities.
|
9.5.6 Provide duress alarms to protect users.
|
9.5.7 Use time-outs to protect inactive terminals.
|
9.5.8 Restrict terminal connection times.
|
9.6 Manage access to application systems. |
9.6.1 Regulate access to applications and information.
|
9.6.2 Isolate sensitive application systems.
|
9.7 Monitor system access and use. |
9.7.1 Establish and maintain system logs.
|
9.7.2 Monitor information processing facilities. |
9.7.2.1 Establish procedures to monitor facilities.
|
9.7.2.2 Review the results of monitoring activities.
|
9.7.2.3 Study logs to identify security events.
|
9.7.3 Protect logs by synchronizing clocks.
|
9.8 Protect mobile and teleworking assets. |
9.8.1 Protect mobile equipment and information.
|
9.8.2 Protect teleworking equipment and information.
|
10.1 Identify system security requirements. |
10.1.1 Specify security controls and requirements.
|
10.2 Build security into your application systems. |
10.2.1 Build input data validation in your systems.
|
10.2.2 Build processing controls into your systems. |
10.2.2.1 Design processing controls to minimize risk.
|
10.2.2.2 Incorporate processing checks and controls.
|
10.2.3 Build message authentication into your systems.
|
10.2.4 Build output data validation into your systems.
|
10.3 Use cryptography to protect information. |
10.3.1 Develop a policy on the use of cryptography.
|
10.3.2 Encrypt sensitive or critical information.
|
10.3.3 Protect documents with digital signatures.
|
10.3.4 Use non-repudiation services to resolve disputes.
|
10.3.5 Establish a key management system. |
10.3.5.1 Protect your cryptographic keys.
|
10.3.5.2 Use secure methods to manage keys.
|
10.4 Protect your organization's system files. |
10.4.1 Control the implementation of software.
|
10.4.2 Control the use of system data for testing.
|
10.4.3 Control access to program source library.
|
10.5 Control development and support. |
10.5.1 Establish change control procedures.
|
10.5.2 Review changes to operating system.
|
10.5.3 Restrict changes to software packages.
|
10.5.4 Safeguard against covert channels and Trojans.
|
10.5.5 Control outsourced software development.
|
11.1 Design a continuity management process. |
11.1.1 Establish your continuity management process.
|
11.1.2 Perform threat analysis and impact analysis.
|
11.1.3 Develop your business continuity plans.
|
11.1.4 Maintain a continuity planning framework.
|
11.1.5 Test and update continuity management plans. |
11.1.5.1 Test business continuity management plans.
|
11.1.5.2 Update business continuity management plans.
|
12.1 Comply with legal requirements. |
12.1.1 Identify all relevant legal requirements.
|
12.1.2 Respect intellectual property rights. |
12.1.2.1 Create intellectual property procedures.
|
12.1.2.2 Comply with all software copyrights.
|
12.1.3 Safeguard your organization's records.
|
12.1.4 Protect the privacy of personal information.
|
12.1.5 Prevent misuse of data processing facilities.
|
12.1.6 Control the use of cryptographic controls.
|
12.1.7 Collect evidence to support your actions. |
12.1.7.1 Comply with appropriate rules of evidence.
|
12.1.7.2 Gather evidence that is admissible in court.
|
12.1.7.3 Protect the quality of your evidence.
|
12.2 Perform security compliance reviews. |
12.2.1 Review compliance with security policy.
|
12.2.2 Review technical security compliance.
|
12.3 Carry out operational system audits. |
12.3.1 Plan the audit of operational systems.
|
12.3.2 Protect your system tools.
|
Praxiom Research Group Limited help@praxiom.com 780-461-4514 |
|||
Updated on March 27, 2014. First published on October 28, 2004. |
|||
Legal
Restrictions on the Use of this Page
Copyright © 2004 - 2014 by Praxiom Research Group Limited. All Rights Reserved. |