ISO IEC 17799 2000TRANSLATED INTO PLAIN ENGLISHSection 4: Organizational StructureDETAILED STANDARD |
||
ISO IEC 17799 2000 is now OBSOLETE. Please see the NEW ISO IEC 27002 2013 Standard. |
4.1 ESTABLISH A SECURITY INFRASTRUCTURE |
|
|
Establish a management framework to control
how |
|
Establish a management forum that you can use
to |
|
Establish a management forum to co‑ordinate
and control the |
|
Establish a management forum that you can use
to |
|
Make sure that you have access to information
security |
|
Make sure that your internal experts are able
|
|
Make sure that you have access to external
|
|
Make sure that your external advisors help you
to monitor |
|
Make sure that your external information
security experts |
|
Make sure that your organization encourages
the use |
4.1.1 SET UP A MANAGEMENT INFORMATION SECURITY FORUM |
|
|
Assign the responsibility for information
security |
|
Establish a management forum that you can
|
|
Make sure that your security management forum
|
|
Make sure that your security management forum
ensures |
|
Make sure that your security management forum
|
|
Make sure that your security management forum
reviews |
|
Make sure that your security management forum
|
|
Make sure that your security management forum
|
|
Make sure that your security management forum
|
|
Make sure that your security management forum
reviews |
4.1.2 CO-ORDINATE INFORMATION SECURITY IMPLEMENTATION |
|
|
Establish a management forum that you can use
to |
|
Make sure that management forum members
|
|
Make sure that your security management forum
distributes information |
|
Make sure that your security management forum
reviews |
|
Make sure that your security management forum
|
|
Make sure that your security management forum
ensures that |
|
Make sure that your security forum evaluates
the adequacy of security |
|
Make sure that your security management forum
co‑ordinates the |
|
Make sure that your security management forum
|
|
Make sure that your forum promotes the
importance |
4.1.3 ALLOCATE INFORMATION SECURITY RESPONSIBILITIES |
|
|
Define the responsibilities that control how
|
|
Define the
responsibilities that control how your |
|
Make sure that
your information security policy describes how security |
|
Define how specific information security roles
and |
|
Define how specific information security roles
and |
|
Define how specific information security roles
and |
|
Define how the responsibility for individual
|
|
Define how the responsibility for individual
|
|
Define how the responsibility for individual
|
|
Appoint an information security manager. |
|
Make sure that your information security
manager has been |
|
Make sure that your information security
manager has been |
|
Make sure that your information security
manager has been |
|
Appoint an owner for each information asset. |
|
Make sure that asset owners have been given
the |
|
Make sure that your asset owners delegate
specific security |
|
Make sure that
asset owners ensure that delegated |
|
Make sure that
delegated responsibilities for security assets
|
|
Make sure that you document all delegated
responsibilities |
|
Make sure that
you define and document all delegated |
|
Make sure that your asset owners ensure that
delegated |
4.1.4 ESTABLISH AUTHORIZATION PROCESS FOR NEW FACILITIES |
|
|
Establish a management authorization process
|
|
Make sure that user managers approve of the
purpose and
|
|
Make sure that your information security
maintenance |
|
Make sure that your information security
maintenance manager |
|
Check new hardware to ensure that it will be
|
|
Check new software to ensure that it will be
|
|
Control the business use of personal
|
|
Evaluate personal information processing
facilities |
|
Authorize the use of personal processing
facilities |
4.1.5 IDENTIFY SPECIALIZED INFORMATION SECURITY ADVISORS |
|
|
Identify an in‑house information security advisor. |
|
Make sure that your in‑house security advisor
accumulates and |
|
Make sure that your in‑house information
security advisor |
|
Make sure that your in‑house information
security advisor |
|
Make sure that your information security
advisors are asked |
|
Make sure that information security advisors
are asked to |
|
Make sure that your information security
advisors have been |
|
Make sure that your information security
advisors have |
|
Consult your information security advisors
|
|
Ask information security advisors to
|
4.1.6 MAINTAIN RELATIONSHIPS WITH OTHER ORGANIZATIONS |
|
|
Maintain relationships with organizations that
could |
|
Make sure that you have a co‑operative
|
|
Make sure that you have a co‑operative
|
|
Make sure that you have a co‑operative
|
|
Make sure that you have a co‑operative
|
|
Make sure that you belong to security groups and associations. |
|
Make sure that you participate in security oriented industry forums. |
|
Make sure that confidential information is not
|
4.1.7 PERFORM INDEPENDENT SECURITY POLICY REVIEWS |
|
|
Perform independent reviews of your information security policy. |
|
Make sure that
your independent policy reviews examine whether or
|
|
Make sure that
your independent policy reviews examine |
|
Make sure that
your independent policy reviews examine |
|
Make sure that
security policy reviews are performed |
|
Make sure that your information security
policy |
4.2 CONTROL THIRD PARTY ACCESS TO FACILITIES |
|
|
Control third party access to your information
|
|
Maintain security while third parties access
your |
|
Carry out a risk assessment whenever third
party |
|
Make sure that your assessments examine the
security |
|
Make sure that your assessments identify the
controls |
|
Make sure that your access control
restrictions |
|
Make sure that your third party access control
contracts
|
4.2.1 IDENTIFY THIRD PARTY ACCESS RISKS |
|
4.2.1.1 CONSIDER TYPES OF THIRD PARTY ACCESS |
|
|
Examine the risks that you take whenever
|
|
Examine the risks that you take whenever
|
|
Examine the risks that you take whenever you
|
|
Examine the risks that you take whenever you
|
|
Examine the risks that you take whenever
|
|
Examine the risks that you take whenever
|
|
Examine the risks that you take whenever you
|
4.2.1.2 ESTABLISH SPECIAL INFORMATION ACCESS CONTROLS |
|
|
Carry out a risk assessment whenever third
parties |
|
Establish special access controls whenever
third parties |
|
Make sure that your special access controls
limit and regulate |
|
Make sure that your special access controls
consider |
|
Make sure that your special access controls
reflect |
|
Make sure that you have special controls that
regulate the |
|
Make sure that you have special controls that
regulate the |
|
Make sure that you have special controls that
regulate |
|
Make sure that you have special controls that
regulate the access |
4.2.1.3 CONTROL ON‑SITE CONTRACTOR INFORMATION ACCESS |
|
|
Use contracts to define all security
requirements and to restrict |
|
Ensure that information access contracts are
signed |
|
Make sure that you implement access controls
before |
|
Make sure that you control consultant access
to your |
|
Make sure that you control hardware and
software |
|
Make sure that you control cleaning, catering,
and security guard access |
|
Make sure that you control student and other
short term contractor |
4.2.2 USE CONTRACTS TO CONTROL THIRD PARTY ACCESS |
|
|
Use contracts to help control third party
access |
|
Make sure that your third party contracts
specify |
|
Make sure that your third party contracts
specify or refer |
|
Make sure that your third party contracts
include procedures |
|
Make sure that
your third party contracts include procedures that
|
|
Make sure that
your third party contracts specify when |
|
Make sure that your third party contracts
specify limits on |
|
Make sure that your third party contracts
specify the services that |
|
Make sure that third party contracts specify
the standard |
|
Make sure that your third party contracts
identify statutory or regulatory |
|
Make sure that your third party contracts
clarify intellectual |
|
Make sure that third party contracts define access methods. |
|
Make sure that
your organization's third party |
|
Make sure that your third party contracts
define the |
|
Make sure that your third party contracts
expect contractors |
|
Make sure that your third party
|
|
Make sure that your third party contracts
define how |
|
Make sure that your third party contracts
reserve the |
|
Make sure that your third party contracts
reserve |
|
Make sure that third party contracts define an
escalation |
|
Make sure that third party contracts define
contingency |
|
Make sure that your third party contracts
define responsibilities
|
|
Make sure that your third party contracts
define responsibilities
|
|
Make sure that third party contracts define reporting structures. |
|
Make sure that third party contracts define reporting formats. |
|
Make sure that your third party contracts
define the |
|
Make sure that your third party contracts
identify |
|
Make sure that your third party contracts
define |
|
Make sure that your third party contracts
identify controls |
|
Make sure that your third party contracts
describe how |
|
Make sure that your third party contracts
describe how |
|
Make sure that your third party contracts
specify |
4.3 CONTROL OUTSOURCED INFORMATION PROCESSING |
|
|
Maintain the security of your information when
the job |
|
Make sure that contracts are used to define
the security requirements |
|
Make sure that outsourcing contracts address security risks. |
|
Make sure that your outsourcing contracts
identify the security controls |
|
Make sure that outsourcing contracts identify the security procedures that must be used by outsourced information process organizations. |
4.3.1 USE CONTRACTS TO CONTROL OUTSOURCED SERVICES |
|
|
Make sure that your outsourcing contracts
specify |
|
Make sure that your outsourcing contracts
specify |
|
Make sure that your outsourcing contracts
specify |
|
Make sure that
your outsourcing contracts specify |
|
Make sure that your outsourcing contracts
specify how |
|
Make sure that
your outsourcing contracts specify |
|
Make sure that
your outsourcing contracts specify how |
|
Make sure that your outsourcing contracts
identify the physical controls |
|
Make sure that your outsourcing contracts
identify |
|
Make sure that your outsourcing contracts
specify how |
|
Make sure that your outsourcing contracts
specify what |
|
Make sure that your outsourcing contracts
establish |
|
Make sure that your outsourcing contracts
establish the |
|
Make sure that your outsourcing contracts
specify or refer |
|
Make sure that your outsourcing contracts
include procedures |
|
Make sure that
your outsourcing contracts
include procedures |
|
Make sure that
outsourcing contracts specify when your |
|
Make sure that your outsourcing contracts
specify limits on |
|
Make sure that your outsourcing contracts
specify the |
|
Make sure that your outsourcing contracts
specify the |
|
Make sure that your outsourcing contracts
identify |
|
Make sure that your outsourcing contracts
clarify intellectual |
|
Make sure that outsourcing contracts define access methods. |
|
Make sure that
your outsourcing contracts require |
|
Make sure that your outsourcing contracts
define the |
|
Make sure that your outsourcing contracts
expect suppliers |
|
Make sure that your outsourcing
|
|
Make sure that your outsourcing contracts
define how |
|
Make sure that your outsourcing contracts
expect |
|
Make sure that your outsourcing contracts
expect |
|
Make sure that your outsourcing contracts
reserve |
|
Make sure that outsourcing contracts define an
escalation |
|
Make sure that your outsourcing contracts
define contingency |
|
Make sure that outsourcing contracts define
responsibilities
|
|
Make sure that outsourcing contracts define
responsibilities |
|
Make sure that your outsourcing contracts define reporting structures. |
|
Make sure that your outsourcing contracts define reporting formats. |
|
Make sure that your outsourcing contracts
define the |
|
Make sure that your outsourcing contracts
identify |
|
Make sure that your outsourcing contracts
define |
|
Make sure that your outsourcing contracts
identify controls |
|
Make sure that your outsourcing contracts
describe how |
|
Make sure that your outsourcing contracts
describe how |
|
Make sure that your outsourcing contracts
specify how |
Praxiom Research Group Limited help@praxiom.com 780-461-4514 |
|||
Updated on March 27, 2014. First published on October 28, 2004. |
|||
Legal
Restrictions on the Use of this Page
Copyright © 2004 - 2014 by Praxiom Research Group Limited. All Rights Reserved. |