ISO IEC 17799 2000TRANSLATED INTO PLAIN ENGLISHSection 5: Asset Classification and ControlDETAILED STANDARD |
||
ISO IEC 17799 2000 is now OBSOLETE. |
5.1 MAKE INFORMATION ASSET OWNERS ACCOUNTABLE |
|
|
Select an owner for each major information asset. |
|
Make sure that asset owners have been asked to protect their assets. |
|
Make sure that asset owners have been asked to implement controls. |
|
Make sure that asset owners have been asked to maintain controls. |
|
Hold asset owners accountable for the security of information assets. |
5.1.1 COMPILE AN INVENTORY OF ALL INFORMATION ASSETS |
|
|
Identify all of your information assets. |
|
Compile an inventory of all information assets. |
|
Compile an inventory of all databases and date files. |
|
Compile an inventory of all system documentation. |
|
Compile an inventory of all user manuals. |
|
Compile an inventory of all procedures. |
|
Compile an inventory of all training materials. |
|
Compile an inventory of all continuity plans. |
|
Compile an inventory of all fallback plans. |
|
Compile an inventory of all archived information. |
|
Compile an inventory of all software assets. |
|
Compile an inventory of all application software. |
|
Compile an inventory of all system software. |
|
Compile an inventory of all development tools. |
|
Compile
an inventory of all the physical |
|
Compile an inventory of all computer equipment. |
|
Compile an inventory of all processors. |
|
Compile an inventory of all monitors. |
|
Compile an inventory of all laptops. |
|
Compile an inventory of all modems. |
|
Compile an inventory of all routers. |
|
Compile an inventory of all PABXs. |
|
Compile an inventory of all telephones. |
|
Compile an inventory of all fax machines. |
|
Compile an inventory of all answering machines. |
|
Compile an inventory of all magnetic media. |
|
Compile an inventory of all tapes and disks. |
|
Compile an inventory of all power supplies. |
|
Compile an inventory of all air conditioning units. |
|
Compile an inventory of all the services
|
|
Compile an inventory of all computing services. |
|
Compile an inventory of all communication services. |
|
Compile an inventory of all utility services. |
|
Define levels of protection for your information assets. |
|
Assign a security classification to all information assets. |
|
Classify all information assets according to
how |
|
Make sure
that your classification system |
|
Make sure that your classification system clearly
|
|
Make sure
that you provide a higher level of protection
|
5.2 USE AN INFORMATION CLASSIFICATION SYSTEM |
|
|
Use a classification system to protect information. |
|
Define a set of security levels for your information. |
|
Make sure
that your classification system specifies how information |
5.2.1 DEVELOP INFORMATION CLASSIFICATION GUIDELINES |
|
|
Develop guidelines for classifying information. |
|
Make sure
that your classification guidelines allow you to
|
|
Make sure
that your information classification system
|
|
Make sure
that your information classification system restricts
|
|
Give the
responsibility for classifying information |
|
Give the responsibility for reviewing your
information
|
|
Make sure
that your personnel understand how |
|
Make sure that you label information according to how valuable it is. |
|
Make sure that you label information according to how sensitive it is. |
|
Make sure that you label information according to how critical it is. |
|
Classify all information according to how
critical |
|
Make sure
that your most critical or sensitive information receives
|
|
Apply your classification system to documents. |
|
Apply your classification system to data records. |
|
Apply your classification system to data files. |
|
Apply your classification system to disks. |
5.2.2 USE INFORMATION HANDLING AND LABELING PROCEDURES |
|
|
Develop information handling procedures for
|
|
Develop a copying procedure for each information security classification. |
|
Develop a storage procedure for each information security classification. |
|
Develop a transmission procedure for each security classification. |
|
Develop a snail mail procedure for each security classification. |
|
Develop an email procedure for each security classification. |
|
Develop a fax procedure for each security classification. |
|
Develop a telephone procedure for each security classification. |
|
Develop a mobile phone procedure for each security classification. |
|
Develop a voice mail procedure for each security classification. |
|
Develop an answering machine procedure
|
|
Develop a face‑to‑face communications
procedure |
|
Develop an
information destruction procedure
|
|
Develop an output labeling procedures
|
|
Make sure that your security labeling
procedures expect |
|
Make sure that your security labeling
procedures expect |
|
Make sure that your security labeling
procedures expect |
|
Make sure that your security labeling
procedures |
|
Make sure that your security labeling
procedures |
|
Make sure that your security labeling
|
|
Make sure that security labeling procedures
|
|
Make sure that security labeling procedures
|
|
Make sure that security labeling procedures
|
|
Make sure that security labeling procedures
|
Also see ISO IEC 27001 2013 Translated into Plain English |
Praxiom Research Group Limited help@praxiom.com 780-461-4514 |
|||
Updated on March 27, 2014. First published on October 28, 2004. |
|||
Legal
Restrictions on the Use of this Page
Copyright © 2004 - 2014 by Praxiom Research Group Limited. All Rights Reserved. |