ISO IEC 17799 2000TRANSLATED INTO PLAIN ENGLISHSection 8: Communications and OperationsDETAILED STANDARD |
||
ISO 17799 2000 is now OBSOLETE. See ISO 27002 2013. |
8.1 ESTABLISH OPERATIONAL PROCEDURES |
|
|
Establish procedures to manage your |
|
Assign responsibilities that govern the
management |
|
Establish procedures to operate your
|
|
Assign responsibilities that govern the
operation of |
8.1.1 DOCUMENT YOUR OPERATING PROCEDURES |
|
|
Develop operating procedures that
|
|
Document your operating procedures. |
|
Control your operating procedure documents. |
|
Make sure that all changes to your operating
procedure |
|
Make sure that operating procedures explain
|
|
Make sure that your operating procedures
|
|
Make sure that your operating procedures
|
|
Make sure that operating procedures explain
|
|
Make sure that your operating procedures
expect |
|
Make sure that operating procedures describe
the systemic |
|
Make sure that your operating procedures
explain |
|
Make sure that your operating procedures
explain how |
|
Make sure that your operating procedures
identify |
|
Make sure that your operating procedures
|
|
Make sure that your operating procedures
explain |
|
Make sure that your operating procedures
explain |
|
Make sure that operating procedures explain
|
|
Make sure that operating procedures
|
|
Make sure that operating procedures
|
|
Develop operational housekeeping procedures
|
|
Develop operational housekeeping
|
|
Develop computer startup and shutdown procedures. |
|
Develop computer backup procedures. |
|
Develop equipment maintenance procedures. |
|
Develop computer room procedures. |
|
Develop mail handling management procedures. |
|
Develop mail handling safety procedures. |
8.1.2 CONTROL CHANGES TO FACILITIES AND SYSTEMS |
|
|
Control changes to information processing facilities. |
|
Control changes to your information systems. |
|
Assign management responsibility
|
|
Assign management responsibility
|
|
Assign management responsibility
|
|
Develop procedures to control changes to equipment. |
|
Develop procedures to control changes to software. |
|
Develop procedures to control changes to procedures. |
|
Control all changes to operational programs. |
|
Use audit logs to track changes to programs. |
|
Identify all significant changes to your
organization’s |
|
Record all significant changes to your
organization’s |
|
Assess the potential impact before you make
changes |
|
Use a formal procedure to authorize proposed
|
|
Ensure that the details of all changes to
facilities and |
|
Use a procedure to control how unsuccessful
|
8.1.3 ESTABLISH INCIDENT MANAGEMENT PROCEDURES |
|
|
Establish procedures that must be used to
|
|
Assign incident management responsibilities. |
|
Develop procedures to handle all types of security incidents. |
|
Develop procedures to handle information system failures. |
|
Develop procedures to handle the loss of service. |
|
Develop procedures to handle the denial of service. |
|
Develop procedures to handle incomplete data. |
|
Develop procedures to handle inaccurate data. |
|
Develop procedures to handle confidentiality breakdowns. |
|
Make sure that your procedures expect people
to identify |
|
Make sure that your procedures expect people
to figure |
|
Make sure that procedures expect people to
communicate |
|
Make sure that your procedures expect people
to report the |
|
Make sure that your procedures expect people
to study |
|
Use evidence to analyze your security incidents. |
|
Collect evidence for breach of contract purposes. |
|
Collect evidence to address regulatory violations. |
|
Collect evidence to support legal proceedings. |
|
Collect evidence to support your requests for
|
|
Develop procedures to control how you
|
|
Make sure that your recovery procedures ensure
|
|
Make sure that your
recovery procedures |
|
Make sure that your recovery procedures expect
|
|
Make sure that your recovery procedures expect
management |
|
Make sure that your
recovery procedures ensure that the |
|
Make sure that
your recovery procedures ensure |
8.1.4 SEGREGATE CONTROL OVER KEY RESPONSIBILITIES |
|
|
Make it difficult to modify information or
services without |
|
Make it difficult to misuse information or
services by |
|
Reduce the chances that people will
accidentally or intentionally modify or |
|
Ensure that responsibility for initiating and
authorizing |
|
Reduce the chances that fraud will be
perpetrated |
|
Reduce the opportunity for collusion by
ensuring that |
|
Take steps to ensure that fraud can be
detected |
|
Supervise work activities more closely
whenever the security |
|
Use audit trails whenever the security of your
information |
8.1.5 SEPARATE SYSTEMS DEVELOPMENT AND OPERATIONS |
|
|
Separate the responsibility for software
|
|
Separate development and testing activities. |
|
Develop and document rules to control the
transfer of software |
|
Run developmental software and operational
|
|
Run developmental software and operational
|
|
Prevent unauthorized access to editors,
compilers, and |
|
Make sure that test systems and operational
|
|
Expect users to use different passwords
|
|
Make sure that it is easy for users to
distinguish between |
|
Control how operational system passwords are
|
8.1.6 CONTROL THE MANAGEMENT OF EXTERNAL FACILITIES |
|
|
Make sure that external contractors have
|
|
Make sure that your contracts specify the
|
|
Make sure that your contracts specify
|
|
Make sure that your contracts specify the
security |
|
Make sure that your contracts specify how
compliance |
|
Make sure that your contracts allocate
specific |
|
Make sure that your contracts identify the
|
|
Make sure that your contracts allocate the
responsibility |
|
Make sure that your contracts define the
procedures that |
|
Keep your most sensitive applications in‑house. |
8.2 DEVELOP PLANS TO PROVIDE FUTURE CAPACITY |
|
|
Develop plans to ensure
that adequate information processing
|
|
Project what your
information processing
capacity |
|
Establish the operational requirements of new
|
|
Document the operational requirements of new
|
|
Test the operational requirements of new
|
8.2.1 MONITOR USAGE AND MEET FUTURE REQUIREMENTS |
|
|
Monitor the demands that are being placed on
your |
|
Figure out what your
future information storage
|
|
Develop plans to ensure that future storage
|
|
Make sure that your plans consider the burden
|
|
Make sure that your plans respect
|
|
Figure out what your mainframe computing
capacity |
|
Monitor mainframe computer processor usage. |
|
Monitor mainframe computer storage usage. |
|
Monitor mainframe computer output device usage. |
|
Monitor mainframe communication system usage. |
|
Identify trends in mainframe computer usage. |
|
Make sure that
managers use trend information to identify
|
|
Make sure that managers use trend
|
|
Make sure that
managers use trend |
8.2.2 USE ACCEPTANCE CRITERIA TO TEST SYSTEMS |
|
|
Use acceptance criteria to test new
information |
|
Use acceptance criteria to test information
system |
|
Use acceptance criteria to test new versions
of |
|
Make sure that managers ensure that new
information |
|
Make sure that managers ensure that new
information |
|
Make sure that managers ensure that new
information |
|
Make sure that your acceptance criteria consider
|
|
Make sure that your acceptance criteria
consider |
|
Make sure that your acceptance criteria
consider |
|
Make sure that acceptance criteria consider
the need to |
|
Make sure that acceptance criteria consider
the need to |
|
Make sure that your acceptance criteria
consider the |
|
Make sure that your acceptance criteria
consider the need |
|
Make sure that acceptance criteria
consider the need to |
|
Make sure that your acceptance criteria
consider the need |
|
Make sure that your acceptance criteria
consider the need |
|
Make sure that acceptance criteria consider the need to prove
|
|
Make sure that your acceptance criteria
consider the need |
|
Perform tests to verify that all acceptance
criteria |
8.3 PROTECT AGAINST MALICIOUS SOFTWARE |
|
|
Make sure that
your managers have taken steps |
|
Make sure that
your managers have taken steps |
|
Make users aware of the damage
|
|
Detect personal computer viruses. |
|
Prevent personal computer viruses. |
8.3.1 DETECT AND PREVENT MALICIOUS SOFTWARE |
|
|
Implement controls to protect your
|
|
Implement controls to detect the
|
|
Implement controls to prevent the
|
|
Develop procedures to make users aware of what
|
|
Develop a formal policy that prohibits your
|
|
Develop a formal policy that requires your
|
|
Develop a formal policy that controls the use
of |
|
Make sure that your organization requires the
|
|
Make sure that you conduct
regular security reviews of the |
|
Make sure that your security
reviews look for unapproved |
|
Investigate the presence of unapproved files
or |
|
Check suspicious files for viruses before use. |
|
Check email attachments for malicious software. |
|
Check all downloads for malicious software. |
|
Make managers responsible for virus protection. |
|
Make managers responsible for reporting viruses. |
|
Make managers responsible for recovering from virus attacks. |
|
Make managers responsible for teaching their staff about viruses. |
|
Develop procedures that must be used
|
|
Develop business continuity plans that
|
|
Develop procedures to ensure that all virus
bulletins |
|
Make sure that warning procedures ensure that
staff are |
8.4 ESTABLISH HOUSEKEEPING PROCEDURES |
|
|
Develop procedures to control data back‑ups. |
|
Develop procedures to control data restoration. |
|
Develop procedures to control how information
|
|
Develop procedures to control how your
|
8.4.1 BACK‑UP YOUR INFORMATION AND SOFTWARE |
|
|
Make regular back‑ups of essential information. |
|
Make regular back‑ups of essential software. |
|
Make sure that you can restore all
|
|
Make sure that you can restore all
|
|
Test your back‑up procedures in order to
ensure |
|
Retain at least three back‑up generations or cycles. |
|
Ensure that your back‑up information and
|
|
Ensure that an accurate and complete record of
|
|
Ensure that all documented restoration
procedures |
|
Make sure that your remote storage location is
far enough |
|
Make sure that your remote back‑up site is
given as much |
|
Make sure that the controls at your back‑up
site |
|
Test the reliability of back‑up media on a regular basis. |
|
Check and test the efficiency and
effectiveness |
|
Establish how long you need to retain essential information. |
|
Figure out what needs to be retained as a permanent archive. |
8.4.2 MAINTAIN A LOG OF OPERATOR ACTIVITIES |
|
|
Make sure that operators maintain a log of their activities. |
|
Keep a record of system start and finish times. |
|
Keep a record of all information system errors. |
|
Keep a record of all corrective actions taken. |
|
Keep a record of exactly who made log entries. |
|
Make sure that your records can confirm
|
|
Make sure that your records can confirm
|
|
Check your operator logs on a regular basis. |
|
Make sure that log checks are performed
|
|
Make sure that logs are checked
|
8.4.3 REPORT AND LOG SYSTEM FAULTS |
|
|
Make sure that users report all system faults. |
|
Make sure that you log all user reports of system faults. |
|
Make sure that you log communication system faults reported by users. |
|
Make sure that you log information processing faults reported by users. |
|
Establish rules for handling reported faults. |
|
Make sure that fault handling rules ensure that fault logs are reviewed. |
|
Make sure that fault handling rules ensure that faults are resolved. |
|
Make sure that corrective actions are taken to resolve system faults. |
|
Make sure that your fault handling rules
ensure that corrective |
|
Make sure that
your corrective action reviews check to |
|
Make sure that
your corrective action reviews check to |
8.5 SAFEGUARD YOUR COMPUTER NETWORKS |
|
|
Take steps to protect information in networks. |
|
Take steps to protect network infrastructure. |
|
Take steps to protect data on public networks. |
8.5.1 ESTABLISH NETWORK SECURITY CONTROLS |
|
|
Make sure that your network managers establish
controls |
|
Make sure that your network managers establish
controls |
|
Reduce the chances that people will
accidentally |
|
Establish procedures to manage remote equipment. |
|
Assign responsibilities for the management of remote equipment. |
|
Establish special controls to protect the
confidentiality |
|
Establish special controls to protect the
systems |
|
Establish special controls to ensure the
availability |
|
Ensure that managers apply network controls
consistently |
8.6 PROTECT AND CONTROL COMPUTER MEDIA |
|
|
Establish operating procedures to protect
|
|
Establish operating procedures to
|
|
Establish operating procedures to protect
|
|
Establish operating procedures to protect
|
|
Make sure that your operating procedures
|
|
Make sure that your operating procedures
|
|
Make sure that your operating procedures
protect |
8.6.1 MANAGE REMOVABLE COMPUTER MEDIA |
|
|
Establish procedures to manage and
|
|
Document your removable media
|
|
Make sure that your procedures expect
|
|
Make sure that your procedures expect
|
|
Make sure that your procedures ensure that
|
|
Make sure that your procedures ensure that all
|
|
Make sure that your procedures tell people to
follow |
8.6.2 CONTROL THE DISPOSAL OF YOUR MEDIA |
|
|
Establish formal procedures to control the
secure |
|
Make sure that
media disposal procedures ensure
that |
|
Make sure that your procedures ensure that all
unneeded |
|
Make sure that your procedures ensure that all
unneeded |
|
Make sure that procedures ensure that
all unneeded |
|
Make sure that procedures ensure that
all unneeded program |
|
Make sure that procedures ensure that all
unneeded |
|
Make sure that procedures ensure that all
carbon |
|
Make sure that procedures ensure that all
one‑time‑use |
|
Make sure that procedures ensure that all
unneeded |
|
Make sure that
procedures ensure that all unneeded |
|
Make sure that
procedures ensure that all unneeded |
|
Make sure that procedures ensure that all
unneeded |
|
Make sure that your procedures ensure that all
unneeded |
|
Make sure that contractors hired to dispose of
|
|
Make sure that your disposal contractors
|
|
Log the disposal of all sensitive or critical items. |
8.6.3 CONTROL INFORMATION HANDLING AND STORAGE |
|
|
Establish procedures to control information handling and storage. |
|
Make sure that information handling and
storage procedures |
|
Make sure that information handling and
storage procedures ensure |
|
Develop a procedure to control how documents should be handled. |
|
Make sure that document control procedure
ensures that every document |
|
Develop a procedure to control how faxes should be handled and stored. |
|
Make sure that your information control
procedure ensures that every |
|
Develop a procedure to control how
|
|
Make sure that your information control
procedure |
|
Develop a procedure to control how your
computing |
|
Make sure that your information control
procedure ensures |
|
Developed a procedure to control how network
|
|
Make sure that your information control
procedure |
|
Develop a procedure to control how mobile
computing |
|
Make sure that your information control
procedure |
|
Develop a procedure to control how mobile
communications |
|
Make sure that your information control
procedure ensures |
|
Develop a procedure to control how
conventional |
|
Make sure that your information control
procedure |
|
Develop a procedure to control how all voice
|
|
Make sure that your information control
procedure |
|
Develop a procedure to control how voice
|
|
Make sure that your information control
procedure ensures |
|
Develop a procedure to control how your |
|
Make sure that your information control
procedure |
|
Make sure that
your procedures ensure |
|
Make sure that
your procedures ensure |
|
Make sure that your procedures ensure that
media access |
|
Make sure that your procedures ensure that you
maintain |
|
Make sure that your procedures ensure that
|
|
Make sure that your procedures ensure that
|
|
Make sure that your procedures ensure that
|
|
Make sure that procedures ensure that your
spooled data |
|
Make sure that your procedures ensure that all
media is |
|
Make sure that procedures ensure that the
distribution |
|
Make sure that procedures ensure that all
copies of data |
|
Make sure that your procedures ensure that
|
|
Make sure that your procedures ensure that
lists of |
8.6.4 PROTECT YOUR SYSTEM DOCUMENTATION |
|
|
Develop controls to protect your system
|
|
Ensure that your system documentation is securely stored. |
|
Make sure that all access to system
documentation |
|
Make sure that access to system
|
|
Make sure that that system documentation
|
8.7 CONTROL INTERORGANIZATIONAL EXCHANGES |
|
|
Make sure that you control the exchange of information
|
|
Make sure that you control the exchange of software
|
|
Make sure that you comply with all relevant
legislation that governs |
|
Make sure that interorganizational exchanges
of information |
|
Establish procedures to protect information
and |
|
Establish standards to protect information and
|
8.7.1 DEVELOP INFORMATION EXCHANGE AGREEMENTS |
|
|
Establish security agreements to control the
exchange of |
|
Establish security agreements to control the
exchange of |
|
Make sure that the amount of protection
specified by your |
|
Make sure that your security agreements ensure
that management |
|
Make sure that your security agreements ensure
that management |
|
Make sure that your security agreements ensure
that management |
|
Make sure that your security agreements ensure
that |
|
Make sure that security agreements ensure that
procedures |
|
Make sure that security agreements ensure that
procedures |
|
Make sure that security agreements ensure that
procedures |
|
Make sure that security agreements ensure that
procedures |
|
Make sure that security agreements ensure that
minimum |
|
Make sure that security agreements ensure that
minimum |
|
Make sure that security agreements ensure that
|
|
Make sure that security agreements
|
|
Make sure that security agreements
|
|
Make sure that your security agreements
require the use |
|
Make sure that your security agreements ensure
that information |
|
Make sure that your security agreements
|
|
Make sure that your security agreements
|
|
Make sure that security agreements clarify
information |
|
Make sure that your security agreements ensure
|
8.7.2 SAFEGUARD THE TRANSPORTATION OF COMPUTER MEDIA |
|
|
Establish controls to safeguard the physical
transportation |
|
Establish controls to protect computer media while it is being mailed. |
|
Establish controls to protect computer media while it is being couriered. |
|
Establish a list of authorized couriers. |
|
Establish a procedure to verify courier identity. |
|
Make sure that packaging protects contents from physical damage. |
|
Make sure that packaging complies with manufacturers’ specifications. |
|
Develop special controls to protect sensitive
information |
|
Develop special controls to protect sensitive
information |
|
Use locked containers to protect information
from |
|
Use hand delivery to protect your information
from |
|
Use tamper‑evident packaging to protect
information from |
|
Split critical deliveries into more than one
package
and more |
|
Use digital signatures to protect information
from |
|
Use encryption to protect your information
from |
8.7.3 CREATE CONTROLS TO PROTECT ECOMMERCE |
|
|
Establish controls to protect your ecommerce activities. |
|
Establish controls to protect electronic
|
|
Establish controls to protect email. |
|
Establish controls to protect your online transactions. |
|
Make sure that your ecommerce controls
|
|
Make sure that your ecommerce controls
|
|
Make sure that your ecommerce controls protect
you |
|
Make sure that your ecommerce controls protect
you |
|
Make sure that your ecommerce
controls ensure that the
|
|
Make sure that your ecommerce controls ensure
that only |
|
Make sure that your ecommerce controls ensure
that participants |
|
Make sure that your ecommerce controls ensure
that your |
|
Make sure that your ecommerce controls ensure
that all |
|
Make sure that your ecommerce controls ensure
that the confidentiality |
|
Make sure that your ecommerce controls ensure
that the |
|
Make sure that your ecommerce controls
|
|
Make sure that controls ensure that the
confidentiality |
|
Make sure that your ecommerce controls
|
|
Use cryptographic techniques to protect
|
|
Use agreements to document the terms that
|
|
Use agreements to document the terms that
|
|
Make sure that your ecommerce hosting service
providers |
8.7.4 ESTABLISH CONTROLS TO PROTECT EMAIL |
|
8.7.4.1 CONTROL THE USE OF EMAIL |
|
|
Establish controls to protect email. |
|
Establish controls to make email messages
|
|
Establish controls to make email messages less
|
|
Establish controls to make email less
|
|
Establish controls to make
|
|
Establish controls to increase the reliability
|
|
Establish controls to prevent the incorrect
|
|
Take steps to ensure that email can
be |
|
Take steps to ensure that email can
|
|
Take steps to ensure that email can
|
|
Take steps to ensure that email can
|
|
Take steps to ensure that email can be
|
|
Take steps to reduce the security risk that
|
|
Take steps to control the access that
|
8.7.4.2 DEVELOP AN EMAIL POLICY |
|
|
Develop a policy to control the use of email. |
|
Make sure that your email policy explains how
|
|
Make sure that your email policy explains how
|
|
Make sure that your email policy explains how
|
|
Make sure that your email policy explains
|
|
Make sure that email policy explains
|
|
Make sure that your email policy states that
email should |
|
Make sure that your email policy makes it
clear |
|
Make sure that your email policy makes it
clear |
|
Make sure that your email policy makes it
clear that email |
|
Make sure that email policy explains when
cryptographic |
|
Make sure that email policy explains what
should be done |
|
Make sure that your email policy
|
8.7.5 PROTECT YOUR ELECTRONIC OFFICE SYSTEMS |
|
|
Establish policies to protect your
|
|
Establish guidelines to protect your
|
|
Reduce the vulnerability of information
|
|
Protect electronic office records of
|
|
Protect the storage of electronic office faxes. |
|
Control the opening and distribution
|
|
Control information sharing within and
|
|
Control information sharing through the
|
|
Establish a policy to manage information
sharing |
|
Protect your most sensitive information by
excluding |
|
Restrict access to personnel diary information
that |
|
Ensure that your electronic office systems can
|
|
Identify categories of staff members that are
officially |
|
Identify the locations from which staff
members are |
|
Identify categories of contractors that are
officially |
|
Identify the locations from which contractors
are |
|
Identify categories of business partners that
are |
|
Identify the locations from which
your business
partners |
|
Select those electronic office facilities that
should |
|
Ensure that electronic office system users
have a way of |
|
Ensure that your organization’s electronic
|
|
Define your information retention policy. |
|
Make arrangements that allow you to continue
|
8.7.6 CONTROL YOUR PUBLIC INFORMATION SYSTEMS |
|
|
Protect the integrity of information
|
|
Prevent the unauthorized modification
|
|
Establish a process to authorize the
|
|
Establish a process to control how electronic
input |
|
Ensure that your electronic input or feedback
|
|
Ensure that information received from the
public |
|
Protect sensitive information received from
|
|
Ensure that information received by electronic
|
|
Ensure that people who are given access to
your |
8.7.7 REGULATE EXTERNAL COMMUNICATIONS |
|
|
Establish procedures to protect and
|
|
Establish procedures to protect and
|
|
Establish procedures to protect and control
|
|
Establish procedures to protect and
|
|
Establish procedures to protect and
|
|
Establish procedures to protect and
|
|
Establish a policy that tells people how to
handle |
|
Make sure that your communications policy
tells people |
|
Make sure that your communications policy
tells people |
|
Make sure that your communications policy
tells people |
|
Make sure that your communications policy
expects people |
|
Make sure that your communications policy expects people to
protect |
|
Make sure that your communications policy
warns people |
|
Make sure that your communications policy
warns people |
|
Make sure that communications policy warns
people not |
|
Make sure that your communications policy
warns people |
|
Make sure that your communications policy
warns people |
|
Make sure that your communications policy
explains that |
|
Make sure that your communications policy
|
|
Make sure that your communications policy
|
Praxiom Research Group Limited help@praxiom.com 780-461-4514 |
|||
Updated on March 27, 2014. First published on October 28, 2004. |
|||
Legal
Restrictions on the Use of this Page
Copyright © 2004 - 2014 by Praxiom Research Group Limited. All Rights Reserved. |