Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Tài liệu SANS Institute Security Consensus Operational Readiness Evaluation pdf
Nội dung xem thử
Mô tả chi tiết
Interested in learning more
about security
management?
SANS Institute
Security Consensus Operational Readiness Evaluation
This checklist is from the SCORE Checklist Project. Reposting is not permited without express, written permission.
ISO 17799 Checklist
Copyright SANS Institute
Author Retains Full Rights
Information Security Management
BS 7799.2:2002
Audit Check List
for SANS
Author: Val Thiagarajan B.E., M.Comp, CCSE, MCSE, SPS (FW), IT Security Consultant.
Approved by: Algis Kibirkstis
Owner: SANS
Extracts from BS 7799 part 1: 1999 are reproduced with the permission of BSI under license number 2003DH0251. British Standards can be purchased from BSI Customer
Services, 389 Chiswick High Road, London W4 4AL. Tel : 44 (0)20 8996 9001. email: [email protected]
SANS Institute
BS 7799 Audit Checklist
6/08/2003
Author: Val Thiagarajan | Approved by: Algis Kibirkstis | Owner: SANS Institute
Page - 2
Table of Contents
Security Policy 9
Information security policy..................................................................................................................................................................... 9
Information security policy document ................................................................................................................................................ 9
Review and evaluation........................................................................................................................................................................ 9
Organisational Security 10
Information security infrastructure ....................................................................................................................................................... 10
Management information security forum ......................................................................................................................................... 10
Information security coordination..................................................................................................................................................... 10
Allocation of information security responsibilities........................................................................................................................... 10
Authorisation process for information processing facilities............................................................................................................. 10
Specialist information security advise .............................................................................................................................................. 11
Co-operation between organisations................................................................................................................................................. 11
Independent review of information security..................................................................................................................................... 11
Security of third party access................................................................................................................................................................ 11
Identification of risks from third party access .................................................................................................................................. 11
Security requirements in third party contracts.................................................................................................................................. 12
Outsourcing........................................................................................................................................................................................... 12
Security requirements in outsourcing contracts................................................................................................................................ 12
Asset classification and control 12
Accountability of assets........................................................................................................................................................................ 12
Inventory of assets ............................................................................................................................................................................ 12
Information classification ..................................................................................................................................................................... 12
Classification guidelines................................................................................................................................................................... 12
Information labelling and handling................................................................................................................................................... 12
SANS Institute
BS 7799 Audit Checklist
6/08/2003
Author: Val Thiagarajan | Approved by: Algis Kibirkstis | Owner: SANS Institute
Page - 3
Personnel security 12
Security in job definition and Resourcing ............................................................................................................................................ 12
Including security in job responsibilities.......................................................................................................................................... 12
Personnel screening and policy......................................................................................................................................................... 12
Confidentiality agreements............................................................................................................................................................... 12
Terms and conditions of employment............................................................................................................................................... 12
User training.......................................................................................................................................................................................... 12
Information security education and training ..................................................................................................................................... 12
Responding to security incidents and malfunctions.............................................................................................................................. 12
Reporting security incidents.............................................................................................................................................................. 12
Reporting security weaknesses ......................................................................................................................................................... 12
Reporting software malfunctions...................................................................................................................................................... 12
Learning from incidents.................................................................................................................................................................... 12
Disciplinary process.......................................................................................................................................................................... 12
Physical and Environmental Security 12
Secure Area ........................................................................................................................................................................................... 12
Physical Security Perimeter.............................................................................................................................................................. 12
Physical entry Controls ..................................................................................................................................................................... 12
Securing Offices, rooms and facilities.............................................................................................................................................. 12
Working in Secure Areas.................................................................................................................................................................. 12
Isolated delivery and loading areas................................................................................................................................................... 12
Equipment Security............................................................................................................................................................................... 12
Equipment siting protection.............................................................................................................................................................. 12
Power Supplies.................................................................................................................................................................................. 12
Cabling Security................................................................................................................................................................................ 12
Equipment Maintenance ................................................................................................................................................................... 12
Securing of equipment off-premises................................................................................................................................................. 12
Secure disposal or re-use of equipment ............................................................................................................................................ 12
General Controls................................................................................................................................................................................... 12