Zuletzt bearbeitet am 14.04.2024 um 14:09:12 durch Sachkunde24-Redaktion.
- Name:
- ISO/IEC 27004
- Titel (Deutsch):
- Informationstechnik - Sicherheitsverfahren - Informationssicherheits-Management - Überwachung, Messung, Analyse und Evaluation
- Titel (Englisch):
- Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
- letzte Aktualisierung:
- :2016-12
- letzte Aktualisierung:
- 01.12.2016
- Seiten:
- 58
- Link (Herausgeber):
- https://www.beuth.de/de/norm/iso-iec-27004/267539970
Änderungsvermerk
Dieses Dokument ersetzt ISO/IEC 27004:2009-12 .
Beschreibung
Contents
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Structure and overview
5 Rationale
- The need for measurement
- Fulfilling the requirements
- Validity of results
- Benefits
6 Characteristics
- General
- What to monitor
- What to measure
- When to monitor, measure, analyse and evaluate
- Who will monitor, measure, analyse and evaluate
7 Types of measures
- General
- Performance measures
- Effectiveness measures
8 Processes
- General
- Identify information needs
- Create and maintain measures
- General
- Identify current security practices that can support information needs
- Develop or update measures
- Document measures and prioritize for implementation
- Keep management informed and engaged
- Establish procedures
- Monitor and measure
- Analyse results
- Evaluate information security performance and ISMS effectiveness
- Review and improve monitoring, measurement, analysis and evaluation processes
- Retain and communicate documented information
A - An information security measurement model (informative)
B - Measurement construct examples (informative)
- General
- Resource allocation
- Policy review
- Management commitment
- Risk exposure
- Audit programme
- Improvement actions
- Security incident cost
- Learning from information security incidents
- Corrective action implementation
- ISMS training or ISMS awareness
- Information security training
- Information security awareness compliance
- ISMS awareness campaigns effectiveness
- Social engineering preparedness
- Password quality – manual
- Password quality – automated
- Review of user access rights
- Physical entry controls system evaluation
- Physical entry controls effectiveness
- Management of periodic maintenance
- Change management
- Protection against malicious code
- Anti-malware
- Total availability
- Firewall rules
- Log files review
- Device configuration
- Pentest and vulnerability assessment
- Vulnerability landscape
- Security in third party agreements – A
- Security in third party agreements – B
- Information security incident management effectiveness
- Security incidents trend
- Security event reporting
- ISMS review process
- Vulnerability coverage
C - An example of free-text form measurement construction (informative)
- ‘Training effectiveness’ – effectiveness measurement construct