ДСТУ ISO/IEC 27035-2:2024 Информационные технологии. Методы защиты. Управление инцидентами информационной безопасности. Часть 2. Руководство по планированию и подготовке к реагированию на инциденты (ISO/IEC 2...

Данный документ доступнен в тарифе «ВСЕ ВКЛЮЧЕНО»

У Вас есть вопросы по документу? Мы рады на них ответить!Перечень бесплатных документовОбнаружили ошибку в документе или на сайте? Пожалуйста, напишите нам об этом!Оставить заявку на документ


ДСТУ ISO/IEC 27035-2:2024
(ISO/IEC 27035-2:2023, IDT)

Інформаційні технології. Методи захисту. Керування інцидентами інформаційної безпеки. Частина 2. Настанова щодо планування та підготовки до реагування на інциденти

 
   
 
 
     
Не є офіційним виданням.
Офіційне видання розповсюджує національний орган стандартизації
(ДП «УкрНДНЦ» http://uas.gov.ua)

Contents

Foreword

Introduction

1 Scope

2 Normative references

3 Terms, definitions and abbreviated terms

3.1 Terms and definitions

3.2 Abbreviated terms

4 Information security incident management policy

4.1 General

4.2 Interested parties

4.3 Information security incident management policy content

5 Updating of information security policies

5.1 General

5.2 Linking of policy documents

6 Creating information security incident management plan

6.1 General

6.2 Information security incident management plan built on consensus

6.3 Interested parties

6.4 Information security incident management plan content

6.5 Incident classification scale

6.6 Incident forms

6.7 Documented processes and procedures

6.8 Trust and confidence

6.9 Handling confidential or sensitive information

7 Establishing an incident management capability

7.1 General

7.2 Incident management team establishment

7.2.1 IMT structure

7.2.2 IMT roles and responsibilities

7.3 Incident response team establishment

7.3.1 IRT structure

7.3.2 IRT types and roles

7.3.3 IRT staff competencies

8 Establishing internal and external relationships

8.1 General

8.2 Relationship with other parts of the organization

8.3 Relationship with external interested parties

9 Defining technical and other support

9.1 General

9.2 Technical support

9.3 Other support

10 Creating information security incident awareness and training

11 Testing the information security incident management plan

11.1 General

11.2 Exercise

11.2.1 Defining the goal of the exercise

11.2.2 Defining the scope of an exercise

11.2.3 Conducting an exercise

11.3 Incident response capability monitoring

11.3.1 Implementing an incident response capability monitoring programme

11.3.2 Metrics and governance of incident response capability monitoring

12 Learn lessons

12.1 General

12.2 Identifying areas for improvement

12.3 Identifying and making improvements to the information security incident management plan

12.4 IMT evaluation

12.5 Identifying and making improvements to information security control implementation

12.6 Identifying and making improvements to information security risk assessment and management review results

12.7 Other improvements

Annex A (informative) Considerations related to legal or regulatory requirements

A.1 Introduction

A.2 Data protection and privacy of personal information

A.3 Record keeping

A.4 Controls to ensure fulfilment of commercial contractual obligations

A.5 Legal issues related to policies and procedures

A.6 Disclaimers are checked for legal validity

A.7 Contracts with external support personnel

A.8 Non-disclosure agreements

A.9 Law enforcement requirements

A.10 Liability aspects

A.11 Specific regulatory requirements

A.12 Prosecutions, or internal disciplinary procedures

A.13 Legal aspects

A.14 Acceptable use policy

Annex B (informative) Example forms for information security events, incidents and vulnerability reports

B.1 Introduction

B.2 Example items in records

B.2.1 Example items of the record for information security event

B.2.2 Example items of the record for information security incident

B.2.3 Example items of the record for information security vulnerability

B.3 How to use forms

B.3.1 Format of date and time

B.3.2 Notes for completion

B.4 Example forms

B.4.1 Example form for information security event report

B.4.2 Example form for information security incident report

B.4.3 Example form for information security vulnerability report

Annex C (informative) Example approaches to the categorization, evaluation and prioritization of information security events and incidents

C.1 Introduction

C.2 Categorization of information security incidents

C.3 Evaluation and prioritization of information security incidents

Bibliography

Полная версия документа доступна в тарифе «ВСЕ ВКЛЮЧЕНО».

Войти в Личный кабинет Подробнее о тарифах

БУДСТАНДАРТ Online