您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 质量控制/管理 > ISO27001安全遵守情况检查表chs
ISO27001遵从检查表检查表标准Section审计问题FindingsStatus(%)1.15.1WhetherthereexistsanInformationsecuritypolicy,whichisapprovedbythemanagement,publishedandcommunicatedasappropriatetoallemployees.Whetherthepolicystatesmanagementcommitmentandsetsouttheorganizationalapproachtomanaginginformationsecurity.WhethertheInformationSecurityPolicyisreviewedatplannedintervals,orifsignificantchangesoccurtoensureitscontinuingsuitability,adequacyandeffectiveness.WhethertheInformationSecuritypolicyhasanowner,whohasapprovedmanagementresponsibilityfordevelopment,reviewandevaluationofthesecuritypolicy.WhetheranydefinedInformationSecurityPolicyreviewproceduresexistanddotheyincluderequirementsforthemanagementreview.Whethertheresultsofthemanagementreviewaretakenintoaccount.Whethermanagementapprovalisobtainedfortherevisedpolicy.2.16.12.116.11ManagementCommitmenttoInformaitonSecurityWhethermanagementdemonstratesactivesupportforsecuritymeasureswithintheorganization.Thiscanbedoneviacleardirection,demonstratedcommitment,explicitassignmentandacknowledgementofinformationsecurityresponsibilities.2.1.26.1.2InformationSecuritycoordinationWhetherinformationsecurityactivitiesarecoordinatedbyrepresentativesfromdiversepartsoftheorganization,withpertinentrolesandresponsibilities参考Auditarea,objectiveandquestionResults安全策略InformationSecurityPolicyOrganizationofInformationSecurity1.1.15.1.1Informationsecuritypolicydocument1.1.25.1.2ReviewofInformationalSecurityPolicyInternalOrganizationHakimKthakimkt@yahoo.comPage12019/8/21ISO27001遵从检查表2.1.36.1.3AllocationofInformationSecurityresponsibilitiesWhetherresponsibilitiesfortheprotectionofindividualassets,andforcarryingoutspecificsecurityprocesses,wereclearlyidentifiedanddefined.2.1.46.1.4AuthorizationprocessforInformationprocessingfacilitiesWhethermanagementauthorizationprocessisdefinedandimplementedforanynewinformationprocessingfacilitywithintheorganization.Whethertheorganization’sneedforConfidentialityorNon-DisclosureAgreement(NDA)forprotectionofinformationisclearlydefinedandregularlyreviewed.Doesthisaddresstherequirementtoprotecttheconfidentialinformationusinglegalenforceableterms2.1.66.1.6ContactwithAuthoritiesWhetherthereexistsaprocedurethatdescribeswhen,andbywhom:relevantauthoritiessuchasLawenforcement,firedepartmentetc.,shouldbecontacted,andhowtheincidentshouldbereported2.1.76.1.7ContactwithspecialinterestgroupsWhetherappropriatecontactswithspecialinterestgroupsorotherspecialistsecurityforums,andprofessionalassociationsaremaintained.2.1.86.1.8IndependentreviewofInformationSecurityWhethertheorganization’sapproachtomanaginginformationsecurity,anditsimplementation,isreviewedindependentlyatplannedintervals,orwhenmajorchangestosecurityimplementationoccur.2.26.22.2.16.2.1IdentificationofrisksrelatedtoexternalpartiesWhetherriskstotheorganization’sinformationandinformationprocessingfacility,fromaprocessinvolvingexternalpartyaccess,isidentifiedandappropriatecontrolmeasuresimplementedbeforegrantingaccess.2.2.26.2.2AddressingsecuritywhiledealingwithcustomersWhetherallidentifiedsecurityrequirementsarefulfilledbeforegrantingcustomeraccesstotheorganization’sinformationorassets.2.2.36.2.3AddressingsecurityinthirdpartyagreementsWhethertheagreementwiththirdparties,involvingaccessing,processing,communicatingormanagingtheorganization’sinformationorinformationprocessingfacility,orintroducingproductsorservicestoinformationprocessingfacility,complieswithallappropriatesecurityrequirements.3.17.1ExternalParties2.1.56.1.5ConfidentialityAgreementsResponsibilityforassetsAssetManagementHakimKthakimkt@yahoo.comPage22019/8/21ISO27001遵从检查表3.1.17.1.1InventoryofAssetsWhetherallassetsareidentifiedandaninventoryorregisterismaintainedwithalltheimportantassets.3.1.27.1.2OwnershipofAssetsWhethereachassetidentifiedhasanowner,adefinedandagreed-uponsecurityclassification,andaccessrestrictionsthatareperiodicallyreviewed.3.1.37.1.3AcceptableuseofassetsWhetherregulationsforacceptableuseofinformationandassetsassociatedwithaninformationprocessingfacilitywereidentified,documentedandimplemented.3.27.23.2.17.2.1ClassificationguidelinesWhethertheinformationisclassifiedintermsofitsvalue,legalrequirements,sensitivityandcriticalitytotheorganization.3.2.27.2.2InformationlabellingandhandlingWhetheranappropriatesetofproceduresaredefinedforinformationlabellingandhandling,inaccordancewiththeclassificationschemeadoptedbytheorganization.4.18.1Whetheremployeesecurityrolesandresponsibilities,contractorsandthirdpartyusersweredefinedanddocumentedinaccordancewiththeorganization’sinformationsecuritypolicy.Weretherolesandresponsibilitiesdefinedandclearlycommunicatedtojobcandidatesduringthepre-employmentprocessWhetherbackgroundverificationchecksforallcandidatesforemployment,contractors,andthirdpartyuserswerecarriedoutinaccordancetotherelevantregulations.Doesthecheckincludecharacterreference,confirmationofclaimedacademicandprofessionalqualificationsandindependentidentitychecksWhetheremployee,contractorsandthirdpartyusersareaskedtosignconfidentiali
本文标题:ISO27001安全遵守情况检查表chs
链接地址:https://www.777doc.com/doc-435406 .html