咨询热线:400-678-1309 中文版  English


标准翻译 - 查看详情
  • 标准介绍
  • 在线预览
标准编号  
GB/T 20269-2006
标准名称  
GB/T 20269-2006 信息安全技术 信息系统安全管理要求 (英文版)
英文名称  
Information security technology Information system security management requirements
发布日期  
2006-05-31
实施日期  
2006-12-01
全文页数  
141
原版价格  
10.00元
是否译文  
译文报价  
1,000.00元
译文格式  
Word/PDF
目录简介  
Contents
Foreword 5
Introduction 6
1 Scope 8
2 Normative references 8
3 Terms and definitions 8
4 General requirements of information system security management 9
4.1Content of information system security management 9
4.2 Information system security management principles 10
5 Information system security management elements and the strength 12
5.1 Policy and system 12
5.1.1 Information security management policy 12
5.1.2 Security management rules and regulations 16
5.1.3 Policy and system document management 19
5.2 organization and personnel management 21
5.2.1 Security management organization 21
5.2.2 Security mechanism centralized management organization 23
5.2.3 Personnel management 24
5.2.4 Education and training 28
5.3 Risk management 29
5.3.1 Risk management requirements and policies 29
5.3.2 Risk analysis and assessment 30
5.3.3 Risk control 33
5.3.4 Decision making based on risks 33
5.3.5 Risk assessment management 34
5.4 Environment and resource management 36
5.4.1 Environment security management 36
5.4.2 Resources management 39
5.5 Operation and maintenance management 43
5.5.1 User management 43
5.5.2 Operation management 45
5.5.3 Operation maintenance management 49
5.5.4 Outsourced service management 53
5.5.5 Guarantee Related to Security Mechanism 55
5.5.6 Security centralized management 63
5.6 Business continuity management 67
5.6.1 Backup and recovery 67
5.6.2 Security incident handling 68
5.6.3 Emergency processing 71
5.7 Supervision and inspection management 73
5.7.1 Conforming with legal requirements 73
5.7.2 Compliance inspection 74
5.7.3 Audit and supervision control 76
5.7.4 Responsibility determination 77
5.8 Life cycle management 78
5.8.1 Plan and project approval management 78
5.8.2 Construction process management 80
5.8.3 System startup and stop management 83
6 Information system security management grading requirements 85
6.1 Grade I: user discretionary protection 85
6.1.1 Management objective and scope 85
6.1.2 Policy and system requirements 85
6.1.3 organization and personnel management requirements 86
6.1.4 Risk management requirements 86
6.1.5 Environment and resource management requirements 87
6.1.6 Operation and maintenance management requirements 88
6.1.7 Business continuity management requirements 89
6.1.8 Supervision and inspection management requirements 90
6.1.9 Life cycle management requirements 90
6.2 Grade II: system audit protection 91
6.2.1 Management objective and scope 91
6.2.2 Policy and system requirements 91
6.2.3 organization and personnel management requirements 92
6.2.4 Risk management requirements 93
6.2.5 Environment and resource management requirements 94
6.2.6 Operation and maintenance management requirements 94
6.2.7 Business continuity management requirements 96
6.2.8 Supervision and inspection management requirements 96
6.2.9 Life cycle management requirements 97
6.3 Grade III: security sign protection 98
6.3.1 Management objective and scope 98
6.3.2 Policy and system requirements 98
6.3.3 organization and personnel management requirements 99
6.3.4 Risk management requirements 100
6.3.5 Environment and resource management requirements 101
6.3.6 Operation and maintenance management requirements 102
6.3.7 Business continuity management requirements 103
6.3.8 Supervision and inspection management requirements 104
6.3.9 Life cycle management requirements 105
6.4 Level four: structured protection level 106
6.4.1 Management objectives and scope 106
6.4.2 Policy and system requirements 107
6.4.3 organization and personnel management requirements 107
6.4.4 Risk management requirements 108
6.4.5 Environment and resource management requirements 109
6.4.6 Operation and maintenance management requirements 109
6.4.7 Business continuity management requirements 111
6.4.8 Supervision and inspection management requirements 111
6.4.9 Life cycle management requirements 112
6.5 Level five: access validation protection level 113
6.5.1 Management objectives and scope 113
6.5.2 Policy and system requirements 113
6.5.3 organization and personnel management requirements 114
6.5.4 Risk management requirements 115
6.5.5 Environment and resource management requirements 115
6.5.6 Operation and maintenance management requirements 115
6.5.7 Business continuity management requirements 116
6.5.8 Supervision and inspection management requirements 117
6.5.9 Life cycle management requirements 117
Annex A (Informative) Corresponding Relationship among Security Management Factors, Strength and Security Management Grading Requirements 118
Annex B (Informative) Information System Security Management Concept Description 127
B.1 Main security factors 128
B.1.1 Assets 128
B.1.2 Threats 129
B.1.3 Vulnerability 129
B.1.4 Effects of accidents 129
B.1.5 Risks 130
B.1.6 Protective measures 130
B.2 Security management process 130
B.2.1 Security management process model 130
B.2.2 Security objectives 131
B.2.3 Determination of security protection level 131
B.2.4 Security risk analysis and assessment 132
B.2.5 Develop security polices 132
B.2.6 Security requirements analysis 133
B.2.7 Implementation of security measures 135
B.2.8 Supervision of security implementation process 136
B.2.9 Security audit of the information system 137
B.2.10 Life cycle management 138
Bibliography 139

关键字  
GB/T 20269 英文版 English Version
  在线下单  
您的电话:
您的邮箱:
  联系我们
Copyright © 2009-2011 北京文心雕语翻译有限公司 保留所有权利。京ICP备09087426号
公司关键字:北京翻译公司 | 北京英语翻译公司 | 北京日语翻译公司 | 北京德语翻译公司