Iso Iec 13335-5 Management Guidance On Network Security.doc

上传人:丁** 文档编号:1544023 上传时间:2019-10-25 格式:DOC 页数:26 大小:298.50KB
返回 下载 相关 举报
Iso Iec 13335-5 Management Guidance On Network Security.doc_第1页
第1页 / 共26页
Iso Iec 13335-5 Management Guidance On Network Security.doc_第2页
第2页 / 共26页
Iso Iec 13335-5 Management Guidance On Network Security.doc_第3页
第3页 / 共26页
点击查看更多>>
资源描述
ISO/IEC TR 13335-5TECHNICAL REPORT Information technology Guidelines for the management of IT Security Part 5: Management guidance on network securityTABLE OF CONTENTSForewordIntroduction1. SCOPE2. REFERENCES3. DEFINITIONS4. ABBREVIATIONS5. STRUCTURE6. AIM7. OVERVIEW7.1 Background7.2 Identification Process8 REVIEW CORPORATE IT SECURITY POLICY REQUIREMENTS9 REVIEW NETWORK ARCHITECTURES AND APPLICATIONS9.1 Introduction9.2 Types of Network9.3 Network Protocols9.4 Network Applications9.5 Other Considerations10 IDENTIFY TYPES OF NETWORK CONNECTION11 REVIEW NETWORKING CHARACTERISTICS AND RELATED TRUST RELATIONSHIPS11.1 Network Characteristics11.2 Trust Relationships12 DETERMINE THE TYPES OF SECURITY RISK13 IDENTIFY APPROPRIATE POTENTIAL SAFEGUARD AREAS13.1 Introduction13.2 Secure Service Management13.2.1 Introduction13.2.2 Security Operating Procedures13.2.3 Security Compliance Checking13.2.4 Security Conditions For Connection13.2.5 Documented Security Conditions for Users of Network Services13.2.6 Incident Handling13.3 Identification and Authentication13.3.1 Introduction13.3.2 Remote Log-in13.3.3 Authentication Enhancements13.3.4 Remote System Identification13.3.5 Secure Single Sign-on13.4 Audit Trails13.5 Intrusion Detection13.6 Protection Against Malicious Code13.7 Network Security Management13.8 Security Gateways13.9 Data Confidentiality Over Networks13.10 Data Integrity Over Networks13.11 Non-Repudiation13.12 Virtual Private Networks13.13 Business Continuity/Disaster Recovery14 DOCUMENT AND REVIEW SECURITY ARCHITECTURE OPTIONS15 PREPARE FOR THE ALLOCATION OF SAFEGUARD SELECTION, DESIGN, IMPLEMENTATION AND MAINTENANCE16 SUMMARYBibliographyForewordISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3.The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.In exceptional circumstances, the joint technical committee may propose the publication of a Technical Report of one of the following types: type 1, when the required support cannot be obtained for the publication of an International Standard, despite repeated efforts; type 2, when the subject is still under technical development or where for any other reason there is the future but not immediate possibility of an agreement on an International Standard; type 3, when the joint technical committee has collected data of a different kind from that which is normally published as an International Standard (state of the art, for example).Technical Reports of types 1 and 2 are subject to review within three years of publication, to decide whether they can be transformed into International Standards. Technical Reports of type 3 do not necessarily have to be reviewed until the data they provide are considered to be no longer valid or useful.Attention is drawn to the possibility that some of the elements of this part of ISO/IEC TR 13335 may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.ISO/IEC TR 13335-5, which is a Technical Report of type 3, was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques.ISO/IEC TR 13335 consists of the following parts, under the general title Information technology Guidelines for the management of IT Security: Part 1: Concepts and models for IT Security Part 2: Managing and planning IT Security Part 3: Techniques for the management of IT Security Part 4: Selection of safeguards Part 5: Management guidance on network securityIntroductionThe purpose of this Technical Report (ISO/IEC TR 13335) is to provide guidance, not solutions, on management aspects of IT security. Those individuals within an organization that are responsible for IT security should be able to adapt the material in this report to meet their specific needs. The main objectives of this Technical Report are: to define and describe the concepts associated with the management of IT security, to identify the relationships between the management of IT security and management of IT in general, to present several models which can be used to explain IT security, and to provide general guidance on the management of IT security.ISO/IEC TR 13335 is organized into five parts. Part 1 provides an overview of the fundamental concepts and models used to describe the management of IT security. This material is suitable for managers responsible for IT security and for those who are responsible for an organizations overall security programme.Part 2 describes management and planning aspects. It is relevant to managers with responsibilities relating to an organizations IT systems. They may be: IT managers who are responsible for overseeing the design, implementation, testing, procurement, or operation of IT systems, or managers who are responsible for activities that make substantial use of IT systems.Part 3 describes security techniques relevant to those involved with management activities during a project life cycle, such as planning, designing, implementing, testing, acquisition or operations.Part 4 provides guidance for the selection of safeguards, and how this can be supported by the use of baseline models and controls. It also describes how this complements the security techniques described in Part 3, and how additional assessment methods can be used for the selection of safeguards.Part 5 provides guidance with respect to networks and communications to those responsible for the management of IT security. This guidance supports the identification and analysis of the communications related factors that should be taken into account to establish network security requirements. It also contains a brief introduction to the possible safeguard areas.Information technology Guidelines for the management of IT Security Part 5:Management guidance on network security1. ScopeISO/IEC TR 13335-5 provides guidance with respect to networks and communications to those responsible for the management of IT security. This guidance supports the identification and analysis of the communications related factors that should be taken into account to establish network security requirements.This part of ISO/IEC TR 13335 builds upon Part 4 of this Technical Report by providing an introduction on how to identify appropriate safeguard areas with respect to security associated with connections to communications networks.It is not within the scope of this TR to provide advice on the detailed design and implementation aspects of the technical safeguard areas. That advice will be dealt with in future ISO documents.2. ReferencesISO/IEC TR 13335-1:1996, Information technology Guidelines for the management of IT Security Part 1: Concepts and models for IT SecurityISO/IEC TR 13335-2:1997, Information technology Guidelines for the management of IT Security Part 2: Managing and planning IT SecurityISO/IEC TR 13335-3:1998, Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT SecurityISO/IEC TR 13335-4:2000, Information technology Guidelines for the management of IT Security Part 4: Selection of safeguardsISO/IEC TR 14516:1), Information technology Guidelines on the use and management of Trusted Third Party (TTP) servicesISO/IEC 13888 (all parts), Information technology Security techniques Non-repudiationISO/IEC 15947:1), Information technology Security techniques IT intrusion detection frameworkISO/IEC 7498-1:1994, Information technology Open Systems Interconnection Basic Reference Model: The Basic ModelISO 7498-2:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security ArchitectureISO/IEC 7498-3:1997, Information technology Open Systems Interconnection Basic Reference Model: Naming and addressingISO/IEC 7498-4:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework(Other relevant, non ISO/IEC, references are given in the Bibliography.)1)To be published.3. DefinitionsFor the purposes of this part of ISO/IEC TR 13335, the definitions given in Part 1 of ISO/IEC TR 13335 apply: accountability, asset, authenticity, availability, baseline controls, confidentiality, data integrity, impact, integrity, IT security, IT security policy, non-repudiation, reliability, risk, risk analysis, risk management, safeguard, threat, vulnerability.4. AbbreviationsEDI-Electronic Data InterchangeIP-Internet ProtocolIT-Information TechnologyPC-Personal ComputerPIN-Personal Identification NumberSecOPs-Security Operating ProceduresTR-Technical Report5. StructureThe approach taken in TR 13335-5 is to first summarize the overall process for identification and analysis of the communications related factors that should be taken into account to establish network security requirements, and then provide an indication of the potential safeguard areas (in doing so indicating where relevant content of other parts of TR 13335 may be used).This document describes three simple criteria to aid those persons responsible for IT security to identify potential safeguard areas. These criteria identify (1) the different types of network connections, (2) the different networking characteristics and related trust relationships, and (3) the potential types of security risk associated with network connections (and the use of services provided via those connections). The results of combining these criteria are then utilised to indicate potential safeguard areas. Subsequently, a brief introductory description is provided of the potential safeguard areas, with indications6. AimThe aim of this document is to provide guidance for the identification and analysis of the communications related factors that should be taken into account to establish network security requirements, and to provide an indication of the potential safeguard areas.7. Overview7.1 BackgroundGovernment and commercial organizations rely heavily on the use of information to conduct their business activities. Loss of confidentiality, integrity, availability, non-repudiation, accountability, authenticity and reliability of information and services can have an adverse impact on an organizations business operations. Consequently, there is a critical need to protect information and to manage the security of IT systems within organizations.This critical need to protect information is particularly important in todays environment because many organizations IT systems are connected by networks. These network connections can be within the organization, between different organizations, and sometimes between the organization and the general public. Both governmental and commercial organizations conduct business globally. Therefore they depend on all kinds of communication from computerized to other classical means. Their network needs have to be fulfilled, with network security playing an increasing significant role.Clause 7.2 summarises the recommended process for the identification and analysis of the communications related factors that should be taken into account to establish network security requirements, and the provision of an indication of the potential safeguard areas. Subsequent clauses then provide further detail of this process.7.2 Identification ProcessWhen considering network connections, all those persons in the organization who have responsibilities associated with the connections should be clear about the business requirements and benefits. In addition, they and all other users of the connections should be aware of the security risks to, and related safeguard areas for, such network connections. The business requirements and benefits are likely to influence many decisions and actions taken in the process of considering network connections, identifying potential safeguard areas, and then eventually selecting, designing, implementing and maintaining security safeguards. Thus, these business requirements and benefits need to be kept in mind throughout the process. In order to identify the appropriate network related security requirements and safeguard areas, the following tasks will need to be completed: review the general security requirements for network connections as set out in the organizations corporate IT security policy (see clause 8), review the network architectures and applications that relate to the network connections, to provide the necessary background to conduct subsequent tasks (see clause 9), identify the type or types of network connection that should be considered (see clause 10), review the characteristics of the networking proposed (aided as necessary by the information available on network and application architectures), and the associated trust relationships (see clause 11), determine the related types of security risk, where possible with the help of risk analysis and management review results - including consideration of the value to business operations of the information to be transferred via the connections, and any other information potentially accessible in an unauthorized way through these connections (see clause 12), identify the references to the potential safeguard areas that may be appropriate, on the basis of the type(s) of network connection, the networking characteristics and associated trust relationships, and the types of security risk, determined (see clause 13), document and review security architecture options (see clause 14), prepare to allocate tasks for the detailed safeguard selection, design, implementation and maintenance, using the identified references to potential safeguard areas and the agreed security architecture (see clause 15).It should be noted that general advice on the identification of safeguards is contained in Part 4 of TR 13335. This Part (5) of TR 13335 complements Part 4 and provides an introduction on how to identify appropriate safeguard areas with respect to security associated with connections to communications networks.Figure 1 below explains the overall process of identification and analysis of the communications related factors that should be taken into account to establish network security requirements, and the provision of indications of potential safeguard areas. Each step of the process is described in further detail in the clauses following the figure.Figure 1: Process for the Identification and Analysis of Communications Related Factors Leading to the Establishment of Network Security RequirementsIt should be noted that, in Figure 1, the solid lines represent the main path of the process, and the dotted line where the types of security risk may be determined with the aid of results from a security risk analysis and management review.In addition to the main path of the process, in certain steps there will be a need to re-visit the results of earlier steps to ensure consistency, in particular the steps “Review Corporate IT Security Policy” and “Review Network Architectures and Applications”. For example, after types of security risk have been determined there may be a need to review corporate IT security policy because something has arisen that is in fact not covered at that policy level, in identifying potential safeguard areas, the corporate IT security policy should be taken into account, because it may, for example, specify that a particular safeguard has to be implemented across the organization regardless of the risks, in reviewing security architecture options, to ensure compatibility there will be a need to consider the network architectures and applications.8 Review Corporate IT Security Policy RequirementsThe organizations corporate IT security policy may include statements on the need for confidentiality, integrity, availability, non-repudiation, accountability, authenticity and reliability, as well as views on types of threat, and safeguard requirements, that relate directly to network connections.For example, such a policy could state that: availability of certain types of information or services is a major concern, no connections via dial-up lines are permitted, all connections to the Internet must be made through a security gateway, a particular type of security gateway must be used, no payment instruction is valid without a digital signature.Such statements, views and requirements, being applicable organization-wide, must be accounted for in the determination of the types of security risk (see clause 12 below) and the identification of potential safeguard areas for network connections (see clause 13 below). If there are any such security requirements then these can be documented in the draft list of potential safeguard areas, and as necessary reflected in security architecture options. Guidance on the positioning of a corporate IT security policy document within an organizations approach to IT security, and on its content and relationships with other security documentation, is provided in Parts 2 and 3 of TR 13335.9 Review Network Architectures and Applications9.1 IntroductionLater steps in the process of moving towards the confirmation of potential safeguard areas, i.e. identification of the: type(s) of network connection that will be used, networking characteristics and associated trust relationships involved, types of security risk,and indeed the development of the list of potential safeguard areas (and later the related designs for securing a particular connection), should always be done in the context of the network architecture and applications that already exist or are planned.Thus detail should be obtained of the relevant network architecture and applications, and reviewed, to provide the necessary understanding and context for the process steps that follow.By clarifying these aspects at the earliest possible stage, the process of identifying the relevant security requirement identification criteria, identifying potential safeguard areas, and refining the security architecture, will become more efficient and will eventually result in a more workable security solution (see clauses 9.2 to 9.5 below).At the same time, consideration of network and application architectural aspects at an early stage allows time for those architectures to be reviewed and possibly revised if an acceptable security solution cannot be realistically achieved within the current architecture.The different areas that need to be considered under network architectures and applications include: types of network, network protocols, network applications.Some
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 管理文书 > 各类标准


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!