Foreword by Nigel Turnbull |
|
xi | |
How to use this book |
|
xiii | |
Acknowledgements |
|
xv | |
Introduction |
|
1 | (142) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (5) |
|
1. Why is information security necessary? |
|
|
9 | (14) |
|
Nature of information security threats |
|
|
10 | (1) |
|
Prevalence of information security threats |
|
|
11 | (2) |
|
Impacts of information security threats |
|
|
13 | (2) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (3) |
|
|
21 | (1) |
|
Benefits of an information security management system |
|
|
22 | (1) |
|
2. The Combined Code, the Turnbull Report and Sarbanes-Oxley |
|
|
23 | (10) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (3) |
|
|
28 | (2) |
|
|
30 | (3) |
|
|
33 | (16) |
|
Benefits of certification |
|
|
33 | (2) |
|
History of BS 7799 and ISO/IEC 17799 |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (2) |
|
PDCA and process approach |
|
|
38 | (1) |
|
Structured approach to implementation |
|
|
39 | (2) |
|
Quality system integration |
|
|
41 | (1) |
|
|
42 | (4) |
|
Continual improvement and metrics |
|
|
46 | (3) |
|
4. Organizing information security |
|
|
49 | (20) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Information security manager |
|
|
51 | (2) |
|
The cross-functional management forum |
|
|
53 | (1) |
|
|
54 | (5) |
|
Approval process for information processing facilities |
|
|
59 | (1) |
|
Product selection and the Common Criteria |
|
|
60 | (1) |
|
Specialist information security advice |
|
|
61 | (5) |
|
Contact with authorities and special interest groups |
|
|
66 | (1) |
|
Independent review of information security |
|
|
67 | (1) |
|
|
68 | (1) |
|
5. Information security policy and scope |
|
|
69 | (10) |
|
Information security policy |
|
|
69 | (6) |
|
|
75 | (2) |
|
Costs and monitoring progress |
|
|
77 | (2) |
|
6. The risk assessment and statement of applicability |
|
|
79 | (20) |
|
Establishing security requirements |
|
|
79 | (1) |
|
Risks, impacts and risk management |
|
|
80 | (13) |
|
Selection of controls and statement of applicability |
|
|
93 | (3) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
99 | (12) |
|
Identification of risks related to external parties |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
105 | (1) |
|
Addressing security when dealing with customers |
|
|
106 | (1) |
|
Addressing security in third party agreements |
|
|
107 | (4) |
|
|
111 | (16) |
|
|
111 | (1) |
|
|
112 | (3) |
|
|
115 | (1) |
|
Information classification |
|
|
115 | (3) |
|
Unified classification markings |
|
|
118 | (2) |
|
Information labelling and handling |
|
|
120 | (5) |
|
Non-disclosure agreements and trusted partners |
|
|
125 | (2) |
|
9. Human resources security |
|
|
127 | (16) |
|
Job descriptions and competence requirements |
|
|
128 | (1) |
|
|
129 | (3) |
|
Terms and conditions of employment |
|
|
132 | (2) |
|
|
134 | (5) |
|
|
139 | (1) |
|
Termination or change of employment |
|
|
140 | (3) |
10. Physical and environmental security |
|
143 | (10) |
|
|
143 | (8) |
|
Public access, delivery and loading areas |
|
|
151 | (2) |
11. Equipment security |
|
153 | (10) |
|
Equipment siting and protection |
|
|
153 | (3) |
|
|
156 | (2) |
|
|
158 | (1) |
|
|
159 | (1) |
|
Security of equipment off-premises |
|
|
160 | (1) |
|
Secure disposal or reuse of equipment |
|
|
161 | (1) |
|
|
161 | (2) |
12. Communications and operations management |
|
163 | (14) |
|
Documented operating procedures |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Separation of development, test and operational facilities |
|
|
167 | (1) |
|
Third party service delivery management |
|
|
168 | (1) |
|
Monitoring and review of third party services |
|
|
169 | (1) |
|
Managing changes to third party services |
|
|
170 | (1) |
|
System planning and acceptance |
|
|
171 | (6) |
13. Controls against malicious software (malware) and back-ups |
|
177 | (12) |
|
Viruses, worms and Trojans |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (3) |
|
|
184 | (1) |
|
Controls against mobile code |
|
|
185 | (1) |
|
|
185 | (4) |
14. Network security management and media handling |
|
189 | (6) |
|
|
189 | (3) |
|
|
192 | (3) |
15. Exchanges of information |
|
195 | (8) |
|
Information exchange policies and procedures |
|
|
195 | (3) |
|
|
198 | (1) |
|
Physical media in transit |
|
|
199 | (1) |
|
Business information systems |
|
|
199 | (4) |
16. Electronic commerce services |
|
203 | (10) |
|
|
203 | (3) |
|
|
206 | (2) |
|
|
208 | (1) |
|
|
209 | (1) |
|
Publicly available information |
|
|
210 | (3) |
17. E-mail and internet use |
|
213 | (8) |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
216 | (2) |
|
Internet acceptable use policy (AUP) |
|
|
218 | (3) |
18. Access control |
|
221 | (18) |
|
|
221 | (1) |
|
|
222 | (3) |
|
|
225 | (1) |
|
|
225 | (3) |
|
|
228 | (8) |
|
Clear desk and clear screen policy |
|
|
236 | (3) |
19. Network access control |
|
239 | (12) |
|
|
239 | (4) |
|
|
243 | (8) |
20. Operating system access control |
|
251 | (6) |
|
|
251 | (2) |
|
User identification and authentication |
|
|
253 | (1) |
|
Password management system |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Limitation of connection time |
|
|
255 | (2) |
21. Application access control and teleworking |
|
257 | (8) |
|
Application and information access control |
|
|
257 | (2) |
|
Mobile computing and teleworking |
|
|
259 | (6) |
22. Systems acquisition, development and maintenance |
|
265 | (6) |
|
Security requirements analysis and specification |
|
|
265 | (1) |
|
Correct processing in applications |
|
|
266 | (5) |
23. Cryptographic controls |
|
271 | (8) |
|
|
272 | (1) |
|
Public key infrastructure (PKI) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (4) |
24. Security in development and support processes |
|
279 | (8) |
|
|
279 | (2) |
|
Access control to program source code |
|
|
281 | (1) |
|
Development and support processes |
|
|
281 | (4) |
|
|
285 | (2) |
25. Monitoring and information security incident management |
|
287 | (16) |
|
|
287 | (5) |
|
Information security events |
|
|
292 | (5) |
|
Management of information security incidents and improvements |
|
|
297 | (6) |
26. Business continuity management |
|
303 | (12) |
|
Business continuity management process |
|
|
304 | (1) |
|
Business continuity and risk assessment |
|
|
305 | (1) |
|
Developing and implementing continuity plans |
|
|
306 | (1) |
|
Business continuity planning framework |
|
|
307 | (4) |
|
Testing, maintaining and reassessing business continuity plans |
|
|
311 | (4) |
27. Compliance |
|
315 | (22) |
|
Identification of applicable legislation |
|
|
316 | (8) |
|
Intellectual property rights (IPR) |
|
|
324 | (4) |
|
Safeguarding of organizational records |
|
|
328 | (2) |
|
Data protection and privacy of personal information |
|
|
330 | (1) |
|
Prevention of misuse of information processing facilities |
|
|
331 | (1) |
|
Regulation of cryptographic controls |
|
|
331 | (1) |
|
Compliance with security policies and standards |
|
|
332 | (3) |
|
Information systems audit considerations |
|
|
335 | (2) |
28. The BS 7799 audit |
|
337 | (6) |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
340 | (3) |
Appendices |
|
343 | (14) |
|
|
345 | (8) |
|
|
345 | (1) |
|
BS 7799 certification organizations |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
346 | (3) |
|
Accounting, finance and economics |
|
|
349 | (1) |
|
Business, management and governance |
|
|
350 | (1) |
|
Contingency planning and disaster recovery |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (2) |
|
|
355 | (2) |
Index |
|
357 | |