总则
When planning for the information security management system, the organization shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to:
当规划信息安全管理体系时,组织应考虑4.1中提及的问题和4.2中提及的要求,确定需要应
对的风险和机会,以:
a) ensure the information security management system can achieve its intended outcome(s);
b) prevent, or reduce, undesired effects; and
c) achieve continual improvement. The organization shall plan:
d) actions to address these risks and opportunities; and
e) how to
1) integrate and implement the actions into its information security management system processes;
2) evaluate the effectiveness of these actions. a) 确保信息安全管理体系能实现其预期结果;
b) 防止或减少意外的影响; c) 实现持续改进。 组织应规划:
d) 应对这些风险和机会的措施;
e) 如何
1) 整合和实施这些措施并将其纳入信息安全管理体系过程;
2) 评价这些措施的有效性。
6.1.2 Information security risk assessment 6.1.2 信息安全风险评估
The organization shall define and apply an information security risk assessment process that:
组织应定义并应用风险评估过程,以:
a) establishes and maintains information security risk criteria that include:
1) the risk acceptance criteria; and
2) criteria for performing information security risk assessments;
b) ensures that repeated information security risk assessments produce consistent, valid and comparable results;
c) identifies the information security risks:
1) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and
2) identify the risk owners;
d) analyses the information security risks:
1) assess the potential consequences that would result if the risks identified in 6.1.2 c) 1) were to materialize;
2) assess the realistic likelihood of the occurrence of the risks identified in 6.1.2 c) 1); and
3) determine the levels of risk;
e) evaluates the information security risks:
1) compare the results of risk analysis with the risk criteria established in 6.1.2 a); and
2) prioritize the analysed risks for risk treatment.
The organization shall retain documented information about the information security risk assessment process.
a) 建立并保持信息安全风险准则,包括:
1) 风险接受准则;
2) 执行信息安全风险评估的准则;
b) 确保重复性的信息安全风险评估可产生一致的、有效的和可比较的结果;
c) 识别信息安全风险:
1) 应用信息安全风险评估过程来识别信息安全管理体系范围内的信息丧失保密性、完整 性和可用性的相关风险;
2) 识别风险负责人;
d) 分析信息安全风险:
1) 评估 6.1.2 c)1)中所识别风险发生后将导致的潜在影响;
2) 评估 6.1.2 c)1)中所识别风险发生的现实可能性;
3) 确定风险级别;
e) 评价信息安全风险;
1) 将风险分析结果同6.1.2 a)建立的风险准则进行比较;
2) 为实施风险处置确定已分析风险的优先级。 组织应定义并应用风险评估过程,以: 组织应保留信息安全风险评估过程的文件记录信息。
6.1.3 Information security risk treatment 6.1.3 信息安全风险处置
The organization shall define and apply an information security risk treatment process to:
a) select appropriate information security risk treatment options, taking account of the risk assessment results;
b) determine all controls that are necessary to implement the information security risk treatment option(s) chosen;
组织应定义并应用信息安全风险处置过程,以:
a) 在考虑风险评估结果的前提下,选择适当的信息安全风险处置选项:
b) 为实施所选择的信息安全风险处置选项,确定所有必需的控制措施;
NOTE Organizations can design controls as required, or identify them from any source.
注:组织可按要求设计控制措施,或从其他来源识别控制措施。
c) compare the controls determined in 6.1.3 b) above with those in Annex A and verify that no necessary controls have been omitted;
c) 将 6.1.3 b)所确定的控制措施与附录A 的控制措施进行比较,以核实没有遗漏必要的
控制措施;
NOTE 1 Annex A contains a comprehensive list of control objectives and controls. Users of this International Standard are directed to Annex A to ensure that no necessary controls are overlooked.
NOTE 2 Control objectives are implicitly included in the controls chosen. The control objectives and controls listed in Annex A are not exhaustive and additional control objectives and controls may be needed.
注1:附录A包含了一份全面的控制目标和控制措施的列表。本标准用户可利用附录A以确保
不会遗漏必要的控制措施。 注2:控制目标包含于所选择的控制措施内。附录A所列的控制目标和控制措施并不是所有 的控制目标和控制措施,组织也可能需要另外的控制目标和控制措施。
d) produce a Statement of Applicability that contains the necessary controls (see 6.1.3 b) and c)) and justification for inclusions, whether they are implemented or not, and the justification for exclusions of controls from Annex A;
e) formulate an information security risk treatment plan; and
f) obtain risk owners’ approval of the information security risk treatment plan and acceptance of the residual information security risks.
The organization shall retain documented information about the information security risk treatment process.
d) 产生适用性声明。适用性声明要包含必要的控制措施(见6.1.3 b)和c))、对包含的合
理性说明(无论是否已实施)以及对附录A 控制措施删减的合理性说明;
e) 制定信息安全风险处置计划;
f) 获得风险负责人对信息安全风险处置计划以及接受信息安全残余风险的批准。 组织应保留信息安全风险处置过程的文件记录信息。
NOTE The information security risk assessment and treatment process in this International Standard aligns with the principles and generic guidelines provided in ISO 31000[5].
注:本标准中的信息安全风险评估和处置过程可与 ISO 31000[5]中规定的原则和通用指南
相结合。