ISO ISO/IEC 27041 Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- 35
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method - First Edition
N ISO/IEC 27041
Annotation
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are "fit for purpose". It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.
This document aims to
- provide guidance on the capture and analysis of functional and non-functional requirements relating to an Information Security (IS) incident investigation,
- give guidance on the use of validation as a means of assuring suitability of processes involved in the investigation,
- provide guidance on assessing the levels of validation required and the evidence required from a validation exercise,
- give guidance on how external testing and documentation can be incorporated in the validation process.
Автоматический перевод:
Информационные технологии - методы Безопасности - Руководство при уверении пригодности и соответствия инцидентного исследовательского метода - Первый Выпуск



