作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (2): 133-134. doi: 10.3969/j.issn.1000-3428.2008.02.044

• 安全技术 • 上一篇    下一篇

ISMS概念模型探索

姚轶崭1,江常青1,张 利1,李建彬2   

  1. (1. 中国信息安全产品测评认证中心,北京 100089;2. 国家税务总局信息中心,北京 100038)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-01-20 发布日期:2008-01-20

ISMS Concept Model Exploration

YAO Yi-zhan1, JIANG Chang-qing1, ZHANG Li1, LI Jian-bin2   

  1. (1. China Information Technology Security Certification Center, Beijing 100089;2. Information Center, State Taxation Administration, Beijing 100038)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-01-20 Published:2008-01-20

摘要: ISO 27001给出了信息安全管理体系要求方面的最佳实践标准,但并没有说明体系要求方面内在的逻辑关系。该文将ISO 27001分解为过程方法要求和安全控制要求2个部分,在过程方法上按照PDCA的循环模型重新解构了过程方法要求之间的关系,在安全控制上按照主体访问客体的方式重组了安全控制要求之间的关系。

关键词: 信息安全管理体系, PDCA循环, 主客体, 过程方法要求, 安全控制要求

Abstract: ISO 27001 provides a best practice of information security management, but it dosen’t present the internal logical relations among the security management requirements. This paper divides ISO 27001 into two parts: methodological requirements and security control requirements. The methodological requirements are organized into the Plan-Do-Check-Act(PDCA) model, and the security control requirements are arranged into "subject access object" model.

Key words: Information Security Management System(ISMS), Plan-Do-Check-Act(PDCA), subject-object, methodological requirements, security control requirements

中图分类号: