SlideShare a Scribd company logo
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security
Standards and Specifications
Page 2
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
 In the process of information security system construction, enterprises
comply with international standards and specifications to develop their
own information security specifications and improve operations.
 This document describes and analyzes several international information
security standards to help better understand information security.
Page 3
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
 Upon completion of this course, you will be able to describe:
 Common information security standards.
 Significance of information security standards.
 Main points of common information security standards.
Page 4
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 5
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Significance of Information Security Standards
 Standards are normative documents that are jointly formulated, approved
by recognized authorities, and used throughout the industry to achieve the
best security.
How can an enterprise build a
secure information system?
Implement each step
according to international
authoritative standards.
Page 6
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security Standards Organizations
 International organizations related to information security standardization:
 International Organization for Standardization (ISO)
 International Electronical Commission (IEC)
 Chinese security standards organizations:
 China Information Security Standardization Technical Committee
 Cyber and Information Security Technical Committee (TC8) of China Communications
Standards Association (CCSA)
 Other standards organizations:
 International Telecommunication Union (ITU)
 Internet Engineering Task Force (IETF)
Page 7
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Common Information Security Standards and
Specifications
ISO 27001
EU:
Information
Technology
Security
Evaluation
Criteria (ITSEC)
US: Trusted
Computer
System
Evaluation
Criteria
(TCSEC)
China: Graded
Protection of
Information
Security
(GB)
Page 8
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 9
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISMS
 The Information Security Management System (ISMS), based on the
BS7799 standard developed by the British Standards Institution (BSI), has
been widely recognized as the international standard.
Plan
Action
Check
Do
 Plan (Establish an ISMS)
 Do (Implement and operate
ISMS)
 Check (Monitor and review
ISMS)
 Action (Maintain and improve
ISMS)
ISMS
Page 10
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISO 27000 ISMS Family of Standards
II
ISO/IEC 27006
ISO/IEC 27007
ISO/IEC 27008
Audit and
certification
guidelines
I
ISO/IEC 27000
ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27003
Requirements and
supporting
guidelines
ISO/IEC 27004
ISO/IEC 27005
IV
ISO 27799
Health information
security management
standards
Projects that are in
the research phase.
For example,
medicine supply
chain and storage
security.
III
Industry information
security management
requirements
Finance
Telecommunication
Other specific
security domains
Page 11
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISO 27001 Evolution
BS 7799-1 ISO/IEC 17799 ISO/IEC 27002
Code of practice for information
security management
Code of practice for
information security controls
BS 7799-2 ISO/IEC 27001
Specification with
guidance for use
Information security management
system requirements
Page 12
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISMS and ISO/IEC 27000
 ISO/IEC 27001 is an international standard that describes the requirements for an
ISMS.
 ISO/IEC 27002 proposes 35 control objectives and 113 controls across 14
categories. These control objectives and controls are the best practices of
information security management.
Requirements and
standards for
implementing and
establishing security
management systems
ISMS
ISO 27001
Establish
ISO/IEC 27001 ISO/IEC 27002
Provide best
practice rules
Information security
management idea
Information security
management operations
Page 13
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Elements for Building an ISMS
 14 control areas in ISO 27002:
3. Human Resource
Security
4. Asset Management 5. Access Control 6. Cryptography
2. Organization of
Information Security
I. Information Security
Policies
7. Physical and
Environmental Security
8. Operation Security
9. Communication
Security
11. Supplier
Relationships
10. System Acquisition,
Development and
Maintenance
12. Information Security
Incident Management
13. Information Security
Aspects of Business
Continuity Management
14. Compliance
Page 14
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISO 27001 Project Implementation Methodology
and Steps
Project initiation
and variance
analysis
 Project kick-off
meeting, team setup,
and team
management
architecture creation
 Rapid assessment of
information security
management status
 Information security
policy design
 Information security
management
training
Stage
Main
Tasks
(Example) Risk
assessment
 Training on asset
collection and risk
assessment
methods
 Threat and
vulnerability
identification, and
security
vulnerability
scanning
 Risk assessment
and rating
 Project review
meeting
System design
and release
System
operation and
monitoring
Certification and
continuous
improvement
1 2 3 4 5
 Risk tolerance and
preference
determination
 Risk handling and
rectification plan
implementation
 System integration
and ISMS
document
preparation
 ISMS release and
training
 Development of
the information
security
management
performance
monitoring process
 ISMS trial run
 System operation
monitoring
 Business continuity
management
training
 Project review
meeting
 ISMS internal audit
 ISMS external audit
 ISMS management
review
 Continually update
corrective and
preventive measures
 Project review
meeting
 Assistance in follow-
up internal and
casual audits
Page 15
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 16
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Definition
No. 27 [2003] of the General Office of
the CPC Central Committee
Opinions for Strengthening Information
Security Assurance Work
Key contents:
• Implementing the policy on graded
protection of information security
• Attaching importance to information
security risk assessment
• Building and improving the information
security monitoring system
• Ensuring information security funds
• Improving the accountability system for
information security management
No. 66 [2004] of the Ministry of Public
Security:
Notice on Issuing the Implementation
Opinions on the Graded Protection of
Information Security
• Public security sector: supervision,
inspection, and guidance of graded
protection
• State secrecy departments: supervision,
inspection, and guidance of classified
work for graded protection
• State cryptography administration
departments: supervision, inspection,
and guidance of cryptography work for
graded protection
1. Public communication networks of
telecom and broadcast/film/TV industries.
Basic information networks such as
broadcast/TV transmission networks.
Important information systems of units
such as Internet information service units,
Internet access service units, and data
centers
2. Important information systems for the
production, scheduling, management,
and office of railway, bank, custom,
taxation, electricity, securities, insurance,
diplomacy, science and technology,
development reform, defense science and
technology, public security,
personnel/labor and social security,
finance, auditing, commerce, water
conservancy, land and energy resources,
transportation, culture, education,
statistics, industry and commerce
administration, and postal sectors
Graded protection of information and information carriers based on their importance levels
National Regulations and
Requirements
Supervision by Public
Security Dept
Implemented by HQs and
Industries
Page 17
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Chapter III: Network Operations Security
Section 1: General Provisions
Article 21: The State implements a tiered cybersecurity protection system.
Network operators shall fulfill the following security protection duties
according to the requirements of the tiered cybersecurity protection system,
to ensure that networks avoid interference, damage, or unauthorized access,
and to guard against network data leaks, theft, or tampering:
• Formulate internal security management systems and operating rules,
determine persons responsible for cybersecurity, and implement
cybersecurity protection responsibility;
• Adopt technological measures to prevent computer viruses, network
attacks, network intrusions and other actions endangering cybersecurity;
• Take technological measures for monitoring and recording network
operating status and cybersecurity incidents, and follow regulations to
store network logs for no less than six months;
• Adopt measures such as data classification, backup of important data, and
encryption;
• Fulfill other obligations as provided by law or administrative regulations.
Significance
Improving overall protection
Effectively improving overall information
security assurance and resolving threats and
major issues faced by information systems
Optimizing resource allocation
Investing limited financial, material, and
human resources in key areas to maximize
economic benefits of security
2. Law and regulation compliance
1. Improve protection and
resource allocation
Page 18
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Background and Development
 After nearly 20 years of development, graded protection has experienced
three stages.
2007 to now:
promotion stage
Started grading, assessment,
rectification, and review. All sector
units started comprehensive
grading/rectification.
2004-2006:
development stage
Many protection-related
standards and specifications
formulated and piloted.
1994-2003: initial stage
The Chinese government called for
strengthening of information security
construction and proposed graded
protection of information systems.
Page 20
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Scope
Protected object
Big data
Information
system (computer)
Industrial control
system
IoT
Cloud computing
platform
Information
system using
mobile internet
technologies
Basic information
network
Page 21
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Grade
Legitimate Rights
and Interests of
Citizens and Legal
Persons
Social Order and
Public Interests
National Security
I Damage N/A N/A
II Severe damage Damage N/A
III / Severe damage Damage
IV / Severe damage Severe damage
V / / Severe damage
Grades
 The grades are defined based on the extent of information system damage
to citizens, society, and state.
Page 22
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Basic Technical Requirements
 Each grade of protection has corresponding technical requirements. For
example, the technical requirements for Grade III cover 5 aspects:
Physical security App security Data security Network security Host security
 7 control points and 33 items:
1. Structure security (7 items)
2. Access control (8 items)
3. Security audit (4 items)
4. Boundary integrity check (2
items)
5. Intrusion prevention (2 items)
6. Malicious code program (2 items)
7. Network device protection (8
items)
Page 23
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Process
Graded Protection Process
Grading Filing Assessment Rectification
 Mandatory
procedure for
notifying the
supervision
department of
graded
protection
construction
 Key to the
implementation
of graded
protection
 Method to
assess the
status of
security
protection
 Primary
step of
graded
protection
Supervision
 External
management
of graded
protection
Page 24
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 25
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Other Standards - US - TCSEC
 Trusted Computer System Evaluation Criteria (TCSEC)
 First formal standard for computer system security evaluation
 Proposed by the Defense Science Board in 1970 and released by the United States
Department of Defense in December 1985
A: Verified
protection
A1
The system administrator must receive a formal security
policy model from the developer. All installation operations
must be performed by the system administrator. Formal
documents must be available for all of these operations.
B: Mandatory
protection
B1
Class-B systems are protected against access from users
without security levels.
B2
B3
C: Discretionary
protection
C1 Audit protection is available, and users' actions and
responsibilities can be audited.
C2
D: Minimal
protection
D1
Security protection is provided only for files and users. The
most common D1 system is a local operating system or a
completely unprotected network.
Page 26
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Other Standards - Europe - ITSEC
 Information Technology Security Evaluation Criteria (ITSEC)
 Formulated by the UK, France, Germany, and the Netherlands, the ITSEC makes better progress in
function flexibility and related evaluation technologies than TCSEC; applied in the military, government,
and business sectors
Function
Level Description
F1-F5 TCSEC D-A
F6 Data and program
integrity
F7 System availability
F8 Data communication
integrity
F9 Data communication
confidentiality
F10 Network security
including confidentiality
and integrity
Level Description
E0 Inadequate assurance
E1
At this level there shall be a security target and an informal description of the architectural design of the
Target of Evaluation (TOE). Functional testing shall indicate that the TOE satisfies its security target.
E2
In addition to the requirements for level E1, there shall be an informal description of the detailed design.
Evidence of functional testing shall be evaluated. There shall be a configuration control system and an
approved distribution procedure.
E3
In addition to the requirements for level E2, the source code and/or hardware drawings corresponding to
the security mechanisms shall be evaluated. Evidence of testing of those mechanisms shall be evaluated.
E4
In addition to the requirements for level E3, there shall be an underlying formal model of security policy
supporting the security target. The security enforcing functions, the architectural design and the detailed
design shall be specified in a semi-formal style.
E5
In addition to the requirements for level E4, there shall be a close correspondence between the detailed
design and the source code and/or hardware drawings.
E6
In addition to the requirements for level E5, the security enforcing functions and the architectural design
shall be specified in a formal style, consistent with the specified underlying formal model of security policy.
Evaluation
Page 27
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Other Standards - Sarbanes-Oxley Act
 Public Company Accounting Reform and Investor Protection Act of 2002,
commonly called SOX.
 Clauses in the SOX Act regarding the monitoring of contract
management and enterprise operation processes can also apply
to information system inspections.
What is the relationship between SOX
and information security?
AN ACT To protect investors by improving the
accuracy and reliability of corporate disclosures
made pursuant to the securities laws, and for
other purposes.
--- Sarbanes-Oxley Act
Page 29
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which of the following are internationally known information security standards
organizations?
A. ISO
B. IEC
C. ITU
D. IETF
2. The ISMS complies with the ______ process.
Page 30
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Summary
 Common information security standards
 Significance of information security standards
 Main points of common information security standards
Page 31
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com

More Related Content

PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
Hatem ElSahhar
 
PDF
Cissp Study notes.pdf
MAHESHUMANATHGOPALAK
 
PPTX
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
PPTX
Security audits & compliance
Vandana Verma
 
PDF
Setting up CSIRT
APNIC
 
PPTX
CompTIA Security+.pptx
KiranKumar24546
 
PDF
CISSP Domain 1 - Security And Risk Management.pdf
hemant6552
 
PPT
PCI DSS
Duy Do Phan
 
(ISC)2 CCSP - Certified Cloud Security Professional
Hatem ElSahhar
 
Cissp Study notes.pdf
MAHESHUMANATHGOPALAK
 
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
Security audits & compliance
Vandana Verma
 
Setting up CSIRT
APNIC
 
CompTIA Security+.pptx
KiranKumar24546
 
CISSP Domain 1 - Security And Risk Management.pdf
hemant6552
 
PCI DSS
Duy Do Phan
 

What's hot (20)

PPTX
Information security management system
Arani Srinivasan
 
PPTX
Physical security
Tariq Mahmood
 
PPTX
Information Security and the SDLC
BDPA Charlotte - Information Technology Thought Leaders
 
PPTX
Iso 27001 isms presentation
Midhun Nirmal
 
PDF
Steps to iso 27001 implementation
Ralf Braga
 
PDF
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
PDF
Data Protection and Privacy
Vertex Holdings
 
PPT
Overview of ISO 27001 ISMS
Akhil Garg
 
PDF
ISO 27001 2002 Update Webinar.pdf
ControlCase
 
PDF
Infosec Audit Lecture_4
Obrina Candra, CISA, ISMS-LA
 
PPTX
Information Security Lecture #1 ppt
vasanthimuniasamy
 
PPT
Information security management
UMaine
 
PDF
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
PDF
Corporate threat vector and landscape
yohansurya2
 
PPTX
Cyber Security –PPT
Rajat Kumar
 
PPTX
What is iso 27001 isms
Craig Willetts ISO Expert
 
PPT
Information security
razendar79
 
PDF
Security Awareness Training
Daniel P Wallace
 
PPT
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Information security management system
Arani Srinivasan
 
Physical security
Tariq Mahmood
 
Iso 27001 isms presentation
Midhun Nirmal
 
Steps to iso 27001 implementation
Ralf Braga
 
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
Data Protection and Privacy
Vertex Holdings
 
Overview of ISO 27001 ISMS
Akhil Garg
 
ISO 27001 2002 Update Webinar.pdf
ControlCase
 
Infosec Audit Lecture_4
Obrina Candra, CISA, ISMS-LA
 
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Information security management
UMaine
 
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Corporate threat vector and landscape
yohansurya2
 
Cyber Security –PPT
Rajat Kumar
 
What is iso 27001 isms
Craig Willetts ISO Expert
 
Information security
razendar79
 
Security Awareness Training
Daniel P Wallace
 
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Ad

Similar to 102 Information security standards and specifications (20)

PPTX
the role of 27001 in cybersecurity pp.pptx
floresmika308
 
PDF
20CS024 Ethics in Information Technology
Kathirvel Ayyaswamy
 
DOCX
Policy InformationPolicy Name __________________________ ID _.docx
stilliegeorgiana
 
PDF
Whitepaper iso 27001_isms | All about ISO 27001
Chandan Singh Ghodela
 
PDF
ISO 27001 is the commonly used standard for ISMS implementation and certifica
Ibrahim78026
 
PDF
ISO 27001:2022 Introduction
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
PDF
Auditing Information Security Management System Using ISO 27001 2013
Andrea Porter
 
PPTX
Iso iec 27001 foundation training course by interprom
Mart Rovers
 
PPTX
Presentaion.pptx
sanathchandranath69
 
PDF
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
Peter GEELEN ✔
 
PDF
A to Z of Information Security Management
Mark Conway
 
PPTX
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
PPTX
Iso 27001 awareness
Ãsħâr Ãâlâm
 
PDF
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
PDF
ISMS_of ISO 27001-2022-awareness training
HananZayed4
 
PDF
NQA Your Complete Guide to ISO 27001
NQA
 
PDF
NQA Your Complete Guide to ISO 27001
NA Putra
 
PPTX
Basics to ISO 27001 by Manula Udugahapattuwa
Manula Udugahapattuwa
 
PPTX
Information security
avinashbalakrishnan2
 
PPTX
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
ITIL Indonesia
 
the role of 27001 in cybersecurity pp.pptx
floresmika308
 
20CS024 Ethics in Information Technology
Kathirvel Ayyaswamy
 
Policy InformationPolicy Name __________________________ ID _.docx
stilliegeorgiana
 
Whitepaper iso 27001_isms | All about ISO 27001
Chandan Singh Ghodela
 
ISO 27001 is the commonly used standard for ISMS implementation and certifica
Ibrahim78026
 
Auditing Information Security Management System Using ISO 27001 2013
Andrea Porter
 
Iso iec 27001 foundation training course by interprom
Mart Rovers
 
Presentaion.pptx
sanathchandranath69
 
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
Peter GEELEN ✔
 
A to Z of Information Security Management
Mark Conway
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
Iso 27001 awareness
Ãsħâr Ãâlâm
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISMS_of ISO 27001-2022-awareness training
HananZayed4
 
NQA Your Complete Guide to ISO 27001
NQA
 
NQA Your Complete Guide to ISO 27001
NA Putra
 
Basics to ISO 27001 by Manula Udugahapattuwa
Manula Udugahapattuwa
 
Information security
avinashbalakrishnan2
 
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
ITIL Indonesia
 
Ad

More from SsendiSamuel (11)

PPTX
106 Threat defense and information security development trends
SsendiSamuel
 
PPTX
105 Common information security threats
SsendiSamuel
 
PPTX
104 Common network devices
SsendiSamuel
 
PPTX
103 Basic network concepts
SsendiSamuel
 
PPTX
101 Basic concepts of information security
SsendiSamuel
 
PPTX
Chapter 06: cloud computing trends
SsendiSamuel
 
PPTX
Chapter 05: introduction to virtualization features
SsendiSamuel
 
PPTX
Chapter 04: Storage virtualization basics
SsendiSamuel
 
PPTX
Chapter 03: Network basics for cloud computing
SsendiSamuel
 
PPTX
Chapter 01: A brief introduction to cloud computing
SsendiSamuel
 
PPTX
Chapter 02: Introduction to compute virtualization
SsendiSamuel
 
106 Threat defense and information security development trends
SsendiSamuel
 
105 Common information security threats
SsendiSamuel
 
104 Common network devices
SsendiSamuel
 
103 Basic network concepts
SsendiSamuel
 
101 Basic concepts of information security
SsendiSamuel
 
Chapter 06: cloud computing trends
SsendiSamuel
 
Chapter 05: introduction to virtualization features
SsendiSamuel
 
Chapter 04: Storage virtualization basics
SsendiSamuel
 
Chapter 03: Network basics for cloud computing
SsendiSamuel
 
Chapter 01: A brief introduction to cloud computing
SsendiSamuel
 
Chapter 02: Introduction to compute virtualization
SsendiSamuel
 

Recently uploaded (20)

PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Virus sequence retrieval from NCBI database
yamunaK13
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 

102 Information security standards and specifications

  • 1. www.huawei.com Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security Standards and Specifications
  • 2. Page 2 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Foreword  In the process of information security system construction, enterprises comply with international standards and specifications to develop their own information security specifications and improve operations.  This document describes and analyzes several international information security standards to help better understand information security.
  • 3. Page 3 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Objectives  Upon completion of this course, you will be able to describe:  Common information security standards.  Significance of information security standards.  Main points of common information security standards.
  • 4. Page 4 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 5. Page 5 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Significance of Information Security Standards  Standards are normative documents that are jointly formulated, approved by recognized authorities, and used throughout the industry to achieve the best security. How can an enterprise build a secure information system? Implement each step according to international authoritative standards.
  • 6. Page 6 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security Standards Organizations  International organizations related to information security standardization:  International Organization for Standardization (ISO)  International Electronical Commission (IEC)  Chinese security standards organizations:  China Information Security Standardization Technical Committee  Cyber and Information Security Technical Committee (TC8) of China Communications Standards Association (CCSA)  Other standards organizations:  International Telecommunication Union (ITU)  Internet Engineering Task Force (IETF)
  • 7. Page 7 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Common Information Security Standards and Specifications ISO 27001 EU: Information Technology Security Evaluation Criteria (ITSEC) US: Trusted Computer System Evaluation Criteria (TCSEC) China: Graded Protection of Information Security (GB)
  • 8. Page 8 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 9. Page 9 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISMS  The Information Security Management System (ISMS), based on the BS7799 standard developed by the British Standards Institution (BSI), has been widely recognized as the international standard. Plan Action Check Do  Plan (Establish an ISMS)  Do (Implement and operate ISMS)  Check (Monitor and review ISMS)  Action (Maintain and improve ISMS) ISMS
  • 10. Page 10 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISO 27000 ISMS Family of Standards II ISO/IEC 27006 ISO/IEC 27007 ISO/IEC 27008 Audit and certification guidelines I ISO/IEC 27000 ISO/IEC 27001 ISO/IEC 27002 ISO/IEC 27003 Requirements and supporting guidelines ISO/IEC 27004 ISO/IEC 27005 IV ISO 27799 Health information security management standards Projects that are in the research phase. For example, medicine supply chain and storage security. III Industry information security management requirements Finance Telecommunication Other specific security domains
  • 11. Page 11 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISO 27001 Evolution BS 7799-1 ISO/IEC 17799 ISO/IEC 27002 Code of practice for information security management Code of practice for information security controls BS 7799-2 ISO/IEC 27001 Specification with guidance for use Information security management system requirements
  • 12. Page 12 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISMS and ISO/IEC 27000  ISO/IEC 27001 is an international standard that describes the requirements for an ISMS.  ISO/IEC 27002 proposes 35 control objectives and 113 controls across 14 categories. These control objectives and controls are the best practices of information security management. Requirements and standards for implementing and establishing security management systems ISMS ISO 27001 Establish ISO/IEC 27001 ISO/IEC 27002 Provide best practice rules Information security management idea Information security management operations
  • 13. Page 13 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Elements for Building an ISMS  14 control areas in ISO 27002: 3. Human Resource Security 4. Asset Management 5. Access Control 6. Cryptography 2. Organization of Information Security I. Information Security Policies 7. Physical and Environmental Security 8. Operation Security 9. Communication Security 11. Supplier Relationships 10. System Acquisition, Development and Maintenance 12. Information Security Incident Management 13. Information Security Aspects of Business Continuity Management 14. Compliance
  • 14. Page 14 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISO 27001 Project Implementation Methodology and Steps Project initiation and variance analysis  Project kick-off meeting, team setup, and team management architecture creation  Rapid assessment of information security management status  Information security policy design  Information security management training Stage Main Tasks (Example) Risk assessment  Training on asset collection and risk assessment methods  Threat and vulnerability identification, and security vulnerability scanning  Risk assessment and rating  Project review meeting System design and release System operation and monitoring Certification and continuous improvement 1 2 3 4 5  Risk tolerance and preference determination  Risk handling and rectification plan implementation  System integration and ISMS document preparation  ISMS release and training  Development of the information security management performance monitoring process  ISMS trial run  System operation monitoring  Business continuity management training  Project review meeting  ISMS internal audit  ISMS external audit  ISMS management review  Continually update corrective and preventive measures  Project review meeting  Assistance in follow- up internal and casual audits
  • 15. Page 15 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 16. Page 16 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Definition No. 27 [2003] of the General Office of the CPC Central Committee Opinions for Strengthening Information Security Assurance Work Key contents: • Implementing the policy on graded protection of information security • Attaching importance to information security risk assessment • Building and improving the information security monitoring system • Ensuring information security funds • Improving the accountability system for information security management No. 66 [2004] of the Ministry of Public Security: Notice on Issuing the Implementation Opinions on the Graded Protection of Information Security • Public security sector: supervision, inspection, and guidance of graded protection • State secrecy departments: supervision, inspection, and guidance of classified work for graded protection • State cryptography administration departments: supervision, inspection, and guidance of cryptography work for graded protection 1. Public communication networks of telecom and broadcast/film/TV industries. Basic information networks such as broadcast/TV transmission networks. Important information systems of units such as Internet information service units, Internet access service units, and data centers 2. Important information systems for the production, scheduling, management, and office of railway, bank, custom, taxation, electricity, securities, insurance, diplomacy, science and technology, development reform, defense science and technology, public security, personnel/labor and social security, finance, auditing, commerce, water conservancy, land and energy resources, transportation, culture, education, statistics, industry and commerce administration, and postal sectors Graded protection of information and information carriers based on their importance levels National Regulations and Requirements Supervision by Public Security Dept Implemented by HQs and Industries
  • 17. Page 17 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Chapter III: Network Operations Security Section 1: General Provisions Article 21: The State implements a tiered cybersecurity protection system. Network operators shall fulfill the following security protection duties according to the requirements of the tiered cybersecurity protection system, to ensure that networks avoid interference, damage, or unauthorized access, and to guard against network data leaks, theft, or tampering: • Formulate internal security management systems and operating rules, determine persons responsible for cybersecurity, and implement cybersecurity protection responsibility; • Adopt technological measures to prevent computer viruses, network attacks, network intrusions and other actions endangering cybersecurity; • Take technological measures for monitoring and recording network operating status and cybersecurity incidents, and follow regulations to store network logs for no less than six months; • Adopt measures such as data classification, backup of important data, and encryption; • Fulfill other obligations as provided by law or administrative regulations. Significance Improving overall protection Effectively improving overall information security assurance and resolving threats and major issues faced by information systems Optimizing resource allocation Investing limited financial, material, and human resources in key areas to maximize economic benefits of security 2. Law and regulation compliance 1. Improve protection and resource allocation
  • 18. Page 18 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Background and Development  After nearly 20 years of development, graded protection has experienced three stages. 2007 to now: promotion stage Started grading, assessment, rectification, and review. All sector units started comprehensive grading/rectification. 2004-2006: development stage Many protection-related standards and specifications formulated and piloted. 1994-2003: initial stage The Chinese government called for strengthening of information security construction and proposed graded protection of information systems.
  • 19. Page 20 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Scope Protected object Big data Information system (computer) Industrial control system IoT Cloud computing platform Information system using mobile internet technologies Basic information network
  • 20. Page 21 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Grade Legitimate Rights and Interests of Citizens and Legal Persons Social Order and Public Interests National Security I Damage N/A N/A II Severe damage Damage N/A III / Severe damage Damage IV / Severe damage Severe damage V / / Severe damage Grades  The grades are defined based on the extent of information system damage to citizens, society, and state.
  • 21. Page 22 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Basic Technical Requirements  Each grade of protection has corresponding technical requirements. For example, the technical requirements for Grade III cover 5 aspects: Physical security App security Data security Network security Host security  7 control points and 33 items: 1. Structure security (7 items) 2. Access control (8 items) 3. Security audit (4 items) 4. Boundary integrity check (2 items) 5. Intrusion prevention (2 items) 6. Malicious code program (2 items) 7. Network device protection (8 items)
  • 22. Page 23 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Process Graded Protection Process Grading Filing Assessment Rectification  Mandatory procedure for notifying the supervision department of graded protection construction  Key to the implementation of graded protection  Method to assess the status of security protection  Primary step of graded protection Supervision  External management of graded protection
  • 23. Page 24 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 24. Page 25 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Other Standards - US - TCSEC  Trusted Computer System Evaluation Criteria (TCSEC)  First formal standard for computer system security evaluation  Proposed by the Defense Science Board in 1970 and released by the United States Department of Defense in December 1985 A: Verified protection A1 The system administrator must receive a formal security policy model from the developer. All installation operations must be performed by the system administrator. Formal documents must be available for all of these operations. B: Mandatory protection B1 Class-B systems are protected against access from users without security levels. B2 B3 C: Discretionary protection C1 Audit protection is available, and users' actions and responsibilities can be audited. C2 D: Minimal protection D1 Security protection is provided only for files and users. The most common D1 system is a local operating system or a completely unprotected network.
  • 25. Page 26 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Other Standards - Europe - ITSEC  Information Technology Security Evaluation Criteria (ITSEC)  Formulated by the UK, France, Germany, and the Netherlands, the ITSEC makes better progress in function flexibility and related evaluation technologies than TCSEC; applied in the military, government, and business sectors Function Level Description F1-F5 TCSEC D-A F6 Data and program integrity F7 System availability F8 Data communication integrity F9 Data communication confidentiality F10 Network security including confidentiality and integrity Level Description E0 Inadequate assurance E1 At this level there shall be a security target and an informal description of the architectural design of the Target of Evaluation (TOE). Functional testing shall indicate that the TOE satisfies its security target. E2 In addition to the requirements for level E1, there shall be an informal description of the detailed design. Evidence of functional testing shall be evaluated. There shall be a configuration control system and an approved distribution procedure. E3 In addition to the requirements for level E2, the source code and/or hardware drawings corresponding to the security mechanisms shall be evaluated. Evidence of testing of those mechanisms shall be evaluated. E4 In addition to the requirements for level E3, there shall be an underlying formal model of security policy supporting the security target. The security enforcing functions, the architectural design and the detailed design shall be specified in a semi-formal style. E5 In addition to the requirements for level E4, there shall be a close correspondence between the detailed design and the source code and/or hardware drawings. E6 In addition to the requirements for level E5, the security enforcing functions and the architectural design shall be specified in a formal style, consistent with the specified underlying formal model of security policy. Evaluation
  • 26. Page 27 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Other Standards - Sarbanes-Oxley Act  Public Company Accounting Reform and Investor Protection Act of 2002, commonly called SOX.  Clauses in the SOX Act regarding the monitoring of contract management and enterprise operation processes can also apply to information system inspections. What is the relationship between SOX and information security? AN ACT To protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws, and for other purposes. --- Sarbanes-Oxley Act
  • 27. Page 29 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Quiz 1. Which of the following are internationally known information security standards organizations? A. ISO B. IEC C. ITU D. IETF 2. The ISMS complies with the ______ process.
  • 28. Page 30 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Summary  Common information security standards  Significance of information security standards  Main points of common information security standards
  • 29. Page 31 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Thank You www.huawei.com