1 / 47
文档名称:

(ebook) SANS Institute - Information Security Management - Audit Checklist (ISO_17799).pdf

格式:pdf   页数:47
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

(ebook) SANS Institute - Information Security Management - Audit Checklist (ISO_17799).pdf

上传人:kuo08091 2014/2/19 文件大小:0 KB

下载得到文件列表

(ebook) SANS Institute - Information Security Management - Audit Checklist (ISO_17799).pdf

文档介绍

文档介绍:Information Security Management

BS :2002

Audit Check List

for SANS


Author: Val Thiagarajan ., p, CCSE, MCSE, SPS (FW), IT Security Consultant.
Approved by: Algis Kibirkstis
Owner: SANS


Extracts from BS 7799 part 1: 1999 are reproduced with the permission of BSI under license number 2003DH0251. British Standards can be purchased from BSI Customer
Services, 389 Chiswick High Road, London W4 4AL. Tel : 44 (0)20 8996 9001. email: ******@bsi-
SANS Institute
BS 7799 Audit Checklist
6/08/2003

Table of Contents
Security Policy 9
Information security policy..................................................................................................................................................................... 9
Information security policy document ................................................................................................................................................ 9
Review and evaluation........................................................................................................................................................................ 9
Organisational Security 10
Information security infrastructure ....................................................................................................................................................... 10
Management information security forum ......................................................................................................................................... 10
Information security coordination..................................................................................................................................................... 10
Allocation of information security responsibilities........................................................................................................................... 10
Authorisation process for information