Dals standardy vydane ISO/IEC/JTC1/SC 27/WG1 2 Standardy (normy) a legislativa informacn bezpecnosti, Dodatek ISO/IEC TR 15945, Specication of TTP services to support the application of digital signatures X spolecny standard s doporucenm X.843 ITU-T 2 PV 017 Bezpecnost IT Jan Staudek http://www..muni.cz/usr/staudek/vyuka/ } ISO/IEC TR 18043, System deployment a operations of intrusion detection systems { IDS X technicka zprava s metodickym navodem jak zahrnout IDS do IT infrastruktury 2 w A| y < 5 4 23 1 0 / -. , )+ ( %&' $ # !" Æ ISO/IEC TR 18044, Information security incident management X technicka zprava s metodickym navodem pro spravu reakce na bezpecnostn incident Verze : podzim 2015 Jan Staudek, FI MU Brno Dals standardy vydane ISO/IEC/JTC1/SC 27/WG1 2 ISO/IEC TR 18028, IT Network security 1 Orientace { kryptogracke a autentizacn techniky a mechanismy X ISO/IEC 9796, 2000{2002, Digital signature schemes giving message recovery X ISO/IEC 9797, 1999{2002, MACs, Message authentication Codes X ISO/IEC 9798, 1997{2000, Entity Authentication X ISO/IEC 10116, 1997, Modes of operation for bezpecny vzdalen y prstup, VPN { Virtual Private Networks ISO/IEC 9979, 1999 Procedures for registration of cryptographic algorithms Jan Staudek, FI MU Brno PV017 { Standardy (normy) informacn bezpecnosti Typy standardu vydanych ISO/IEC/JTC1/SC 27/WG2 X sprava a architektura st'ove bezpecnosti, bezpecnostn brany, 2 | | PV017 { Standardy (normy) informacn bezpecnosti X X X X X X X 2 n-bit block cipher algorithm ISO/IEC 10118, 1998{2000, Hash function ISO/IEC 11770, 1996{1999, Key management ISO/IEC 13888, 1997{1998, Non-repudation ISO/IEC 14888, 1998{1999, Digital signature schemes with appendix ISO/IEC 15946, Cryptographic techniques based on elliptic curves ISO/IEC 18014, 2002, Time stamping services ISO/IEC 18033, Ecryption algorithms Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti 3 Standard vydany ISO/IEC/JTC1/SC 27/WG3 2 Standardy ISO/TC 68 Financial Services ISO/IEC 15408 Evaluation criteria for IT security X X X X X 2 Soucasna struktura TC 68 X SC2: Security management a general banking operations ISO/IEC 15408-1: Part 1: Introduction and general model ISO/IEC 15408-2: Part 2: Security functional requirements ISO/IEC 15408-3: Part 3: Security assurance requirements vsechny 3 c asti byly publikovane v r. 2005 vce v samostatne predna sce X X X X Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti 4 2 Zastresuj CEN a ETSI Hlavn iniciativa { CEN/ISSS, Information Society Standardization System X vznik koncem 90. let, uzk a navaznost na CEN, ETSI, CENELEC X cl: zkracen ISO{doby tvorby ISO standardu (tou je 5 let) X zavad se velmi pruzny princip prijman pracovnch (de facto) standardu formou vysledn ych dokumentu standardizacnch workshopu (WS) ustanovovanych podle potreby, tzv. CEN Workshop Agreements, CWA 2 prklady CEN/ISSS workshopu X X X X Electronics Signatures, E-Sign eAuthentication Data protection and Privacy, DPP Electronic Commerce,EC, . . . Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti Standard NIST, rodina SP 800, p r klady Evropske iniciativy ve standardizaci informacn bezpecnosti 2 { hlavn pusobi ste standardizace bezpecnosti IT { WG4 Information security guidelines fo banking { WG6 Framework for IT security for nancial institutions { WG10 Biometric information security { WG11 Encryption algorithm used in banking applications { WG12 Security in retail banking { WG14 Cryptographic syntax scheme for nancial services SC4: Securities and realted nancial instruments SC6: Retail nancial services SC7: Core banking WG2: International bank account number 6 5 (SP – Special Publication) X SP 800-12 : An Introduction to Computer Security: The NIST Handbook X SP 800-14 : Generally Accepted Principles and Practices for Securing Information Technology Systems X SP 800-27 : Engineering Principles for IT Security X SP 800-30 : Risk Management Guide for Information Technology Systems X SP 800-45 : Electronic Mail Security X SP 800-50 : Building an Inf. Techn. Security Awareness and Training Program X SP 800-63 : Electronic Authentication Guidelines X SP 800-94 : Guide to Intrusion Detection and Prevention Systems (IDPS) X SP 800-95 : Guidelines for Secure Web Services X SP 800-100 : Information Security Handbook: A Guide for Mngrs Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti 7 Standard ISACA, COBIT 2 2 Standard ISACA, COBIT, detailneji COBIT { Control Objectives for Information and related Techn. 34 procesu, 230 r dicch nastroj u v oblastech { v domen ach 2 X X X X X X X X X X X Plan and Organize jak mu ze IT pomoc organizaci dosahnout stanovenych clu X Acquire and Implement identikace pozadavku na IT a jejich implementace do stavaj cch podnikatelskych procesu organizace X Deliver and Support procesy umoznuj c efektivn beh systemu X Monitor and Evaluate strategie posuzovan potreb organizace, prokaz an , zda stavaj cc system stale splnuje cle, pro ktere byl navrzeny 2 Planov an a organizace (Plan and Organize PO) s irs zab er nez ISO/IEC 27002, doplnuj se, nekonkuruj si Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti 8 Jan Staudek, FI MU Brno Akvizice a implementace (Acquire and Implement AI) X X X X X X X 2 AI1 Identify automated solution. AI2 Acquire and maintain application software AI3 Acquire and maintain technology infrastructure AI4 Enable operation and use AI5 Procure IT resources AI6 Manage changes AI7 Install and accredit solutions and changes Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti | PV017 { Standardy (normy) informacn bezpecnosti 9 Standard ISACA, COBIT, detailneji Standard ISACA, COBIT, detailneji 2 PO1 Dene a strategic IT plan PO2 Dene the information architecture PO3 Determine technological direction PO4 Dene the IT processes, organisation and relationships PO5 Manage the IT investment PO6 Communicate management aims and direction PO7 Manage IT human resources PO8 Manage quality PO9 Assess and manage IT risks PO10 Manage projects Dodavka a podpora (Deliver and Support DS) X X X X X X X X X X X X 10 DS1 Dene and manage service levels DS2 Manage third-party service DS3 Manage performance and capacity DS4 Ensure continuous service DS5 Ensure systems security DS6 Identify and allocate costs DS7 Educate and train users DS8 Manage service desk and incidents DS9 Manage the conguration. DS10 Manage problems DS11 Manage data DS12 Manage the physical environment DS13 Manage operations Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti 11 Standard ISACA, COBIT, detailneji 2 Standard ISF, SoGP Monitoring a evaluace (Monitor and Evalue ME ) 2 ME1 Monitor and evaluate IT performance. ME2 Monitor and evaluate internal control. ME3 Ensure compliance with external requirements. ME4 Provide IT governance. 2 X X X X X X X X X X 2 Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti SoGP { Standard of Good Practice for Information Security s est klc ovych aspektu 12 Security management { r zen bezpecnosti Critical business applications { provozovan aplikac Computer installations { IT infrastruktura Networks { IT infrastruktura Systems development { vyvoj novych aplikac End user environment { prostred koncovych uzivatelu popisy principu a clu, doporucen pokryvaj c implementaci Jan Staudek, FI MU Brno | PV017 { Standardy (normy) informacn bezpecnosti 13