电脑桌面
添加安全生产网—安全人的学习资料平台到电脑桌面
安装后可以在桌面快捷访问

Risk Assessment Checklist.pdfVIP专享VIP免费原创优质

Risk Assessment Checklist.pdf_第1页
1/9
Risk Assessment Checklist.pdf_第2页
2/9
Risk Assessment Checklist.pdf_第3页
3/9
RiskAssessmentCheckListInformationSecurityPolicy1.InformationsecuritypolicydocumentDoesanInformationsecuritypolicyexist,whichisapprovedbythemanagement,publishedandcommunicatedasappropriatetoallemployees?Doesitstatethemanagementcommitmentandsetouttheorganizationalapproachtomanaginginformationsecurity?2.ReviewandEvaluationDoestheSecuritypolicyhaveanowner,whoisresponsibleforitsmaintenanceandreviewaccordingtoadefinedreviewprocess?Doestheprocessensurethatareviewtakesplaceinresponsetoanychangesaffectingthebasisoftheoriginalassessment,example:significantsecurityincidents,newvulnerabilitiesorchangestoorganizationalortechnicalstructure?OrganizationalSecurityInformationsecurityinfrastructure1.Allocationofinformationsecurityresponsibilitiesa.Areresponsibilitiesfortheprotectionofindividualassetsandforcarryingoutspecificsecurityprocessesclearlydefined?2.Co-operationbetweenorganizationsa.Aretheappropriatecontactswithlawenforcementauthorities,regulatorybodies,utilityproviders,informationserviceprovidersandtelecommunicationoperatorsmaintainedtoensurethatappropriateactioncanbequicklytakenandadviceobtained,intheeventofanincident?3.IndependentreviewofinformationsecurityYesNoInProgressa.Istheimplementationofsecuritypolicyreviewedindependentlyonregularbasis?Thisistoprovideassurancethatorganizationalpracticesproperlyreflectthepolicy,andthatitisfeasibleandeffective.Securityofthirdpartyaccess1.Identificationofrisksfromthirdpartya.Arerisksfromthirdpartyaccessidentifiedandappropriatesecuritycontrolsimplemented?b.Arethetypesofaccessesidentified,classifiedandreasonsforaccessjustified?c.Aresecurityriskswiththirdpartycontractorsworkingonsiteidentifiedandappropriatecontrolsimplemented?2.Securityrequirementsinthirdpartycontractsa.Isthereaformalcontractcontaining,orreferringto,allthesecurityrequirementstoensurecompliancewiththeorganization=ssecuritypoliciesandstandards?Outsourcing1.Securityrequirementsinoutsourcingcontractsa.Aresecurityrequirementsaddressedinthecontractwiththethirdparty,whentheorganizationhasoutsourcedthemanagementandcontrolofallorsomeofitsinformationsystems,networksand/ordesktopenvironments?Doescontractaddresshowthelegalrequirementsaretobemet,howthesecurityoftheorganization=sassetsaremaintainedandtested,andtherightofaudit,physicalsecurityissuesandhowtheavailabilityoftheservicesistobemaintainedintheeventofdisaster?AssetclassificationandcontrolAccountabilityofassetsYesNoInProgress1.Inventoryofassetsa.Isthereamaintainedinventoryorregisteroftheimportantassetsassociatedwitheachinformationsystem?Informationclassification1.Classificationguidelinesa.IsthereanInformationclassificationschemeorguidelineinplace;whichwillassistindetermininghowtheinformationistobehandledandprotected?2.Informationlabelingandhandlinga.Isthereanappropriatesetofproceduresdefinedforinformationlabelingandhandlinginaccordancewiththeclassificationschemeadoptedbytheorganization?PersonnelsecuritySecurityinjobdefinitionandResourcing1.Includingsecurityinjobresponsibilitiesa.AresecurityrolesandresponsibilitiesaslaidinOrganization=sinformationsecuritypolicydocumentedwhereappropriate?Doesthisincludegeneralresponsibilitiesforimplementingormaintainingsecuritypolicyaswellasspecificresponsibilitiesforprotectionofparticularassets,orforextensionofparticularsecurityprocessesoractivities?2.Confidentialityagreementsa.DoemployeessignConfid...

1、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
3、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。

碎片内容

Risk Assessment Checklist.pdf

您可能关注的文档

确认删除?