ISO27001:2013中英文对照 - 图文 下载本文

内容发布更新时间 : 2024/7/7 18:31:14星期一 下面是文章的全部内容请认真阅读。

5 Leadership 5 领导

5.1 Leadership and commitment 5.1 领导和承诺

Top management shall demonstrate leadership and commitment with respect to the information security management system by: 高层管理者应通过下列方式展示其关于信息安全管理体系的领导力和承诺:

a) ensuring the information security policy and the information security objectives are established and are compatible with the strategic direction of the organization;

b) ensuring the integration of the information security management system requirements into the organization’s processes;

c) ensuring that the resources needed for the information security management system are available;

d) communicating the importance of effective information security management and of conforming to the information security management system requirements;

e) ensuring that the information security management system achieves its intended outcome(s);

f) directing and supporting persons to contribute to the effectiveness of the information security management system;

g) promoting continual improvement; and

h) supporting other relevant management roles to demonstrate their leadership as it applies to their areas of responsibility.

a) 确保建立信息安全方针和信息安全目标,并与组织的战略方向保持一致; b) 确保将信息安全管理体系要求整合到组织的业务过程中; c) 确保信息安全管理体系所需资源可用;

d) 传达信息安全管理有效实施、符合信息安全管理体系要求的重要性; e) 确保信息安全管理体系实现其预期结果;

f) 指挥并支持人员为信息安全管理体系的有效实施作出贡献; g) 促进持续改进;

h) 支持其他相关管理角色在其职责范围内展示他们的领导力。

5.2 Policy 5.2 方针

Top management shall establish an information security policy that: 高层管理者应建立信息安全方针,以:

a) is appropriate to the purpose of the organization;

b) includes information security objectives (see 6.2) or provides the framework for setting information security objectives;

c) includes a commitment to satisfy applicable requirements related to information security;

d) includes a commitment to continual improvement of the information security management system. The information security policy shall: e) be available as documented information;

f) be communicated within the organization; and g) be available to interested parties, as appropriate. a) 适于组织的目标;

b) 包含信息安全目标(见6.2)或设置信息安全目标提供框架; c) 包含满足适用的信息安全相关要求的承诺; d) 包含信息安全管理体系持续改进的承诺。 信息安全方针应:

e) 文件化并保持可用性; f) 在组织内部进行传达; g) 适当时,对相关方可用。

5.3 Organizational roles, responsibilities and authorities 5.3 组织角色、职责和权限

Top management shall ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated. 高层管理者应确保分配并传达了信息安全相关角色的职责和权限。

Top management shall assign the responsibility and authority for: 高层管理者应分配下列职责和权限:

a) ensuring that the information security management system conforms to the requirements of this International Standard; and

b) reporting on the performance of the information security management system to top management.

a) 确保信息安全管理体系符合本标准的要求; b) 将信息安全管理体系的绩效报告给高层管理者。

NOTE Top management may also assign responsibilities and authorities for reporting performance of the information security management system within the organization. 注:高层管理者可能还要分配在组织内部报告信息安全管理体系绩效的职责和权限。

6 Planning 6 规划

6.1 Actions to address risks and opportunities 6.1 应对风险和机会的措施 6.1.1 General 6.1.1 总则

When planning for the information security management system, the organization shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to:

当规划信息安全管理体系时,组织应考虑4.1中提及的问题和4.2中提及的要求,确定需要应

对的风险和机会,以:

a) ensure the information security management system can achieve its intended outcome(s);

b) prevent, or reduce, undesired effects; and c) achieve continual improvement. The organization shall plan:

d) actions to address these risks and opportunities; and e) how to

1) integrate and implement the actions into its information security management system processes;

2) evaluate the effectiveness of these actions. a) 确保信息安全管理体系能实现其预期结果; b) 防止或减少意外的影响; c) 实现持续改进。 组织应规划:

d) 应对这些风险和机会的措施; e) 如何

1) 整合和实施这些措施并将其纳入信息安全管理体系过程; 2) 评价这些措施的有效性。

6.1.2 Information security risk assessment 6.1.2 信息安全风险评估

The organization shall define and apply an information security risk assessment process that:

组织应定义并应用风险评估过程,以:

a) establishes and maintains information security risk criteria that include: 1) the risk acceptance criteria; and

2) criteria for performing information security risk assessments;

b) ensures that repeated information security risk assessments produce consistent, valid and comparable results;

c) identifies the information security risks:

1) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and 2) identify the risk owners;

d) analyses the information security risks:

1) assess the potential consequences that would result if the risks identified in 6.1.2 c) 1) were to materialize;

2) assess the realistic likelihood of the occurrence of the risks identified in 6.1.2 c) 1); and

3) determine the levels of risk;

e) evaluates the information security risks:

1) compare the results of risk analysis with the risk criteria established in 6.1.2 a); and 2) prioritize the analysed risks for risk treatment.

The organization shall retain documented information about the information security risk assessment process.

a) 建立并保持信息安全风险准则,包括: 1) 风险接受准则;

2) 执行信息安全风险评估的准则;

b) 确保重复性的信息安全风险评估可产生一致的、有效的和可比较的结果; c) 识别信息安全风险:

1) 应用信息安全风险评估过程来识别信息安全管理体系范围内的信息丧失保密性、完整 性和可用性的相关风险;

2) 识别风险负责人; d) 分析信息安全风险:

1) 评估 6.1.2 c)1)中所识别风险发生后将导致的潜在影响; 2) 评估 6.1.2 c)1)中所识别风险发生的现实可能性; 3) 确定风险级别; e) 评价信息安全风险;

1) 将风险分析结果同6.1.2 a)建立的风险准则进行比较;

2) 为实施风险处置确定已分析风险的优先级。 组织应定义并应用风险评估过程,以: 组织应保留信息安全风险评估过程的文件记录信息。

6.1.3 Information security risk treatment 6.1.3 信息安全风险处置

The organization shall define and apply an information security risk treatment process to: a) select appropriate information security risk treatment options, taking account of the risk assessment results;

b) determine all controls that are necessary to implement the information security risk treatment option(s) chosen;

组织应定义并应用信息安全风险处置过程,以:

a) 在考虑风险评估结果的前提下,选择适当的信息安全风险处置选项: