Presentation is loading. Please wait.

Presentation is loading. Please wait.

2016 년도 1 학기 정보보호관리체계 (ISMS) 인증 이 강 신 010-3791-3814.

Similar presentations


Presentation on theme: "2016 년도 1 학기 정보보호관리체계 (ISMS) 인증 이 강 신 010-3791-3814."— Presentation transcript:

1 2016 년도 1 학기 정보보호관리체계 (ISMS) 인증 이 강 신 otter1212@gmail.com 010-3791-3814

2 이강신 Profile  DACOM(‘90~’92), NIA(‘92~’00), KISA(’00~’11), K&C(‘11~ 현재 )  한양대 수학 ( 학사 / 석사 ), 고려대 ( 공학박사 )  활동내역  한국정보보호학회 부회장 ( 현 )  PIPL 인증위원회 위원 ( 현 )  현대홈쇼핑 정보보호위원회 위원 ( 현 )  ISMS/PIMS 인증위원회 위원  ISO/IEC SC27 WG1 멤버  행정자치부 개인정보보호포럼 산업기술분과위원장  대통령 직속 국가정보화전략위원회 정보화역기능 전문위원  개인정보보호위원회 조사 · 분석 전문위원  쿠팡 개인정보보호위원회 위원  금융보안연구원 IT 컴플라이언스 자문위원  금융위원회 F-ISMS 태스크포스 자문위원  저술 : " 개인정보보호 기초와 활용 ", 2009. 10, 인포더북스  자격 : ISMS/ISO27001/PIMS/PIPL 인증심사원, CISSP/CISA/CPPG  연락처 : otter1212@gmail.com, 010-3791-3814

3 수강생 소개  경력사항  현 position  관심분야 ( 전공, 취미 등 )  본 수업에서 기대하는 사항

4 강의 일반  강의목표 : 정보보호관리체계 수립, 인증에 대한 방법과 절차 습득  학습내용  정보보호관리에 관한 국내외 다양한 방법 ( 강의 )  ISO 27000 Series 를 이용한 체계수립 및 인증 방법 ( 세미나 발표 방식 ) ※ ISMS, NIST SP-Series, 독일의 IT Baseline Protection Manual 등 참고  인증심사 절차와 방법 ( 강의 )  진행방식  각자 40 분 발표, 참석자 질문 및 교수의 보충강의  발표자료는 1 주일 전 게시판에 업로드  평가 : 세미나 발표 (30%), 중간시험 (30%), 기말시험 (30%), 출석 (10%)

5 강의 일반  1 주 : 1 학기 강의일정, 방법, 교재 등 안내  2 주 : 국내외 ISMS 비교  3, 4 주 : ISO27000 ( 세미나 발표 )  5, 6 주 : ISO27001 ( 세미나 발표 )  7, 9, 10, 11, 12, 13 주 : ISO27002 ( 세미나 발표 )  14, 15 주 : ISO27005 ( 세미나 발표 )  8, 16 주 : 중간 / 기말시험

6 ISO/IEC JTC1  ISO/IEC JTC1 SC27 WG? 중 JTC1 까지만 공식적인 위원회임  SC27(IT Security Techniques) 는 작업 조직으로 명실상부한 위원회는 아님  Chair – Secretariat 구조  SC27 산하에 WG1 ~ 5 까지 존재  WG1~5 는 다음페이지  Convenor 구조  표준화 절차 : NP  WD  CD  (FCD)  DIS  FDIS  IS  WD 까지는 SC 범위 내에서 진행 (WD 결정은 JTC 에서 결정, 에디터 선정 )  CD 에서 3~6 개월 검토 후 3 개월 이내에 DIS 등록  DIS 에서 IS 까지 4 개월 소요 NP: New Work Item Proposal, WD : Working Draft, CD : Committee Draft, FCD : Final Committee Draft, DIS : Draft International Standard, FDIS : Final Draft International Standard, IS : International Standard P-Members : Voting, O-Members : Observing

7 ISO/IEC JTC1 SC27 WG1 : Information security management systems, WG2 : Cryptography & Security Mechanisms, WG3 : Security Evaluation, WG4 : Security Control & Services, WG5 : Privacy, Identity & Biometric Security

8 isms family of standards ( Source : ISO/IEC 27000 : 2014) 27000:2014, 27001:2013, 27003:2010, 27004:2009, 27005:2011, 27009:2012

9 ISO/IEC JTC1 SC27 WG1 의 ISMS 표준  ISO/IEC 27000:2014 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary  ISO/IEC 27001:2013 Information technology -- Security techniques -- Information security management systems -- Requirements ISO/IEC 27001:2013  ISO/IEC 27002:2013 Information technology -- Security techniques -- Code of practice for information security management ISO/IEC 27002:2013  SO/IEC 27003:2010 Information technology -- Security techniques -- Information security management system implementation guidance SO/IEC 27003:2010  ISO/IEC 27004:2009 Information technology -- Security techniques -- Information security management -- Measurement ISO/IEC 27004:2009  ISO/IEC 27005:2011 Information technology -- Security techniques -- Information security risk management ISO/IEC 27005:2011  ISO/IEC 27006:2011 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems ISO/IEC 27006:2011  ISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information security management systems auditing ISO/IEC 27007:2011  ISO/IEC TR 27008:2011 Information technology -- Security techniques -- Guidelines for auditors on information security controls ISO/IEC TR 27008:2011  ISO/IEC CD 27009:2012 The Use and Application of ISO/IEC 27001 for Sector/Service-Specific Third-Party Accredited Certifications ISO/IEC CD 27009:2012  ISO/IEC 27010:2012 Information technology -- Security techniques -- Information security management for inter-sector and inter-organizational communications ISO/IEC 27010:2012

10 ISO/IEC JTC1 SC27 WG1 의 ISMS 표준  ISO/IEC 27011:2008 Information technology -- Security techniques -- Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 ISO/IEC 27011:2008  ISO/IEC 27013:2012 Information technology -- Security techniques -- Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 ISO/IEC 27013:2012  ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information security  ISO/IEC TR 27015:2012 Information technology -- Security techniques -- Information security management guidelines for financial services ISO/IEC TR 27015:2012  ISO/IEC TR 27016:2014 Information technology -- Security techniques -- Information security management – Organizational economics  ISO/IEC DIS 27017 Information technology -- Security techniques – Code of practice for information security controls based on ISO/IEC 27002 for cloud services ISO/IEC DIS 27017  ISO/IEC 27018:2014 Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors ISO/IEC 27018:2014  ISO/IEC TR 27019:2013  Information technology -- Security techniques -- Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry  ISO/IEC NP 27021 Information technology -- Security techniques -- Competence requirements for information security management systems professionals ISO/IEC NP 27021  ISO/IEC TR 27023 Information technology -- Security techniques -- Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 ISO/IEC TR 27023

11 ISO/IEC JTC1 SC27 WG1 의 ISMS 표준  ISO/IEC 27031:2011 Information technology -- Security techniques -- Guidelines for information and communication technology readiness for business continuity ISO/IEC 27031:2011  ISO/IEC 27032:2012 Information technology -- Security techniques -- Guidelines for cybersecurity ISO/IEC 27032:2012  ISO/IEC 27033-1:2009 Information technology -- Security techniques -- Network security -- Part 1: Overview and concepts ISO/IEC 27033-1:2009  ISO/IEC 27033-2:2012 Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network security ISO/IEC 27033-2:2012  ISO/IEC 27033-3:2010 Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques and control issues ISO/IEC 27033-3:2010  ISO/IEC 27033-4:2014 Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security gateways ISO/IEC 27033-4:2014  ISO/IEC 27033-5:2013 Information technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs) ISO/IEC 27033-5:2013  ISO/IEC DIS 27033-6 Information technology -- Security techniques -- Network security -- Part 6: Securing wireless IP network access ISO/IEC DIS 27033-6

12 ISO/IEC JTC1 SC27 WG1 의 ISMS 표준  ISO/IEC 27034-1:2011 Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts ISO/IEC 27034-1:2011  ISO/IEC FDIS 27034-2 Information technology -- Security techniques -- Application security -- Part 2: Organization normative framework ISO/IEC FDIS 27034-2  ISO/IEC NP 27034-3 Information technology -- Security techniques -- Application security -- Part 3: Application security management process ISO/IEC NP 27034-3  ISO/IEC CD 27034-4 Information technology -- Security techniques -- Application security -- Part 4: Application security validation ISO/IEC CD 27034-4  ISO/IEC CD 27034-5 Information technology -- Security techniques -- Application security -- Part 5: Protocols and application security controls data structure ISO/IEC CD 27034-5  ISO/IEC CD 27034-6 Information technology -- Security techniques -- Application security -- Part 6: Security guidance for specific applications ISO/IEC CD 27034-6  ISO/IEC NP 27034-7 Information technology -- Application security -- Part 7: Application security assurance prediction ISO/IEC NP 27034-7  ISO/IEC NP 27034-5-1 Information technology -- Application security -- Part 5-1: Protocols and application security controls data structure -- XML schemas ISO/IEC NP 27034-5-1

13 ISO/IEC JTC1 SC27 WG1 의 ISMS 표준  ISO/IEC 27035:2011 Information technology -- Security techniques -- Information security incident management ISO/IEC 27035:2011  ISO/IEC CD 27035-1 Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident management ISO/IEC CD 27035-1  ISO/IEC CD 27035-2 Information technology -- Security techniques -- Information security incident management -- Part 2: Guidelines to plan and prepare for incident response ISO/IEC CD 27035-2  ISO/IEC CD 27035-3 Information technology -- Security techniques -- Information security incident management -- Part 3: Guidelines for CSIRT operations ISO/IEC CD 27035-3  ISO/IEC 27036-1:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 1: Overview and concepts ISO/IEC 27036-1:2014  ISO/IEC 27036-2:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 2: Requirements ISO/IEC 27036-2:2014  ISO/IEC 27036-3:2013 Information technology -- Security techniques -- Information security for supplier relationships -- Part 3: Guidelines for information and communication technology supply chain security ISO/IEC 27036-3:2013  ISO/IEC WD 27036-4 Information technology -- Information security for supplier relationships -- Part 4: Guidelines for security of Cloud services ISO/IEC WD 27036-4  ISO/IEC 27037:2012 Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence ISO/IEC 27037:2012  ISO/IEC 27038:2014 Information technology -- Security techniques -- Specification for digital redaction ISO/IEC 27038:2014  ISO/IEC 27039:2015 Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection systems (IDPS) ISO/IEC 27039:2015

14 ISO/IEC JTC1 SC27 WG1 의 ISMS 표준  ISO/IEC 27040:2015 Information technology -- Security techniques -- Storage security ISO/IEC 27040:2015  ISO/IEC FDIS 27041 Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method ISO/IEC FDIS 27041  ISO/IEC DIS 27042 Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence ISO/IEC DIS 27042  ISO/IEC 27043 Information technology -- Security techniques -- Incident investigation principles and processes ISO/IEC 27043  ISO/IEC WD 27044 Guidelines for Security Information and Event Management (SIEM) ISO/IEC WD 27044  ISO/IEC CD 27050-1 Information technology -- Security techniques -- Electronic discovery -- Part 1: Overview and concepts ISO/IEC CD 27050-1  ISO/IEC NP 27050-2 Information technology -- Security techniques -- Electronic discovery -- Part 2: Guidance for governance and management of electronic discovery ISO/IEC NP 27050-2  ISO/IEC NP 27050-3 Information technology -- Security techniques -- Electronic discovery -- Part 3: Code of Practice for electronic discovery ISO/IEC NP 27050-3  ISO/IEC NP 27050-4 Information technology -- Security techniques -- Electronic discovery -- Part 4: ICT readiness for electronic discovery ISO/IEC NP 27050-4 Source : http://http://www.iso.org/iso/home/store/catalogue_tc/catalogue_tc_browse.htm?commid=45306 ISO 표준화 6 단계 : NP(New work item Proposal)  WD(Working Draft)  CD(Committee Draft)  DIS(Draft International Standard)  FDIS(Fianl Draft International Standard)  IS(International Standard)

15 Q & A

16 [ 참고 ] NIST risk management framework security life cycle


Download ppt "2016 년도 1 학기 정보보호관리체계 (ISMS) 인증 이 강 신 010-3791-3814."

Similar presentations


Ads by Google