SlideShare a Scribd company logo
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security
Standards and Specifications
Page 2
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
 In the process of information security system construction, enterprises
comply with international standards and specifications to develop their
own information security specifications and improve operations.
 This document describes and analyzes several international information
security standards to help better understand information security.
Page 3
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
 Upon completion of this course, you will be able to describe:
 Common information security standards.
 Significance of information security standards.
 Main points of common information security standards.
Page 4
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 5
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Significance of Information Security Standards
 Standards are normative documents that are jointly formulated, approved
by recognized authorities, and used throughout the industry to achieve the
best security.
How can an enterprise build a
secure information system?
Implement each step
according to international
authoritative standards.
Page 6
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security Standards Organizations
 International organizations related to information security standardization:
 International Organization for Standardization (ISO)
 International Electronical Commission (IEC)
 Chinese security standards organizations:
 China Information Security Standardization Technical Committee
 Cyber and Information Security Technical Committee (TC8) of China Communications
Standards Association (CCSA)
 Other standards organizations:
 International Telecommunication Union (ITU)
 Internet Engineering Task Force (IETF)
Page 7
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Common Information Security Standards and
Specifications
ISO 27001
EU:
Information
Technology
Security
Evaluation
Criteria (ITSEC)
US: Trusted
Computer
System
Evaluation
Criteria
(TCSEC)
China: Graded
Protection of
Information
Security
(GB)
Page 8
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 9
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISMS
 The Information Security Management System (ISMS), based on the
BS7799 standard developed by the British Standards Institution (BSI), has
been widely recognized as the international standard.
Plan
Action
Check
Do
 Plan (Establish an ISMS)
 Do (Implement and operate
ISMS)
 Check (Monitor and review
ISMS)
 Action (Maintain and improve
ISMS)
ISMS
Page 10
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISO 27000 ISMS Family of Standards
II
ISO/IEC 27006
ISO/IEC 27007
ISO/IEC 27008
Audit and
certification
guidelines
I
ISO/IEC 27000
ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27003
Requirements and
supporting
guidelines
ISO/IEC 27004
ISO/IEC 27005
IV
ISO 27799
Health information
security management
standards
Projects that are in
the research phase.
For example,
medicine supply
chain and storage
security.
III
Industry information
security management
requirements
Finance
Telecommunication
Other specific
security domains
Page 11
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISO 27001 Evolution
BS 7799-1 ISO/IEC 17799 ISO/IEC 27002
Code of practice for information
security management
Code of practice for
information security controls
BS 7799-2 ISO/IEC 27001
Specification with
guidance for use
Information security management
system requirements
Page 12
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISMS and ISO/IEC 27000
 ISO/IEC 27001 is an international standard that describes the requirements for an
ISMS.
 ISO/IEC 27002 proposes 35 control objectives and 113 controls across 14
categories. These control objectives and controls are the best practices of
information security management.
Requirements and
standards for
implementing and
establishing security
management systems
ISMS
ISO 27001
Establish
ISO/IEC 27001 ISO/IEC 27002
Provide best
practice rules
Information security
management idea
Information security
management operations
Page 13
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Elements for Building an ISMS
 14 control areas in ISO 27002:
3. Human Resource
Security
4. Asset Management 5. Access Control 6. Cryptography
2. Organization of
Information Security
I. Information Security
Policies
7. Physical and
Environmental Security
8. Operation Security
9. Communication
Security
11. Supplier
Relationships
10. System Acquisition,
Development and
Maintenance
12. Information Security
Incident Management
13. Information Security
Aspects of Business
Continuity Management
14. Compliance
Page 14
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ISO 27001 Project Implementation Methodology
and Steps
Project initiation
and variance
analysis
 Project kick-off
meeting, team setup,
and team
management
architecture creation
 Rapid assessment of
information security
management status
 Information security
policy design
 Information security
management
training
Stage
Main
Tasks
(Example) Risk
assessment
 Training on asset
collection and risk
assessment
methods
 Threat and
vulnerability
identification, and
security
vulnerability
scanning
 Risk assessment
and rating
 Project review
meeting
System design
and release
System
operation and
monitoring
Certification and
continuous
improvement
1 2 3 4 5
 Risk tolerance and
preference
determination
 Risk handling and
rectification plan
implementation
 System integration
and ISMS
document
preparation
 ISMS release and
training
 Development of
the information
security
management
performance
monitoring process
 ISMS trial run
 System operation
monitoring
 Business continuity
management
training
 Project review
meeting
 ISMS internal audit
 ISMS external audit
 ISMS management
review
 Continually update
corrective and
preventive measures
 Project review
meeting
 Assistance in follow-
up internal and
casual audits
Page 15
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 16
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Definition
No. 27 [2003] of the General Office of
the CPC Central Committee
Opinions for Strengthening Information
Security Assurance Work
Key contents:
• Implementing the policy on graded
protection of information security
• Attaching importance to information
security risk assessment
• Building and improving the information
security monitoring system
• Ensuring information security funds
• Improving the accountability system for
information security management
No. 66 [2004] of the Ministry of Public
Security:
Notice on Issuing the Implementation
Opinions on the Graded Protection of
Information Security
• Public security sector: supervision,
inspection, and guidance of graded
protection
• State secrecy departments: supervision,
inspection, and guidance of classified
work for graded protection
• State cryptography administration
departments: supervision, inspection,
and guidance of cryptography work for
graded protection
1. Public communication networks of
telecom and broadcast/film/TV industries.
Basic information networks such as
broadcast/TV transmission networks.
Important information systems of units
such as Internet information service units,
Internet access service units, and data
centers
2. Important information systems for the
production, scheduling, management,
and office of railway, bank, custom,
taxation, electricity, securities, insurance,
diplomacy, science and technology,
development reform, defense science and
technology, public security,
personnel/labor and social security,
finance, auditing, commerce, water
conservancy, land and energy resources,
transportation, culture, education,
statistics, industry and commerce
administration, and postal sectors
Graded protection of information and information carriers based on their importance levels
National Regulations and
Requirements
Supervision by Public
Security Dept
Implemented by HQs and
Industries
Page 17
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Chapter III: Network Operations Security
Section 1: General Provisions
Article 21: The State implements a tiered cybersecurity protection system.
Network operators shall fulfill the following security protection duties
according to the requirements of the tiered cybersecurity protection system,
to ensure that networks avoid interference, damage, or unauthorized access,
and to guard against network data leaks, theft, or tampering:
• Formulate internal security management systems and operating rules,
determine persons responsible for cybersecurity, and implement
cybersecurity protection responsibility;
• Adopt technological measures to prevent computer viruses, network
attacks, network intrusions and other actions endangering cybersecurity;
• Take technological measures for monitoring and recording network
operating status and cybersecurity incidents, and follow regulations to
store network logs for no less than six months;
• Adopt measures such as data classification, backup of important data, and
encryption;
• Fulfill other obligations as provided by law or administrative regulations.
Significance
Improving overall protection
Effectively improving overall information
security assurance and resolving threats and
major issues faced by information systems
Optimizing resource allocation
Investing limited financial, material, and
human resources in key areas to maximize
economic benefits of security
2. Law and regulation compliance
1. Improve protection and
resource allocation
Page 18
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Background and Development
 After nearly 20 years of development, graded protection has experienced
three stages.
2007 to now:
promotion stage
Started grading, assessment,
rectification, and review. All sector
units started comprehensive
grading/rectification.
2004-2006:
development stage
Many protection-related
standards and specifications
formulated and piloted.
1994-2003: initial stage
The Chinese government called for
strengthening of information security
construction and proposed graded
protection of information systems.
Page 20
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Scope
Protected object
Big data
Information
system (computer)
Industrial control
system
IoT
Cloud computing
platform
Information
system using
mobile internet
technologies
Basic information
network
Page 21
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Grade
Legitimate Rights
and Interests of
Citizens and Legal
Persons
Social Order and
Public Interests
National Security
I Damage N/A N/A
II Severe damage Damage N/A
III / Severe damage Damage
IV / Severe damage Severe damage
V / / Severe damage
Grades
 The grades are defined based on the extent of information system damage
to citizens, society, and state.
Page 22
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Basic Technical Requirements
 Each grade of protection has corresponding technical requirements. For
example, the technical requirements for Grade III cover 5 aspects:
Physical security App security Data security Network security Host security
 7 control points and 33 items:
1. Structure security (7 items)
2. Access control (8 items)
3. Security audit (4 items)
4. Boundary integrity check (2
items)
5. Intrusion prevention (2 items)
6. Malicious code program (2 items)
7. Network device protection (8
items)
Page 23
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Process
Graded Protection Process
Grading Filing Assessment Rectification
 Mandatory
procedure for
notifying the
supervision
department of
graded
protection
construction
 Key to the
implementation
of graded
protection
 Method to
assess the
status of
security
protection
 Primary
step of
graded
protection
Supervision
 External
management
of graded
protection
Page 24
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Information Security Standards and Specifications
2. ISO 27001 ISMS
3. Graded Protection of Information Security
4. Other Standards
Page 25
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Other Standards - US - TCSEC
 Trusted Computer System Evaluation Criteria (TCSEC)
 First formal standard for computer system security evaluation
 Proposed by the Defense Science Board in 1970 and released by the United States
Department of Defense in December 1985
A: Verified
protection
A1
The system administrator must receive a formal security
policy model from the developer. All installation operations
must be performed by the system administrator. Formal
documents must be available for all of these operations.
B: Mandatory
protection
B1
Class-B systems are protected against access from users
without security levels.
B2
B3
C: Discretionary
protection
C1 Audit protection is available, and users' actions and
responsibilities can be audited.
C2
D: Minimal
protection
D1
Security protection is provided only for files and users. The
most common D1 system is a local operating system or a
completely unprotected network.
Page 26
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Other Standards - Europe - ITSEC
 Information Technology Security Evaluation Criteria (ITSEC)
 Formulated by the UK, France, Germany, and the Netherlands, the ITSEC makes better progress in
function flexibility and related evaluation technologies than TCSEC; applied in the military, government,
and business sectors
Function
Level Description
F1-F5 TCSEC D-A
F6 Data and program
integrity
F7 System availability
F8 Data communication
integrity
F9 Data communication
confidentiality
F10 Network security
including confidentiality
and integrity
Level Description
E0 Inadequate assurance
E1
At this level there shall be a security target and an informal description of the architectural design of the
Target of Evaluation (TOE). Functional testing shall indicate that the TOE satisfies its security target.
E2
In addition to the requirements for level E1, there shall be an informal description of the detailed design.
Evidence of functional testing shall be evaluated. There shall be a configuration control system and an
approved distribution procedure.
E3
In addition to the requirements for level E2, the source code and/or hardware drawings corresponding to
the security mechanisms shall be evaluated. Evidence of testing of those mechanisms shall be evaluated.
E4
In addition to the requirements for level E3, there shall be an underlying formal model of security policy
supporting the security target. The security enforcing functions, the architectural design and the detailed
design shall be specified in a semi-formal style.
E5
In addition to the requirements for level E4, there shall be a close correspondence between the detailed
design and the source code and/or hardware drawings.
E6
In addition to the requirements for level E5, the security enforcing functions and the architectural design
shall be specified in a formal style, consistent with the specified underlying formal model of security policy.
Evaluation
Page 27
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Other Standards - Sarbanes-Oxley Act
 Public Company Accounting Reform and Investor Protection Act of 2002,
commonly called SOX.
 Clauses in the SOX Act regarding the monitoring of contract
management and enterprise operation processes can also apply
to information system inspections.
What is the relationship between SOX
and information security?
AN ACT To protect investors by improving the
accuracy and reliability of corporate disclosures
made pursuant to the securities laws, and for
other purposes.
--- Sarbanes-Oxley Act
Page 29
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which of the following are internationally known information security standards
organizations?
A. ISO
B. IEC
C. ITU
D. IETF
2. The ISMS complies with the ______ process.
Page 30
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Summary
 Common information security standards
 Significance of information security standards
 Main points of common information security standards
Page 31
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com

More Related Content

PPTX
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
PPTX
Cloud security
PPTX
Attack on Sony
PPT
Cyber security standards
PPTX
Layers and types of cloud
PPT
Datacenter
PDF
Cobit 2019 foundation study material
PPTX
Presentation on GDPR
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
Cloud security
Attack on Sony
Cyber security standards
Layers and types of cloud
Datacenter
Cobit 2019 foundation study material
Presentation on GDPR

What's hot (20)

PPT
Information Security Policies and Standards
PPTX
Security Policies and Standards
DOCX
Iso 27001 2013 Standard Requirements
PDF
Information security management system (isms) overview
PDF
Why ISO27001 For My Organisation
PDF
Steps to iso 27001 implementation
PPTX
Basic introduction to iso27001
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
ISO 27001 Awareness/TRansition.pptx
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPT
Chapter 3: Information Security Framework
PDF
Risk Assessments
PPT
isms-presentation.ppt
PPTX
27001.pptx
PPTX
Effective Security Operation Center - present by Reza Adineh
PPSX
Security policies
PDF
Cybersecurity Roadmap Development for Executives
PDF
PDF
Iso27001- Nashwan Mustafa
PPTX
Module 02 ftk imager
Information Security Policies and Standards
Security Policies and Standards
Iso 27001 2013 Standard Requirements
Information security management system (isms) overview
Why ISO27001 For My Organisation
Steps to iso 27001 implementation
Basic introduction to iso27001
Security Operations Center (SOC) Essentials for the SME
ISO 27001 Awareness/TRansition.pptx
VAPT - Vulnerability Assessment & Penetration Testing
Chapter 3: Information Security Framework
Risk Assessments
isms-presentation.ppt
27001.pptx
Effective Security Operation Center - present by Reza Adineh
Security policies
Cybersecurity Roadmap Development for Executives
Iso27001- Nashwan Mustafa
Module 02 ftk imager
Ad

Similar to 102 Information security standards and specifications (20)

PPT
S nandakumar
PPT
S nandakumar_banglore
PPT
Metholodogies and Security Standards
PDF
ISO/IEC 27001.pdf
PPTX
Iso iec 27001 foundation training course by interprom
PPTX
UNINFO - BIG DATA & Information Security Standards - Guasconi
PPT
Khas bank isms 3 s
PPTX
Iso 27001 isms presentation
PDF
A Major Revision of the CISRCP Program
PPTX
D1 security and risk management v1.62
PPTX
Automatski - The Internet of Things - Security Standards
PPTX
Information Security Management System ISO/IEC 27001:2005
PPT
Security policy and standards
PDF
Eric hibbard storage-security_the-standard
PPT
2008: Web Application Security Tutorial
ODT
Ch.5 rq (1)
PPT
Security Manager - Slides - Module 10.ppt
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
S nandakumar
S nandakumar_banglore
Metholodogies and Security Standards
ISO/IEC 27001.pdf
Iso iec 27001 foundation training course by interprom
UNINFO - BIG DATA & Information Security Standards - Guasconi
Khas bank isms 3 s
Iso 27001 isms presentation
A Major Revision of the CISRCP Program
D1 security and risk management v1.62
Automatski - The Internet of Things - Security Standards
Information Security Management System ISO/IEC 27001:2005
Security policy and standards
Eric hibbard storage-security_the-standard
2008: Web Application Security Tutorial
Ch.5 rq (1)
Security Manager - Slides - Module 10.ppt
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Ad

More from SsendiSamuel (11)

PPTX
106 Threat defense and information security development trends
PPTX
105 Common information security threats
PPTX
104 Common network devices
PPTX
103 Basic network concepts
PPTX
101 Basic concepts of information security
PPTX
Chapter 06: cloud computing trends
PPTX
Chapter 05: introduction to virtualization features
PPTX
Chapter 04: Storage virtualization basics
PPTX
Chapter 03: Network basics for cloud computing
PPTX
Chapter 01: A brief introduction to cloud computing
PPTX
Chapter 02: Introduction to compute virtualization
106 Threat defense and information security development trends
105 Common information security threats
104 Common network devices
103 Basic network concepts
101 Basic concepts of information security
Chapter 06: cloud computing trends
Chapter 05: introduction to virtualization features
Chapter 04: Storage virtualization basics
Chapter 03: Network basics for cloud computing
Chapter 01: A brief introduction to cloud computing
Chapter 02: Introduction to compute virtualization

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Cell Types and Its function , kingdom of life
PDF
Insiders guide to clinical Medicine.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Complications of Minimal Access Surgery at WLH
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPH.pptx obstetrics and gynecology in nursing
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Cell Types and Its function , kingdom of life
Insiders guide to clinical Medicine.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Week 4 Term 3 Study Techniques revisited.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES

102 Information security standards and specifications

  • 1. www.huawei.com Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security Standards and Specifications
  • 2. Page 2 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Foreword  In the process of information security system construction, enterprises comply with international standards and specifications to develop their own information security specifications and improve operations.  This document describes and analyzes several international information security standards to help better understand information security.
  • 3. Page 3 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Objectives  Upon completion of this course, you will be able to describe:  Common information security standards.  Significance of information security standards.  Main points of common information security standards.
  • 4. Page 4 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 5. Page 5 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Significance of Information Security Standards  Standards are normative documents that are jointly formulated, approved by recognized authorities, and used throughout the industry to achieve the best security. How can an enterprise build a secure information system? Implement each step according to international authoritative standards.
  • 6. Page 6 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Information Security Standards Organizations  International organizations related to information security standardization:  International Organization for Standardization (ISO)  International Electronical Commission (IEC)  Chinese security standards organizations:  China Information Security Standardization Technical Committee  Cyber and Information Security Technical Committee (TC8) of China Communications Standards Association (CCSA)  Other standards organizations:  International Telecommunication Union (ITU)  Internet Engineering Task Force (IETF)
  • 7. Page 7 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Common Information Security Standards and Specifications ISO 27001 EU: Information Technology Security Evaluation Criteria (ITSEC) US: Trusted Computer System Evaluation Criteria (TCSEC) China: Graded Protection of Information Security (GB)
  • 8. Page 8 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 9. Page 9 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISMS  The Information Security Management System (ISMS), based on the BS7799 standard developed by the British Standards Institution (BSI), has been widely recognized as the international standard. Plan Action Check Do  Plan (Establish an ISMS)  Do (Implement and operate ISMS)  Check (Monitor and review ISMS)  Action (Maintain and improve ISMS) ISMS
  • 10. Page 10 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISO 27000 ISMS Family of Standards II ISO/IEC 27006 ISO/IEC 27007 ISO/IEC 27008 Audit and certification guidelines I ISO/IEC 27000 ISO/IEC 27001 ISO/IEC 27002 ISO/IEC 27003 Requirements and supporting guidelines ISO/IEC 27004 ISO/IEC 27005 IV ISO 27799 Health information security management standards Projects that are in the research phase. For example, medicine supply chain and storage security. III Industry information security management requirements Finance Telecommunication Other specific security domains
  • 11. Page 11 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISO 27001 Evolution BS 7799-1 ISO/IEC 17799 ISO/IEC 27002 Code of practice for information security management Code of practice for information security controls BS 7799-2 ISO/IEC 27001 Specification with guidance for use Information security management system requirements
  • 12. Page 12 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISMS and ISO/IEC 27000  ISO/IEC 27001 is an international standard that describes the requirements for an ISMS.  ISO/IEC 27002 proposes 35 control objectives and 113 controls across 14 categories. These control objectives and controls are the best practices of information security management. Requirements and standards for implementing and establishing security management systems ISMS ISO 27001 Establish ISO/IEC 27001 ISO/IEC 27002 Provide best practice rules Information security management idea Information security management operations
  • 13. Page 13 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Elements for Building an ISMS  14 control areas in ISO 27002: 3. Human Resource Security 4. Asset Management 5. Access Control 6. Cryptography 2. Organization of Information Security I. Information Security Policies 7. Physical and Environmental Security 8. Operation Security 9. Communication Security 11. Supplier Relationships 10. System Acquisition, Development and Maintenance 12. Information Security Incident Management 13. Information Security Aspects of Business Continuity Management 14. Compliance
  • 14. Page 14 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ISO 27001 Project Implementation Methodology and Steps Project initiation and variance analysis  Project kick-off meeting, team setup, and team management architecture creation  Rapid assessment of information security management status  Information security policy design  Information security management training Stage Main Tasks (Example) Risk assessment  Training on asset collection and risk assessment methods  Threat and vulnerability identification, and security vulnerability scanning  Risk assessment and rating  Project review meeting System design and release System operation and monitoring Certification and continuous improvement 1 2 3 4 5  Risk tolerance and preference determination  Risk handling and rectification plan implementation  System integration and ISMS document preparation  ISMS release and training  Development of the information security management performance monitoring process  ISMS trial run  System operation monitoring  Business continuity management training  Project review meeting  ISMS internal audit  ISMS external audit  ISMS management review  Continually update corrective and preventive measures  Project review meeting  Assistance in follow- up internal and casual audits
  • 15. Page 15 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 16. Page 16 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Definition No. 27 [2003] of the General Office of the CPC Central Committee Opinions for Strengthening Information Security Assurance Work Key contents: • Implementing the policy on graded protection of information security • Attaching importance to information security risk assessment • Building and improving the information security monitoring system • Ensuring information security funds • Improving the accountability system for information security management No. 66 [2004] of the Ministry of Public Security: Notice on Issuing the Implementation Opinions on the Graded Protection of Information Security • Public security sector: supervision, inspection, and guidance of graded protection • State secrecy departments: supervision, inspection, and guidance of classified work for graded protection • State cryptography administration departments: supervision, inspection, and guidance of cryptography work for graded protection 1. Public communication networks of telecom and broadcast/film/TV industries. Basic information networks such as broadcast/TV transmission networks. Important information systems of units such as Internet information service units, Internet access service units, and data centers 2. Important information systems for the production, scheduling, management, and office of railway, bank, custom, taxation, electricity, securities, insurance, diplomacy, science and technology, development reform, defense science and technology, public security, personnel/labor and social security, finance, auditing, commerce, water conservancy, land and energy resources, transportation, culture, education, statistics, industry and commerce administration, and postal sectors Graded protection of information and information carriers based on their importance levels National Regulations and Requirements Supervision by Public Security Dept Implemented by HQs and Industries
  • 17. Page 17 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Chapter III: Network Operations Security Section 1: General Provisions Article 21: The State implements a tiered cybersecurity protection system. Network operators shall fulfill the following security protection duties according to the requirements of the tiered cybersecurity protection system, to ensure that networks avoid interference, damage, or unauthorized access, and to guard against network data leaks, theft, or tampering: • Formulate internal security management systems and operating rules, determine persons responsible for cybersecurity, and implement cybersecurity protection responsibility; • Adopt technological measures to prevent computer viruses, network attacks, network intrusions and other actions endangering cybersecurity; • Take technological measures for monitoring and recording network operating status and cybersecurity incidents, and follow regulations to store network logs for no less than six months; • Adopt measures such as data classification, backup of important data, and encryption; • Fulfill other obligations as provided by law or administrative regulations. Significance Improving overall protection Effectively improving overall information security assurance and resolving threats and major issues faced by information systems Optimizing resource allocation Investing limited financial, material, and human resources in key areas to maximize economic benefits of security 2. Law and regulation compliance 1. Improve protection and resource allocation
  • 18. Page 18 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Background and Development  After nearly 20 years of development, graded protection has experienced three stages. 2007 to now: promotion stage Started grading, assessment, rectification, and review. All sector units started comprehensive grading/rectification. 2004-2006: development stage Many protection-related standards and specifications formulated and piloted. 1994-2003: initial stage The Chinese government called for strengthening of information security construction and proposed graded protection of information systems.
  • 19. Page 20 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Scope Protected object Big data Information system (computer) Industrial control system IoT Cloud computing platform Information system using mobile internet technologies Basic information network
  • 20. Page 21 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Grade Legitimate Rights and Interests of Citizens and Legal Persons Social Order and Public Interests National Security I Damage N/A N/A II Severe damage Damage N/A III / Severe damage Damage IV / Severe damage Severe damage V / / Severe damage Grades  The grades are defined based on the extent of information system damage to citizens, society, and state.
  • 21. Page 22 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Basic Technical Requirements  Each grade of protection has corresponding technical requirements. For example, the technical requirements for Grade III cover 5 aspects: Physical security App security Data security Network security Host security  7 control points and 33 items: 1. Structure security (7 items) 2. Access control (8 items) 3. Security audit (4 items) 4. Boundary integrity check (2 items) 5. Intrusion prevention (2 items) 6. Malicious code program (2 items) 7. Network device protection (8 items)
  • 22. Page 23 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Process Graded Protection Process Grading Filing Assessment Rectification  Mandatory procedure for notifying the supervision department of graded protection construction  Key to the implementation of graded protection  Method to assess the status of security protection  Primary step of graded protection Supervision  External management of graded protection
  • 23. Page 24 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. Information Security Standards and Specifications 2. ISO 27001 ISMS 3. Graded Protection of Information Security 4. Other Standards
  • 24. Page 25 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Other Standards - US - TCSEC  Trusted Computer System Evaluation Criteria (TCSEC)  First formal standard for computer system security evaluation  Proposed by the Defense Science Board in 1970 and released by the United States Department of Defense in December 1985 A: Verified protection A1 The system administrator must receive a formal security policy model from the developer. All installation operations must be performed by the system administrator. Formal documents must be available for all of these operations. B: Mandatory protection B1 Class-B systems are protected against access from users without security levels. B2 B3 C: Discretionary protection C1 Audit protection is available, and users' actions and responsibilities can be audited. C2 D: Minimal protection D1 Security protection is provided only for files and users. The most common D1 system is a local operating system or a completely unprotected network.
  • 25. Page 26 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Other Standards - Europe - ITSEC  Information Technology Security Evaluation Criteria (ITSEC)  Formulated by the UK, France, Germany, and the Netherlands, the ITSEC makes better progress in function flexibility and related evaluation technologies than TCSEC; applied in the military, government, and business sectors Function Level Description F1-F5 TCSEC D-A F6 Data and program integrity F7 System availability F8 Data communication integrity F9 Data communication confidentiality F10 Network security including confidentiality and integrity Level Description E0 Inadequate assurance E1 At this level there shall be a security target and an informal description of the architectural design of the Target of Evaluation (TOE). Functional testing shall indicate that the TOE satisfies its security target. E2 In addition to the requirements for level E1, there shall be an informal description of the detailed design. Evidence of functional testing shall be evaluated. There shall be a configuration control system and an approved distribution procedure. E3 In addition to the requirements for level E2, the source code and/or hardware drawings corresponding to the security mechanisms shall be evaluated. Evidence of testing of those mechanisms shall be evaluated. E4 In addition to the requirements for level E3, there shall be an underlying formal model of security policy supporting the security target. The security enforcing functions, the architectural design and the detailed design shall be specified in a semi-formal style. E5 In addition to the requirements for level E4, there shall be a close correspondence between the detailed design and the source code and/or hardware drawings. E6 In addition to the requirements for level E5, the security enforcing functions and the architectural design shall be specified in a formal style, consistent with the specified underlying formal model of security policy. Evaluation
  • 26. Page 27 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Other Standards - Sarbanes-Oxley Act  Public Company Accounting Reform and Investor Protection Act of 2002, commonly called SOX.  Clauses in the SOX Act regarding the monitoring of contract management and enterprise operation processes can also apply to information system inspections. What is the relationship between SOX and information security? AN ACT To protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws, and for other purposes. --- Sarbanes-Oxley Act
  • 27. Page 29 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Quiz 1. Which of the following are internationally known information security standards organizations? A. ISO B. IEC C. ITU D. IETF 2. The ISMS complies with the ______ process.
  • 28. Page 30 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Summary  Common information security standards  Significance of information security standards  Main points of common information security standards
  • 29. Page 31 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Thank You www.huawei.com