没有合适的资源?快使用搜索试试~ 我知道了~
首页ISO IEC 27018-2014
ISO 27018标准原文,英文版 ISO/IEC27018是在公有云环境中建立与ISO/IEC 29100《信息技术—安全技术—隐私框架》中隐私原则一致的用于保护个人可识别信息(PII)的通用的可接受的控制目标、控制措施和实施指南。该标准基于ISO/ IEC27002, 添加了实施指南,考虑适用于公有云服务中信息安全风险环境中保护PII的法规需求。标准适用于根据与其他组织的合同通过云计算作为PII处理者提供信息处理服务的所有类型和规模的组织,包括国有企业、私营公司、政府实体和非营利组织。标准中的实施指南也与组织作为PII控制者相关,PII控制者可能比PII处理者需遵从更多的PII保护法律、法规和协议,但该标准只适用于PII处理者。
资源详情
资源评论
资源推荐
Information technology — Security
techniques — Code of practice for
acting as PII processors
Technologies de l’information — Techniques de sécurité — Code de
bonnes pratiques pour la protection des informations personnelles
©
ISO/IEC 2014
INTERNATIONAL
STANDARD
ISO/IEC
27018
First edition
2014-08-01
Reference number
ISO/IEC 27018:2014(E)
Copyright International Organization for Standardization
Provided by IHS under license with ISO
Not for Resale
No reproduction or networking permitted without license from IHS
--`,,```,,,,````-`-`,,`,,`,`,,`---
ISO/IEC 27018:2014(E)
ii © ISO/IEC 2014 – All rights reserved
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2014
Tel. + 41 22 749 01 11
Web www.iso.org
Copyright International Organization for Standardization
Provided by IHS under license with ISO
Not for Resale
No reproduction or networking permitted without license from IHS
--`,,```,,,,````-`-`,,`,,`,`,,`---
ISO/IEC 27018:2014(E)
© ISO/IEC 2014 – All rights reserved iii
Contents
Foreword ..........................................................................................................................................................................................................................................v
0 Introduction
.............................................................................................................................................................................................................vi
1 Scope
................................................................................................................................................................................................................................. 1
2 Normative references
...................................................................................................................................................................................... 1
..................................................................................................................................................................................... 1
4 Overview
....................................................................................................................................................................................................................... 3
.............................................................................................................................................................. 3
................................................................................................................................................................................ 4
5 Information security policies
.................................................................................................................................................................. 4
....................................................................................................... 4
6 Organization of information security
............................................................................................................................................. 5
.........................................................................................................................................................................
..............................................................................................................................................
7 Human resource security
............................................................................................................................................................................ 5
..........................................................................................................................................................................
............................................................................................................................................................................
.........................................................................................................................
8 Asset management
............................................................................................................................................................................................. 6
9 Access control
.......................................................................................................................................................................................................... 6
.........................................................................................................................
...............................................................................................................................................................
9.3 User responsibilities .......................................................................................................................................................................... 7
............................................................................................................................... 7
10 Cryptography
............................................................................................................................................................................................................ 8
.................................................................................................................................................................... 8
11 Physical and environmental security
.............................................................................................................................................. 8
............................................................................................................................................................................................... 8
................................................................................................................................................................................................... 9
12 Operations security
........................................................................................................................................................................................... 9
............................................................................................................... 9
............................................................................................................................................................ 10
.........................................................................................................................................................................................................10
............................................................................................................................................................... 11
............................................................................................................................................ 12
............................................................................................................................... 12
.................................................................................................................. 12
13 Communications security
........................................................................................................................................................................12
............................................................................................................................................. 12
....................................................................................................................................................................... 12
14 System acquisition, development and maintenance
....................................................................................................13
15 Supplier relationships
.................................................................................................................................................................................13
16 Information security incident management
........................................................................................................................13
.....................................................13
.............................................................14
18 Compliance
..............................................................................................................................................................................................................14
....................................................................................... 14
Copyright International Organization for Standardization
Provided by IHS under license with ISO
Not for Resale
No reproduction or networking permitted without license from IHS
--`,,```,,,,````-`-`,,`,,`,`,,`---
ISO/IEC 27018:2014(E)
iv © ISO/IEC 2014 – All rights reserved
.................................................................................................................................................. 14
Annex A
........................15
.............................................................................................................................................................................................................................23
Copyright International Organization for Standardization
Provided by IHS under license with ISO
Not for Resale
No reproduction or networking permitted without license from IHS
--`,,```,,,,````-`-`,,`,,`,`,,`---
ISO/IEC 27018:2014(E)
Foreword
ISO/IEC JTC 1.
.
© ISO/IEC 2014 – All rights reserved v
Copyright International Organization for Standardization
Provided by IHS under license with ISO
Not for Resale
No reproduction or networking permitted without license from IHS
--`,,```,,,,````-`-`,,`,,`,`,,`---
剩余31页未读,继续阅读
CelestineCloud
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- RTL8188FU-Linux-v5.7.4.2-36687.20200602.tar(20765).gz
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0