{"id":99568,"date":"2024-11-13T13:46:00","date_gmt":"2024-11-13T05:46:00","guid":{"rendered":"https:\/\/www.073980.com\/?p=99568"},"modified":"2025-01-15T13:45:03","modified_gmt":"2025-01-15T05:45:03","slug":"iso27001%e8%ae%a4%e8%af%81%e6%98%af%e4%bb%80%e4%b9%88%ef%bc%9f","status":"publish","type":"post","link":"https:\/\/www.073980.com\/99568.html","title":{"rendered":"ISO27001\u8ba4\u8bc1\u662f\u4ec0\u4e48\uff1f"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

ISO27001\u8ba4\u8bc1\u662f\u76ee\u524d\u56fd\u9645\u4e0a\u6700\u88ab\u5e7f\u6cdb\u63a5\u53d7\u548c\u91c7\u7528\u7684\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u4f53\u7cfb\u6807\u51c6\u3002\u5b83\u4e3a\u7ec4\u7ec7\u5efa\u7acb\u3001\u5b9e\u65bd\u3001\u7ef4\u62a4\u548c\u6301\u7eed\u6539\u8fdb\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u4f53\u7cfb\uff08ISMS\uff09\u63d0\u4f9b\u4e86\u4e00\u4e2a\u7cfb\u7edf\u5316\u7684\u6846\u67b6\u3002\u7b80\u800c\u8a00\u4e4b\uff0cISO27001\u8ba4\u8bc1\u53ef\u4ee5\u88ab\u89c6\u4e3a\u4e00\u5957\u4fdd\u62a4\u4fe1\u606f\u8d44\u4ea7\u3001\u964d\u4f4e\u5b89\u5168\u98ce\u9669\u7684\u6700\u4f73\u5b9e\u8df5\u6307\u5357\u3002\u901a\u8fc7\u8ba4\u8bc1\uff0c\u610f\u5473\u7740\u7ec4\u7ec7\u5df2\u7ecf\u5efa\u7acb\u4e86\u4e00\u5957\u7b26\u5408\u56fd\u9645\u6807\u51c6\u7684\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u4f53\u7cfb\uff0c\u5e76\u80fd\u591f\u6709\u6548\u5e94\u5bf9\u5404\u79cd\u4fe1\u606f\u5b89\u5168\u5a01\u80c1\uff0c\u4fdd\u969c\u81ea\u8eab\u548c\u5ba2\u6237\u6570\u636e\u7684\u5b89\u5168\u3002\u5b83\u7684\u76ee\u7684\u5728\u4e8e\u5e2e\u52a9\u7ec4\u7ec7\u786e\u4fdd\u5176\u4fe1\u606f\u7684\u4fdd\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u548c\u53ef\u7528\u6027\uff0c\u540c\u65f6\u63d0\u9ad8\u4fe1\u606f\u5b89\u5168\u610f\u8bc6\u548c\u7ba1\u7406\u6c34\u5e73\u3002<\/p>\n\n\n\n

\u4e00\u3001\u4ec0\u4e48\u662fISO27001\uff1f<\/h2>\n\n\n\n

1.1 \u5b9a\u4e49\u4e0e\u8d77\u6e90<\/h4>\n\n\n\n

ISO27001\u662f\u7531\u56fd\u9645\u6807\u51c6\u5316\u7ec4\u7ec7\uff08ISO\uff09\u548c\u56fd\u9645\u7535\u5de5\u59d4\u5458\u4f1a\uff08IEC\uff09\u8054\u5408\u53d1\u5e03\u7684\u4e00\u9879\u56fd\u9645\u6807\u51c6\uff0c\u5168\u79f0\u4e3a\u201c\u4fe1\u606f\u6280\u672f-\u5b89\u5168\u6280\u672f-\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u4f53\u7cfb-\u8981\u6c42\u201d\uff08Information technology – Security techniques – Information security management systems – Requirements\uff09\u3002\u5b83\u8d77\u6e90\u4e8e\u82f1\u56fd\u6807\u51c6\u534f\u4f1a\uff08BSI\uff09\u5236\u5b9a\u7684BS7799\u6807\u51c6\uff0c\u7ecf\u8fc7\u4e0d\u65ad\u53d1\u5c55\u548c\u5b8c\u5584\uff0c\u6700\u7ec8\u6210\u4e3a\u5168\u7403\u516c\u8ba4\u7684\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u4f53\u7cfb\u6807\u51c6\u3002<\/p>\n\n\n\n

1.2 \u6838\u5fc3\u5185\u5bb9<\/h4>\n\n\n\n

ISO27001\u6807\u51c6\u7684\u6838\u5fc3\u5728\u4e8e\u5efa\u7acb\u4e00\u4e2a\u7cfb\u7edf\u5316\u7684\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u4f53\u7cfb\uff08ISMS\uff09\u3002\u8be5\u4f53\u7cfb\u6db5\u76d6\u4e86\u4ece\u98ce\u9669\u8bc4\u4f30\u3001\u7b56\u7565\u5236\u5b9a\u3001\u63a7\u5236\u63aa\u65bd\u5b9e\u65bd\u5230\u6301\u7eed\u6539\u8fdb\u7684\u6574\u4e2a\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u751f\u547d\u5468\u671f\u3002\u5b83\u8981\u6c42\u7ec4\u7ec7\uff1a<\/p>\n\n\n\n