ISOR:Toegangsbeveiliging - Overzicht van toegangsbeveiliging objecten ingedeeld naar BUC: verschil tussen versies
Naar navigatie springen
Naar zoeken springen
(tabel toegevoegd) |
k (x'jes weggehaald) |
||
Regel 8: | Regel 8: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>B 01</td> | <td>B 01</td> | ||
<td>Toegangsbeveiligingsbeleid</td> | <td>Toegangsbeveiligingsbeleid</td> | ||
Regel 15: | Regel 15: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>B.02</td> | <td>B.02</td> | ||
<td>Cryptografie</td> | <td>Cryptografie</td> | ||
Regel 22: | Regel 22: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>B.03</td> | <td>B.03</td> | ||
<td>Toegangsbeveiligingsarchitectuur</td> | <td>Toegangsbeveiligingsarchitectuur</td> | ||
Regel 36: | Regel 36: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.01</td> | <td>U.01</td> | ||
<td>Registratieprocedure</td> | <td>Registratieprocedure</td> | ||
Regel 43: | Regel 43: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.02</td> | <td>U.02</td> | ||
<td>Toegangverleningsprocedure</td> | <td>Toegangverleningsprocedure</td> | ||
Regel 50: | Regel 50: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.03</td> | <td>U.03</td> | ||
<td>Inlogprocedures</td> | <td>Inlogprocedures</td> | ||
Regel 57: | Regel 57: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.04</td> | <td>U.04</td> | ||
<td>Autorisatieproces</td> | <td>Autorisatieproces</td> | ||
Regel 64: | Regel 64: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.05</td> | <td>U.05</td> | ||
<td>Wachtwoordbeheer</td> | <td>Wachtwoordbeheer</td> | ||
Regel 71: | Regel 71: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.06</td> | <td>U.06</td> | ||
<td>Speciale toegangsrechten beheer</td> | <td>Speciale toegangsrechten beheer</td> | ||
Regel 78: | Regel 78: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.07</td> | <td>U.07</td> | ||
<td>Functiescheiding</td> | <td>Functiescheiding</td> | ||
Regel 85: | Regel 85: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.08</td> | <td>U.08</td> | ||
<td>Geheime authenticatie-informatie</td> | <td>Geheime authenticatie-informatie</td> | ||
Regel 92: | Regel 92: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.09</td> | <td>U.09</td> | ||
<td>Autorisatie</td> | <td>Autorisatie</td> | ||
Regel 99: | Regel 99: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.10</td> | <td>U.10</td> | ||
<td>Autorisatievoorziening faciliteiten</td> | <td>Autorisatievoorziening faciliteiten</td> | ||
Regel 106: | Regel 106: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>U.11</td> | <td>U.11</td> | ||
<td>Fysieke toegangsbeveiliging</td> | <td>Fysieke toegangsbeveiliging</td> | ||
Regel 120: | Regel 120: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>C.01</td> | <td>C.01</td> | ||
<td>Beoordelingsprocedure</td> | <td>Beoordelingsprocedure</td> | ||
Regel 127: | Regel 127: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>C.02</td> | <td>C.02</td> | ||
<td>Beoordeling toegangsrechten</td> | <td>Beoordeling toegangsrechten</td> | ||
Regel 134: | Regel 134: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>C.03</td> | <td>C.03</td> | ||
<td>Gebeurtenissen registreren (logging en monitoring)</td> | <td>Gebeurtenissen registreren (logging en monitoring)</td> | ||
Regel 141: | Regel 141: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td> </td> | <td> </td> | ||
<td> </td> | <td> </td> | ||
Regel 148: | Regel 148: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td></td> | ||
<td>C.04</td> | <td>C.04</td> | ||
<td>Beheersingsorganisatie toegangsbeveiliging</td> | <td>Beheersingsorganisatie toegangsbeveiliging</td> |
Versie van 30 okt 2019 13:41
Beleid domein | Nr | Objecten | Referentie | IFGS |
---|---|---|---|---|
B 01 | Toegangsbeveiligingsbeleid | BIO: 9.1.1 | I | |
B.02 | Cryptografie | BIO 10.1.1, SoGP: TS 2.2 | G | |
B.03 | Toegangsbeveiligingsarchitectuur | Additioneel | S | |
Uitvoering domein | Nr | Objecten | Referentie | IFGS |
U.01 | Registratieprocedure | BIO: 9.2.1 | I | |
U.02 | Toegangverleningsprocedure | BIO: 9.2.2 | I | |
U.03 | Inlogprocedures | BIO: 9.4.2 | I | |
U.04 | Autorisatieproces | BIO: 9.2.6 | F | |
U.05 | Wachtwoordbeheer | BIO: 9.4.3 | F | |
U.06 | Speciale toegangsrechten beheer | BIO: 9.2.3 | F | |
U.07 | Functiescheiding | BIO: 6.1.2 | F | |
U.08 | Geheime authenticatie-informatie | BIO: 9.2.4 | G | |
U.09 | Autorisatie | BIO: 9.4.1 | G | |
U.10 | Autorisatievoorziening faciliteiten | Additioneel | S | |
U.11 | Fysieke toegangsbeveiliging | BIO: 11.1.2 | F | |
Control Domein | Nr | Objecten | Referentie | IFGS |
C.01 | Beoordelingsprocedure | Additioneel | I | |
C.02 | Beoordeling toegangsrechten | BIO: 9.2.5 | F | |
C.03 | Gebeurtenissen registreren (logging en monitoring) | ISO27002: 12.4.1, | G | |
BIO: 12.4.1 | ||||
C.04 | Beheersingsorganisatie toegangsbeveiliging | Additioneel | S |