ISOR:Toegangsbeveiliging - Overzicht van toegangsbeveiliging objecten ingedeeld naar BUC: verschil tussen versies
Naar navigatie springen
Naar zoeken springen
k (x'jes weggehaald) |
k (tabel aangepast) |
||
Regel 1: | Regel 1: | ||
<table> | <noinclude>{{ISOR tabel bij|BIO Thema Toegangbeveiliging}}</noinclude> | ||
<table class="wikitable"> | |||
<tr> | <tr> | ||
<th>Beleid | <th colspan="4">Beleid</th> | ||
< | </tr> | ||
< | <tr> | ||
< | <td>Nr</td> | ||
< | <td>Objecten</td> | ||
<td>Referentie</td> | |||
<td>IFGS</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>B 01</td> | <td>B 01</td> | ||
<td> | <td>Toegangbeveiligingsbeleid</td> | ||
<td>BIO: 9.1.1</td> | <td>BIO: 9.1.1</td> | ||
<td>I</td> | <td>I</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>B.02</td> | <td>B.02</td> | ||
<td>Eigendom van bedrijfsmiddelen</td> | |||
<td>BIO: 8.1.2</td> | |||
<td>I</td> | |||
</tr> | |||
<tr> | |||
<td>B.03</td> | |||
<td>Beveiligingsfunctie</td> | |||
<td>SoGP SM2.1</td> | |||
<td>F</td> | |||
</tr> | |||
<tr> | |||
<td>B.04</td> | |||
<td>Cryptografie</td> | <td>Cryptografie</td> | ||
<td>BIO 10.1.1, SoGP: TS 2.2</td> | <td>BIO 10.1.1, SoGP: TS 2.2</td> | ||
Regel 22: | Regel 35: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td></td> | <td>B.05</td> | ||
<td>B. | <td>Toegangbeveiligingsorganisatie</td> | ||
<td> | <td>Additioneel</td> | ||
<td>S</td> | |||
</tr> | |||
<tr> | |||
<td>B.06</td> | |||
<td>Toegangbeveiligingsarchitectuur</td> | |||
<td>Additioneel</td> | <td>Additioneel</td> | ||
<td>S</td> | <td>S</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Uitvoering | <td colspan="4">Uitvoering</td> | ||
</tr> | |||
<tr> | |||
<td>Nr</td> | <td>Nr</td> | ||
<td>Objecten</td> | <td>Objecten</td> | ||
Regel 36: | Regel 56: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.01</td> | <td>U.01</td> | ||
<td>Registratieprocedure</td> | <td>Registratieprocedure</td> | ||
Regel 43: | Regel 62: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.02</td> | <td>U.02</td> | ||
<td>Toegangverleningsprocedure</td> | <td>Toegangverleningsprocedure</td> | ||
Regel 50: | Regel 68: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.03</td> | <td>U.03</td> | ||
<td>Inlogprocedures</td> | <td>Inlogprocedures</td> | ||
Regel 57: | Regel 74: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.04</td> | <td>U.04</td> | ||
<td>Autorisatieproces</td> | <td>Autorisatieproces</td> | ||
Regel 64: | Regel 80: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.05</td> | <td>U.05</td> | ||
<td>Wachtwoordbeheer</td> | <td>Wachtwoordbeheer</td> | ||
Regel 71: | Regel 86: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.06</td> | <td>U.06</td> | ||
<td>Speciale toegangsrechten beheer</td> | <td>Speciale toegangsrechten beheer</td> | ||
Regel 78: | Regel 92: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.07</td> | <td>U.07</td> | ||
<td>Functiescheiding</td> | <td>Functiescheiding</td> | ||
Regel 85: | Regel 98: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.08</td> | <td>U.08</td> | ||
<td>Geheime authenticatie-informatie</td> | <td>Geheime authenticatie-informatie</td> | ||
Regel 92: | Regel 104: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.09</td> | <td>U.09</td> | ||
<td>Autorisatie</td> | <td>Autorisatie</td> | ||
Regel 99: | Regel 110: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.10</td> | <td>U.10</td> | ||
<td>Autorisatievoorziening faciliteiten</td> | <td>Autorisatievoorziening faciliteiten</td> | ||
Regel 106: | Regel 116: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>U.11</td> | <td>U.11</td> | ||
<td>Fysieke toegangsbeveiliging</td> | <td>Fysieke toegangsbeveiliging</td> | ||
Regel 113: | Regel 122: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Control | <td colspan="4">Control</td> | ||
</tr> | |||
<tr> | |||
<td>Nr</td> | <td>Nr</td> | ||
<td>Objecten</td> | <td>Objecten</td> | ||
Regel 120: | Regel 131: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>C.01</td> | <td>C.01</td> | ||
<td>Beoordelingsprocedure</td> | <td>Beoordelingsprocedure</td> | ||
Regel 127: | Regel 137: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>C.02</td> | <td>C.02</td> | ||
<td>Beoordeling | <td>Beoordeling oegangsrechten</td> | ||
<td>BIO: 9.2.5</td> | <td>BIO: 9.2.5</td> | ||
<td>F</td> | <td>F</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>C.03</td> | <td>C.03</td> | ||
<td>Gebeurtenissen registreren (logging en monitoring)</td> | <td>Gebeurtenissen registreren (logging en monitoring)</td> | ||
<td>ISO27002: 12.4.1,</td> | <td>ISO27002: 12.4.1, BIO: 12.4.1</td> | ||
<td>G</td> | <td>G</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>C.04</td> | <td>C.04</td> | ||
<td>Beheersingsorganisatie toegangsbeveiliging</td> | <td>Beheersingsorganisatie toegangsbeveiliging</td> | ||
Regel 154: | Regel 154: | ||
<td>S</td> | <td>S</td> | ||
</tr> | </tr> | ||
</table> | <caption align="bottom">TABELNAAM</caption></table> |
Versie van 6 jan 2020 13:56
- Dit is een tabel bij BIO Thema-uitwerking Toegangsbeveiliging
Beleid | |||
---|---|---|---|
Nr | Objecten | Referentie | IFGS |
B 01 | Toegangbeveiligingsbeleid | BIO: 9.1.1 | I |
B.02 | Eigendom van bedrijfsmiddelen | BIO: 8.1.2 | I |
B.03 | Beveiligingsfunctie | SoGP SM2.1 | F |
B.04 | Cryptografie | BIO 10.1.1, SoGP: TS 2.2 | G |
B.05 | Toegangbeveiligingsorganisatie | Additioneel | S |
B.06 | Toegangbeveiligingsarchitectuur | Additioneel | S |
Uitvoering | |||
Nr | Objecten | Referentie | IFGS |
U.01 | Registratieprocedure | BIO: 9.2.1 | I |
U.02 | Toegangverleningsprocedure | BIO: 9.2.2 | I |
U.03 | Inlogprocedures | BIO: 9.4.2 | I |
U.04 | Autorisatieproces | BIO: 9.2.6 | F |
U.05 | Wachtwoordbeheer | BIO: 9.4.3 | F |
U.06 | Speciale toegangsrechten beheer | BIO: 9.2.3 | F |
U.07 | Functiescheiding | BIO: 6.1.2 | F |
U.08 | Geheime authenticatie-informatie | BIO: 9.2.4 | G |
U.09 | Autorisatie | BIO: 9.4.1 | G |
U.10 | Autorisatievoorziening faciliteiten | Additioneel | S |
U.11 | Fysieke toegangsbeveiliging | BIO: 11.1.2 | F |
Control | |||
Nr | Objecten | Referentie | IFGS |
C.01 | Beoordelingsprocedure | Additioneel | I |
C.02 | Beoordeling oegangsrechten | BIO: 9.2.5 | F |
C.03 | Gebeurtenissen registreren (logging en monitoring) | ISO27002: 12.4.1, BIO: 12.4.1 | G |
C.04 | Beheersingsorganisatie toegangsbeveiliging | Additioneel | S |