09.02.2015 Views

ISO/IEC 21827

ISO/IEC 21827

ISO/IEC 21827

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>ISO</strong>/<strong>IEC</strong> <strong>21827</strong>:2002(E)<br />

Contents<br />

Foreword .......................................................................................................................................................................... v<br />

Introduction ...................................................................................................................................................................... vi<br />

1 Scope ......................................................................................................................................................................... 1<br />

2 Normative references ................................................................................................................................................. 1<br />

3 Terms and definitions ................................................................................................................................................. 2<br />

4 Background ................................................................................................................................................................ 5<br />

4.1 Reason for Development .................................................................................................................................... 5<br />

4.2 The Importance of Security Engineering ............................................................................................................. 6<br />

4.3 Consensus .......................................................................................................................................................... 6<br />

5 Structure of the Document ......................................................................................................................................... 7<br />

6 Model Architecture ..................................................................................................................................................... 7<br />

6.1 Security Engineering ........................................................................................................................................... 7<br />

6.2 Security Engineering Process Overview ............................................................................................................. 9<br />

6.3 SSE-CMM® Architecture Description ............................................................................................................... 12<br />

6.4 Summary Chart ................................................................................................................................................. 20<br />

7. Security Base Practices ........................................................................................................................................... 20<br />

7.1 PA01 - Administer Security Controls ................................................................................................................ 21<br />

7.2 PA02 - Assess Impact ...................................................................................................................................... 24<br />

7.3 PA03 - Assess Security Risk ............................................................................................................................ 28<br />

7.4 PA04 - Assess Threat ....................................................................................................................................... 31<br />

7.5 PA05 - Assess Vulnerability .............................................................................................................................. 34<br />

7.6 PA06 - Build Assurance Argument ................................................................................................................... 37<br />

7.7 PA07 - Coordinate Security .............................................................................................................................. 40<br />

7.8 PA08 - Monitor Security Posture ....................................................................................................................... 42<br />

7.9 PA09 - Provide Security Input ........................................................................................................................... 47<br />

7.10PA10 - Specify Security Needs ......................................................................................................................... 50<br />

7.11PA11 - Verify and Validate Security .................................................................................................................. 54<br />

Annex A(normative)Generic Practices ............................................................................................................................ 57<br />

A.1 General ...................................................................................................................................................... 57<br />

A.2 Capability Level 1 - Performed Informally .................................................................................................. 57<br />

A.3 Capability Level 2 - Planned and Tracked ........................................................................................................ 58<br />

A.4 Capability Level 3 - Well Defined ...................................................................................................................... 63<br />

A.5 Capability Level 4 - Quantitatively Controlled ................................................................................................... 68<br />

A.6 Capability Level 5 - Continuously Improving ..................................................................................................... 70<br />

© <strong>ISO</strong>/<strong>IEC</strong> 2002 – All rights reserved iii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!