12.07.2015 Views

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>ISO</strong>/<strong>IEC</strong><strong>18028</strong>-1:2006(E)13.4.3 Roles and ResponsibilitiesThe roles and responsibilities that should be instigated associated with network security management are asfollows. (It should be noted that, depending upon the size of the organization, these roles may be combined.)Senior management:— define the organization's security objectives,— initiate, approve, publish, and impose the organization's security policy, procedures and rules,— initiate, approve, publish, and impose the organization's acceptable usage policy,— ensure security and acceptable usage policies are enforced,Network management:— develop detailed network security policy,— implement the network security policy,— implement the acceptable usage policy,— manage the interface with external stakeholders / external service providers to ensure conformance withinternal and external network security policies,Network Security team:— acquire, develop, test, check and maintain security components and tools,— maintain security tools and components to follow closely the evolution of threats (e.g. updating virussignature files),— update security relevant configurations (e.g. access control lists ) according to changing business needs,Network administrators:— install, update, use and protect network security services and components,— carry out the necessary daily tasks to apply the security specifications, rules, and parameters required bythe security policies in force,— take appropriate measures to assure the protection of network security components (e.g. back-ups,monitoring network activity, responding to security incidents or alarms, etc.),Network users:— communicate their security requirements,— comply with corporate security policy,— comply with corporate acceptable usage policies for network resources,— report network security incidents,— provide feedback on network security effectiveness,Auditors (internal and/or external):— review and audit (e.g. periodically test the effectiveness of network security),— check compliance of systems with network security policy,— check and test compatibility of operating security rules with the current business requirements and legalrestrictions (e.g. lists granted for network accesses).48 © <strong>ISO</strong>/<strong>IEC</strong> 2006 - All rights reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!