ISO/IEC 27033-2:2012
(Main)Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO/IEC 27033-2:2012 gives guidelines for organizations to plan, design, implement and document network security.
Technologies de l'information — Techniques de sécurité - Sécurité de réseau — Partie 2: Lignes directrices pour la conception et l'implémentation de la sécurité de réseau
General Information
Relations
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 27033-2
First edition
2012-08-01
Corrected version
2012-08-15
Information technology — Security
techniques — Network security
Part 2:
Guidelines for the design and
implementation of network security
Technologies de l'information — Techniques de sécurité — Sécurité de
réseau
Partie 2: Lignes directrices pour la conception et l'implémentation de la
sécurité de réseau
Reference number
ISO/IEC 27033-2:2012(E)
©
ISO/IEC 2012
---------------------- Page: 1 ----------------------
ISO/IEC 27033-2:2012(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2012
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2012 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 27033-2:2012(E)
Contents Page
Foreword . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviations . 2
5 Document structure . 2
6 Preparing for design of network security . 3
6.1 Introduction . 3
6.2 Asset identification . 3
6.3 Requirements collection . 3
6.3.1 Legal and regulatory requirements . 3
6.3.2 Business requirements . 4
6.3.3 Performance requirements . 4
6.4 Review requirements . 4
6.5 Review of existing designs and implementations . 5
7 Design of network security . 5
7.1 Introduction . 5
7.2 Design principles . 6
7.2.1 Introduction . 6
7.2.2 Defence in depth . 6
7.2.3 Network Zones . 7
7.2.4 Design resilience . 7
7.2.5 Scenarios . 8
7.2.6 Models and Frameworks. 8
7.3 Design Sign off .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.