GS ISI 001-2 : 1.1.2
Current
The latest, up-to-date edition.
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1
Hardcopy , PDF
English
23-05-2013
Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Position GS ISI 001-1 within the framework
of ISO/IEC 27001 to 27008
5 Position GS ISI 001-1 against COBIT
and ISO/IEC 20000
6 Different other useful cross-references
Annex A (normative) - Position the proposed operational
indicators against ISO/IEC 27002 control areas
and ISO/IEC 27006 technical control areas (Summary
table)
Annex B (informative) - Position the proposed operational
indicators against COBIT V4.1 DS5 Control Objectives
(Summary table)
Annex C (informative) - Position the proposed operational
indicators against CAG V4.0 framework 20 Critical
Controls (Summary table)
Annex D (informative) - Authors & contributors
Annex E (informative) - Bibliography
History
Gives a guide to use the range of indicators provided in GS ISI 001-1.
Committee |
ISI
|
DocumentType |
Standard
|
Pages |
27
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
GS ISI 005 : 1.1.1 | INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR SECURITY EVENT DETECTION TESTING AND ASSESSMENT OF DETECTION EFFECTIVENESS |
TR 103 331 : 1.1.1 | CYBER; STRUCTURED THREAT INFORMATION SHARING |
GS ISI 001-1 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE |
GS ISI 004 : 1.1.1 | INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR EVENT DETECTION IMPLEMENTATION |
GS ISI 003 : 1.2.1 | INFORMATION SECURITY INDICATORS (ISI); KEY PERFORMANCE SECURITY INDICATORS (KPSI) TO EVALUATE THE MATURITY OF SECURITY EVENT DETECTION |
GS ISI 002 : 1.2.1 | INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
GS ISI 002 : 1.2.1 | INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
ISO/IEC 27035:2011 | Information technology Security techniques Information security incident management |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
GS ISI 001-1 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
GS ISI 005 : 1.1.1 | INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR SECURITY EVENT DETECTION TESTING AND ASSESSMENT OF DETECTION EFFECTIVENESS |
ISO/IEC 20000-1:2011 | Information technology Service management Part 1: Service management system requirements |
ISO/IEC 20000-2:2012 | Information technology Service management Part 2: Guidance on the application of service management systems |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
GS ISI 004 : 1.1.1 | INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR EVENT DETECTION IMPLEMENTATION |
GS ISI 003 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); KEY PERFORMANCE SECURITY INDICATORS (KPSI) TO EVALUATE THE MATURITY OF SECURITY EVENT DETECTION |
ISO/IEC TR 27008:2011 | Information technology Security techniques Guidelines for auditors on information security controls |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC 27007:2017 | Information technology Security techniques Guidelines for information security management systems auditing |
ISO/TR 17791:2013 | Health informatics Guidance on standards for enabling safety in health software |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.