Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016)

This International Standard gives guidelines for organizational information security standards and
information security management practices including the selection, implementation and management
of controls taking into consideration the organization’s information security risk environment(s).
This International Standard defines guidelines to support the interpretation and implementation in
health informatics of ISO/IEC 27002 and is a companion to that International Standard.4)
This International Standard provides implementation guidance for the controls described in
ISO/IEC 27002 and supplements them where necessary, so that they can be effectively used for
managing health information security. By implementing this International Standard, healthcare
organizations and other custodians of health information will be able to ensure a minimum requisite
level of security that is appropriate to their organization’s circumstances and that will maintain the
confidentiality, integrity and availability of personal health information in their care.
This International Standard applies to health information in all its aspects, whatever form the
information takes (words and numbers, sound recordings, drawings, video, and medical images),
whatever means are used to store it (printing or writing on paper or storage electronically), and
whatever means are used to transmit it (by hand, through fax, over computer networks, or by post), as
the information is always be appropriately protected.
This International Standard and ISO/IEC 27002 taken together define what is required in terms of
information security in healthcare, they do not define how these requirements are to be met. That is
to say, to the fullest extent possible, this International Standard is technology-neutral. Neutrality with
respect to implementing technologies is an important feature. Security technology is still undergoing
rapid development and the pace of that change is now measured in months rather than years. By
contrast, while subject to periodic review, International Standards are expected on the whole to remain
valid for years. Just as importantly, technological neutrality leaves vendors and service providers free
to suggest new or developing technologies that meet the necessary requirements that this International
Standard describes.
As noted in the introduction, familiarity with ISO/IEC 27002 is indispensable to an understanding of
this International Standard.
The following areas of information security are outside the scope of this International Standard:
a) methodologies and statistical tests for effective anonymization of personal health information;
b) methodologies for pseudonymization of personal health information (see Bibliography for a brief
description of a Technical Specification that deals specifically with this topic);
c) network quality of service and methods for measuring availability of networks used for health
informatics;
d) data quality (as distinct from data integrity).

Medizinische Informatik - Informationsmanagement im Gesundheitswesen bei Verwendung der ISO/IEC 27002 (ISO 27799:2016)

Informatique de santé - Management de la sécurité de l'information relative à la santé en utilisant l'ISO/IEC 27002 (ISO 27799:2016)

L'ISO 27799 :2016 donne des lignes directrices en matière de normes organisationnelles relatives à la sécurité de l'information et des bonnes pratiques de management de la sécurité de l'information, incluant la sélection, la mise en ?uvre et la gestion de mesures de sécurité prenant en compte le ou les environnement(s) à risques pour la sécurité de l'information de l'organisme.
Elle spécifie des lignes directrices permettant d'interpréter et de mettre en ?uvre l'ISO/IEC 27002 dans le domaine de l'informatique de santé et constitue un complément à cette dernière.
L'ISO 27799 :2016 fournit des préconisations de mise en ?uvre des mesures décrites dans l'ISO/IEC 27002 et les complète, le cas échéant, de façon à ce qu'elles puissent être utilisées efficacement dans le mangement de la sécurité des informations de santé. La mise en ?uvre de l'ISO 27799 :2016 permettra aux organismes de santé et aux autres dépositaires d'informations de santé de garantir le niveau minimal requis de sécurité approprié aux conditions de leur organisme et de protéger la confidentialité, l'intégrité et la disponibilité des informations personnelles de santé dans leurs activités de soins.
L'ISO 27799 :2016 s'applique à tous les aspects des informations de santé, quelle que soit la forme (mots, chiffres, enregistrements sonores, dessins, vidéos et images médicales), le support utilisé pour les stocker (imprimés, documents manuscrits ou stockage électronique) ou les moyens mis en ?uvre pour leur transmission (en main propre, par fax, par réseau informatique ou par courrier), de sorte que l'information soit toujours correctement protégée.
L'ISO 27799 :2016 et l'ISO/IEC 27002 définissent les exigences en termes de sécurité de l'information dans les soins de santé, mais elles ne définissent pas la façon de satisfaire à ces exigences. En d'autres termes, dans toute la mesure du possible, la technologie est absente de l'ISO 27799 :2016. La neutralité sur les technologies de mise en ?uvre est une caractéristique importante. La technologie en matière de sécurité continue de se développer rapidement. Le rythme de cette évolution se mesure actuellement en mois et non plus en années. En revanche, bien que les Normes internationales soient soumises à des révisions régulières, il est prévu qu'elles restent valides pendant plusieurs années. De manière également importante, la neutralité sur les technologies laisse aux fournisseurs et aux prestataires de services l'entière liberté de suggérer des technologies nouvelles ou en développement qui peuvent répondre aux exigences décrites dans l'ISO 27799 :2016.
Comme mentionné dans l'introduction, la connaissance de l'ISO/IEC 27002 est indispensable à la compréhension de l'ISO 27799 :2016.
Les domaines suivants de la sécurité de l'information ne relèvent pas du domaine d'application de l'ISO 27799 :2016:
a)    les méthodologies et les essais statistiques en vue d'une anonymisation efficace des informations personnelles de santé;
b)    les méthodologies en vue de la pseudonymisation des informations personnelles de santé (voir la bibliographie pour une brève description d'une Spécification technique qui traite spécifiquement de ce sujet);
c)    la qualité des services fournis par le réseau et les méthodes pour évaluer la disponibilité des réseaux utilisés pour l'informatique de santé;
d)    la qualité des données (par opposition à l'intégrité des données).

Zdravstvena informatika - Upravljanje informacijske varnosti v zdravstvu z uporabo standarda ISO/IEC 27002 (ISO 27799:2016)

Ta mednarodni standard podaja smernice za standarde informacijske varnosti organizacij in načine uporabe upravljanja informacijske varnosti, kar vključuje izbiro, izvajanje in upravljanje kontrol, pri čemer upošteva tveganja za informacijsko varnost v okolju organizacije.
Ta mednarodni standard opredeljuje smernice za podporo pri tolmačenju in izvajanju na področju zdravstvene informatike v okviru standarda ISO/IEC 27002 in je spremljevalni standard k temu mednarodnemu standardu.
4) Ta mednarodni standard podaja smernice za izvajanje na področju kontrol, opisanih v standardu ISO/IEC 27002, in jih dopolnjuje, kjer je to potrebno, tako da se lahko učinkovito uporabljajo za upravljanje informacijske varnosti v zdravstvu. Zdravstvene organizacije in drugi hranitelji zdravstvenih podatkov lahko z izvajanjem tega mednarodnega standarda poskrbijo za najnižjo potrebno stopnjo varnosti, ki bo ustrezala pogojem določene organizacije ter zagotavljala zaupnost, celovitost in razpoložljivost osebnih zdravstvenih podatkov v njeni hrambi.
Ta mednarodni standard se uporablja za zdravstvene podatke v vseh pogledih, vseh oblikah (besede in številke, zvočni zapisi, risbe, videoposnetki ter medicinske slike), vseh oblikah njihovega shranjevanja (tiskanje, zapisovanje na papir ali elektronska shramba) in vseh oblikah njihovega prenašanja (ročno, po faksu, prek računalniških omrežij ali po pošti), pri čemer morajo biti ti podatki ustrezno zavarovani.
Ta mednarodni standard in standard ISO/IEC 27002 skupaj določata zahteve glede informacijske varnosti v zdravstvu, ne pa tudi načina, kako te zahteve izpolniti. Ta mednarodni standard je torej tehnološko nevtralen v največjem mogočem obsegu. Nevtralnost v zvezi z uvajanjem tehnologij je pomembna lastnost tega standarda. Varnostna tehnologija je še vedno podvržena naglemu razvoju in hitrost uvajanja tovrstnih sprememb je trenutno podana v mesecih namesto v letih. Po drugi strani so mednarodni standardi predmet rednih revizij, zato se na splošno pričakuje, da bodo ostali veljavni več let. Pomembno je tudi, da tehnološka nevtralnost dobaviteljem in ponudnikom storitev omogoča, da prosto predlagajo nove ali razvijajoče se tehnologije, ki izpolnjujejo potrebne zahteve v skladu s tem mednarodnim standardom.
Kot je omenjeno v uvodu, je poznavanje vsebine standarda ISO/IEC 27002 nujno potrebno za ustrezno razumevanje tega mednarodnega standarda.
Naslednja področja informacijske varnosti ne spadajo na področje uporabe tega mednarodnega standarda:
a) metodologije in statistični preskusi za učinkovito preoblikovanje osebnih zdravstvenih podatkov v anonimne;
b) metodologije za preoblikovanje osebnih zdravstvenih podatkov v psevdonime (glej bibliografijo za kratek opis tehnične specifikacije, v kateri je posebej obravnavana ta tema);
c) omrežna kakovost storitev in metod za merjenje razpoložljivosti omrežij, ki se uporabljajo za informatiko v zdravstvu;
d) kakovost podatkov (za razliko od njihove celovitosti).

General Information

Status
Published
Public Enquiry End Date
29-Nov-2014
Publication Date
28-Nov-2016
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
29-Aug-2016
Due Date
03-Nov-2016
Completion Date
29-Nov-2016

Relations

Buy Standard

Standard
EN ISO 27799:2017 - BARVE
English language
114 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Draft
prEN ISO 27799:2014 - BARVE
English language
126 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST EN ISO 27799:2017
01-februar-2017
1DGRPHãþD
SIST EN ISO 27799:2008
Zdravstvena informatika - Upravljanje informacijske varnosti v zdravstvu z
uporabo standarda ISO/IEC 27002 (ISO 27799:2016)
Health informatics - Information security management in health using ISO/IEC 27002
(ISO 27799:2016)
Medizinische Informatik - Informationsmanagement im Gesundheitswesen bei
Verwendung der ISO/IEC 27002 (ISO 27799:2016)
Informatique de santé - Management de la sécurité de l'information relative à la santé en
utilisant l'ISO/IEC 27002 (ISO 27799:2016)
Ta slovenski standard je istoveten z: EN ISO 27799:2016
ICS:
35.030 Informacijska varnost IT Security
35.240.80 Uporabniške rešitve IT v IT applications in health care
zdravstveni tehniki technology
SIST EN ISO 27799:2017 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST EN ISO 27799:2017

---------------------- Page: 2 ----------------------

SIST EN ISO 27799:2017


EN ISO 27799
EUROPEAN STANDARD

NORME EUROPÉENNE

August 2016
EUROPÄISCHE NORM
ICS 35.240.80 Supersedes EN ISO 27799:2008
English Version

Health informatics - Information security management in
health using ISO/IEC 27002 (ISO 27799:2016)
Informatique de santé - Management de la sécurité de Medizinische Informatik - Informationsmanagement
l'information relative à la santé en utilisant l'ISO/IEC im Gesundheitswesen bei Verwendung der ISO/IEC
27002 (ISO 27799:2016) 27002 (ISO 27799:2016)
This European Standard was approved by CEN on 18 June 2016.

CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this
European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references
concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN
member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management
Centre has the same status as the official versions.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and
United Kingdom.





EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2016 CEN All rights of exploitation in any form and by any means reserved Ref. No. EN ISO 27799:2016 E
worldwide for CEN national Members.

---------------------- Page: 3 ----------------------

SIST EN ISO 27799:2017
EN ISO 27799:2016 (E)
Contents Page
European foreword . 3

2

---------------------- Page: 4 ----------------------

SIST EN ISO 27799:2017
EN ISO 27799:2016 (E)
European foreword
This document (EN ISO 27799:2016) has been prepared by Technical Committee ISO/TC 215 “Health
informatics” in collaboration with Technical Committee CEN/TC 251 “Health informatics” the
secretariat of which is held by NEN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by February 2017, and conflicting national standards
shall be withdrawn at the latest by February 2017.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent
rights.
This document supersedes EN ISO 27799:2008.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia,
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta,
Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Turkey and the United Kingdom.
Endorsement notice
The text of ISO 27799:2016 has been approved by CEN as EN ISO 27799:2016 without any modification.
3

---------------------- Page: 5 ----------------------

SIST EN ISO 27799:2017

---------------------- Page: 6 ----------------------

SIST EN ISO 27799:2017
INTERNATIONAL ISO
STANDARD 27799
Second edition
2016-07-01
Health informatics — Information
security management in health using
ISO/IEC 27002
Informatique de santé — Management de la sécurité de l’information
relative à la santé en utilisant l’ISO/IEC 27002
Reference number
ISO 27799:2016(E)
©
ISO 2016

---------------------- Page: 7 ----------------------

SIST EN ISO 27799:2017
ISO 27799:2016(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO 2016 – All rights reserved

---------------------- Page: 8 ----------------------

SIST EN ISO 27799:2017
ISO 27799:2016(E)

Contents Page
Foreword .vii
Introduction .viii
1 Scope . 1
2 Normative references . 2
3 Terms and definitions . 2
4 Structure of this International Standard . 3
5 Information security policies . 4
5.1 Management direction for information security . 4
5.1.1 Policies for information security. 4
5.1.2 Review of the policies for information security . 5
6 Organization of information security . 6
6.1 Internal organization . 6
6.1.1 Information security roles and responsibilities . 6
6.1.2 Segregation of duties . 7
6.1.3 Contact with authorities . 7
6.1.4 Contact with special interest groups . 7
6.1.5 Information security in project management . 8
6.2 Mobile devices and teleworking . 8
6.2.1 Mobile device policy . 8
6.2.2 Teleworking. 9
7 Human resource security . 9
7.1 Prior to employment . 9
7.1.1 Screening . 9
7.1.2 Terms and conditions of employment .10
7.2 During employment .11
7.2.1 Management responsibilities .11
7.2.2 Information security awareness, education and training .11
7.2.3 Disciplinary process . .11
7.3 Termination and change of employment .12
7.3.1 Termination or change of employment responsibilities .12
8 Asset management .12
8.1 Responsibility for assets .12
8.1.1 Inventory of assets .12
8.1.2 Ownership of assets .13
8.1.3 Acceptable use of assets .13
8.1.4 Return of assets .13
8.2 Information classification .14
8.2.1 Classification of information .14
8.2.2 Labelling of information .15
8.2.3 Handling of assets .15
8.3 Media handling .16
8.3.1 Management of removable media .16
8.3.2 Disposal of media .16
8.3.3 Physical media transfer .17
9 Access control .17
9.1 Business requirements of access control .17
9.1.1 Access control policy .17
9.1.2 Access to networks and network services .18
9.2 User access management .18
9.2.1 User registration and de-registration .18
9.2.2 User access provisioning.19
© ISO 2016 – All rights reserved iii

---------------------- Page: 9 ----------------------

SIST EN ISO 27799:2017
ISO 27799:2016(E)

9.2.3 Management of privileged access rights .19
9.2.4 Management of secret authentication information of users .20
9.2.5 Review of user access rights .20
9.2.6 Removal or adjustment of access rights .21
9.3 User responsibilities .21
9.3.1 Use of secret authentication information .21
9.4 System and application access control .22
9.4.1 Information access restriction .22
9.4.2 Secure log-on procedures .22
9.4.3 Password management system .22
9.4.4 Use of privileged utility programs .23
9.4.5 Access control to program source code .23
10 Cryptography .23
10.1 Cryptographic controls .23
10.1.1 Policy on the use of cryptographic controls .23
10.1.2 Key management .24
11 Physical and environmental security .24
11.1 Secure areas .24
11.1.1 Physical security perimeter .24
11.1.2 Physical entry controls .25
11.1.3 Securing offices, rooms and facilities .25
11.1.4 Protecting against external and environmental threats .25
11.1.5 Working in secure areas .25
11.1.6 Delivery and loading areas .25
11.2 Equipment .26
11.2.1 Equipment siting and protection .26
11.2.2 Supporting utilities .26
11.2.3 Cabling security .27
11.2.4 Equipment maintenance .27
11.2.5 Removal of assets .27
11.2.6 Security of equipment and assets off-premises .27
11.2.7 Secure disposal or reuse of equipment .28
11.2.8 Unattended user equipment .28
11.2.9 Clear desk and clear screen policy .28
12 Operations security .29
12.1 Operational procedures and responsibilities .29
12.1.1 Documented operating procedures .29
12.1.2 Change management .29
12.1.3 Capacity management .30
12.1.4 Separation of development, testing and operational environments .30
12.2 Protection from malware .30
12.2.1 Controls against malware .30
12.3 Backup .31
12.3.1 Information backup .31
12.4 Logging and monitoring .31
12.4.1 Event logging .31
12.4.2 Protection of log information .32
12.4.3 Administrator and operator logs .33
12.4.4 Clock synchronisation .34
12.5 Control of operational software .34
12.5.1 Installation of software on operational systems .34
12.6 Technical vulnerability management .34
12.6.1 Management of technical vulnerabilities.34
12.6.2 Restrictions on software installation .35
12.7 Information systems audit considerations .35
12.7.1 Information systems audit controls .35
iv © ISO 2016 – All rights reserved

---------------------- Page: 10 ----------------------

SIST EN ISO 27799:2017
ISO 27799:2016(E)

13 Communications security .35
13.1 Network security management .35
13.1.1 Network controls .35
13.1.2 Security of network services .36
13.1.3 Segregation in networks .36
13.2 Information transfer .36
13.2.1 Information transfer policies and procedures .36
13.2.2 Agreements on information transfer .37
13.2.3 Electronic messaging .37
13.2.4 Confidentiality or non-disclosure agreements .38
14 System acquisition, development and maintenance .38
14.1 Security requirements of information systems .38
14.1.1 Information security requirements analysis and specification .38
14.1.2 Securing application services on public networks .40
14.1.3 Protecting application services transactions .40
14.2 Security in development and support processes .40
14.2.1 Secure development policy .40
14.2.2 System change control procedures .41
14.2.3 Technical review of applications after operating platform changes .41
14.2.4 Restrictions on changes to software packages .41
14.2.5 Secure system engineering principles.42
14.2.6 Secure development environment .42
14.2.7 Outsourced development .42
14.2.8 System security testing .42
14.2.9 System acceptance testing .43
14.3 Test data .43
14.3.1 Protection of test data .43
15 Supplier relationships .43
15.1 Information security in supplier relationships .43
15.1.1 Information security policy for supplier relationships .43
15.1.2 Addressing security within supplier agreements .44
15.1.3 Information and communication technology supply chain .
...

SLOVENSKI STANDARD
oSIST prEN ISO 27799:2014
01-november-2014
Zdravstvena informatika - Upravljanje informacijske varnosti v zdravstvu z
uporabo standarda ISO/IEC 27002 (ISO/DIS 27799:2014)
Health informatics - Information security management in health using ISO/IEC 27002
(ISO/DIS 27799:2014)
Medizinische Informatik - Informationsmanagement im Gesundheitswesen bei
Verwendung der ISO/IEC 27002 (ISO/DIS 27799:2014)
Informatique de santé - Management de la sécurité de l'information relative à la santé en
utilisant l'ISO/IEC 27002 (ISO/DIS 27799:2014)
Ta slovenski standard je istoveten z: prEN ISO 27799
ICS:
35.240.80 Uporabniške rešitve IT v IT applications in health care
zdravstveni tehniki technology
oSIST prEN ISO 27799:2014 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
oSIST prEN ISO 27799:2014

---------------------- Page: 2 ----------------------
oSIST prEN ISO 27799:2014
DRAFT INTERNATIONAL STANDARD
ISO/DIS 27799
ISO/TC 215 Secretariat: ANSI
Voting terminates on:
Voting begins on:
2014-09-11 2015-02-11
Health informatics — Information security management in
health using ISO/IEC 27002
Informatique de la santé — Gestion de la securité de l’information relative à la santé en utilisant l’ISO/IEC
27002
ICS: 35.240.80
ISO/CEN PARALLEL PROCESSING
This draft has been developed within the International Organization for
Standardization (ISO), and processed under the ISO lead mode of collaboration
as defined in the Vienna Agreement.
This draft is hereby submitted to the ISO member bodies and to the CEN member
bodies for a parallel five month enquiry.
Should this draft be accepted, a final draft, established on the basis of comments
received, will be submitted to a parallel two-month approval vote in ISO and
THIS DOCUMENT IS A DRAFT CIRCULATED
formal vote in CEN.
FOR COMMENT AND APPROVAL. IT IS
THEREFORE SUBJECT TO CHANGE AND MAY
NOT BE REFERRED TO AS AN INTERNATIONAL
STANDARD UNTIL PUBLISHED AS SUCH.
To expedite distribution, this document is circulated as received from the
IN ADDITION TO THEIR EVALUATION AS
committee secretariat. ISO Central Secretariat work of editing and text
BEING ACCEPTABLE FOR INDUSTRIAL,
composition will be undertaken at publication stage.
TECHNOLOGICAL, COMMERCIAL AND
USER PURPOSES, DRAFT INTERNATIONAL
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
POTENTIAL TO BECOME STANDARDS TO
WHICH REFERENCE MAY BE MADE IN
Reference number
NATIONAL REGULATIONS.
ISO/DIS 27799:2014(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
©
PROVIDE SUPPORTING DOCUMENTATION. ISO 2014

---------------------- Page: 3 ----------------------
oSIST prEN ISO 27799:2014
ISO/DIS 27799:2014(E)

Copyright notice
This ISO document is a Draft International Standard and is copyright-protected by ISO. Except as
permitted under the applicable laws of the user’s country, neither this ISO draft nor any extract
from it may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, photocopying, recording or otherwise, without prior written permission being secured.
Requests for permission to reproduce should be addressed to either ISO at the address below or ISO’s
member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
ii © ISO 2014 – All rights reserved

---------------------- Page: 4 ----------------------
oSIST prEN ISO 27799:2014
ISO/WD 27799
Contents Page
1 Scope . 1
1.1 General . 1
1.2 Scope exclusions . 1
2 Normative references . 2
3 Terms and definitions . 2
4 Structure of this standard. 4
5 Information security policies . 5
5.1 Management direction for information security . 5
5.1.1 Policies for information security . 5
5.1.2 Review of the policies for information security . 7
6 Organization of information security . 8
6.1 Internal organization . 8
6.1.1 Information security roles and responsibilities . 8
6.1.2 Segregation of duties . 10
6.1.3 Contact with authorities . 10
6.1.4 Contact with special interest groups . 10
6.1.5 Information security in project management . 11
6.2 Mobile devices and teleworking . 11
6.2.1 Mobile device policy . 11
6.2.2 Teleworking . 13
7 Human resource security . 14
7.1 Prior to employment . 14
7.1.1 Screening . 14
7.1.2 Terms and conditions of employment . 15
7.2 During employment . 16
7.2.1 Management responsibilities . 16
7.2.2 Information security awareness, education and training . 17
7.2.3 Disciplinary process . 18
7.3 Termination and change of employment . 19
7.3.1 Termination or change of employment responsibilities . 19
8 Asset management . 19
8.1 Responsibility for assets . 19
8.1.1 Inventory of assets . 19
8.1.2 Ownership of assets . 20
8.1.3 Acceptable use of assets. 21
8.1.4 Return of assets . 21
8.2 Information classification . 21
8.2.1 Classification of information . 21
8.2.2 Labelling of information . 23
8.2.3 Handling of assets . 23
8.3 Media handling . 24
8.3.1 Management of removable media . 24
8.3.2 Disposal of media . 25
8.3.3 Physical media transfer . 25
9 Access control . 26
9.1 Business requirements of access control . 26
9.1.1 Access control policy . 26
9.1.2 Access to networks and network services . 28
9.2 User access management . 28
9.2.1 User registration and de-registration . 28
© ISO 2013 – All rights reserved iii

---------------------- Page: 5 ----------------------
oSIST prEN ISO 27799:2014
ISO/WD 27799
9.2.2 User access provisioning . 29
9.2.3 Management of privileged access rights . 30
9.2.4 Management of secret authentication information of users . 31
9.2.5 Review of user access rights . 32
9.2.6 Removal or adjustment of access rights . 32
9.3 User responsibilities . 33
9.3.1 Use of secret authentication information . 33
9.4 System and application access control . 34
9.4.1 Information access restriction . 34
9.4.2 Secure log-on procedures . 35
9.4.3 Password management system . 35
9.4.4 Use of privileged utility programs . 36
9.4.5 Access control to program source code . 37
10 Cryptography . 37
10.1 Cryptographic controls . 37
10.1.1 Policy on the use of cryptographic controls . 37
10.1.2 Key management . 38
11 Physical and environmental security . 39
11.1 Secure areas . 39
11.1.1 Physical security perimeter . 40
11.1.2 Physical entry controls . 41
11.1.3 Securing offices, rooms and facilities . 41
11.1.4 Protecting against external and environmental threats . 42
11.1.5 Working in secure areas . 42
11.1.6 Delivery and loading areas . 42
11.2 Equipment . 43
11.2.1 Equipment siting and protection . 43
11.2.2 Supporting utilities . 44
11.2.3 Cabling security . 44
11.2.4 Equipment maintenance . 45
11.2.5 Removal of assets . 45
11.2.6 Security of equipment and assets off-premises . 46
11.2.7 Secure disposal or re-use of equipment . 46
11.2.8 Unattended user equipment . 47
11.2.9 Clear desk and clear screen policy . 47
12 Operations security . 48
12.1 Operational procedures and responsibilities . 48
12.1.1 Documented operating procedures . 48
12.1.2 Change management . 49
12.1.3 Capacity management . 49
12.1.4 Separation of development, testing and operational environments . 50
12.2 Protection from malware . 51
12.2.1 Controls against malware . 51
12.3 Backup . 52
12.3.1 Information backup. 52
12.4 Logging and monitoring . 53
12.4.1 Event logging . 53
12.4.2 Protection of log information . 54
12.4.3 Administrator and operator logs . 56
12.4.4 Clock synchronisation . 56
12.5 Control of operational software . 57
12.5.1 Installation of software on operational systems . 57
12.6 Technical vulnerability management . 58
12.6.1 Management of technical vulnerabilities . 58
12.6.2 Restrictions on software installation . 59
12.7 Information systems audit considerations . 59
12.7.1 Information systems audit controls . 59
13 Communications security . 60
iv © ISO 2013 – All rights reserved

---------------------- Page: 6 ----------------------
oSIST prEN ISO 27799:2014
ISO/WD 27799
13.1 Network security management . 60
13.1.1 Network controls . 60
13.1.2 Security of network services . 60
13.1.3 Segregation in networks . 61
13.2 Information transfer . 61
13.2.1 Information transfer policies and procedures . 61
13.2.2 Agreements on information transfer . 63
13.2.3 Electronic messaging . 63
13.2.4 Confidentiality or non-disclosure agreements . 64
14 System acquisition, development and maintenance . 65
14.1 Security requirements of information systems . 65
14.1.1 Information security requirements analysis and specification . 65
14.1.2 Securing application services on public networks . 67
14.1.3 Protecting application services transactions . 68
14.2 Security in development and support processes . 69
14.2.1 Secure development policy . 69
14.2.2 System change control procedures . 69
14.2.3 Technical review of applications after operating platform changes . 70
14.2.4 Restrictions on changes to software packages . 71
14.2.5 Secure system engineering principles . 71
14.2.6 Secure development environment . 72
14.2.7 Outsourced development . 72
14.2.8 System security testing . 73
14.2.9 System acceptance testing . 73
14.3 Test data . 74
14.3.1 Protection of test data . 74
15 Supplier relationships . 74
15.1 Information security in supplier relationships . 74
15.2 Test data . 74
15.2.1 Information security policy for supplier relationships . 74
15.2.2 Addressing security within supplier agreements . 76
15.2.3 Information and communication technology supply chain . 77
15.3 Supplier service delivery management . 78
15.3.1 Monitoring and review of supplier services . 78
15.3.2 Managing changes to supplier services . 78
16 Information security incident management . 79
16.1 Management of information security incidents and improvements . 79
16.1.1 Responsibilities and procedures . 79
16.1.2 Reporting information security events . 80
16.1.3 Reporting information security weaknesses . 81
16.1.4 Assessment of and decision on information security events . 82
16.1.5 Response to information security incidents . 82
16.1.6 Learning from information security incidents . 83
16.1.7 Collection of evidence . 83
17 Information security aspects of business continuity management . 84
17.1 Information security continuity . 84
17.1.1 Planning information security continuity . 84
17.1.2 Implementing information security continuity . 85
17.1.3 Verify, review and evaluate information security continuity . 85
17.2 Redundancies . 86
17.2.1 Availability of information processing facilities. 86
18 Compliance . 86
18.1 Compliance with legal and contractual requirements . 86
18.1.1 Identification of applicable legislation and contractual requirements . 86
18.1.2 Intellectual property rights . 87
18.1.3 Protection of records . 88
18.1.4 Privacy and protection of personally identifiable information . 88
© ISO 2013 – All rights reserved v

---------------------- Page: 7 ----------------------
oSIST prEN ISO 27799:2014
ISO/WD 27799
18.1.5 Regulation of cryptographic controls. 90
18.2 Information security reviews . 90
18.2.1 Independent review of information security . 90
18.2.2 Compliance with security policies and standards . 90
18.2.3 Technical compliance review . 91
Annex A Threats to health information security (informative) . 92
Annex B Practical action plan for implementing ISO/IEC 27002 in healthcare (informative) . 96
B.1 Taxonomy of the 27001 and 27002 standards . 96
B.2 Management commitment to implementing ISO/IEC 27002 . 96
B.3 Establishing, operating, maintaining and improving the ISMS . 97
B.4 Planning: establishing the ISMS . 97
B.4.1 Selecting and defining a compliance scope . 97
B.4.2 Gap analysis .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.