GSC20 Session8 Security Laura ISOIEC
GSC20 Session8 Security Laura ISOIEC
Pg 2 |
JTC 1 Security and Privacy
Pg 3 |
Security and Privacy Topic Areas
Governance
Pg 5 |
ISO/IEC 27000 family relationship
31000
Vocabulary Audit
Governance 27000 27006 20000-1
27014 27007
ISMS 27008
27001
27009
Controls Metrics Risk
Implementation
Management
27010 27013
27002 27003 27004
27015 27005
27011
27017
Clause 17-27031 27018
Clause 13.1 - 27033 27019
Clause 16 - 27035 27799
Investigative
Clause 15 - 27036 27037 27016
Clause 12.4-27039 27038 27032
27040 27034
27041
27042
27043
27050
Key Privacy Products
Pg 7 |
Vertical Topic Areas
• Cloud Computing
• Accessibility
• Health Care
• IoT
• Societal considerations
• Telecom
Pg 8 |
Key Work Products Related to Verticals
• Cloud Computing
• ITU-T X.1631|ISO/IEC 27017 – Guidelines on Information security
controls for the use of cloud computing services based on ISO/IEC
27002
• ISO/IEC 27018 - Code of practice for PII protection in public clouds
acting as PII processors
• ISO/IEC 27036-4 - Information security for supplier relationships – Part
4: Guidelines for security of cloud services
• Health Care
• ISO/IEC 27999
• Societal considerations
• ISO/IEC 27032 – Guidelines for Cybersecurity
• Telecom
• ITU-T X.1051|ISO/IEC 27011 - Information security management
guidelines for telecommunications organizations based on ISO/IEC
27002
Pg 9 |
In Progress and Future Work Areas
• Cyber Insurance
• Cyber Resilience
• Cloud Computing
• SLA for security and privacy
• Trusted connections
• Virtualization
• Big Data
• Security and Privacy considerations
• IoT
• Privacy considerations
• Identity Management
• Security considerations
• Privacy implications related to SmartPhone Applications
• Privacy
• Information Management System
• Notices and Consent
Pg 10 | • De-identification techniques
Collaboration with GSC Organizations
• ITU-T
• SG 17 – Information Security, Cloud Security, ISMS, Identity
• SG 20 – IoT
• SG 13 – Cloud Computing
• ETSI
• Cybersecurity, Cloud Security, Privacy, Crypto mechanisms
• IEEE
• Cloud Security, Information Assurance, storage, IoT
Pg 11 |
Collaboration with Groups outside JTC 1
• INTERPOL • Amex
• OASIS • MasterCard
• ISC2 • VISA
• FIRST • Article 29 Data
• Opengroup Protection Working
• ISACA Party
• ENISA
Pg 12 |
Summary
SC17 Structure
SC17
Chair: Mr Richard A. Mabbott,
Secretariat: Ms Shanti Conn (BSI)
WG 1 (Physical
characteristics and WG 3 (Identification
cards-Machine WG8 (Contactless WG9 (Optical
test methods for ID- WG 4 (Integrated WG 5 (Registration integrated circuit memory cards and
cards) readable travel circuit card with Management Group
documents) cards) devices)
contacts) (RMG))
Convenor: Mr. Uwe Convenor: Mr. Convenor: Mr. Ron
Truggelmann Convenor: Mr. Tom Convenor: Mr. Jean- Convenor: Mr.
Kinneging Michael Hegenbarth Field
Yves Duveau Patrick Macy
WG 10 (Motor
WG 11 (Application
Vehicle driver licence
of biometrics to
and related
cards and personal
documents)
identification)
Convenor: Ms. Loffie
Convenor: Lin Yih
Jordaan
1
7
SC 37 Biometrics
SC37 Structure
SC37
Chair: Mr Fernando Podio,
Secretariat: Ms. Michaela Miller (ANSI)
WG6 (Cross-
WG 1 (Harmonized WG 5 (Biometric
jurisdictional and
biometric WG 2 (Biometric WG 3 (Biometric WG 4 (Technical testing and
societal aspects of
vocabulary) technical interfaces) data interchange Implementation of reporting)
biometrics)
formats) biometric systems)
SC 27 Mission
SC 27 is an internationally recognized centre of information and IT security standards
expertise serving the needs of business sectors as well as governments. Its work covers
the development of standards for the protection of information and ICT. This includes
requirements, methods, techniques and guidelines to address aspects of both security
and privacy in regard to:
Information security management systems (ISMS)
Cryptographic and security mechanisms
Security evaluation, testing and specification
Security controls and services
Identity management and privacy technologies
SC 27 Structure
SC 27
Chair: Dr. Walter Fumy, Vice-chair: Dr. Marijke De Soete,
Secretariat: Krystyna Passia (DIN)
Projects
- Total no of projects: 210
- No of active projects: 74
- Current number of published standards: 136
Standing Documents (all freely available from the SC 27 site as given below)
- SD6 Glossary of IT Security terminology (http://www.JTC 1SC 27.din.de/sbe/SD6)
- SD7 Catalogue of SC 27 Projects and Standards (http://www.JTC 1SC
27.din.de/sbe/SD7
- SD11 Overview of SC 27 (http://www.JTC 1SC 27.din.de/sbe/SD11)
- SD12 Assessment of cryptographic algorithms and key lengths (http://www.JTC
1SC 27.din.de/sbe/SD12)
2
2
SC 27 Members
P-members (voting)
Algeria, Argentina, Australia, Austria, Belgium, Brazil, Canada, China, Côte-d'Ivoire,
Cyprus, Czech Republic, Denmark, Finland, France, Germany, India, Ireland, Italy, Israel,
Jamaica, Japan, Kazakhstan, Kenya, Rep. of Korea, Luxembourg, Malaysia, Mauritius,
Mexico, Morocco, The Netherlands, New Zealand, Norway, Peru, Poland, Romania,
Russian Federation, Rwanda, Singapore, Slovakia, South Africa, Spain, Sri Lanka,
Sweden, Switzerland, Thailand, The Former Yugoslav Republic of Macedonia, Ukraine,
United Arab Emirates, United Kingdom, United States of America, Uruguay (Total: 51)
O-members (observing)
Belarus, Bosnia and Herzegovina, Costa Rica, El Salvador, Estonia, Ghana, Hong Kong,
Hungary, Iceland, Indonesia, Islamic Rep. of Iran, Lithuania, State of Palestine, Portugal,
Saudi Arabia, Serbia, Slovenia, State of Palestine, Swaziland, Turkey (Total: 20)
2
3
SC 27 Liaison Partners
Internal Liaisons within ISO
• ISO/CASCO
• ISO/JTCG Joint technical Coordination Group on MSS
• ISO/TC 46/SC 11 Information and documentation – Archives/Records
management
• ISO/TC 68/SC 2 Financial services -- Security
• ISO/TC 171 Document management applications
• ISO/TC 176/SC 3 - Quality management and quality assurance - Supporting
technologies
• ISO/TC 176/SC 3/WG 16 Quality management and quality assurance - Supporting
technologies - Joint WG with TC 207/SC2 for the revision of ISO 19011
• ISO/TC 204 Intelligent transport systems - WG 1 Architecture
• ISO/TC 208 Thermal turbines for industrial application (steam turbines, gas
expansion turbines)
2
4
SC 27 Liaison Partners
SC 27 Liaison Partners
SC 27 Liaison Partners
SC 27 WG 1 Mission
Information Security Management Systems
The scope covers all aspects of standardisation related to
information security management systems:
3rd ed. 2014 This International Standard describes the overview and the vocabulary
Overview and
ISO/IEC 27000 under of information security management systems, which form the subject of
vocabulary
revision (DIS) the ISMS family of standards, and defines related terms and definitions.
This International Standard specifies the requirements for establishing,
Information security implementing, operating, monitoring, reviewing, maintaining and
ISO/IEC 27001 management systems 2nd ed. 2013 improving a documented information security management system
– Requirements within the context of the organization’s business activities and the risks it
faces.
Code of practice for This International Standard offers a collection of commonly accepted
ISO/IEC 27002 information security 2nd ed. 2013 information security control objectives and controls and includes
controls guidelines for implementing these controls.
1st ed. 2010 This International Standard provides further information about using the
Information security
under PDCA model and give guidance addressing the requirements of the
ISO/IEC 27003 management system -
revision (2nd different stages on the PDCA process to establish, implement and
guidance
CD) operate, monitor and review and improve the ISMS.
Information security
1st ed. 2009
management This International Standard provides guidance on the specification and
under
ISO/IEC 27004 Monitoring, use of measurement techniques for providing assurance as regards the
revision (2nd
measurement, analysis effectiveness of information security management systems.
CD)
and evaluation
3
3
WG 1 Products
Standard Title Status Abstract
Cloud security use cases and potential standardisation gaps Study Period
Information security code of practice for the aviation industry Study Period
Inclusion of Chinese SM2 and IBS schemes in ISO/IEC 14888-3 Study Period
Quantum computing resistant cryptography Study Period
Mechanisms and properties for ISO/IEC 9798 and ISO/IEC 11770 Study Period
Privacy-respecting identity management scheme using attribute-based credentials Study Period (with WG 5)
4
7
SC 27 WG 3 Mission
Cryptographic
The purpose of this standard is to address conformance testing
algorithms and security
ISO/IEC 18367 1st DIS methods of cryptographic algorithms and security mechanisms
mechanisms
implemented in a cryptographic module.
conformance testing
Catalogue of
Architectural and This Technical Report (TR) provides a catalogue with guidelines for
Design Principles for architectural and design principles for the development of secure
ISO/IEC 19249 1st PDTR
Secure Products, products, systems, and applications. Applying those principles should
Systems, and result in more secure products, systems, and applications.
Applications
Guidance for
This TR provides guidance for developing privacy functional
developing security and
requirements as extended components based on privacy principles
ISO/IEC 19608 privacy functional 3rd WD
defined in ISO/IEC 29100 through the paradigm described in ISO/IEC
requirements based on
15408-2.
ISO/IEC 15408
2nd ed.
Security requirements ISO/IEC 19790:2012 specifies the security requirements for a
Pending
ISO/IEC 19790 for cryptographic cryptographic module utilised within a security system protecting
corrected
modules sensitive information in computer and telecommunication systems
reprint
Security assessment of ISO/IEC TR 19791:2010 provides guidance and criteria for the security
ISO/IEC TR 19791 2nd ed.
operational systems evaluation of operational systems.
5
0
WG 3 Products
Standard Title Status Abstract
Physical security
1st Ed This Technical Report addresses how security assurance can be stated
attacks, mitigation
ISO/IEC TS 30104 Pending for products where the risk of the security environment requires the
techniques and security
publication support of physical protection mechanisms.
requirements
ISO/IEC 30111:2013 gives guidelines for how to process and resolve
Vulnerability handling 1st Ed. 2013
ISO/IEC 30111 potential vulnerability information in a product or online service. It is
processes Under revision
applicable to vendors involved in handling vulnerabilities.
5
3
SC 27 WG 4 Mission
Security controls and services
International Standards etc. for information security in the area of Security Controls and Services.
Assist organizations in the implementation of the Information Security Management Systems (ISMS)
standards.
Addressing existing and emerging information security issues and needs and other security
aspects that resulted from the proliferation and use of ICT and Internet related technology in
organizations.
Domains
Security incidents
Detection, Investigation, Management, Recovery
System and system life cycle security
Acquisition and supply
Security related to storage
Security related to processing
Security related to communication
5
4
WG 4 Products
Standard Title Status Abstract
Guidelines for the use Provides guidance for the use and management of Trusted Third Party
IITU-T X.842 | and management of 1st
Ed. 2002 (TTP) services, a clear definition of the basic duties and services
ISO/IEC TR 14516 Trusted Third Party under revision provided, their description and their purpose, and the roles and
services liabilities of TTPs and entities using their services.
Security information Provides object definitions that are commonly needed in security
IIITU-T X.841 |
objects for access 1st ed. 2002 standards to avoid multiple and different definitions of the same
ISO/IEC 15816
control functionality.
Specification of TTP
IITU-T X.843 | services to support the Defines the services required to support the application of digital
1st ed. 2002
ISO/IEC 15945 application of digital signatures for non-repudiation of creation of a document.
signatures
Describes the concepts and principles ICT readiness for business
Guidelines for ICT
continuity, and provides a framework of methods and processes to
ISO/IEC 27031 readiness for business 1st ed. 2011
identify and specify all aspects for improving an organization's ICT
continuity
readiness to ensure business continuity.
Provides guidance for improving the state of Cybersecurity, drawing
Guidelines for out the unique aspects of that activity and its dependencies on other
ISO/IEC 27032 1st ed. 2012
cybersecurity security domains. It covers the baseline security practices for
stakeholders in the Cyberspace.
5
5
WG 4 Products
Standard Title Status Abstract
Guidance on assuring
Provides guidance on mechanisms for ensuring that methods and
suitability and adequacy
ISO/IEC 27041 1st Ed. 2015 processes used in the investigation of Information Security Incidents
of incident investigative
are “fit for purpose”.
methods
Guidelines for the
Provides guidance on the analysis and interpretation of digital
analysis and
ISO/IEC 27042 1st ed. 2015 evidence in a manner which addresses issues of continuity, validity,
interpretation of digital
reproducibility and repeatability.
evidence
Provides guidelines that encapsulate idealized models for common
Incident investigation
ISO/IEC 27043 1st ed. 2015 incident investigation processes across various incident investigation
principles and processes
scenarios involving digital evidence.
This Technical Report explains how to provide and use time-stamping
Best practice on the services so that time-stamp tokens are effective when used to provide
ISO/IEC TR 29149 provision and use of time- 1st ed. 2012 timeliness and data integrity services, or non-repudiation services (in
stamping services conjunction with other mechanisms). It covers time-stamp services,
explaining how to generate, renew, and verify time-stamp tokens.
5
9
WG 4 Projects
Standard Title Status Abstract
Information security Presents basic concepts and phases of information security incident
incident management – management and combines these concepts with principles in a
ISO/IEC 27035-1 DIS
Part 1: Principles of structured approach to detecting, reporting, assessing, and
incident management responding to incidents, and applying lessons learnt.
Information security
incident management – Describes how to plan and prepare for incident response. This part
ISO/IEC 27035-2 Part 2: Guidelines to DIS covers the “Plan and Prepare” and “Lessons Learnt” phases of the
plan and prepare for model presented in Part 1.
incident response
Information security Includes staff responsibilities and operational incident response
incident management – activities across the organization. Particular focus is given to the
ISO/IEC TS 27035-3 Part 3: Guidelines for 1st PDTS incident response team activities including monitoring, detection,
incident response analysis, and response activities for the collected data or security
operations events.
Information security for
supplier relationships –
Define guidelines supporting the implementation of Information
ISO/IEC 27036-4 Part 4: Guidelines for 2nd CD
Security Management for the use of cloud service.
security of cloud
services
Cloud computing –
Specifies the Security and Privacy aspects of Service Level
Service level agreement
ISO/IEC 19086-4 1st WD Agreements (SLA) for cloud services including requirements and
(SLA) framework – Part
guidance.
4: Security and privacy
6
2
WG 4 Projects
Standard Title Status Abstract
Provides an overview of electronic discovery. In addition, it defines
Electronic discovery –
related definitions and describes the concepts, including, but not
ISO/IEC 27050-1 Part 1: Overview and 3rd CD
limited to identification, preservation, collection, processing, review,
concepts
analysis, and production of Electronically Stored Information (ESI).
Electronic discovery –
Provides guidance for technical and non-technical personnel at
Part 2: Guidance for
senior levels within an organization, including those with
ISO/IEC 27050-2 governance and 4th WD
responsibility for compliance with regulatory requirements, industry
management of
standards and, in some jurisdictions, legal requirements.
electronic discovery
Provides requirements and guidance on activities in electronic
Electronic discovery –
discovery, including, but not limited to identification, preservation,
ISO/IEC 27050-3 Part 3: Code of Practice 4th WD
collection, processing, review, analysis, and production of
for electronic discovery
Electronically Stored Information (ESI)
Electronic discovery – Provides guidance on the ways an organization can plan and prepare
ISO/IEC 27050-4 Part 4: ICT readiness for 4th WD for, and implement, electronic discovery from the perspective of
electronic discovery both technology and processes.
6
3
WG 4 Future Considerations
Topics Status
SC 27 WG 5 Mission
ISO/IEC 24760-1
• defines terms for identity management, and
• specifies core concepts of identity and identity management and
their relationships.
st To address the need to efficiently and effectively implement systems
1 ed. 2011
that make identity-based decisions ISO/IEC 24760 specifies a
framework for the issuance, administration, and use of data that
Freely available
A framework for identity serves to characterize individuals, organizations or information
via
management – technology components which operate on behalf of individuals or
ISO/IEC 24760-1 http://standard
Part 1: Terminology and organizations.
s.iso.org/ittf/Pu
concepts ISO/IEC 24760 specifies fundamental concepts and operational
bliclyAvailableS
structures of identity management with the purpose to realize
tandards/index.
information system management so that information systems can
html
meet business, contractual, regulatory and legal obligations.
ISO/IEC 24760-1 specifies the terminology and concepts for identity
management, to promote a common understanding in the field of
identity management. It also provides a bibliography of documents
related to standardization of various aspects of identity management.
ISO/IEC 24760-2
A framework for • provides guidelines for the implementation of systems for the
identity management – management of identity information, and
st
ISO/IEC 24760-2 Part 2: Reference 1 ed. 2015 • specifies requirements for the implementation and operation of a
architecture and framework for identity management.
requirements ISO/IEC 24760-2 is applicable to any information system where
information relating to identity is processed or stored.
6
7
WG 5 Products
Standard Title Status Abstract
Standing
WG 5 Roadmap
Document 1
Standing Freely available via www.JTC
Privacy references list
Document 2 1SC 27.din.de/en
Standing Freely available via www.JTC
Standards privacy assessment
Document 4 1SC 27.din.de/en
Standing
Guidelines on the application of ISMS in the area of privacy
Document 5
7
0
WG 5 Projects
Project Title Status
On the adoption and usage of ISO/IEC 29115 and its interaction with ISO/IEC
Study Period Starting
29003
Study Period Anonymous attribute assurance Starting
7
1