【正文】
...........................................17 Protecting the Host.......................................................................................17 Protecting the Application .............................................................................17 Software Development .................................................................................17 iv Security Management Protecting the Data ......................................................................................17 Physical Defense ..........................................................................................18 Policies, Procedures, and Awareness .............................................................18 Processes and Activities ...................................................................................... 21 Overview............................................................................................................21 Process Flow Summary.................................................................................21 Establishing an Organizational Security Policy ...............................................21 Establishing a Security Risk Management Process .........................................22 Establishing a Security Monitoring and Security Auditing Process ..................22 Establishing an Incident Response Process....................................................22 Establishing an Organizational Security Policy .....................................................23 Security Vision and Mission...........................................................................24 Inputs to Policies ..........................................................................................25 Data Classification ........................................................................................27 Policy Planning .............................................................................................31 Roles and Responsibilities .............................................................................33 Awareness ...................................................................................................36 Summary .....................................................................................................37 Establishing a Security Risk Management Process ...............................................38 Assessing Risk..............................................................................................39 Conducting Decision Support ........................................................................41 Implementing Controls .................................................................................42 Measuring Program Effectiveness..................................................................43 Summary .....................................................................................................45 Establishing a Security Monitoring and Security Auditing Process ........................46 Security Monitoring ......................................................................................46 Security Auditing ..........................................................................................53 Summary .....................................................................................................56 Establishing an Incident Response Process..........................................................57 User Reporting Responsibilities .....................................................................57 Escalation to Incident Response Team ..........................................................58 Incident Assessment ....................................................................................59 Summary .....................................................................................................60 Relationship to ITIL, ISO 17799:20xx, and Microsoft SMFs ............................ 61 Industry Standards.............................................................................................62 ITIL..............................................................................................................62 ISO 17799:20xx ..........................................................................................62 Related Microsoft SMFs.......................................................................................62 Service Management Function v Availability Management SMF .......................................................................62 Change Management SMF ............................................................................63 Incident Management SMF ...........................................................................63 Problem Management SMF ...........................................................................63 IT Service Continuity Management SMF ........................................................64 Service Desk SMF.........................................................................................64 Service Level Management SMF....................................................................64 Service Monitoring and Control SMF..............................................................64 Security Risk Management Guide........................................................................65 Key Performance Indicators ............................................................................... 67 Hierarchical Key Performance Indicators .............................................................68 Measuring Key Performance Indicators ...............................................................69 Security Audit Results ..................................................................................69 User Surveys.........................................................................................