Objective: To ensure correct and
secure operations of information processing facilities.
7.1.1 Documented operating
procedures
Operating procedures should be documented and made available to relevant users.
7.1.2 Change management
Changes to the organization, business processes, information processing facilities and systems that affect information security should be controlled.
7.1.3 Capacity management
The use of resources should be monitored, tuned and projections made of future capacity requirements to ensure the required system performance.
7.1.4 Separation of development,
testing and operational environments
Development, testing, and operational environments should be separated to reduce the risks of unauthorized access or changes to the operational environment.
Objective: To ensure that
information and information processing facilities are protected against
malware.
7.2.1 Controls against malware
Detection, prevention and recovery controls to protect against malware should be implemented, combined with appropriate user awareness.
Objective: To protect against loss
of data.
7.3.1 Information backup
Backup copies of information, software and system images should be taken and tested regularly in accordance with an agreed backup policy.
Objective: To record events and
generate evidence.
7.4.1 Event logging
Event logs recording user activities, exceptions, faults and information security events should be produced, kept and regularly reviewed.
7.4.2 Protection of log
information
Logging facilities and log information should be protected against tampering and unauthorized access. System administrator and system operator activities should be logged and the logs protected and regularly reviewed.
7.4.3 Clock synchronisation
The clocks of all relevant information processing systems within an organization or security domain should be synchronised to a single reference time source.
Objective: To record events and
generate evidence.
7.5.1 Installation of software on
operational systems
Procedures should be implemented to control the installation of software on operational systems.
Objective: To prevent
exploitation of technical vulnerabilities.
7.6.1 Management of technical
vulnerabilities
Information about technical vulnerabilities of information systems being used should be obtained in a timely fashion, the organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk.
7.6.2 Restrictions on software
installation
Rules governing the installation of software by users should be established and implemented.
Objective: To minimise the impact
of audit activities on operational systems.
7.7.1 Information systems audit
controls
Audit requirements and activities involving verification of operational systems should be carefully planned and agreed to minimize disruptions to business processes.
created with
Static Website Generator .