Information technology — Security techniques — Information security management systems — Requirements- Performance evaluation
信息安全管理體系要求-績效評價
8Performance evaluation
8績效評價
8.1 Monitoring, measurement, analysis and evaluation
8.1 監視、測量、分析和評價
The organization shall determine:
a) what needs to be monitored and measured, including information security processes and controls;
b) the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid results. The methods selected should produce comparable and reproducible results to be considered valid;
c) when the monitoring and measuring shall be performed;
d) who shall monitor and measure;
e) when the results from monitoring and measurement shall be analysed and evaluated;
f) who shall analyse and evaluate these results.
組織應確定:
a) 需要監控和測量的內容,包括信息安全過程和控制措施;
b) 監視、測量、分析和評價的方法,適用時,確保結果有效;選擇的方法最好產生可比較和可再現的結果,這樣才能被認為是有效的。
c) 什么時候應執行監視和測量;
d) 誰應實施監視和測量;
e) 什么時候應對監視和測量的結果進行分析和評價;
f) 誰應分析和評價這些結果。
Documented information shall be available as evidence of the results.
組織應保留適當的文件記錄信息作為監視和測量結果的證據。
The organization shall evaluate the information security performance and the effectiveness of the information security management system.
組織應對信息安全管理體系的信息安全性能和有效性進行評價。
8.2 Internal audit
8.2 內部審核
8.2.1 General
8.2.1 總則
The organization shall conduct internal audits at planned intervals to provide information on whether the information security management system:
組織應按計劃的時間間隔進行內部審核,以提供信息確定信息安全管理體系是否:
a) conforms to
1) the organization’s own requirements for its information security management system;
2) the requirements of this document;
b) is effectively implemented and maintained.
a) 符合
1) 組織自身信息安全管理體系的要求;
2) 本標準的要求;
b) 得到有效的實施和保持。
溫馨提示:獲取完整版ISO27001最新2022版中英文對照資料,可咨詢中培課程顧問或撥打客服電話了解18513851518