Information technology — Security techniques — Information security management systems — Requirements- Performance evaluation
信息安全管理体系要求-绩效评价
8Performance evaluation
8绩效评价
8.1 Monitoring, measurement, analysis and evaluation
8.1 监视、测量、分析和评价
The organization shall determine:
a) what needs to be monitored and measured, including information security processes and controls;
b) the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid results. The methods selected should produce comparable and reproducible results to be considered valid;
c) when the monitoring and measuring shall be performed;
d) who shall monitor and measure;
e) when the results from monitoring and measurement shall be analysed and evaluated;
f) who shall analyse and evaluate these results.
组织应确定:
a) 需要监控和测量的内容,包括信息安全过程和控制措施;
b) 监视、测量、分析和评价的方法,适用时,确保结果有效;选择的方法最好产生可比较和可再现的结果,这样才能被认为是有效的。
c) 什么时候应执行监视和测量;
d) 谁应实施监视和测量;
e) 什么时候应对监视和测量的结果进行分析和评价;
f) 谁应分析和评价这些结果。
Documented information shall be available as evidence of the results.
组织应保留适当的文件记录信息作为监视和测量结果的证据。
The organization shall evaluate the information security performance and the effectiveness of the information security management system.
组织应对信息安全管理体系的信息安全性能和有效性进行评价。
8.2 Internal audit
8.2 内部审核
8.2.1 General
8.2.1 总则
The organization shall conduct internal audits at planned intervals to provide information on whether the information security management system:
组织应按计划的时间间隔进行内部审核,以提供信息确定信息安全管理体系是否:
a) conforms to
1) the organization’s own requirements for its information security management system;
2) the requirements of this document;
b) is effectively implemented and maintained.
a) 符合
1) 组织自身信息安全管理体系的要求;
2) 本标准的要求;
b) 得到有效的实施和保持。
温馨提示:获取完整版ISO27001最新2022版中英文对照资料,可咨询中培课程顾问或拨打客服电话了解18513851518