ETSI GS ISI 001-2 V1.1.2 (2015-06)
Current
The latest, up-to-date edition.
Information Security Indicators (ISI); Indicators (INC); Part 2: Guide to select operational indicators based on the full set given in part 1
Hardcopy , PDF
English
01-06-2015
Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Position GS ISI 001-1 within the framework
of ISO/IEC 27001 to 27008
5 Position GS ISI 001-1 against COBIT
and ISO/IEC 20000
6 Different other useful cross-references
Annex A (normative) - Position the proposed operational
indicators against ISO/IEC 27002 control areas
and ISO/IEC 27006 technical control areas (Summary
table)
Annex B (informative) - Position the proposed operational
indicators against COBIT V4.1 DS5 Control Objectives
(Summary table)
Annex C (informative) - Position the proposed operational
indicators against CAG V4.0 framework 20 Critical
Controls (Summary table)
Annex D (informative) - Authors & contributors
Annex E (informative) - Bibliography
History
Gives a guide to use the range of indicators provided in GS ISI 001-1.
| DocumentType |
Standard
|
| Pages |
27
|
| PublisherName |
European Telecommunications Standards Institute
|
| Status |
Current
|
| ETSI GS ISI 003 V1.2.1 (2018-01) | Information Security Indicators (ISI); Key Performance Security Indicators (KPSI) to evaluate the maturity of security event detection |
| ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
| ISO/IEC 27035:2011 | Information technology — Security techniques — Information security incident management |
| ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
| ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
| ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 20000-1:2011 | Information technology — Service management — Part 1: Service management system requirements |
| ISO/IEC 20000-2:2012 | Information technology — Service management — Part 2: Guidance on the application of service management systems |
| ISO/IEC TR 19791:2010 | Information technology — Security techniques — Security assessment of operational systems |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| ETSI GS ISI 003 V1.1.2 (2014-06) | Information Security Indicators (ISI); Key Performance Security Indicators (KPSI) to evaluate the maturity of security event detection |
| ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
| ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing |
| ISO/TR 17791:2013 | Health informatics — Guidance on standards for enabling safety in health software |
| ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.