Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security

ISO/IEC 27033-2:2012 gives guidelines for organizations to plan, design, implement and document network security.

Technologies de l'information — Techniques de sécurité - Sécurité de réseau — Partie 2: Lignes directrices pour la conception et l'implémentation de la sécurité de réseau

General Information

Status
Published
Publication Date
26-Jul-2012
Current Stage
9060 - Close of review
Start Date
04-Mar-2029
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 27033-2:2012 - Information technology -- Security techniques -- Network security
English language
28 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 27033-2
First edition
2012-08-01
Corrected version
2012-08-15

Information technology — Security
techniques — Network security
Part 2:
Guidelines for the design and
implementation of network security
Technologies de l'information — Techniques de sécurité — Sécurité de
réseau
Partie 2: Lignes directrices pour la conception et l'implémentation de la
sécurité de réseau




Reference number
ISO/IEC 27033-2:2012(E)
©
ISO/IEC 2012

---------------------- Page: 1 ----------------------
ISO/IEC 27033-2:2012(E)

COPYRIGHT PROTECTED DOCUMENT


©  ISO/IEC 2012
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 27033-2:2012(E)
Contents Page
Foreword . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviations . 2
5 Document structure . 2
6 Preparing for design of network security . 3
6.1 Introduction . 3
6.2 Asset identification . 3
6.3 Requirements collection . 3
6.3.1 Legal and regulatory requirements . 3
6.3.2 Business requirements . 4
6.3.3 Performance requirements . 4
6.4 Review requirements . 4
6.5 Review of existing designs and implementations . 5
7 Design of network security . 5
7.1 Introduction . 5
7.2 Design principles . 6
7.2.1 Introduction . 6
7.2.2 Defence in depth . 6
7.2.3 Network Zones . 7
7.2.4 Design resilience . 7
7.2.5 Scenarios . 8
7.2.6 Models and Frameworks. 8
7.3 Design Sign off .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.