|
US$774.00 · In stock Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 25067-2020: Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems Status: Valid GB/T 25067: Evolution and historical versions
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 25067-2020 | English | 774 |
Add to Cart
|
6 days [Need to translate]
|
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
| Valid |
GB/T 25067-2020
|
| GB/T 25067-2016 | English | RFQ |
ASK
|
3 days [Need to translate]
|
Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems
| Obsolete |
GB/T 25067-2016
|
| GB/T 25067-2010 | English | RFQ |
ASK
|
4 days [Need to translate]
|
Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems
| Obsolete |
GB/T 25067-2010
|
PDF similar to GB/T 25067-2020
Basic data | Standard ID | GB/T 25067-2020 (GB/T25067-2020) | | Description (Translated English) | Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 41,472 | | Date of Issue | 2020-04-28 | | Date of Implementation | 2020-11-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 25067-2020: Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
ICS 35.040
L80
National Standards of People's Republic of China
Replace GB/T 25067-2016
Information technology security technology information security management system audit and certification body requirements
2020-04-28 released
2020-11-01 implementation
State Administration for Market Regulation
Issued by the National Standardization Management Committee
Table of contents
Preface Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Principle 1
5 General requirements 1
5.1 Legal and contractual matters1
5.2 Fair management 1
5.3 Responsibility and financial resources 2
6 Structural requirements 2
7 Resource requirements 2
7.1 Personnel capacity 2
7.2 Personnel involved in certification activities 5
7.3 Use of external auditors and external technical experts 6
7.4 Personnel records 6
7.5 Outsourcing 6
8 Information requirements 6
8.1 Public information 6
8.2 Certification documents 6
8.3 Reference to certification and use of mark 6
8.4 Confidentiality 7
8.5 Information exchange between the certification body and its clients 7
9 Process requirements 7
9.1 Pre-certification activities 7
9.2 Planning audit 9
9.3 Initial certification 10
9.4 Conduct audit 11
9.5 Certification decision 12
9.6 Maintain certification 12
9.7 Appeal 13
9.8 Complaints 13
9.9 Customer records 13
10 Management system requirements for certification bodies 14
10.1 Optional method 14
10.2 Method A. General management system requirements 14
10.3 Method B. Management system requirements consistent with GB/T 19001 14
Appendix A (informative appendix) ISMS audit and certification knowledge and skills 15
Appendix B (Normative Appendix) Audit Time 17
Appendix C (informative appendix) Audit time calculation method 21
Appendix D (informative appendix) Guidelines for the review of the implemented controls in Appendix A of GB/T 22080-2016 25
Reference 36
Information Technology Security Technology Information Security Management System
Audit and certification agency requirements
1 Scope
This standard, on the basis of GB/T 27021.1-2017 and GB/T 22080-2016, provides for organizations that implement ISMS audit and certification
The requirements are specified and guidelines are provided. The main purpose of this standard is to provide support for the accreditation of ISMS certification bodies.
Any organization that provides ISMS certification needs to prove that it meets the requirements of this standard in terms of capability and reliability. In this standard
The guide provides further explanation of these requirements.
Note. This standard can be used as a standard document for accreditation, peer review or other review processes.
2 Normative references
The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GB/T 22080-2016 Information Technology Security Technology Information Security Management System Requirements (ISO /IEC 27001.2013, IDT)
GB/T 27021.1-2017 Conformity Assessment Management System Audit and Certification Bodies Requirements Part 1.Requirements (ISO /IEC 17021-1.2015, IDT)
ISO /IEC 27000 Information Technology Security Technology Information Security Management System Overview and Vocabulary
3 Terms and definitions
The following terms and definitions defined by GB/T 27021.1-2017 and ISO /IEC 27000 apply to this document.
3.1
Certification documents
A class of documents indicating that the customer’s ISMS complies with the specified ISMS standards and any supplementary documents required by the ISMS.
4 principles
The principles in Chapter 4 of GB/T 27021.1-2017 apply.
5 General requirements
5.1 Legal and contract matters
The requirements of 5.1 in GB/T 27021.1-2017 apply.
5.2 Fair management
The requirements of 5.2 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
5.2.1 IS5.2 Conflict of Interest
The certification body can perform the following tasks and will not be considered as consulting or having a potential conflict of interest.
a) Arrange training courses and participate in teaching. If these courses involve information security management, related management systems or audits, certification
The organization should be limited to providing publicly available general information and advice, that is, the certification body should not provide
Counter the suggestion required by b) below.
b) Upon request, provide or publish explanatory information (see 9.1.3.6) required by the certification body for certification audit standards.
c) Pre-audit activities are only for the purpose of determining whether the certification audit is ready, but these activities should not lead to the provision of advice that violates this clause.
Discussions and opinions. The certification body shall be able to verify that these activities do not violate the requirements of this clause and that these activities are not considered to be reduced
Reasons for the final certification audit time.
d) Implement second-party audits or third-party audits in accordance with standards or regulations outside the scope of accreditation.
e) Value-added activities in the certification audit and supervisory audit process, for example, in the audit process, when opportunities for improvement are obvious, identify improvements
Opportunities but do not recommend specific solutions.
Certification bodies should not provide internal information security reviews for ISMS clients seeking certification. In addition, the certification body should be independent of providing
ISMS internal audit organization (including any individual).
5.3 Responsibility and financial resources
The requirements of 5.3 in GB/T 27021.1-2017 apply.
6 Structural requirements
The requirements of Chapter 6 in GB/T 27021.1-2017 apply.
7 Resource requirements
7.1 Personnel ability
The requirements of 7.1 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
7.1.1 IS7.1.1 General considerations
7.1.1.1 General capability requirements
The certification body shall ensure that it has the latest technical knowledge and knowledge of laws and regulations related to the assessed customer ISMS.
The certification body shall determine the competence requirements for each certification function in accordance with Table A.1 of GB/T 27021.1-2017.The certification body should consider
GB/T 27021.1-2017 and 7.1.2 and 7.2.1, related to the ISMS technical field determined by the certification body
All requirements.
Appendix A summarizes the competence requirements of personnel for specific certification functions.
7.1.2 IS7.1.2 Determination of competence criteria
7.1.2.1 Capability requirements for ISMS audit
7.1.2.1.1 General requirements
The certification body shall have criteria for verifying the background experience, specific training or description of the audit team members to ensure that the audit team has at least.
a) Knowledge of information security;
b) Technical knowledge related to the audited activity;
c) Knowledge of the management system;
d) Knowledge of audit principles;
Note. For further information on audit principles, see ISO 19011.
e) Knowledge of ISMS monitoring, measurement, analysis and evaluation.
Except for b) that can be shared among auditors who are members of the audit team, the above a) ~ e) apply to all auditors who are members of the audit team.
The audit team shall be able to trace the signs of information security incidents in the customer’s ISMS to the corresponding elements of the ISMS.
The audit team should have appropriate work experience on the above knowledge items and have actually applied these knowledge items (this does not mean that an auditor needs to
It must have comprehensive experience in all areas of information security, but the audit team as a whole should have sufficient knowledge and experience in the area being audited).
7.1.2.1.2 Information security management terms, principles, practices and technologies
All members of the audit team as a whole should have the following knowledge.
a) The structure, hierarchy and interrelationship of ISMS specific documents;
b) Tools, methods, techniques and applications related to information security management;
c) Information security risk assessment and risk management;
d) ISMS applicable process;
e) Current technologies that may be related to information security or may face information security issues.
Each auditor should meet a), c) and d).
7.1.2.1.3 Information security management system standards and normative documents
Auditors participating in ISMS audits should have the following knowledge.
a) All requirements of GB/T 22080-2016;
All members of the audit team as a whole should have the following knowledge.
b) All controls and their implementation in GB/T 22081 (if necessary, it can also be derived from specific industry standards). These controls are divided into the following categories.
1) Information security strategy;
2) Information security organization;
3) Human resource security;
4) Asset management;
5) Access control, including authorization;
6) Password;
7) Physical and environmental safety;
8) Operational safety, including IT services;
9) Communication security, including network security management and information transmission;
10) System acquisition, development and maintenance;
11) Supplier relationships, including outsourcing services;
12) Information security incident management;
13) Information security aspects of business continuity management, including redundancy;
14) Compliance, including information security review.
7.1.2.1.4 Business management practices
Auditors participating in ISMS audits should have the following knowledge.
a) Information security best practices and information security regulations of the industry;
b) Information security strategy and business requirements;
c) The concept and practice of general business management, as well as the interrelationship between policies, goals and results;
d) Management process and related terms.
Note. These processes also include human resource management, internal communication, external communication and other related support processes.
7.1.2.1.5 Customer’s business areas
Auditors participating in ISMS audits should have the following knowledge.
a) The legal and regulatory requirements for specific information security fields, regions and jurisdictions;
Note. Having the knowledge required by laws and regulations does not mean having a deep legal background.
b) Information security risks related to business areas;
c) General terminology, process and technology related to the customer's business area;
d) Practice in related business areas.
Among them, a) can be shared within the audit group.
7.1.2.1.6 Customer's products, processes and organization
All members of the audit team as a whole should have the following knowledge.
a) The impact of organization type, size, governance, structure, functions and relationships on the development and implementation of ISMS and certification activities, including outsourcing;
b) Complex operations in a broad sense;
c) The legal and regulatory requirements applicable to the product or service.
7.1.2.2 Competence requirements for leading the ISMS audit team
In addition to the requirements in 7.1.2.1, the audit team leader should also meet the following requirements, and they should be included in the audit with guidance and supervision
Confirm.
a) Have the knowledge and skills to manage the certification audit process and the audit team;
b) Possess effective oral and written communication skills.
7.1.2.3 Ability requirements for implementing application review
7.1.2.3.1 Information security management system standards and normative documents
The personnel who conduct the application review to determine the required audit team capabilities, select the audit team members and determine the audit time should have the following knowledge.
a) Related ISMS standards and other normative documents used in the certification process.
7.1.2.3.2 Customer's business areas
The personnel who conduct the application review to determine the required audit team capabilities, select the audit team members and determine the audit time should have the following knowledge.
a) General terms, processes, technologies and risks related to the customer's business area.
7.1.2.3.3 Customer's products, processes and organization
The personnel who conduct the application review to determine the required audit team capabilities, select the audit team members and determine the audit time should have the following knowledge.
a) The relationship between customer products, processes, organizational types, scale, governance, structure, functions, and the development and implementation of ISMS and certification activities, including outsourced functions.
7.1.2.4 Ability requirements for reviewing audit reports and making certification decisions
7.1.2.4.1 General
The personnel who review the audit report and make certification decisions should have the knowledge to enable them to verify the suitability of the certification scope and the scope of changes to
And the impact of changes on the effectiveness of the audit, especially the continued effectiveness and corresponding risks of identifying interfaces and dependencies.
In addition, the person who reviews the audit report and makes a certification decision should have the following knowledge.
a) General management system;
b) Audit process and procedures;
c) Audit principles, practices and techniques.
7.1.2.4.2 Information security management terms, principles, practices and technologies
The person who reviews the audit report and makes a certification decision should have the following knowledge.
a) Items listed in a), c), and d) in 7.1.2.1.2;
b) Legal and regulatory requirements related to information security.
7.1.2.4.3 Information security management system standards and normative documents
The person who reviews the audit report and makes a certification decision should have the following knowledge.
a) Related ISMS standards and other normative documents used in the certification process.
7.1.2.4.4 Customer's business areas
The person who reviews the audit report and makes a certification decision should have the following knowledge.
a) General terminology and risks related to practices in related business areas.
7.1.2.4.5 Customer's products, processes and organization
The person who reviews the audit report and makes a certification decision should have the following knowledge.
a) The customer's product, process, organization type, scale, governance, structure, function and relationship.
7.2 People involved in certification activities
The requirements of 7.2 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
7.2.1 IS7.2 confirms the auditor’s knowledge and experience
The certification body shall verify the auditor's knowledge and experience through the following aspects.
a) Recognized ISMS specific qualifications;
b) Register as an auditor when applicable;
c) Participate in ISMS training courses and obtain relevant personal certificates;
d) The latest continuous professional development record;
e) Witness the ISMS audit by another ISMS auditor.
7.2.1.1 Selection of auditors
In addition to 7.1.2.1, the criteria for selecting auditors should ensure that each auditor.
a) Possess professional education or training equivalent to university education.
b) Have at least 4 years of full-time practical work experience in information technology, of which at least 2 years of work experience
All related duties or functions.
c) Successfully complete at least 5 days of training, the scope of training includes ISMS audit and audit management.
d) Have gained experience in the entire information security assessment process before being assigned auditor responsibilities. Should participate in at least 4 times, total days
ISMS certification audits (including recertification audits and surveillance audits) for at least 20 days (of which up to 5 days can be
Nuclear) to gain this experience. When participating in the audit, it should include review documents and risk assessment, assess the implementation status and report the audit
Happening.
e) Have relevant and timely experience.
f) Through continuous professional development, keep current knowledge and skills in information security and auditing up to date.
Technical experts should meet criteria a), b) and e).
7.2.1.2 Selection of auditors to lead the audit team
In addition to 7.1.2.2 and 7.2.1.1, the criteria for selecting the auditor to lead the audit team should ensure that the auditor.
a) Have actively participated in all stages of at least 3 ISMS audits. When participating in the audit, the initial scope identification and strategy should be included.
Plan, review documents and risk assessment, evaluate implementation status and formally report audit status.
7.3 Use of external auditors and external technical experts
The requirements of 7.3 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
7.3.1 IS7.3 Use external auditors or external technical experts as part of the audit team
Technical experts should work under the supervision of auditors. 7.2.1.1 lists the minimum requirements for technical experts.
7.4 Personnel records
The requirements of 7.4 in GB/T 27021.1-2017 apply.
7.5 Outsourcing
The requirements of 7.5 in GB/T 27021.1-2017 apply.
8 Information requirements
8.1 Public information
The requirements of 8.1 in GB/T 27021.1-2017 apply.
8.2 Certification documents
The requirements of 8.2 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
8.2.1 IS8.2 IS8.2 ISMS certification documents
The certification document should be signed by the person responsible for this responsibility. The certification document shall include the version of the applicability statement.
Note. If the change in the applicability statement does not change the scope of control in the scope of certification, the certification certificate is not required to be updated.
Certification documents can also include identification of specific industry standards used.
8.3 Reference to certification and use of logo
The requirements of 8.3 in GB/T 27021.1-2017 apply.
8.4 Confidentiality
The requirements of 8.4 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
8.4.1 IS8.4 Acquisition of organization records
Before the certification audit, the certification body shall require the client to report whether there is any information that cannot be provided due to the confidentiality or sensitive information.
ISMS-related information (such as ISMS records or information about the design and effectiveness of controls) for the audit team to check. The certification body shall confirm
Determine whether the ISMS can be adequately audited in the absence of this information. If the certification body’s conclusion is that the
If confidential or sensitive information cannot be adequately audited for ISMS, the certification body should inform the client
The certification audit can only be conducted after obtaining the permit.
8.5 Information exchange between the certification body and its clients
The requirements of 8.5 in GB/T 27021.1-2017 apply.
9 Process requirements
9.1 Pre-certification activities
9.1.1 Application
The requirements of 9.1 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
9.1.1.1 IS9.1.1 application preparation
The certification body shall require the client to have a documented and implemented other that meets the requirements of GB/T 22080-2016 and certification
ISMS of his file.
9.1.2 Application review
The requirements of 9.1.2 in GB/T 27021.1-2017 apply.
9.1.3 Audit plan
The requirements of 9.1.3 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
9.1.3.1 IS9.1.3 General
The ISMS audit plan should consider the information security controls identified.
9.1.3.2 IS9.1.3 audit method
The procedures of the certification body shall not presuppose the special method of ISMS implementation or the special format of documents and records. The certification process should
The point is to determine that the customer’s ISMS meets the requirements of GB/T 22080-2016 and the customer’s strategy and goals.
Note. ISO /IEC 27007 gives further guidance on audits.
9.1.3.3 General preparation for IS9.1.3 initial audit
The certification body shall require the client to make all necessary arrangements for the review of internal audit reports and independent information security review reports. In certification
In the first stage of the audit, the client should provide at least the following information.
a) ISMS and general information about the activities it covers;
b) Copies of necessary ISMS documents specified in GB/T 22080-2016, and necessary related documents.
9.1.3.4 IS9.1.3 review cycle
If an ISMS has not performed at least one management review and internal audit covering the scope of certification, the certification body shall not
ISMS implements certification.
9.1.3.5 IS9.1.3 certification scope
The audit team shall audit the customer ISMS included in the determined scope in accordance with all applicable certification requirements. The certification body shall confirm
It is recognized that the customer meets the requirements of 4.3 in GB/T 22080-2016 within the scope of its ISMS.
The certification body shall ensure that. the customer's information security risk assessment and risk treatment accurately reflect its activities and extend to the scope of certification
The boundary defined by its activities. The certification body shall confirm that this is reflected in the client's ISMS scope and applicability statement. Certification
The organization shall verify that each certification scope has at least one applicability statement.
The certification body shall ensure that the interface with services or activities not fully covered by the ISMS has been obtained in the ISMS seeking certification
It has been included in the customer’s information security risk assessment. Sharing facilities with other institutions (e.g. IT systems, databases, communication systems
System or outsourcing a business function) is an example of this type of situation.
9.1.3.6 IS9.1.3 certification audit criteria
The criteria for customer ISMS to be audited should be ISMS standard GB/T 22080-2016.Other documents related to the functions performed
It can be used as a certification requirement.
9.1.4 Determine the audit time
The requirements of 9.1.4 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
9.1.4.1 IS9.1.4 audit time
The certification body shall give the auditor sufficient time to carry out all activities related to the initial audit, surveillance audit or recertification audit.
The calculation of the total audit time should include sufficient time for reporting the audit.
The certification body shall determine the audit time in accordance with Appendix B.
Note. Appendix C provides further guidance and examples for calculating audit time.
9.1.5 Sampling from multiple locations
The requirements of 9.1.5 in GB/T 27021.1-2017 apply. Also, the following requirements and guidelines apply.
9.1.5.1 IS9.1.5 Multi-location
9.1.5.1.1 When the customer has multiple sites that meet the following a) to c), the certification body may consider using sampling-based methods for multiple locations.
Site certification audit.
a) All sites operate under the same ISMS and the ISMS implements centralized and unified management, audit and management review;
b) All sites are included in the customer's ISMS internal audit program;
c) All sites are included in the customer’s ISMS management review plan.
9.1.5.1.2 When the certification body uses sampling-based methods, it shall have appropriate procedures to ensure.
a) In the initial contract review, to maximize the identification of differences between sites in order to determine the appropriate sampling level.
b) Based on the following factors, the certification body selects representative locations.
1) The results of internal audits at headquarters and other locations;
2) Results of management review;
3) The difference in the...
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 25067-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 25067-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 25067-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 25067-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB/T 25067-2020?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 25067-2020 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|