{"id":2137,"date":"2014-08-09T13:24:07","date_gmt":"2014-08-09T04:24:07","guid":{"rendered":"https:\/\/www.ismwebstore.com\/materials\/?p=2137"},"modified":"2016-10-23T09:35:25","modified_gmt":"2016-10-23T00:35:25","slug":"iso270012013%e3%80%80%e9%99%84%e5%b1%9e%e6%9b%b8a%e3%80%80%e4%b8%80%e8%a6%a7-%ef%bc%88%e3%82%a4%e3%83%a9%e3%82%b9%e3%83%88%e3%81%a4%e3%81%8d%ef%bc%89","status":"publish","type":"post","link":"https:\/\/www.ismwebstore.com\/materials\/archives\/2137","title":{"rendered":"ISO\/IEC 27001:2013\u9644\u5c5e\u66f8A\u306e\u30a4\u30e9\u30b9\u30c8\u4ed8\u304d\u4e00\u89a7"},"content":{"rendered":"<p>ISMS\u306e\u8a8d\u8a3c\u53d6\u5f97\u898f\u683c\u3067\u3042\u308b\u300cISO\/IEC 27001:2013\uff08JIS Q 27001:2014\uff09\u300d\u306e\u9644\u5c5e\u66f8A\u3092\u3001\u30a4\u30e9\u30b9\u30c8\u3068\u3068\u3082\u306b\u4e00\u89a7\u306b\u3057\u3066\u307f\u307e\u3057\u305f\u3002<\/p>\n<p>\u9644\u5c5e\u66f8A\u306f\u3001\u65e7\u898f\u683c\uff08ISO\/IEC 27001:2005\uff09\u306e11\u306e\u7b87\u6761\u300139\u306e\u7ba1\u7406\u76ee\u7684\u3001133\u306e\u7ba1\u7406\u7b56\u304b\u3089\u300114\u306e\u7b87\u6761\u300135\u306e\u7ba1\u7406\u76ee\u7684\u3001114\u306e\u7ba1\u7406\u7b56\u3068\u5909\u66f4\u306b\u306a\u308a\u307e\u3057\u305f\u3002<\/p>\n<p>\u591a\u304f\u306e\u7ba1\u7406\u7b56\u306f\u3001\u65e7\u898f\u683c\u306e\u7ba1\u7406\u7b56\u3092\u7d99\u627f\u3057\u3066\u304a\u308a\u3001\u8868\u984c\u304a\u3088\u3073\u7ba1\u7406\u7b56\u304c\u3001\u307b\u307c\u540c\u4e00\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u304c\u3001\u65b0\u898f\u683c\u3067\u306f\u3001\u65b0\u3057\u3044\u52d5\u5411\u3084\u6982\u5ff5\u3082\u53d6\u308a\u5165\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u307e\u305f\u3001ISO\/IEC 27002\uff1a2013\u3067\u306f\u3001\u305d\u306e\u8868\u984c\u304b\u3089\u3082\u5206\u304b\u308b\u3088\u3046\u306b\u3001\u3088\u308a\u7ba1\u7406\u7b56\u304c\u4e3b\u984c\u3067\u3042\u308b\u3053\u3068\u304c\u660e\u793a\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Information technology \u2013 Security techniques &#8211; Code of practice for information security <strong>controls<\/strong><br \/>\n\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<strong>\u7ba1\u7406\u7b56<\/strong>\u306e\u5b9f\u8df5\u306e\u305f\u3081\u306e\u898f\u7bc4<br \/>\n(\u3061\u306a\u307f\u306b\u3001\u65e7\u7248\u3067\u306f\u300cInformation technology \u2013 Security techniques &#8211; Code of practice for information security <strong>management<\/strong>\u300d)<\/p>\n<p><!--more--><br \/>\n<a href=\"https:\/\/www.ismwebstore.com\/materials\/wp-content\/themes\/style\/images\/ISO27001.2013.annexA.pdf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.ismwebstore.com\/materials\/wp-content\/uploads\/2014\/08\/ISO27001.2013.annexA.jpg\" alt=\"ISO27001.2013.annexA\" width=\"655\" height=\"931\" class=\"aligncenter size-full wp-image-2138\" srcset=\"https:\/\/www.ismwebstore.com\/materials\/wp-content\/uploads\/2014\/08\/ISO27001.2013.annexA.jpg 655w, https:\/\/www.ismwebstore.com\/materials\/wp-content\/uploads\/2014\/08\/ISO27001.2013.annexA-211x300.jpg 211w, https:\/\/www.ismwebstore.com\/materials\/wp-content\/uploads\/2014\/08\/ISO27001.2013.annexA-119x170.jpg 119w\" sizes=\"(max-width: 655px) 100vw, 655px\" \/><\/a><\/p>\n<p class=\"mt-2\" style=\"margin-bottom:10px;\"><strong>\u25a0ISO\/IEC 27001:2013 AnnexA 14\u306e\u7b87\u6761<\/strong><\/p>\n<p>5 \u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u65b9\u91dd\u7fa4\u3000\uff08\u65e7\u30005\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u672c\u65b9\u91dd\uff09<br \/>\n6 \u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u7d44\u7e54\u3000\uff08\u65e7\u30006\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u7d44\u7e54\uff09<br \/>\n7 \u4eba\u7684\u8cc7\u6e90\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3000\uff08\u65e7\u30007\u8cc7\u7523\u306e\u7ba1\u7406\uff09<br \/>\n8 \u8cc7\u7523\u306e\u7ba1\u7406\u3000\uff08\u65e7\u30008\u4eba\u7684\u8cc7\u6e90\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff09<br \/>\n9 \u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u3000\uff08\u65e7\u300011\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff09<br \/>\n10 \u6697\u53f7\u3000\uff08\u65e7\u300012\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u306e\u53d6\u5f97\u3001\u958b\u767a\u53ca\u3073\u4fdd\u5b88\uff09<br \/>\n11 \u7269\u7406\u7684\u53ca\u3073\u74b0\u5883\u7684\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3000\uff08\u65e7\u30009\u7269\u7406\u7684\u53ca\u3073\u74b0\u5883\u7684\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff09<br \/>\n12 \u904b\u7528\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3000\uff08\u65e7\u300010\u901a\u4fe1\u53ca\u3073\u904b\u7528\u7ba1\u7406\uff09<br \/>\n13 \u901a\u4fe1\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3000\uff08\u65e7\u300010\u901a\u4fe1\u53ca\u3073\u904b\u7528\u7ba1\u7406\uff09<br \/>\n14 \u30b7\u30b9\u30c6\u30e0\u306e\u53d6\u5f97\u3001\u958b\u767a\u53ca\u3073\u4fdd\u5b88\u3000\uff08\u65e7\u300012\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u306e\u53d6\u5f97\u3001\u958b\u767a\u53ca\u3073\u4fdd\u5b88\uff09<br \/>\n15 \u4f9b\u7d66\u8005\u95a2\u4fc2<br \/>\n16 \u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u7ba1\u7406\u3000\uff08\u65e7\u300013\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u7ba1\u7406\uff09<br \/>\n17 \u4e8b\u696d\u7d99\u7d9a\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5074\u9762\u3000\uff08\u65e7\u300014\u4e8b\u696d\u7d99\u7d9a\u7ba1\u7406\uff09<br \/>\n18 \u9806\u5b88\u3000\uff08\u65e7\u300015\u9806\u5b88\uff09<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISMS\u8a8d\u8a3c\u898f\u683c ISO\/IEC 27001:2013\uff08JIS Q 27001:2014\uff09\u306e\u9644\u5c5e\u66f8A\u3092\u30a4\u30e9\u30b9\u30c8\u4ed8\u304d\u3067\u5206\u304b\u308a\u3084\u3059\u304f\u4e00\u89a7\u5316\u300214\u306e\u7b87\u6761\u300135\u306e\u7ba1\u7406\u76ee\u7684\u3001114\u306e\u7ba1\u7406\u7b56\u306b\u3064\u3044\u3066\u3001\u65e7\u898f\u683c\u3068\u306e\u5909\u66f4\u70b9\u3084\u65b0\u898f\u683c\u306e\u30dd\u30a4\u30f3\u30c8\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002\u7ba1\u7406\u7b56\u306e\u5168\u4f53\u50cf\u3092\u76f4\u611f\u7684\u306b\u628a\u63e1\u3057\u3001\u793e\u5185\u6559\u80b2\u3084\u898f\u5b9a\u7b56\u5b9a\u306b\u6d3b\u7528\u3057\u305f\u3044\u62c5\u5f53\u8005\u5fc5\u643a\u306e\u8cc7\u6599\u3067\u3059\u3002<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-2137","post","type-post","status-publish","format-standard","hentry","category-isms"],"aioseo_notices":[],"modified_by":"ISM Web store \u30ab\u30b9\u30bf\u30de\u30fc\u30b5\u30dd\u30fc\u30c8","views":50583,"_links":{"self":[{"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/posts\/2137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/comments?post=2137"}],"version-history":[{"count":19,"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/posts\/2137\/revisions"}],"predecessor-version":[{"id":2532,"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/posts\/2137\/revisions\/2532"}],"wp:attachment":[{"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/media?parent=2137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/categories?post=2137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ismwebstore.com\/materials\/wp-json\/wp\/v2\/tags?post=2137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}