ICS 35.030GBCCS L.80
ÖÐ »ªÈË Ãñ ¹²ºÍ ¹ú ¹ú¼Ò ±ê ×¼
GB/T 20984¡ª2022
´úÌæ GB/T 20984¡ª2007
ÐÅÏ¢°²È«¼¼Êõ ÐÅÏ¢°²È«·çÏÕÆÀ¹À·½·¨
Information security technology¡ªRisk assessment method for
information security
2022-04-15·¢²¼ 2022-11-01ʵʩ
¹ú¼ÒÊг¡¼à¶½¹ÜÀí×ַܾ¢ ²¼¹ú¼Ò±ê×¼»¯¹ÜÀíίԱ»á(GB/T 20984¡ª2022
Ä¿ ´Î
Ç°ÑÔ ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡I
1 ·¶Î§ ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 1
2 ¹æ·¶ÐÔÒýÓÃÎļþ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡1
3 ÊõÓïºÍ¶¨Òå¡¢ËõÂÔÓï¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 1
3.1 ÊõÓïºÍ¶¨Òå ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 1
3.2ËõÂÔÓï ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡2
4 ·çÏÕÆÀ¹À¿ò¼Ü¼°Á÷³Ì ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 2
4.1 ·çÏÕÒªËعØϵ ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 2
4.2 ·çÏÕ·ÖÎöÔÀí ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 3
4.3 ·çÏÕÆÀ¹ÀÁ÷³Ì¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡3
5 ·çÏÕÆÀ¹Àʵʩ ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 4
5.1 ·çÏÕÆÀ¹À×¼±¸¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡4
5.2 ·çÏÕʶ±ð ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡5
5.3 ·çÏÕ·ÖÎö¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡11
5.4 ·çÏÕÆÀ¼Û¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 11
5.5 ¹µÍ¨ÓëÐÉÌ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 13
5.6 ·çÏÕÆÀ¹ÀÎĵµ¼Ç¼¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 13
¸½Â¼A£¨×ÊÁÏÐÔ£© ÆÀ¹À¶ÔÏóÉúÃüÖÜÆÚ¸÷½×¶ÎµÄ·çÏÕÆÀ¹À¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 14
¸½Â¼B£¨×ÊÁÏÐÔ£© ·çÏÕÆÀ¹ÀµÄ¹¤×÷ÐÎʽ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 17
¸½Â¼C£¨×ÊÁÏÐÔ£© ·çÏÕÆÀ¹ÀµÄ¹¤¾ß¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 18
¸½Â¼D£¨×ÊÁÏÐÔ£© ×ʲúʶ±ð¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 21
¸½Â¼E£¨×ÊÁÏÐÔ£© Íþвʶ±ð¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 23
¸½Â¼F£¨×ÊÁÏÐÔ£© ·ïÏÕ¼ÆËãʾÀý¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 26
²Î¿¼ÎÄÏ× ¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡ 27GB/T 20984¡ª2022
Ç° ÑÔ
±¾Îļþ°´ÕÕGB/T1.1¡ª2020¡¶±ê×¼»¯¹¤×÷µ¼Ôò µÚ1²¿·Ö¡Ã±ê×¼»¯ÎļþµÄ½á¹¹ºÍÆð²Ý¹æÔò¡·µÄ¹æ
¶¨Æð²Ý¡£
±¾Îļþ´úÌæGB/T 20984¡ª2007¡¶ÐÅÏ¢°²È«¼¼ÊõÐÅÏ¢°²È«·çÏÕÆÀ¹À¹æ·¶¡·£¬ÓëGB/T 20984¡ª2007
Ïà±È£¬³ý½á¹¹µ÷ÕûºÍ±à¼ÐԸĶ¯Í⣬Ö÷Òª¼¼Êõ±ä»¯ÈçÏ¡Ã
a£©Ôö¼ÓÁË"ÒµÎñ"ºÍ"ÐÅϢϵͳÉúÃüÖÜÆÚ"<¼û3.4ºÍ 3.7£©;
b£©É¾³ýÁË"ÒµÎñÕ½ÂÔ"µÄÊõÓïºÍ¶¨Ò壨¼û 2007Äê°æµÄ3.4£©;
c£©É¾³ýÁË"×ʲú""×ʲú¼ÛÖµ""¿ÉÓÃÐÔ""±£ÃÜÐÔ""ÐÅϢϵͳ""ÍêÕûÐÔ""²ÐÓà·çÏÕ""°²È«Ê¼þ""Íþ
в"ºÍ"´àÈõÐÔ"µÄÊõÓïºÍ¶¨Ò壨¼û 2007Äê°æµÄ3.1¡¢3.2¡¢3.3¡¢3.5¡¢3.8¡¢3.10¡¢3.12¡¢3.14¡¢3.17ºÍ
3.18);
d£© ¸ü¸ÄÁË·çÏÕÆÀ¹À¿ò¼Ü¼°Á÷³ÌÖеķçÏÕÒªËعØϵ¡¢·çÏÕ·ÖÎöÔÀíºÍÆÀ¹ÀʵʩÁ÷³Ì£¨¼ûµÚ 4Õ£¬
2007Äê°æµÄµÚ4Õ£©;
e£© ¸ü¸ÄÁË·çÏÕÆÀ¹Àʵʩ¹ý³ÌÖзçÏÕÒªËØʶ±ðºÍ¹ØÁª·ÖÎöÄÚÈÝ£¨¼û 5.2 ºÍ 5.3.2007 Äê°æµÄ 5.2¡¢
5.3¡¢5.4¡¢5.5ºÍ5.6£©;
f£© ½«Ô±ê×¼ÖÐÆÀ¹À¶ÔÏóÉúÃüÖÜÆÚ¸÷½×¶ÎµÄ·çÏÕÆÀ¹ÀºÍ·çÏÕÆÀ¹ÀµÄ¹¤×÷ÐÎʽµ÷Õûµ½¹æ·¶ÐÔ¸½Â¼ A
ºÍ×ÊÁÏÐÔ¸½Â¼BÖУ¨¼û¸½Â¼AºÍ¸½Â¼ B.2007Äê°æµÄµÚ6Õº͵Ú7Õ£©¡£
Çë×¢Òâ±¾ÎļþµÄijЩÄÚÈÝ¿ÉÄÜÉ漰רÀû¡£±¾ÎļþµÄ·¢²¼»ú¹¹²»³Ðµ£Ê¶±ðרÀûµÄÔðÈΡ£
±¾ÎļþÓÉÈ«¹úÐÅÏ¢°²È«±ê×¼»¯¼¼ÊõίԱ»á£¨SAC/TC 260£©Ìá³ö²¢¹é¿Ú¡£
±¾ÎļþÆð²Ýµ¥Î»¡Ã¹ú¼ÒÐÅÏ¢ÖÐÐÄ¡¢±±¾©°²ÐÅÌìÐпƼ¼ÓÐÏÞ¹«Ë¾¡¢ÐÅÏ¢²úÒµÐÅÏ¢°²È«²âÆÀÖÐÐÄ¡¢±±¾©ÐÅ
Ï¢°²È«²âÆÀÖÐÐÄ¡¢ÖйúÐÅÏ¢°²È«²âÆÀÖÐÐÄ¡¢ÖйúÍøÂ簲ȫÉó²é¼¼ÊõÓëÈÏÖ¤ÖÐÐÄ¡¢Öйúµç×Ó¼¼Êõ±ê×¼»¯ÑÐ
¾¿Ôº¡¢¹«°²²¿ÐÅÏ¢°²È«µÈ¼¶±£»¤ÆÀ¹ÀÖÐÐÄ¡¢¹«°²²¿µÚÒ»Ñо¿Ëù¡¢ÉϺ£¹Û°²ÐÅÏ¢¼¼Êõ¹É·ÝÓÐÏÞ¹«Ë¾¡¢³É¶¼Ãñ
º½µç×Ó¼¼ÊõÓÐÏÞÔðÈι«Ë¾¡¢ºÓÄϽð¶ÜÐÅ°²¼ì²âÆÀ¹ÀÖÐÐÄÓÐÏÞ¹«Ë¾¡¢ÉîÛÚÊÐÄÏɽÇøÕþÎñ·þÎñÊý¾Ý¹ÜÀí¾Ö¡¢
ÔÆÄϹ«Â·ÁªÍøÊշѹÜÀíÓÐÏÞ¹«Ë¾¡¢¹úÍøÄþÏĵçÁ¦ÓÐÏÞ¹«Ë¾¡¢¹úÍøн®µçÁ¦ÓÐÏÞ¹«Ë¾¡£
±¾ÎļþÖ÷ÒªÆð²ÝÈË;»¿¡¢Õ²°ñ»ª¡¢³ÂÓÀ¸Õ¡¢Áõ·á¡¢³ÂÇàÃñ¡¢ÕÔÔöÕñ¡¢ÕÅÒæ¡¢¸ßÑÇ骡¢ÈνðÇ¿¡¢ÁõÁúÌΡ¢
ÁõµÂÁÖ¡¢Áõ¿¿¡¡¢ËïÃ÷ÁÁ¡¢¶ÅÓî¸ë¡¢µÔÑǺ졢Íõ»ÝÝ°¡¢ÈÎÎÀ
GB-T 20984-2022 信息安全技术 信息安全风险评估方法
文档预览
中文文档
30 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共30页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 SC 于 2023-05-03 01:08:38上传分享