- From: Harshvardhan J. Pandit <me@harshp.com>
- Date: Fri, 22 Mar 2019 14:51:45 +0000
- To: public-dpvcg@w3.org
- Message-ID: <317103f8-e19d-24b3-cd21-823e0cee0abf@harshp.com>
Hello, I tried looking up the relevant ISO standards for security and to
identify terms for a taxonomy. But I ran into two major problems:
a) ISO holds a copyright on their specific codes and terms
b) ISO standards are not open, so I cannot look at them in depth
Maybe someone who does have access can check the relevant standards and
see how we can formulate the taxonomies.
In light of this, I feel we need to re-evaluate what a taxonomy of
security (related to data) should contain.
Attached is a mapping between different security standards and top-level
criteria, which is very informational.
And I'm sharing my notes for the security ISO standards:
ISO standards
* mapping between GDPR and ISO27000
http://www.iso27001security.com/ISO27k_GDPR_mapping_release_1.pdf
* There are two standards - ISO27001/2 and ISO27018 for cloud based
services
ISO27018
ISO27018 adds the following over ISO27001/2 (source random article on
the internet
https://advisera.com/27001academy/blog/2015/11/16/iso-27001-vs-iso-27018-standard-for-protecting-privacy-in-the-cloud)
* Rights of the customer to access and delete the data
* Processing the data only for the purpose for which the customer has
provided this data
* Not using the data for marketing and advertising
* Deletion of temporary files
* Notification to the customer in case of a request for data disclosure
* Recording all the disclosures of personal data
* Disclosing the information about all the sub-contractors used for
processing the personal data
* Notification to the customer in case of a data breach
* Document management for cloud policies and procedures
* Policy for return, transfer and disposal of personal data
* Confidentiality agreements for individuals who can access personal data
* Restriction of printing the personal data
* Procedure for data restoration
* Authorization for taking the physical media off-site
* Restriction of usage of media that does not have encryption capability
* Encrypting data that is transmitted over public networks
* Destruction of printed media with personal data
* Usage of unique IDs for cloud customers
* Records of user access to the cloud
* Disabling the usage of expired user IDs
* Specifying the minimum security controls in contracts with customers
and subcontractors
* Deletion of data in storage assigned to other customers
* Disclosing to the cloud customer in which countries will the data be
stored
* Ensuring the data reaches the destination
https://en.wikipedia.org/wiki/Security_controls
ISO 27001 Controls and Objectives
https://en.wikipedia.org/wiki/ISO/IEC_27001
http://www.foo.be/docs/iso/AnnexIX1302-ListOfControls-ISO-27001.pdf
ISO 27002 Security Control Objectives
http://praxiom.com/iso-17799-objectives.htm
http://praxiom.com/iso-27002-objectives.htm
ISO/IEC 15408 Evaluation criteria for IT security
ISO/IEC 18045 Methodology for IT security evaluation
ISO/IEC 19608 Guidance for developing security and privacy functional
requirements based on
ISO/IEC 15408
ISO/IEC 27002 Code of practice for information security controls
ISO/IEC 17030 Guidelines for security and privacy in Internet of Things
(IoT)
ISO/IEC 27017 Code of practice for information security controls based
on ISO/IEC 27002 for
cloud services
ISO/IEC 18033 Encryption algorithms
ISO/IEC 18370 Blind digital signatures
ISO/IEC 20008 Anonymous digital signatures
ISO/IEC 20009 Anonymous entity authentication
ISO/IEC 29191 Partially anonymous partially unlinkable authentication
ISO/IEC 20889 Privacy enhancing data de-identification techniques
ISO/IEC 27551 Attribute based unlinkable entity authentication
JWG8 has proposed to recognize ISO/IEC 29134 (privacy impact assessment
Methodology) as a European standard (EN)
ETSI
DTR/CYBER-0010, TR 103 370, Practical introductory guide to privacy
DTS/CYBER-0013, TS 103 485, Mechanisms for privacy assurance and
verification
DTS/CYBER-0014, TS 103 486, Identity management and naming schema
protection mechanisms
DTS/CYBER-0020, TS 103 458, Application of Attribute Based Encryption
(ABE) for data protection
on smart devices, cloud and mobile services
Regards,
Harsh
On 12/02/2019 13:56, Data Privacy Vocabularies and Controls Community
Group Issue Tracker wrote:
> ISSUE-11: Taxonomies on storrage locations and restrictions as well as security measues and restrictions still undefined.
>
> https://www.w3.org/community/dpvcg/track/issues/11
>
> Raised by:
> On product:
>
>
>
>
>
--
---
Harshvardhan Pandit
PhD Researcher
ADAPT Centre
Trinity College Dublin
Attachments
- application/pdf attachment: Poster_Winter2016_CSCs.pdf
Received on Friday, 22 March 2019 14:52:39 UTC