{"id":56,"date":"2008-03-16T17:25:47","date_gmt":"2008-03-16T09:25:47","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/03\/16\/iso-27006\/"},"modified":"2008-03-16T17:25:47","modified_gmt":"2008-03-16T09:25:47","slug":"iso-27006","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=56","title":{"rendered":"ISO\/IEC 27006\u8b93ISO 27001\u8a8d\u8b49\u8cbb\u7528\u589e\u52a0"},"content":{"rendered":"<p>\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u9a57\u8b49\u6a5f\u69cb\u8a8d\u8b49\u898f\u7bc4 ISO\/IEC 27006:2007\u5df2\u7d93\u78ba\u5b9a\u65bc2008\u5e749\u670814\u65e5\u5168\u9762\u5be6\u884c\uff0c\u5c46\u6642\u4e0d\u7ba1\u662f\u53d6\u5f97UKAS\u6216TAF\u8a8d\u8b49\u7684\u4f01\u696d\u8207\u653f\u5e9c\u6a5f\u95dc\uff0c\u90fd\u5c07\u56e0\u70ba\u9019\u500b\u6a19\u6e96\u7684\u5be6\u65bd\uff0c\u589e\u52a0\u4ed8\u7d66\u9a57\u8b49\u6a5f\u69cb\u4e4b\u8a8d\u8b49\u8cbb\u7528\u3002\u6839\u64daTAF\u8ca1\u5718\u6cd5\u4eba\u5168\u570b\u8a8d\u8b49\u57fa\u91d1\u6703\u8a8d\u8b49\u4f5c\u696d\u901a\u5831\uff0c\u9a57\u8b49\u516c\u53f8\u5fc5\u9808\u91dd\u5c0d2007\u5e7412\u670810\u65e5\u4ee5\u5f8c\u7533\u8acbTAF\u8a8d\u8b49\u4e4b\u4f01\u696d\u8207\u6a5f\u95dc\uff0c\u4f9d\u64daISO\/IEC27006\u898f\u7bc4\u8fa6\u7406\u8a8d\u8b49\u8a55\u9451\uff0c\u56e0\u6b64\u5c0d\u65bc\u5404\u4f01\u696d\u3001\u6a5f\u95dc\uff0c\u4ee5\u53ca\u9867\u554f\u516c\u53f8\u800c\u8a00\uff0c\u9664\u4e86\u611f\u53d7\u5230\u539f\u7269\u6599\u3001\u7269\u50f9\u3001\u751f\u7522\u6210\u672c\u4e0a\u6f32\u4ee5\u5916\uff0c\u53e6\u5916\u4e00\u500b\u660e\u986f\u7684\u4f8b\u5b50\u5c31\u662f\u8981\u4ed8\u7d66\u9a57\u8b49\u516c\u53f8\u7684\u8a8d\u8b49\u8cbb\u7528\u4e5f\u66b4\u6f32\u4e86\u3002<\/p>\n<p>\u00a0<\/p>\n<p>\u5728ISO\/IEC 27006\u6587\u4ef6\u4e2d\uff0c\u8981\u6c42\u9a57\u8b49\u516c\u53f8\u4f9d\u64da\u8981\u7533\u8acb\u8a8d\u8b49\u4e4b\u8a8d\u8b49\u7bc4\u570d\u4eba\u6578\uff0c\u4f9d\u64da\u4e0b\u8868\u9032\u884c\u4eba\u5929\u6578\u8a55\u4f30\uff1a<\/p>\n<p>\u00a0<\/p>\n<table style=\"border-color: #000000; border-width: 3px;\" border=\"3\">\n<tbody>\n<tr>\n<td>\u8a8d\u8b49\u7bc4\u570d\u4eba\u6578 <\/td>\n<td>\u9a57\u8b49\u6a5f\u69cb\u521d\u6b21\u7a3d\u6838\u7684\u4eba\u5929\u6578 <\/td>\n<\/tr>\n<tr>\n<td>1-10<\/td>\n<td>5<\/td>\n<\/tr>\n<tr>\n<td>11-25<\/td>\n<td>7<\/td>\n<\/tr>\n<tr>\n<td>26-45<\/td>\n<td>8.5<\/td>\n<\/tr>\n<tr>\n<td>46-65<\/td>\n<td>10<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">66-85<\/td>\n<td valign=\"top\">11<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">86-125<\/td>\n<td valign=\"top\">12<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">126-175<\/td>\n<td valign=\"top\">13<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">176-275<\/td>\n<td valign=\"top\">14<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">276-425<\/td>\n<td valign=\"top\">15<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p>\u5c0d\u65bc\u9996\u6b21\u7533\u8acb\u8a8d\u8b49\u7684\u4f01\u696d\/\u6a5f\u95dc\uff0c\u5982\u679c\u8a8d\u8b49\u7bc4\u570d\u572811-25\u4eba\u4e4b\u9593\uff0c\u9a57\u8b49\u6a5f\u69cb\u5fc5\u9808\u9032\u884c7\u4eba\u5929\u6578\u7684\u7a3d\u6838\u5de5\u4f5c\uff0c\u65e5\u5f8c\u6bcf\u5e74\u7684\u6301\u7e8c\u8a55\u9451\uff0c\u7d04\u7565\u70ba\u521d\u6b21\u7a3d\u6838\u4eba\u5929\u6578\u7684\u4e09\u5206\u4e4b\u3127\uff0c\u56e0\u6b64\u4ee511-25\u4eba\u4e4b\u9593\u7684\u9a57\u8b49\u7bc4\u570d\uff0c\u6bcf\u5e74\u9a57\u8b49\u516c\u53f8\u8981\u9032\u884c2.5\u5929\u7684\u7a3d\u6838\u5de5\u4f5c\u3002\u5728ISO\/IEC27006\u5be6\u884c\u4e0b\uff0c\u8b93\u5404\u5bb6\u9a57\u8b49\u6a5f\u69cb\u521d\u6b21\u7a3d\u6838\u8a8d\u8b49\u4f01\u696d\/\u6a5f\u95dc\u6709\u4e86\u4e00\u81f4\u6027\u7684\u4eba\u5929\u6578\u6a19\u6e96\uff0c\u800c\u4e0d\u6703\u767c\u751f\u50cf\u5148\u524d\u5404\u5bb6\u9a57\u8b49\u6a5f\u69cb\u8a55\u4f30\u76f8\u540c\u8a8d\u8b49\u6a5f\u95dc\uff0c\u537b\u6709\u4e0d\u540c\u4eba\u5929\u6578\u7684\u5dee\u7570\u5b58\u5728\u3002\u5c0d\u65bc\u5df2\u7d93\u901a\u904e\uff0c\u6216\u662f\u5373\u5c07\u8981\u7533\u8acb\u8a8d\u8b49\u7684\u4f01\u696d\u8207\u6a5f\u95dc\u5011\uff0c\u8981\u4f9d\u64da\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u9a57\u8b49\u6a5f\u69cb\u8a8d\u8b49\u898f\u7bc4 ISO\/IEC 27006:2007\uff0c\u91cd\u65b0\u7de8\u5217\u7b26\u5408\u8a8d\u8b49\u7bc4\u570d\u4eba\u6578\u8a08\u7b97\u6a19\u6e96\u4e4b\u65b0\u9810\u7b97\uff0c\u624d\u80fd\u5920\u652f\u4ed8\u8db3\u5920\u91d1\u984d\u7d66\u9a57\u8b49\u6a5f\u69cb\u3002<\/p>\n<p>\u00a0<\/p>\n<p>\u4ee5\u4e0b\u6a94\u6848\u70baTAF\u63d0\u4f9b\uff1a<\/p>\n<p><a title=\"ISO 27006\" href=\"docs\/TAF-CBA-ICC-01.pdf\" target=\"_blank\" rel=\"noopener\">\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u9a57\u8b49\u6a5f\u69cb\u8a8d\u8b49\u898f\u7bc4 ISO\/IEC 27006:2007<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u9a57\u8b49\u6a5f\u69cb\u8a8d\u8b49\u898f\u7bc4 ISO\/IEC 27006:2007\u5df2\u7d93\u78ba\u5b9a\u65bc2008\u5e749\u670814\u65e5\u5168\u9762\u5be6\u884c\uff0c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","category-iso-27001"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=56"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/56\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}