💼 A.5 Information security policies | 1 | | | |
💼 A.5.1 Management direction for information security | 2 | | | |
💼 A.5.1.1 Policies for information security | | | | |
💼 A.5.1.2 Review of the policies for information security | | | | |
💼 A.6 Organization of information security | 2 | | | |
💼 A.6.1 Internal organization | 5 | | | |
💼 A.6.1.1 Information security roles and responsibilities | | | | |
💼 A.6.1.2 Segregation of duties | | | | |
💼 A.6.1.3 Contact with authorities | | | | |
💼 A.6.1.4 Contact with special interest groups | | | | |
💼 A.6.1.5 Information security in project management | | | | |
💼 A.6.2 Mobile devices and teleworking | 2 | | | |
💼 A.6.2.1 Mobile device policy | | | | |
💼 A.6.2.2 Teleworking | | | | |
💼 A.7 Human resource security | 3 | | | |
💼 A.7.1 Prior to employment | 2 | | | |
💼 A.7.1.1 Screening | | | | |
💼 A.7.1.2 Terms and conditions of employment | | | | |
💼 A.7.2 During employment | 3 | | | |
💼 A.7.2.1 Management responsibilities | | | | |
💼 A.7.2.2 Information security awareness, education and training | | | | |
💼 A.7.2.3 Disciplinary process | | | | |
💼 A.7.3 Termination and change of employment | 1 | | | |
💼 A.7.3.1 Termination or change of employment responsibilities | | | | |
💼 A.8 Asset management | 3 | | | |
💼 A.8.1 Responsibility for assets | 4 | | | |
💼 A.8.1.1 Inventory of assets | | | | |
💼 A.8.1.2 Ownership of assets | | | | |
💼 A.8.1.3 Acceptable use of assets | | | | |
💼 A.8.1.4 Return of assets | | | | |
💼 A.8.2 Information classification | 3 | | | |
💼 A.8.2.1 Classification of information | | | | |
💼 A.8.2.2 Labelling of information | | | | |
💼 A.8.2.3 Handling of assets | | | | |
💼 A.8.3 Media handling | 3 | | | |
💼 A.8.3.1 Management of removable media | | | | |
💼 A.8.3.2 Disposal of media | | | | |
💼 A.8.3.3 Physical media transfer | | | | |
💼 A.9 Access control | 4 | | | |
💼 A.9.1 Business requirements of access control | 2 | | | |
💼 A.9.1.1 Access control policy | | | | |
💼 A.9.1.2 Access to networks and network services | | 17 | 18 | |
💼 A.9.2 User access management | 6 | | | |
💼 A.9.2.1 User registration and de-registration | | 1 | 1 | |
💼 A.9.2.2 User access provisioning | | 4 | 4 | |
💼 A.9.2.3 Management of privileged access rights | | 3 | 4 | |
💼 A.9.2.4 Management of secret authentication information of users | | 8 | 10 | |
💼 A.9.2.5 Review of user access rights | | 1 | 1 | |
💼 A.9.2.6 Removal or adjustment of access rights | | | | |
💼 A.9.3 User responsibilities | 1 | | | |
💼 A.9.3.1 Use of secret authentication information | | 3 | 3 | |
💼 A.9.4 System and application access control | 5 | | | |
💼 A.9.4.1 Information access restriction | | 19 | 20 | |
💼 A.9.4.2 Secure log-on procedures | | | | |
💼 A.9.4.3 Password management system | | 1 | 1 | |
💼 A.9.4.4 Use of privileged utility programs | | | | |
💼 A.9.4.5 Access control to program source code | | | | |
💼 A.10 Cryptography | 1 | | | |
💼 A.10.1 Cryptographic controls | 2 | | | |
💼 A.10.1.1 Policy on the use of cryptographic controls | | 14 | 15 | |
💼 A.10.1.2 Key management | | 9 | 11 | |
💼 A.11 Physical and environmental security | 2 | | | |
💼 A.11.1 Secure areas | 6 | | | |
💼 A.11.1.1 Physical security perimeter | | | | |
💼 A.11.1.2 Physical entry controls | | | | |
💼 A.11.1.3 Securing offices, rooms and facilities | | | | |
💼 A.11.1.4 Protecting against external and environmental threats | | | | |
💼 A.11.1.5 Working in secure areas | | | | |
💼 A.11.1.6 Delivery and loading areas | | | | |
💼 A.11.2 Equipment | 9 | | | |
💼 A.11.2.1 Equipment siting and protection | | | | |
💼 A.11.2.2 Supporting utilities | | | | |
💼 A.11.2.3 Cabling security | | | | |
💼 A.11.2.4 Equipment maintenance | | | | |
💼 A.11.2.5 Removal of assets | | | | |
💼 A.11.2.6 Security of equipment and assets off-premises | | | | |
💼 A.11.2.7 Secure disposal or reuse of equipment | | | | |
💼 A.11.2.8 Unattended user equipment | | | | |
💼 A.11.2.9 Clear desk and clear screen policy | | | | |
💼 A.12 Operations security | 7 | | | |
💼 A.12.1 Operational procedures and responsibilities | 4 | | | |
💼 A.12.1.1 Documented operating procedures | | | | |
💼 A.12.1.2 Change management | | | | |
💼 A.12.1.3 Capacity management | | | | |
💼 A.12.1.4 Separation of development, testing and operational environments | | | | |
💼 A.12.2 Protection from malware | 1 | | | |
💼 A.12.2.1 Controls against malware | | 7 | 7 | |
💼 A.12.3 Backup | 1 | | | |
💼 A.12.3.1 Information backup | | | | |
💼 A.12.4 Logging and monitoring | 4 | | | |
💼 A.12.4.1 Event logging | | 16 | 18 | |
💼 A.12.4.2 Protection of log information | | 2 | 2 | |
💼 A.12.4.3 Administrator and operator logs | | 8 | 9 | |
💼 A.12.4.4 Clock synchronisation | | | | |
💼 A.12.5 Control of operational software | 1 | | | |
💼 A.12.5.1 Installation of software on operational systems | | 4 | 4 | |
💼 A.12.6 Technical vulnerability management | 2 | | | |
💼 A.12.6.1 Management of technical vulnerabilities | | 7 | 7 | |
💼 A.12.6.2 Restrictions on software installation | | | | |
💼 A.12.7 Information systems audit considerations | 1 | | | |
💼 A.12.7.1 Information systems audit controls | | | | |
💼 A.13 Communications security | 2 | | | |
💼 A.13.1 Network security management | 3 | | | |
💼 A.13.1.1 Network controls | | | | |
💼 A.13.1.2 Security of network services | | | | |
💼 A.13.1.3 Segregation in networks | | | | |
💼 A.13.2 Information transfer | 4 | | | |
💼 A.13.2.1 Information transfer policies and procedures | | | | |
💼 A.13.2.2 Agreements on information transfer | | | | |
💼 A.13.2.3 Electronic messaging | | | | |
💼 A.13.2.4 Confidentiality or nondisclosure agreements | | | | |
💼 A.14 System acquisition, development and maintenance | 3 | | | |
💼 A.14.1 Security requirements of information systems | 3 | | | |
💼 A.14.1.1 Information security requirements analysis and specification | | 6 | 6 | |
💼 A.14.1.2 Securing application services on public networks | | 4 | 4 | |
💼 A.14.1.3 Protecting application services transactions | | 7 | 8 | |
💼 A.14.2 Security in development and support processes | 9 | | | |
💼 A.14.2.1 Secure development policy | | | | |
💼 A.14.2.2 System change control procedures | | | | |
💼 A.14.2.3 Technical review of applications after operating platform changes | | | | |
💼 A.14.2.4 Restrictions on changes to software packages | | | | |
💼 A.14.2.5 Secure system engineering principles | | | | |
💼 A.14.2.6 Secure development environment | | | | |
💼 A.14.2.7 Outsourced development | | | | |
💼 A.14.2.8 System security testing | | | | |
💼 A.14.2.9 System acceptance testing | | | | |
💼 A.14.3 Test data | 1 | | | |
💼 A.14.3.1 Protection of test data | | | | |
💼 A.15 Supplier relationships | 2 | | | |
💼 A.15.1 Information security in supplier relationships | 3 | | | |
💼 A.15.1.1 Information security policy for supplier relationships | | | | |
💼 A.15.1.2 Addressing security within supplier agreements | | | | |
💼 A.15.1.3 Information and communication technology supply chain | | | | |
💼 A.15.2 Supplier service delivery management | 2 | | | |
💼 A.15.2.1 Monitoring and review of supplier services | | | | |
💼 A.15.2.2 Managing changes to supplier services | | | | |
💼 A.16 Information security incident management | 1 | | | |
💼 A.16.1 Management of information security incidents and improvements | 7 | | | |
💼 A.16.1.1 Responsibilities and procedures | | | | |
💼 A.16.1.2 Reporting information security events | | 9 | 10 | |
💼 A.16.1.3 Reporting information security weaknesses | | | | |
💼 A.16.1.4 Assessment of and decision on information security events | | | | |
💼 A.16.1.5 Response to information security incidents | | | | |
💼 A.16.1.6 Learning from information security incidents | | | | |
💼 A.16.1.7 Collection of evidence | | | | |
💼 A.17 Information security aspects of business continuity management | 2 | | | |
💼 A.17.1 Information security continuity | 3 | | | |
💼 A.17.1.1 Planning information security continuity | | | | |
💼 A.17.1.2 Implementing information security continuity | | 3 | 3 | |
💼 A.17.1.3 Verify, review and evaluate information security continuity | | 1 | 1 | |
💼 A.17.2 Redundancies | 1 | | | |
💼 A.17.2.1 Availability of information processing facilities | | 1 | 1 | |
💼 A.18 Compliance | 2 | | | |
💼 A.18.1 Compliance with legal and contractual requirements | 5 | | | |
💼 A.18.1.1 Identification of applicable legislation and contractual requirements | | | | |
💼 A.18.1.2 Intellectual property rights | | | | |
💼 A.18.1.3 Protection of records | | 2 | 2 | |
💼 A.18.1.4 Privacy and protection of personally identifiable information | | | | |
💼 A.18.1.5 Regulation of cryptographic controls | | | | |
💼 A.18.2 Information security reviews | 3 | | | |
💼 A.18.2.1 Independent review of information security | | | | |
💼 A.18.2.2 Compliance with security policies and standards | | | | |
💼 A.18.2.3 Technical compliance review | | | | |