Skip to main content

💼 ISO/IEC 27001:2013

  • Contextual name: 💼 ISO/IEC 27001:2013
  • ID: /frameworks/iso-iec-27001-2013

Description

Empty...

Similar

  • Internal
    • ID: dec-a-e2478d73

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 A.5 Information security policies1
    💼 A.5.1 Management direction for information security2
        💼 A.5.1.1 Policies for information security
        💼 A.5.1.2 Review of the policies for information security
💼 A.6 Organization of information security2
    💼 A.6.1 Internal organization5
        💼 A.6.1.1 Information security roles and responsibilities
        💼 A.6.1.2 Segregation of duties
        💼 A.6.1.3 Contact with authorities
        💼 A.6.1.4 Contact with special interest groups
        💼 A.6.1.5 Information security in project management
    💼 A.6.2 Mobile devices and teleworking2
        💼 A.6.2.1 Mobile device policy
        💼 A.6.2.2 Teleworking
💼 A.7 Human resource security3
    💼 A.7.1 Prior to employment2
        💼 A.7.1.1 Screening
        💼 A.7.1.2 Terms and conditions of employment
    💼 A.7.2 During employment3
        💼 A.7.2.1 Management responsibilities
        💼 A.7.2.2 Information security awareness, education and training
        💼 A.7.2.3 Disciplinary process
    💼 A.7.3 Termination and change of employment1
        💼 A.7.3.1 Termination or change of employment responsibilities
💼 A.8 Asset management3
    💼 A.8.1 Responsibility for assets4
        💼 A.8.1.1 Inventory of assets
        💼 A.8.1.2 Ownership of assets
        💼 A.8.1.3 Acceptable use of assets
        💼 A.8.1.4 Return of assets
    💼 A.8.2 Information classification3
        💼 A.8.2.1 Classification of information
        💼 A.8.2.2 Labelling of information
        💼 A.8.2.3 Handling of assets
    💼 A.8.3 Media handling3
        💼 A.8.3.1 Management of removable media
        💼 A.8.3.2 Disposal of media
        💼 A.8.3.3 Physical media transfer
💼 A.9 Access control4
    💼 A.9.1 Business requirements of access control2
        💼 A.9.1.1 Access control policy
        💼 A.9.1.2 Access to networks and network services1718
    💼 A.9.2 User access management6
        💼 A.9.2.1 User registration and de-registration11
        💼 A.9.2.2 User access provisioning44
        💼 A.9.2.3 Management of privileged access rights34
        💼 A.9.2.4 Management of secret authentication information of users810
        💼 A.9.2.5 Review of user access rights11
        💼 A.9.2.6 Removal or adjustment of access rights
    💼 A.9.3 User responsibilities1
        💼 A.9.3.1 Use of secret authentication information33
    💼 A.9.4 System and application access control5
        💼 A.9.4.1 Information access restriction1920
        💼 A.9.4.2 Secure log-on procedures
        💼 A.9.4.3 Password management system11
        💼 A.9.4.4 Use of privileged utility programs
        💼 A.9.4.5 Access control to program source code
💼 A.10 Cryptography1
    💼 A.10.1 Cryptographic controls2
        💼 A.10.1.1 Policy on the use of cryptographic controls1415
        💼 A.10.1.2 Key management911
💼 A.11 Physical and environmental security2
    💼 A.11.1 Secure areas6
        💼 A.11.1.1 Physical security perimeter
        💼 A.11.1.2 Physical entry controls
        💼 A.11.1.3 Securing offices, rooms and facilities
        💼 A.11.1.4 Protecting against external and environmental threats
        💼 A.11.1.5 Working in secure areas
        💼 A.11.1.6 Delivery and loading areas
    💼 A.11.2 Equipment9
        💼 A.11.2.1 Equipment siting and protection
        💼 A.11.2.2 Supporting utilities
        💼 A.11.2.3 Cabling security
        💼 A.11.2.4 Equipment maintenance
        💼 A.11.2.5 Removal of assets
        💼 A.11.2.6 Security of equipment and assets off-premises
        💼 A.11.2.7 Secure disposal or reuse of equipment
        💼 A.11.2.8 Unattended user equipment
        💼 A.11.2.9 Clear desk and clear screen policy
💼 A.12 Operations security7
    💼 A.12.1 Operational procedures and responsibilities4
        💼 A.12.1.1 Documented operating procedures
        💼 A.12.1.2 Change management
        💼 A.12.1.3 Capacity management
        💼 A.12.1.4 Separation of development, testing and operational environments
    💼 A.12.2 Protection from malware1
        💼 A.12.2.1 Controls against malware77
    💼 A.12.3 Backup1
        💼 A.12.3.1 Information backup
    💼 A.12.4 Logging and monitoring4
        💼 A.12.4.1 Event logging1618
        💼 A.12.4.2 Protection of log information22
        💼 A.12.4.3 Administrator and operator logs89
        💼 A.12.4.4 Clock synchronisation
    💼 A.12.5 Control of operational software1
        💼 A.12.5.1 Installation of software on operational systems44
    💼 A.12.6 Technical vulnerability management2
        💼 A.12.6.1 Management of technical vulnerabilities77
        💼 A.12.6.2 Restrictions on software installation
    💼 A.12.7 Information systems audit considerations1
        💼 A.12.7.1 Information systems audit controls
💼 A.13 Communications security2
    💼 A.13.1 Network security management3
        💼 A.13.1.1 Network controls
        💼 A.13.1.2 Security of network services
        💼 A.13.1.3 Segregation in networks
    💼 A.13.2 Information transfer4
        💼 A.13.2.1 Information transfer policies and procedures
        💼 A.13.2.2 Agreements on information transfer
        💼 A.13.2.3 Electronic messaging
        💼 A.13.2.4 Confidentiality or nondisclosure agreements
💼 A.14 System acquisition, development and maintenance3
    💼 A.14.1 Security requirements of information systems3
        💼 A.14.1.1 Information security requirements analysis and specification66
        💼 A.14.1.2 Securing application services on public networks44
        💼 A.14.1.3 Protecting application services transactions78
    💼 A.14.2 Security in development and support processes9
        💼 A.14.2.1 Secure development policy
        💼 A.14.2.2 System change control procedures
        💼 A.14.2.3 Technical review of applications after operating platform changes
        💼 A.14.2.4 Restrictions on changes to software packages
        💼 A.14.2.5 Secure system engineering principles
        💼 A.14.2.6 Secure development environment
        💼 A.14.2.7 Outsourced development
        💼 A.14.2.8 System security testing
        💼 A.14.2.9 System acceptance testing
    💼 A.14.3 Test data1
        💼 A.14.3.1 Protection of test data
💼 A.15 Supplier relationships2
    💼 A.15.1 Information security in supplier relationships3
        💼 A.15.1.1 Information security policy for supplier relationships
        💼 A.15.1.2 Addressing security within supplier agreements
        💼 A.15.1.3 Information and communication technology supply chain
    💼 A.15.2 Supplier service delivery management2
        💼 A.15.2.1 Monitoring and review of supplier services
        💼 A.15.2.2 Managing changes to supplier services
💼 A.16 Information security incident management1
    💼 A.16.1 Management of information security incidents and improvements7
        💼 A.16.1.1 Responsibilities and procedures
        💼 A.16.1.2 Reporting information security events910
        💼 A.16.1.3 Reporting information security weaknesses
        💼 A.16.1.4 Assessment of and decision on information security events
        💼 A.16.1.5 Response to information security incidents
        💼 A.16.1.6 Learning from information security incidents
        💼 A.16.1.7 Collection of evidence
💼 A.17 Information security aspects of business continuity management2
    💼 A.17.1 Information security continuity3
        💼 A.17.1.1 Planning information security continuity
        💼 A.17.1.2 Implementing information security continuity33
        💼 A.17.1.3 Verify, review and evaluate information security continuity11
    💼 A.17.2 Redundancies1
        💼 A.17.2.1 Availability of information processing facilities11
💼 A.18 Compliance2
    💼 A.18.1 Compliance with legal and contractual requirements5
        💼 A.18.1.1 Identification of applicable legislation and contractual requirements
        💼 A.18.1.2 Intellectual property rights
        💼 A.18.1.3 Protection of records22
        💼 A.18.1.4 Privacy and protection of personally identifiable information
        💼 A.18.1.5 Regulation of cryptographic controls
    💼 A.18.2 Information security reviews3
        💼 A.18.2.1 Independent review of information security
        💼 A.18.2.2 Compliance with security policies and standards
        💼 A.18.2.3 Technical compliance review