| 💼 5 Organizational controls | 37 | 52 | 89 |  | no data | 
|  💼 5.1 Policies for information security |  |  |  |  | no data | 
|  💼 5.2 Information security roles and responsibilities |  |  |  |  | no data | 
|  💼 5.3 Segregation of duties |  | 2 | 2 |  | no data | 
|  💼 5.4 Management responsibilities |  |  |  |  | no data | 
|  💼 5.5 Contact with authorities |  | 2 | 3 |  | no data | 
|  💼 5.6 Contact with special interest |  | 2 | 3 |  | no data | 
|  💼 5.7 Threat intelligence |  |  |  |  | no data | 
|  💼 5.8 Information security in project |  |  |  |  | no data | 
|  💼 5.9 Inventory of information and |  | 3 | 6 |  | no data | 
|  💼 5.10 Acceptable use of information and other associated assets |  | 11 | 27 |  | no data | 
|  💼 5.11 Return of assets |  |  |  |  | no data | 
|  💼 5.12 Classification of information |  |  |  |  | no data | 
|  💼 5.13 Labelling of information |  |  |  |  | no data | 
|  💼 5.14 Information transfer |  | 8 | 10 |  | no data | 
|  💼 5.15 Access control |  | 14 | 31 |  | no data | 
|  💼 5.16 Identity management |  | 2 | 4 |  | no data | 
|  💼 5.17 Authentication information |  | 1 | 1 |  | no data | 
|  💼 5.18 Access rights |  | 4 | 6 |  | no data | 
|  💼 5.19 Information security in supplier relationships |  |  |  |  | no data | 
|  💼 5.20 Addressing information security within supplier agreements |  | 2 | 3 |  | no data | 
|  💼 5.21 Managing information security in the information and communication technology (ICT) supply chain |  |  |  |  | no data | 
|  💼 5.22 Monitoring, review and change Control Control management of supplier services |  |  |  |  | no data | 
|  💼 5.23 Information security for use of cloud services |  |  |  |  | no data | 
|  💼 5.24 Information security incident management planning and preparation |  | 2 | 3 |  | no data | 
|  💼 5.25 Assessment and decision on information security events |  | 1 | 3 |  | no data | 
|  💼 5.26 Response to information security incidents |  |  |  |  | no data | 
|  💼 5.27 Learning from information security incidents |  |  |  |  | no data | 
|  💼 5.28 Collection of evidence |  | 14 | 21 |  | no data | 
|  💼 5.29 Information security during disruption |  |  |  |  | no data | 
|  💼 5.30 ICT readiness for business continuity |  |  |  |  | no data | 
|  💼 5.31 Legal, statutory, regulatory and contractual requirements |  |  |  |  | no data | 
|  💼 5.32 Intellectual property rights |  |  |  |  | no data | 
|  💼 5.33 Protection of records |  | 10 | 15 |  | no data | 
|  💼 5.34 Privacy and protection of personal identifiable information (PII) |  |  |  |  | no data | 
|  💼 5.35 Independent review of information security |  |  |  |  | no data | 
|  💼 5.36 Compliance with policies, rules and standards for information security |  |  |  |  | no data | 
|  💼 5.37 Documented operating procedures |  |  |  |  | no data | 
| 💼 6 People controls | 8 | 6 | 8 |  | no data | 
|  💼 6.1 Screening |  |  |  |  | no data | 
|  💼 6.2 Terms and conditions of employment |  |  |  |  | no data | 
|  💼 6.3 Information security awareness, education and training |  |  |  |  | no data | 
|  💼 6.4 Disciplinary process |  |  |  |  | no data | 
|  💼 6.5 Responsibilities after termination or change of employment |  | 2 | 4 |  | no data | 
|  💼 6.6 Confidentiality or non-disclosure agreements |  |  |  |  | no data | 
|  💼 6.7 Remote working |  | 4 | 4 |  | no data | 
|  💼 6.8 Information security event reporting |  |  |  |  | no data | 
| 💼 7 Physical controls | 14 |  |  |  | no data | 
|  💼 7.1 Physical security perimeters |  |  |  |  | no data | 
|  💼 7.2 Physical entry |  |  |  |  | no data | 
|  💼 7.3 Securing offices, rooms and facilities |  |  |  |  | no data | 
|  💼 7.4 Physical security monitoring |  |  |  |  | no data | 
|  💼 7.5 Protecting against physical and environmental threats |  |  |  |  | no data | 
|  💼 7.6 Working in secure areas |  |  |  |  | no data | 
|  💼 7.7 Clear desk and clear screen |  |  |  |  | no data | 
|  💼 7.8 Equipment siting and protection |  |  |  |  | no data | 
|  💼 7.9 Security of assets off-premises |  |  |  |  | no data | 
|  💼 7.10 Storage media |  |  |  |  | no data | 
|  💼 7.11 Supporting utilities |  |  |  |  | no data | 
|  💼 7.12 Cabling security |  |  |  |  | no data | 
|  💼 7.13 Equipment maintenance |  |  |  |  | no data | 
|  💼 7.14 Secure disposal or re-use of equipment |  |  |  |  | no data | 
| 💼 8 Technological controls | 34 | 49 | 102 |  | no data | 
|  💼 8.1 User end point devices |  | 8 | 13 |  | no data | 
|  💼 8.2 Privileged access rights |  | 7 | 10 |  | no data | 
|  💼 8.3 Information access restriction |  | 10 | 24 |  | no data | 
|  💼 8.4 Access to source code |  | 8 | 22 |  | no data | 
|  💼 8.5 Secure authentication |  |  | 2 |  | no data | 
|  💼 8.6 Capacity management |  | 3 | 3 |  | no data | 
|  💼 8.7 Protection against malware |  | 1 | 1 |  | no data | 
|  💼 8.8 Management of technical vulnerabilities |  | 8 | 10 |  | no data | 
|  💼 8.9 Configuration management |  |  | 12 |  | no data | 
|  💼 8.10 Information deletion |  |  |  |  | no data | 
|  💼 8.11 Data masking |  |  |  |  | no data | 
|  💼 8.12 Data leakage prevention |  |  |  |  | no data | 
|  💼 8.13 Information backup |  | 1 | 2 |  | no data | 
|  💼 8.14 Redundancy of information processing facilities |  |  |  |  | no data | 
|  💼 8.15 Logging |  | 18 | 34 |  | no data | 
|  💼 8.16 Monitoring activities |  | 4 | 5 |  | no data | 
|  💼 8.17 Clock synchronization |  |  |  |  | no data | 
|  💼 8.18 Use of privileged utility programs |  |  |  |  | no data | 
|  💼 8.19 Installation of software on operational systems |  |  |  |  | no data | 
|  💼 8.20 Networks security |  | 5 | 14 |  | no data | 
|  💼 8.21 Security of network services |  |  |  |  | no data | 
|  💼 8.22 Segregation of networks |  | 4 | 4 |  | no data | 
|  💼 8.23 Web filtering |  |  |  |  | no data | 
|  💼 8.24 Use of cryptography |  |  |  |  | no data | 
|  💼 8.25 Secure development life cycle |  | 2 | 2 |  | no data | 
|  💼 8.26 Application security requirements |  | 2 | 2 |  | no data | 
|  💼 8.27 Secure system architecture and engineering principles |  | 1 | 4 |  | no data | 
|  💼 8.28 Secure coding |  |  |  |  | no data | 
|  💼 8.29 Security testing in development and acceptance |  |  |  |  | no data | 
|  💼 8.30 Outsourced development |  |  |  |  | no data | 
|  💼 8.31 Separation of development, test and production environments |  |  |  |  | no data | 
|  💼 8.32 Change management |  |  |  |  | no data | 
|  💼 8.33 Test information |  |  |  |  | no data | 
|  💼 8.34 Protection of information systems during audit testing |  |  |  |  | no data |