Skip to main content

💼 ISO/IEC 27001:2022

  • ID: /frameworks/iso-iec-27001-2022

Description​

Empty...

Similar​

  • Internal
    • ID: dec-a-2df38173

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 5 Organizational controls375289no data
 💼 5.1 Policies for information securityno data
 💼 5.2 Information security roles and responsibilitiesno data
 💼 5.3 Segregation of duties22no data
 💼 5.4 Management responsibilitiesno data
 💼 5.5 Contact with authorities23no data
 💼 5.6 Contact with special interest23no data
 💼 5.7 Threat intelligenceno data
 💼 5.8 Information security in projectno data
 💼 5.9 Inventory of information and36no data
 💼 5.10 Acceptable use of information and other associated assets1127no data
 💼 5.11 Return of assetsno data
 💼 5.12 Classification of informationno data
 💼 5.13 Labelling of informationno data
 💼 5.14 Information transfer810no data
 💼 5.15 Access control1431no data
 💼 5.16 Identity management24no data
 💼 5.17 Authentication information11no data
 💼 5.18 Access rights46no data
 💼 5.19 Information security in supplier relationshipsno data
 💼 5.20 Addressing information security within supplier agreements23no data
 💼 5.21 Managing information security in the information and communication technology (ICT) supply chainno data
 💼 5.22 Monitoring, review and change Control Control management of supplier servicesno data
 💼 5.23 Information security for use of cloud servicesno data
 💼 5.24 Information security incident management planning and preparation23no data
 💼 5.25 Assessment and decision on information security events13no data
 💼 5.26 Response to information security incidentsno data
 💼 5.27 Learning from information security incidentsno data
 💼 5.28 Collection of evidence1421no data
 💼 5.29 Information security during disruptionno data
 💼 5.30 ICT readiness for business continuityno data
 💼 5.31 Legal, statutory, regulatory and contractual requirementsno data
 💼 5.32 Intellectual property rightsno data
 💼 5.33 Protection of records1015no data
 💼 5.34 Privacy and protection of personal identifiable information (PII)no data
 💼 5.35 Independent review of information securityno data
 💼 5.36 Compliance with policies, rules and standards for information securityno data
 💼 5.37 Documented operating proceduresno data
💼 6 People controls868no data
 💼 6.1 Screeningno data
 💼 6.2 Terms and conditions of employmentno data
 💼 6.3 Information security awareness, education and trainingno data
 💼 6.4 Disciplinary processno data
 💼 6.5 Responsibilities after termination or change of employment24no data
 💼 6.6 Confidentiality or non-disclosure agreementsno data
 💼 6.7 Remote working44no data
 💼 6.8 Information security event reportingno data
💼 7 Physical controls14no data
 💼 7.1 Physical security perimetersno data
 💼 7.2 Physical entryno data
 💼 7.3 Securing offices, rooms and facilitiesno data
 💼 7.4 Physical security monitoringno data
 💼 7.5 Protecting against physical and environmental threatsno data
 💼 7.6 Working in secure areasno data
 💼 7.7 Clear desk and clear screenno data
 💼 7.8 Equipment siting and protectionno data
 💼 7.9 Security of assets off-premisesno data
 💼 7.10 Storage mediano data
 💼 7.11 Supporting utilitiesno data
 💼 7.12 Cabling securityno data
 💼 7.13 Equipment maintenanceno data
 💼 7.14 Secure disposal or re-use of equipmentno data
💼 8 Technological controls3449102no data
 💼 8.1 User end point devices813no data
 💼 8.2 Privileged access rights710no data
 💼 8.3 Information access restriction1024no data
 💼 8.4 Access to source code822no data
 💼 8.5 Secure authentication2no data
 💼 8.6 Capacity management33no data
 💼 8.7 Protection against malware11no data
 💼 8.8 Management of technical vulnerabilities810no data
 💼 8.9 Configuration management12no data
 💼 8.10 Information deletionno data
 💼 8.11 Data maskingno data
 💼 8.12 Data leakage preventionno data
 💼 8.13 Information backup12no data
 💼 8.14 Redundancy of information processing facilitiesno data
 💼 8.15 Logging1834no data
 💼 8.16 Monitoring activities45no data
 💼 8.17 Clock synchronizationno data
 💼 8.18 Use of privileged utility programsno data
 💼 8.19 Installation of software on operational systemsno data
 💼 8.20 Networks security514no data
 💼 8.21 Security of network servicesno data
 💼 8.22 Segregation of networks44no data
 💼 8.23 Web filteringno data
 💼 8.24 Use of cryptographyno data
 💼 8.25 Secure development life cycle22no data
 💼 8.26 Application security requirements22no data
 💼 8.27 Secure system architecture and engineering principles14no data
 💼 8.28 Secure codingno data
 💼 8.29 Security testing in development and acceptanceno data
 💼 8.30 Outsourced developmentno data
 💼 8.31 Separation of development, test and production environmentsno data
 💼 8.32 Change managementno data
 💼 8.33 Test informationno data
 💼 8.34 Protection of information systems during audit testingno data