Skip to main content

💼 ISO/IEC 27001:2022

  • Contextual name: 💼 ISO/IEC 27001:2022
  • ID: /frameworks/iso-iec-27001-2022

Description

Empty...

Similar

  • Internal
    • ID: dec-a-2df38173

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 5 Organizational controls37
    💼 5.1 Policies for information security
    💼 5.2 Information security roles and responsibilities
    💼 5.3 Segregation of duties22
    💼 5.4 Management responsibilities
    💼 5.5 Contact with authorities22
    💼 5.6 Contact with special interest22
    💼 5.7 Threat intelligence
    💼 5.8 Information security in project
    💼 5.9 Inventory of information and35
    💼 5.10 Acceptable use of information and other associated assets1114
    💼 5.11 Return of assets
    💼 5.12 Classification of information
    💼 5.13 Labelling of information
    💼 5.14 Information transfer89
    💼 5.15 Access control1416
    💼 5.16 Identity management24
    💼 5.17 Authentication information11
    💼 5.18 Access rights46
    💼 5.19 Information security in supplier relationships
    💼 5.20 Addressing information security within supplier agreements22
    💼 5.21 Managing information security in the information and communication technology (ICT) supply chain
    💼 5.22 Monitoring, review and change Control Control management of supplier services
    💼 5.23 Information security for use of cloud services
    💼 5.24 Information security incident management planning and preparation22
    💼 5.25 Assessment and decision on information security events11
    💼 5.26 Response to information security incidents
    💼 5.27 Learning from information security incidents
    💼 5.28 Collection of evidence1415
    💼 5.29 Information security during disruption
    💼 5.30 ICT readiness for business continuity
    💼 5.31 Legal, statutory, regulatory and contractual requirements
    💼 5.32 Intellectual property rights
    💼 5.33 Protection of records1010
    💼 5.34 Privacy and protection of personal identifiable information (PII)
    💼 5.35 Independent review of information security
    💼 5.36 Compliance with policies, rules and standards for information security
    💼 5.37 Documented operating procedures
💼 6 People controls8
    💼 6.1 Screening
    💼 6.2 Terms and conditions of employment
    💼 6.3 Information security awareness, education and training
    💼 6.4 Disciplinary process
    💼 6.5 Responsibilities after termination or change of employment24
    💼 6.6 Confidentiality or non-disclosure agreements
    💼 6.7 Remote working55
    💼 6.8 Information security event reporting
💼 7 Physical controls14
    💼 7.1 Physical security perimeters
    💼 7.2 Physical entry
    💼 7.3 Securing offices, rooms and facilities
    💼 7.4 Physical security monitoring
    💼 7.5 Protecting against physical and environmental threats
    💼 7.6 Working in secure areas
    💼 7.7 Clear desk and clear screen
    💼 7.8 Equipment siting and protection
    💼 7.9 Security of assets off-premises
    💼 7.10 Storage media
    💼 7.11 Supporting utilities
    💼 7.12 Cabling security
    💼 7.13 Equipment maintenance
    💼 7.14 Secure disposal or re-use of equipment
💼 8 Technological controls34
    💼 8.1 User end point devices911
    💼 8.2 Privileged access rights77
    💼 8.3 Information access restriction1011
    💼 8.4 Access to source code89
    💼 8.5 Secure authentication
    💼 8.6 Capacity management33
    💼 8.7 Protection against malware11
    💼 8.8 Management of technical vulnerabilities99
    💼 8.9 Configuration management
    💼 8.10 Information deletion
    💼 8.11 Data masking
    💼 8.12 Data leakage prevention
    💼 8.13 Information backup11
    💼 8.14 Redundancy of information processing facilities
    💼 8.15 Logging1920
    💼 8.16 Monitoring activities66
    💼 8.17 Clock synchronization
    💼 8.18 Use of privileged utility programs
    💼 8.19 Installation of software on operational systems
    💼 8.20 Networks security55
    💼 8.21 Security of network services
    💼 8.22 Segregation of networks55
    💼 8.23 Web filtering
    💼 8.24 Use of cryptography
    💼 8.25 Secure development life cycle22
    💼 8.26 Application security requirements22
    💼 8.27 Secure system architecture and engineering principles11
    💼 8.28 Secure coding
    💼 8.29 Security testing in development and acceptance
    💼 8.30 Outsourced development
    💼 8.31 Separation of development, test and production environments
    💼 8.32 Change management
    💼 8.33 Test information
    💼 8.34 Protection of information systems during audit testing