💼 5 Organizational controls | 37 | | | |
💼 5.1 Policies for information security | | | | |
💼 5.2 Information security roles and responsibilities | | | | |
💼 5.3 Segregation of duties | | 2 | 2 | |
💼 5.4 Management responsibilities | | | | |
💼 5.5 Contact with authorities | | 2 | 2 | |
💼 5.6 Contact with special interest | | 2 | 2 | |
💼 5.7 Threat intelligence | | | | |
💼 5.8 Information security in project | | | | |
💼 5.9 Inventory of information and | | 3 | 5 | |
💼 5.10 Acceptable use of information and other associated assets | | 11 | 14 | |
💼 5.11 Return of assets | | | | |
💼 5.12 Classification of information | | | | |
💼 5.13 Labelling of information | | | | |
💼 5.14 Information transfer | | 8 | 9 | |
💼 5.15 Access control | | 14 | 16 | |
💼 5.16 Identity management | | 2 | 4 | |
💼 5.17 Authentication information | | 1 | 1 | |
💼 5.18 Access rights | | 4 | 6 | |
💼 5.19 Information security in supplier relationships | | | | |
💼 5.20 Addressing information security within supplier agreements | | 2 | 2 | |
💼 5.21 Managing information security in the information and communication technology (ICT) supply chain | | | | |
💼 5.22 Monitoring, review and change Control Control management of supplier services | | | | |
💼 5.23 Information security for use of cloud services | | | | |
💼 5.24 Information security incident management planning and preparation | | 2 | 2 | |
💼 5.25 Assessment and decision on information security events | | 1 | 1 | |
💼 5.26 Response to information security incidents | | | | |
💼 5.27 Learning from information security incidents | | | | |
💼 5.28 Collection of evidence | | 14 | 15 | |
💼 5.29 Information security during disruption | | | | |
💼 5.30 ICT readiness for business continuity | | | | |
💼 5.31 Legal, statutory, regulatory and contractual requirements | | | | |
💼 5.32 Intellectual property rights | | | | |
💼 5.33 Protection of records | | 10 | 10 | |
💼 5.34 Privacy and protection of personal identifiable information (PII) | | | | |
💼 5.35 Independent review of information security | | | | |
💼 5.36 Compliance with policies, rules and standards for information security | | | | |
💼 5.37 Documented operating procedures | | | | |
💼 6 People controls | 8 | | | |
💼 6.1 Screening | | | | |
💼 6.2 Terms and conditions of employment | | | | |
💼 6.3 Information security awareness, education and training | | | | |
💼 6.4 Disciplinary process | | | | |
💼 6.5 Responsibilities after termination or change of employment | | 2 | 4 | |
💼 6.6 Confidentiality or non-disclosure agreements | | | | |
💼 6.7 Remote working | | 5 | 5 | |
💼 6.8 Information security event reporting | | | | |
💼 7 Physical controls | 14 | | | |
💼 7.1 Physical security perimeters | | | | |
💼 7.2 Physical entry | | | | |
💼 7.3 Securing offices, rooms and facilities | | | | |
💼 7.4 Physical security monitoring | | | | |
💼 7.5 Protecting against physical and environmental threats | | | | |
💼 7.6 Working in secure areas | | | | |
💼 7.7 Clear desk and clear screen | | | | |
💼 7.8 Equipment siting and protection | | | | |
💼 7.9 Security of assets off-premises | | | | |
💼 7.10 Storage media | | | | |
💼 7.11 Supporting utilities | | | | |
💼 7.12 Cabling security | | | | |
💼 7.13 Equipment maintenance | | | | |
💼 7.14 Secure disposal or re-use of equipment | | | | |
💼 8 Technological controls | 34 | | | |
💼 8.1 User end point devices | | 9 | 11 | |
💼 8.2 Privileged access rights | | 7 | 7 | |
💼 8.3 Information access restriction | | 10 | 11 | |
💼 8.4 Access to source code | | 8 | 9 | |
💼 8.5 Secure authentication | | | | |
💼 8.6 Capacity management | | 3 | 3 | |
💼 8.7 Protection against malware | | 1 | 1 | |
💼 8.8 Management of technical vulnerabilities | | 9 | 9 | |
💼 8.9 Configuration management | | | | |
💼 8.10 Information deletion | | | | |
💼 8.11 Data masking | | | | |
💼 8.12 Data leakage prevention | | | | |
💼 8.13 Information backup | | 1 | 1 | |
💼 8.14 Redundancy of information processing facilities | | | | |
💼 8.15 Logging | | 19 | 20 | |
💼 8.16 Monitoring activities | | 6 | 6 | |
💼 8.17 Clock synchronization | | | | |
💼 8.18 Use of privileged utility programs | | | | |
💼 8.19 Installation of software on operational systems | | | | |
💼 8.20 Networks security | | 5 | 5 | |
💼 8.21 Security of network services | | | | |
💼 8.22 Segregation of networks | | 5 | 5 | |
💼 8.23 Web filtering | | | | |
💼 8.24 Use of cryptography | | | | |
💼 8.25 Secure development life cycle | | 2 | 2 | |
💼 8.26 Application security requirements | | 2 | 2 | |
💼 8.27 Secure system architecture and engineering principles | | 1 | 1 | |
💼 8.28 Secure coding | | | | |
💼 8.29 Security testing in development and acceptance | | | | |
💼 8.30 Outsourced development | | | | |
💼 8.31 Separation of development, test and production environments | | | | |
💼 8.32 Change management | | | | |
💼 8.33 Test information | | | | |
💼 8.34 Protection of information systems during audit testing | | | | |