Skip to main content

💼 5 Organizational controls

  • ID: /frameworks/iso-iec-27001-2022/05

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-675166a2

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 5.1 Policies for information securityno data
💼 5.2 Information security roles and responsibilitiesno data
💼 5.3 Segregation of duties22no data
💼 5.4 Management responsibilitiesno data
💼 5.5 Contact with authorities23no data
💼 5.6 Contact with special interest23no data
💼 5.7 Threat intelligenceno data
💼 5.8 Information security in projectno data
💼 5.9 Inventory of information and36no data
💼 5.10 Acceptable use of information and other associated assets1127no data
💼 5.11 Return of assetsno data
💼 5.12 Classification of informationno data
💼 5.13 Labelling of informationno data
💼 5.14 Information transfer810no data
💼 5.15 Access control1431no data
💼 5.16 Identity management24no data
💼 5.17 Authentication information11no data
💼 5.18 Access rights46no data
💼 5.19 Information security in supplier relationshipsno data
💼 5.20 Addressing information security within supplier agreements23no data
💼 5.21 Managing information security in the information and communication technology (ICT) supply chainno data
💼 5.22 Monitoring, review and change Control Control management of supplier servicesno data
💼 5.23 Information security for use of cloud servicesno data
💼 5.24 Information security incident management planning and preparation23no data
💼 5.25 Assessment and decision on information security events13no data
💼 5.26 Response to information security incidentsno data
💼 5.27 Learning from information security incidentsno data
💼 5.28 Collection of evidence1421no data
💼 5.29 Information security during disruptionno data
💼 5.30 ICT readiness for business continuityno data
💼 5.31 Legal, statutory, regulatory and contractual requirementsno data
💼 5.32 Intellectual property rightsno data
💼 5.33 Protection of records1015no data
💼 5.34 Privacy and protection of personal identifiable information (PII)no data
💼 5.35 Independent review of information securityno data
💼 5.36 Compliance with policies, rules and standards for information securityno data
💼 5.37 Documented operating proceduresno data