Skip to main content

๐Ÿ’ผ 5 Organizational controls

  • Contextual name: ๐Ÿ’ผ 5 Organizational controls
  • ID: /frameworks/iso-iec-27001-2022/05
  • Located in: ๐Ÿ’ผ ISO/IEC 27001:2022

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-675166a2

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 5.1 Policies for information security
๐Ÿ’ผ 5.2 Information security roles and responsibilities
๐Ÿ’ผ 5.3 Segregation of duties22
๐Ÿ’ผ 5.4 Management responsibilities
๐Ÿ’ผ 5.5 Contact with authorities23
๐Ÿ’ผ 5.6 Contact with special interest23
๐Ÿ’ผ 5.7 Threat intelligence
๐Ÿ’ผ 5.8 Information security in project
๐Ÿ’ผ 5.9 Inventory of information and36
๐Ÿ’ผ 5.10 Acceptable use of information and other associated assets1126
๐Ÿ’ผ 5.11 Return of assets
๐Ÿ’ผ 5.12 Classification of information
๐Ÿ’ผ 5.13 Labelling of information
๐Ÿ’ผ 5.14 Information transfer810
๐Ÿ’ผ 5.15 Access control1430
๐Ÿ’ผ 5.16 Identity management24
๐Ÿ’ผ 5.17 Authentication information11
๐Ÿ’ผ 5.18 Access rights46
๐Ÿ’ผ 5.19 Information security in supplier relationships
๐Ÿ’ผ 5.20 Addressing information security within supplier agreements23
๐Ÿ’ผ 5.21 Managing information security in the information and communication technology (ICT) supply chain
๐Ÿ’ผ 5.22 Monitoring, review and change Control Control management of supplier services
๐Ÿ’ผ 5.23 Information security for use of cloud services
๐Ÿ’ผ 5.24 Information security incident management planning and preparation23
๐Ÿ’ผ 5.25 Assessment and decision on information security events13
๐Ÿ’ผ 5.26 Response to information security incidents
๐Ÿ’ผ 5.27 Learning from information security incidents
๐Ÿ’ผ 5.28 Collection of evidence1421
๐Ÿ’ผ 5.29 Information security during disruption
๐Ÿ’ผ 5.30 ICT readiness for business continuity
๐Ÿ’ผ 5.31 Legal, statutory, regulatory and contractual requirements
๐Ÿ’ผ 5.32 Intellectual property rights
๐Ÿ’ผ 5.33 Protection of records1015
๐Ÿ’ผ 5.34 Privacy and protection of personal identifiable information (PII)
๐Ÿ’ผ 5.35 Independent review of information security
๐Ÿ’ผ 5.36 Compliance with policies, rules and standards for information security
๐Ÿ’ผ 5.37 Documented operating procedures