Skip to main content

๐Ÿ’ผ 5 Organizational controls

  • Contextual name: ๐Ÿ’ผ 5 Organizational controls
  • ID: /frameworks/iso-iec-27001-2022/05
  • Located in: ๐Ÿ’ผ ISO/IEC 27001:2022

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-675166a2

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 5.1 Policies for information security
๐Ÿ’ผ 5.2 Information security roles and responsibilities
๐Ÿ’ผ 5.3 Segregation of duties22
๐Ÿ’ผ 5.4 Management responsibilities
๐Ÿ’ผ 5.5 Contact with authorities22
๐Ÿ’ผ 5.6 Contact with special interest22
๐Ÿ’ผ 5.7 Threat intelligence
๐Ÿ’ผ 5.8 Information security in project
๐Ÿ’ผ 5.9 Inventory of information and35
๐Ÿ’ผ 5.10 Acceptable use of information and other associated assets1114
๐Ÿ’ผ 5.11 Return of assets
๐Ÿ’ผ 5.12 Classification of information
๐Ÿ’ผ 5.13 Labelling of information
๐Ÿ’ผ 5.14 Information transfer89
๐Ÿ’ผ 5.15 Access control1416
๐Ÿ’ผ 5.16 Identity management24
๐Ÿ’ผ 5.17 Authentication information11
๐Ÿ’ผ 5.18 Access rights46
๐Ÿ’ผ 5.19 Information security in supplier relationships
๐Ÿ’ผ 5.20 Addressing information security within supplier agreements22
๐Ÿ’ผ 5.21 Managing information security in the information and communication technology (ICT) supply chain
๐Ÿ’ผ 5.22 Monitoring, review and change Control Control management of supplier services
๐Ÿ’ผ 5.23 Information security for use of cloud services
๐Ÿ’ผ 5.24 Information security incident management planning and preparation22
๐Ÿ’ผ 5.25 Assessment and decision on information security events11
๐Ÿ’ผ 5.26 Response to information security incidents
๐Ÿ’ผ 5.27 Learning from information security incidents
๐Ÿ’ผ 5.28 Collection of evidence1415
๐Ÿ’ผ 5.29 Information security during disruption
๐Ÿ’ผ 5.30 ICT readiness for business continuity
๐Ÿ’ผ 5.31 Legal, statutory, regulatory and contractual requirements
๐Ÿ’ผ 5.32 Intellectual property rights
๐Ÿ’ผ 5.33 Protection of records1010
๐Ÿ’ผ 5.34 Privacy and protection of personal identifiable information (PII)
๐Ÿ’ผ 5.35 Independent review of information security
๐Ÿ’ผ 5.36 Compliance with policies, rules and standards for information security
๐Ÿ’ผ 5.37 Documented operating procedures