Skip to main content

💼 8 Technological controls

  • Contextual name: 💼 8 Technological controls
  • ID: /frameworks/iso-iec-27001-2022/08
  • Located in: 💼 ISO/IEC 27001:2022

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-8258c88f

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 8.1 User end point devices813
💼 8.2 Privileged access rights710
💼 8.3 Information access restriction1023
💼 8.4 Access to source code821
💼 8.5 Secure authentication2
💼 8.6 Capacity management33
💼 8.7 Protection against malware11
💼 8.8 Management of technical vulnerabilities810
💼 8.9 Configuration management12
💼 8.10 Information deletion
💼 8.11 Data masking
💼 8.12 Data leakage prevention
💼 8.13 Information backup12
💼 8.14 Redundancy of information processing facilities
💼 8.15 Logging1834
💼 8.16 Monitoring activities45
💼 8.17 Clock synchronization
💼 8.18 Use of privileged utility programs
💼 8.19 Installation of software on operational systems
💼 8.20 Networks security514
💼 8.21 Security of network services
💼 8.22 Segregation of networks44
💼 8.23 Web filtering
💼 8.24 Use of cryptography
💼 8.25 Secure development life cycle22
💼 8.26 Application security requirements22
💼 8.27 Secure system architecture and engineering principles14
💼 8.28 Secure coding
💼 8.29 Security testing in development and acceptance
💼 8.30 Outsourced development
💼 8.31 Separation of development, test and production environments
💼 8.32 Change management
💼 8.33 Test information
💼 8.34 Protection of information systems during audit testing