Skip to main content

๐Ÿ’ผ 8 Technological controls

  • Contextual name: ๐Ÿ’ผ 8 Technological controls
  • ID: /frameworks/iso-iec-27001-2022/08
  • Located in: ๐Ÿ’ผ ISO/IEC 27001:2022

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-8258c88f

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 8.1 User end point devices813
๐Ÿ’ผ 8.2 Privileged access rights710
๐Ÿ’ผ 8.3 Information access restriction1023
๐Ÿ’ผ 8.4 Access to source code821
๐Ÿ’ผ 8.5 Secure authentication2
๐Ÿ’ผ 8.6 Capacity management33
๐Ÿ’ผ 8.7 Protection against malware11
๐Ÿ’ผ 8.8 Management of technical vulnerabilities810
๐Ÿ’ผ 8.9 Configuration management12
๐Ÿ’ผ 8.10 Information deletion
๐Ÿ’ผ 8.11 Data masking
๐Ÿ’ผ 8.12 Data leakage prevention
๐Ÿ’ผ 8.13 Information backup12
๐Ÿ’ผ 8.14 Redundancy of information processing facilities
๐Ÿ’ผ 8.15 Logging1834
๐Ÿ’ผ 8.16 Monitoring activities45
๐Ÿ’ผ 8.17 Clock synchronization
๐Ÿ’ผ 8.18 Use of privileged utility programs
๐Ÿ’ผ 8.19 Installation of software on operational systems
๐Ÿ’ผ 8.20 Networks security514
๐Ÿ’ผ 8.21 Security of network services
๐Ÿ’ผ 8.22 Segregation of networks44
๐Ÿ’ผ 8.23 Web filtering
๐Ÿ’ผ 8.24 Use of cryptography
๐Ÿ’ผ 8.25 Secure development life cycle22
๐Ÿ’ผ 8.26 Application security requirements22
๐Ÿ’ผ 8.27 Secure system architecture and engineering principles14
๐Ÿ’ผ 8.28 Secure coding
๐Ÿ’ผ 8.29 Security testing in development and acceptance
๐Ÿ’ผ 8.30 Outsourced development
๐Ÿ’ผ 8.31 Separation of development, test and production environments
๐Ÿ’ผ 8.32 Change management
๐Ÿ’ผ 8.33 Test information
๐Ÿ’ผ 8.34 Protection of information systems during audit testing