Skip to main content

๐Ÿ’ผ 8 Technological controls

  • Contextual name: ๐Ÿ’ผ 8 Technological controls
  • ID: /frameworks/iso-iec-27001-2022/08
  • Located in: ๐Ÿ’ผ ISO/IEC 27001:2022

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-8258c88f

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 8.1 User end point devices911
๐Ÿ’ผ 8.2 Privileged access rights77
๐Ÿ’ผ 8.3 Information access restriction1011
๐Ÿ’ผ 8.4 Access to source code89
๐Ÿ’ผ 8.5 Secure authentication
๐Ÿ’ผ 8.6 Capacity management33
๐Ÿ’ผ 8.7 Protection against malware11
๐Ÿ’ผ 8.8 Management of technical vulnerabilities99
๐Ÿ’ผ 8.9 Configuration management
๐Ÿ’ผ 8.10 Information deletion
๐Ÿ’ผ 8.11 Data masking
๐Ÿ’ผ 8.12 Data leakage prevention
๐Ÿ’ผ 8.13 Information backup11
๐Ÿ’ผ 8.14 Redundancy of information processing facilities
๐Ÿ’ผ 8.15 Logging1920
๐Ÿ’ผ 8.16 Monitoring activities66
๐Ÿ’ผ 8.17 Clock synchronization
๐Ÿ’ผ 8.18 Use of privileged utility programs
๐Ÿ’ผ 8.19 Installation of software on operational systems
๐Ÿ’ผ 8.20 Networks security55
๐Ÿ’ผ 8.21 Security of network services
๐Ÿ’ผ 8.22 Segregation of networks55
๐Ÿ’ผ 8.23 Web filtering
๐Ÿ’ผ 8.24 Use of cryptography
๐Ÿ’ผ 8.25 Secure development life cycle22
๐Ÿ’ผ 8.26 Application security requirements22
๐Ÿ’ผ 8.27 Secure system architecture and engineering principles11
๐Ÿ’ผ 8.28 Secure coding
๐Ÿ’ผ 8.29 Security testing in development and acceptance
๐Ÿ’ผ 8.30 Outsourced development
๐Ÿ’ผ 8.31 Separation of development, test and production environments
๐Ÿ’ผ 8.32 Change management
๐Ÿ’ผ 8.33 Test information
๐Ÿ’ผ 8.34 Protection of information systems during audit testing