Skip to main content

💼 8 Technological controls

  • ID: /frameworks/iso-iec-27001-2022/08

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-8258c88f

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 8.1 User end point devices813no data
💼 8.2 Privileged access rights710no data
💼 8.3 Information access restriction1024no data
💼 8.4 Access to source code822no data
💼 8.5 Secure authentication2no data
💼 8.6 Capacity management33no data
💼 8.7 Protection against malware11no data
💼 8.8 Management of technical vulnerabilities810no data
💼 8.9 Configuration management12no data
💼 8.10 Information deletionno data
💼 8.11 Data maskingno data
💼 8.12 Data leakage preventionno data
💼 8.13 Information backup12no data
💼 8.14 Redundancy of information processing facilitiesno data
💼 8.15 Logging1834no data
💼 8.16 Monitoring activities45no data
💼 8.17 Clock synchronizationno data
💼 8.18 Use of privileged utility programsno data
💼 8.19 Installation of software on operational systemsno data
💼 8.20 Networks security514no data
💼 8.21 Security of network servicesno data
💼 8.22 Segregation of networks44no data
💼 8.23 Web filteringno data
💼 8.24 Use of cryptographyno data
💼 8.25 Secure development life cycle22no data
💼 8.26 Application security requirements22no data
💼 8.27 Secure system architecture and engineering principles14no data
💼 8.28 Secure codingno data
💼 8.29 Security testing in development and acceptanceno data
💼 8.30 Outsourced developmentno data
💼 8.31 Separation of development, test and production environmentsno data
💼 8.32 Change managementno data
💼 8.33 Test informationno data
💼 8.34 Protection of information systems during audit testingno data