Skip to main content

๐Ÿ’ผ ISO/IEC 27001:2022

  • Contextual name: ๐Ÿ’ผ ISO/IEC 27001:2022
  • ID: /frameworks/iso-iec-27001-2022

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-a-2df38173

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 5 Organizational controls37
    ๐Ÿ’ผ 5.1 Policies for information security
    ๐Ÿ’ผ 5.2 Information security roles and responsibilities
    ๐Ÿ’ผ 5.3 Segregation of duties22
    ๐Ÿ’ผ 5.4 Management responsibilities
    ๐Ÿ’ผ 5.5 Contact with authorities22
    ๐Ÿ’ผ 5.6 Contact with special interest22
    ๐Ÿ’ผ 5.7 Threat intelligence
    ๐Ÿ’ผ 5.8 Information security in project
    ๐Ÿ’ผ 5.9 Inventory of information and35
    ๐Ÿ’ผ 5.10 Acceptable use of information and other associated assets1114
    ๐Ÿ’ผ 5.11 Return of assets
    ๐Ÿ’ผ 5.12 Classification of information
    ๐Ÿ’ผ 5.13 Labelling of information
    ๐Ÿ’ผ 5.14 Information transfer89
    ๐Ÿ’ผ 5.15 Access control1416
    ๐Ÿ’ผ 5.16 Identity management24
    ๐Ÿ’ผ 5.17 Authentication information11
    ๐Ÿ’ผ 5.18 Access rights46
    ๐Ÿ’ผ 5.19 Information security in supplier relationships
    ๐Ÿ’ผ 5.20 Addressing information security within supplier agreements22
    ๐Ÿ’ผ 5.21 Managing information security in the information and communication technology (ICT) supply chain
    ๐Ÿ’ผ 5.22 Monitoring, review and change Control Control management of supplier services
    ๐Ÿ’ผ 5.23 Information security for use of cloud services
    ๐Ÿ’ผ 5.24 Information security incident management planning and preparation22
    ๐Ÿ’ผ 5.25 Assessment and decision on information security events11
    ๐Ÿ’ผ 5.26 Response to information security incidents
    ๐Ÿ’ผ 5.27 Learning from information security incidents
    ๐Ÿ’ผ 5.28 Collection of evidence1415
    ๐Ÿ’ผ 5.29 Information security during disruption
    ๐Ÿ’ผ 5.30 ICT readiness for business continuity
    ๐Ÿ’ผ 5.31 Legal, statutory, regulatory and contractual requirements
    ๐Ÿ’ผ 5.32 Intellectual property rights
    ๐Ÿ’ผ 5.33 Protection of records1010
    ๐Ÿ’ผ 5.34 Privacy and protection of personal identifiable information (PII)
    ๐Ÿ’ผ 5.35 Independent review of information security
    ๐Ÿ’ผ 5.36 Compliance with policies, rules and standards for information security
    ๐Ÿ’ผ 5.37 Documented operating procedures
๐Ÿ’ผ 6 People controls8
    ๐Ÿ’ผ 6.1 Screening
    ๐Ÿ’ผ 6.2 Terms and conditions of employment
    ๐Ÿ’ผ 6.3 Information security awareness, education and training
    ๐Ÿ’ผ 6.4 Disciplinary process
    ๐Ÿ’ผ 6.5 Responsibilities after termination or change of employment24
    ๐Ÿ’ผ 6.6 Confidentiality or non-disclosure agreements
    ๐Ÿ’ผ 6.7 Remote working34
    ๐Ÿ’ผ 6.8 Information security event reporting
๐Ÿ’ผ 7 Physical controls14
    ๐Ÿ’ผ 7.1 Physical security perimeters
    ๐Ÿ’ผ 7.2 Physical entry
    ๐Ÿ’ผ 7.3 Securing offices, rooms and facilities
    ๐Ÿ’ผ 7.4 Physical security monitoring
    ๐Ÿ’ผ 7.5 Protecting against physical and environmental threats
    ๐Ÿ’ผ 7.6 Working in secure areas
    ๐Ÿ’ผ 7.7 Clear desk and clear screen
    ๐Ÿ’ผ 7.8 Equipment siting and protection
    ๐Ÿ’ผ 7.9 Security of assets off-premises
    ๐Ÿ’ผ 7.10 Storage media
    ๐Ÿ’ผ 7.11 Supporting utilities
    ๐Ÿ’ผ 7.12 Cabling security
    ๐Ÿ’ผ 7.13 Equipment maintenance
    ๐Ÿ’ผ 7.14 Secure disposal or re-use of equipment
๐Ÿ’ผ 8 Technological controls34
    ๐Ÿ’ผ 8.1 User end point devices710
    ๐Ÿ’ผ 8.2 Privileged access rights77
    ๐Ÿ’ผ 8.3 Information access restriction1011
    ๐Ÿ’ผ 8.4 Access to source code89
    ๐Ÿ’ผ 8.5 Secure authentication
    ๐Ÿ’ผ 8.6 Capacity management33
    ๐Ÿ’ผ 8.7 Protection against malware11
    ๐Ÿ’ผ 8.8 Management of technical vulnerabilities88
    ๐Ÿ’ผ 8.9 Configuration management
    ๐Ÿ’ผ 8.10 Information deletion
    ๐Ÿ’ผ 8.11 Data masking
    ๐Ÿ’ผ 8.12 Data leakage prevention
    ๐Ÿ’ผ 8.13 Information backup11
    ๐Ÿ’ผ 8.14 Redundancy of information processing facilities
    ๐Ÿ’ผ 8.15 Logging1819
    ๐Ÿ’ผ 8.16 Monitoring activities34
    ๐Ÿ’ผ 8.17 Clock synchronization
    ๐Ÿ’ผ 8.18 Use of privileged utility programs
    ๐Ÿ’ผ 8.19 Installation of software on operational systems
    ๐Ÿ’ผ 8.20 Networks security55
    ๐Ÿ’ผ 8.21 Security of network services
    ๐Ÿ’ผ 8.22 Segregation of networks34
    ๐Ÿ’ผ 8.23 Web filtering
    ๐Ÿ’ผ 8.24 Use of cryptography
    ๐Ÿ’ผ 8.25 Secure development life cycle22
    ๐Ÿ’ผ 8.26 Application security requirements22
    ๐Ÿ’ผ 8.27 Secure system architecture and engineering principles11
    ๐Ÿ’ผ 8.28 Secure coding
    ๐Ÿ’ผ 8.29 Security testing in development and acceptance
    ๐Ÿ’ผ 8.30 Outsourced development
    ๐Ÿ’ผ 8.31 Separation of development, test and production environments
    ๐Ÿ’ผ 8.32 Change management
    ๐Ÿ’ผ 8.33 Test information
    ๐Ÿ’ผ 8.34 Protection of information systems during audit testing