Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Iso27002 2022

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

5.

1 Policies for information security

5.2 Information security roles and


responsibilities

5.3 Segregation of duties

5.4 Management responsibilities

5.5 Contact with authorities

5.6 Contact with special interest


groups

5.7 Threat intelligence

5.8 Information security in project


management

5.9 Inventory of information and


other associated assets

5.10 Acceptable use of information


and other associated assets

5.11 Return of assets

5.12 Classification of information

5.13 Labelling of information

5.14 Information transfer

5.15 Access control

5.16 Identity management

5.17 Authentication information

5.18 Access rights

A.5 Organizational Controls


5.19 Information security in supplier relationships

5.20 Addressing information security within supplier agreements

5.21 Managing information security in the ICT supply chain

5.22 Monitoring, review and change management of supplier services

5.23 Information security for use of cloud services

5.24 Information security incident management planning and preparation

5.25 Assessment and decision on information security events

5.26 Response to information security incidents

5.27 Learning from information security incidents

5.28 Collection of evidence

5.29 Information security during disruption

Application security 5.30 ICT readiness for business continuity

Asset management 5.31 Legal, statutory, regulatory and contractual requirements

Continuity 5.32 Intellectual property rights

Data protection 5.33 Protection of records

Governance 5.34 Privacy and protection of PII

Human resource security 5.35 Independent review of information security

Identity and access management 5.36 Compliance with policies, rules and standards for information security

Information security event management 5.37 Documented operating procedures


Operational Capabilities
Legal and compliance 6.1 Screening

Physical security 6.2 Terms and conditions of employment

Secure configuration 6.3 Information security awareness, education and training

Security assurance 6.4 Disciplinary process

Supplier relationships security A.6 People Controls 6.5 Responsibilities after termination or change of employment

System and network security 6.6 Confidentiality or non-disclosure agreements

Threat and vulnerability management 6.7 Remote working

Identify 6.8 Information security event reporting

Protect 7.1 Physical security perimeters

Detect Cybersecurity Concepts 7.2 Physical entry

Respond 7.3 Securing offices, rooms and facilities

ISO 27001:2022 Controls


Recover 7.4 Physical security monitoring

Confidentiality 7.5 Protecting against physical and environmental threats

Integrity 7.6 Working in secure areas


Information Security Property
Availability 7.7 Clear desk and clear screen

Preventive A.7 Physical Controls 7.8 Equipment siting and protection

Detective Control Type 7.9 Security of assets off-premises

Corrective 7.10 Storage media

Governance and Ecosystem 7.11 Supporting utilities

Protection 7.12 Cabling security

Defence Security Domains 7.13 Equipment maintenance

Resilience 7.14 Secure disposal or re-use of equipment

8.1 User endpoint devices

8.2 Privileged access rights

8.3 Information access restriction

8.4 Access to source code

8.5 Secure authentication

8.6 Capacity management

8.7 Protection against malware

8.8 Management of technical vulnerabilities

8.9 Configuration management

8.10 Information deletion

8.11 Data masking

8.12 Data leakage prevention

8.13 Information backup

8.14 Redundancy of information processing facilities

8.15 Logging

8.16 Monitoring activities

8.17 Clock synchronization

A.8 Technological Controls 8.18 Use of privileged utility programs

8.19 Installation of software on operational systems

8.20 Networks security

8.21 Security of network services

8.22 Segregation of networks

8.23 Web filtering

8.24 Use of cryptography

8.25 Secure development lifecycle

8.26 Application security requirements

8.27 Secure system architecture and engineering principles

8.28 Secure coding

8.29 Security testing in development and acceptance

8.30 Outsourced development

8.31 Separation of development, test and production environments

8.32 Change management

8.33 Test information

8.34 Protection of information systems during audit testing

You might also like