Cookie consent settingsAccept all
  • Skip to header bar
  • Skip to main navigation
  • Skip to page tools
  • Skip to work area
  • New process
  • Overview
    • Files
    • Processes
    • Ratings
    • Recommendations
    • WikiExplorer
    • Workflows
  • Quick Links
    • Customers
    • Emergency manual
    • Org Chart
    • Processes
    External websites
    • BlueSpice Helpdesk
    • bluespice.com
    • hallowelt.com
    • mediawiki.org
    • semantic-mediawiki.org
    Wikipedia
    • ISO 9001
    • PDCA
    • Wikitext
    • Knowledge base
    • Knowledge management
    Business travel
    • Travel information Deutsche Bahn
    • German Federal Foreign Office
    • Regensburg hotels
  • Login
Main navigation contains tabs, main links and MediaWiki sidebar
Entrypoints
  • Main Page
  • Pages
  • Books
  • Blogs
  • Processes
  • Files
  • Recent changes
Getting started
  • Sandbox
Use cases
  • Knowledge Base
  • Integrated Management System
  • Documentation System
  • Organization Manual
  • IMS
  • Standards overview
    • ISO27001
      • Annex A
      Last edited one month ago
      by WikiSysop

      Annex A

      back to ISO27001

      • implemented: 0
      • partially implemented: 0
      • applicable: 0
      • not applicable: 0
      • unchecked: 93
      ISO 27001 Annex A Controls Status
      5 Organizational
      5.1 Policies for information security unchecked
      5.2 Information security roles and responsibilities unchecked
      5.3 Segregation of duties unchecked
      5.4 Management responsibilities unchecked
      5.5 Contact with authorities unchecked
      5.6 Contact with special interest groups unchecked
      5.7 Threat intelligence unchecked
      5.8 Information security in project management unchecked
      5.9 Inventory of information and other associated assets unchecked
      5.10 Acceptable use of information and other associated assets unchecked
      5.11 Return of assets unchecked
      5.12 Classification of information unchecked
      5.13 Labelling of information unchecked
      5.14 Information transfer unchecked
      5.15 Access control unchecked
      5.16 Identity management unchecked
      5.17 Authentication information unchecked
      5.18 Access rights unchecked
      5.19 Information security in supplier relationships unchecked
      5.20 Addressing information security within supplier agreements unchecked
      5.21 Managing information security in the ICT supply chain unchecked
      5.22 Monitoring, review and change management of supplier services unchecked
      5.23 Information security for use of cloud services Neu unchecked
      5.24 Information security incident management planning and preparation unchecked
      5.25 Assessment and decision on information security events unchecked
      5.26 Response to information security incidents unchecked
      5.27 Learning from information security incidents unchecked
      5.28 Collection of evidence unchecked
      5.29 Information security during disruption unchecked
      5.30 ICT readiness for business continuity unchecked
      5.31 Identification of legal, statutory, regulatory, and contractual requirements unchecked
      5.32 Intellectual property rights unchecked
      5.33 Protection of records unchecked
      5.34 Privacy and protection of PII unchecked
      5.35 Independent review of information security unchecked
      5.36 Compliance with policies and standards for information security unchecked
      5.37 Documented operating procedures unchecked
      6 People controls
      6.1 Screening unchecked
      6.2 Terms and conditions of employment unchecked
      6.3 Information security awareness, education and training unchecked
      6.4 Disciplinary process unchecked
      6.5 Responsibilities after termination or change of employment unchecked
      6.6 Confidentiality or non-disclosure agreements unchecked
      6.7 Remote working unchecked
      6.8 Information security event reporting unchecked
      7 Physical controls
      7.1 Physical security perimeter unchecked
      7.2 Physical entry controls unchecked
      7.3 Securing offices, rooms and facilities unchecked
      7.4 Physical security monitoring unchecked
      7.5 Protecting against physical and environmental threats unchecked
      7.6 Working in secure areas unchecked
      7.7 Clear desk and clear screen unchecked
      7.8 Equipment siting and protection unchecked
      7.9 Security of assets off-premises unchecked
      7.10 Storage media unchecked
      7.11 Supporting utilities unchecked
      7.12 Cabling security unchecked
      7.13 Equipment maintenance unchecked
      7.14 Secure disposal or re-use of equipment unchecked
      8 Technological controls
      8.1 User endpoint devices unchecked
      8.2 Privileged access rights unchecked
      8.3 Information access restriction unchecked
      8.4 Access to source code unchecked
      8.5 Secure authentication unchecked
      8.6 Capacity management unchecked
      8.7 Protection against malware unchecked
      8.8 Management of technical vulnerabilities unchecked
      8.9 Configuration management unchecked
      8.10 Information deletion unchecked
      8.11 Data masking unchecked
      8.12 Data leakage prevention unchecked
      8.13 Information backup unchecked
      8.14 Redundancy of information processing facilities unchecked
      8.15 Logging unchecked
      8.16 Monitoring activities unchecked
      8.17 Clock synchronization unchecked
      8.18 Use of privileged utility programs unchecked
      8.19 Installation of software on operational systems unchecked
      8.20 Network controls unchecked
      8.21 Security of network services unchecked
      8.22 Segregation in networks unchecked
      8.23 Web filtering unchecked
      8.24 Use of cryptography unchecked
      8.25 Secure development lifecycle unchecked
      8.26 Application security requirements unchecked
      8.27 Secure system architecture and engineering principles unchecked
      8.28 Secure coding unchecked
      8.29 Security testing in development and acceptance unchecked
      8.30 Outsourced development unchecked
      8.31 Separation of development, test and production environments unchecked
      8.32 Change management unchecked
      8.33 Test information unchecked
      8.34 Protection of information systems during audit and testing unchecked
      Retrieved from "https://en.demo.bluespice.com/w/index.php?title=IMS:Standards_overview/ISO27001/Annex_A&oldid=3271"
      No categories assignedEdit
      Page actions and tools navigaiton contains tabs, toolbox and actions
      Actions
      • Refresh
      • Copy URL
      • E-Mail
      • QR code
      Details
      • View history
      • Page information
      • Browse properties
      • ... all actions
      • Privacy policy
      • Terms of service
      • Disclaimer
      • Imprint
      • About
      • Analysis service
      • Edit preview settings
      • Powered by MediaWiki
      • Powered by BlueSpice
      • Powered by Semantic MediaWiki
      • Creative Commons License