This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- ISO27001:Controls/A.7.9 Security of assets off-premises + (9)
- ISO27001:Controls/A.8.10 Information deletion + (10)
- ISO27001:Controls/A.7.10 Storage media + (10)
- ISO27001:Controls/A.5.10 Acceptable use of information and other associated assets + (10)
- ISO27001:Controls/A.7.11 Supporting utilities + (11)
- ISO27001:Controls/A.8.11 Data masking + (11)
- ISO27001:Controls/A.5.11 Return of assets + (11)
- ISO27001:Controls/A.8.12 Data leakage prevention + (12)
- ISO27001:Controls/A.7.12 Cabling security + (12)
- ISO27001:Controls/A.5.12 Classification of information + (12)
- ISO27001:Controls/A.5.13 Labelling of information + (13)
- ISO27001:Controls/A.8.13 Information backup + (13)
- ISO27001:Controls/A.7.13 Equipment maintenance + (13)
- ISO27001:Controls/A.8.14 Redundancy of information processing facilities + (14)
- ISO27001:Controls/A.7.14 Secure disposal or re-use of equipment + (14)
- ISO27001:Controls/A.5.14 Information transfer + (14)
- ISO27001:Controls/A.8.15 Logging + (15)
- ISO27001:Controls/A.5.15 Access control + (15)
- ISO27001:Controls/A.8.16 Monitoring activities + (16)
- ISO27001:Controls/A.5.16 Identity management + (16)
- ISO27001:Controls/A.5.17 Authentication information + (17)
- ISO27001:Controls/A.8.17 Clock synchronization + (17)
- ISO27001:Controls/A.8.18 Use of privileged utility programs + (18)
- ISO27001:Controls/A.5.18 Access rights + (18)
- ISO27001:Controls/A.5.19 Information security in supplier relationships + (19)
- ISO27001:Controls/A.8.19 Installation of software on operational systems + (19)
- ISO27001:Controls/A.5.20 Addressing information security within supplier agreements + (20)
- ISO27001:Controls/A.8.20 Network controls + (20)
- ISO27001:Controls/A.8.21 Security of network services + (21)
- ISO27001:Controls/A.5.21 Managing information security in the ICT supply chain + (21)
- ISO27001:Controls/A.5.22 Monitoring, review and change management of supplier services + (22)
- ISO27001:Controls/A.8.22 Segregation in networks + (22)
- ISO27001:Controls/A.5.23 Information security for use of cloud services + (23)
- ISO27001:Controls/A.8.23 Web filtering + (23)
- ISO27001:Controls/A.5.24 Information security incident management planning and preparation + (24)
- ISO27001:Controls/A.8.24 Use of cryptography + (24)
- ISO27001:Controls/A.5.25 Assessment and decision on information security events + (25)
- ISO27001:Controls/A.8.25 Secure development lifecycle + (25)
- ISO27001:Controls/A.8.26 Application security requirements + (26)
- ISO27001:Controls/A.5.26 Response to information security incidents + (26)
- ISO27001:Controls/A.5.27 Learning from information security incidents + (27)
- ISO27001:Controls/A.8.27 Secure system architecture and engineering principles + (27)
- ISO27001:Controls/A.5.28 Collection of evidence + (28)
- ISO27001:Controls/A.8.28 Secure coding + (28)
- ISO27001:Controls/A.5.29 Information security during disruption + (29)
- ISO27001:Controls/A.8.29 Security testing in development and acceptance + (29)
- ISO27001:Controls/A.5.30 ICT readiness for business continuity + (30)
- ISO27001:Controls/A.8.30 Outsourced development + (30)
- ISO27001:Controls/A.5.31 Identification of legal, statutory, regulatory, and contractual requirements + (31)
- ISO27001:Controls/A.8.31 Separation of development, test and production environments + (31)
- ISO27001:Controls/A.5.32 Intellectual property rights + (32)
- ISO27001:Controls/A.8.32 Change management + (32)