Last edited 2 weeks ago
by WikiSysop

ISO27001 Annex A

  • implemented: 0
  • partially implemented: 0
  • applicable: 0
  • not applicable: 0
  • unchecked: 0
ISO 27001 Annex A Controls Status
5 Organizational
5.1 Policies for information security unchecked
5.2 Information security roles and responsibilities unchecked
5.3 Segregation of duties unchecked
5.4 Management responsibilities unchecked
5.5 Contact with authorities unchecked
5.6 Contact with special interest groups unchecked
5.7 Threat intelligence unchecked
5.8 Information security in project management unchecked
5.9 Inventory of information and other associated assets unchecked
5.10 Acceptable use of information and other associated assets unchecked
5.11 Return of assets unchecked
5.12 Classification of information unchecked
5.13 Labelling of information unchecked
5.14 Information transfer unchecked
5.15 Access control unchecked
5.16 Identity management unchecked
5.17 Authentication information unchecked
5.18 Access rights unchecked
5.19 Information security in supplier relationships unchecked
5.20 Addressing information security within supplier agreements unchecked
5.21 Managing information security in the ICT supply chain unchecked
5.22 Monitoring, review and change management of supplier services unchecked
5.23 Information security for use of cloud services Neu unchecked
5.24 Information security incident management planning and preparation unchecked
5.25 Assessment and decision on information security events unchecked
5.26 Response to information security incidents unchecked
5.27 Learning from information security incidents unchecked
5.28 Collection of evidence unchecked
5.29 Information security during disruption unchecked
5.30 ICT readiness for business continuity unchecked
5.31 Identification of legal, statutory, regulatory, and contractual requirements unchecked
5.32 Intellectual property rights unchecked
5.33 Protection of records unchecked
5.34 Privacy and protection of PII unchecked
5.35 Independent review of information security unchecked
5.36 Compliance with policies and standards for information security unchecked
5.37 Documented operating procedures unchecked
6 People controls
6.1 Screening unchecked
6.2 Terms and conditions of employment unchecked
6.3 Information security awareness, education and training unchecked
6.4 Disciplinary process unchecked
6.5 Responsibilities after termination or change of employment unchecked
6.6 Confidentiality or non-disclosure agreements unchecked
6.7 Remote working unchecked
6.8 Information security event reporting unchecked
7 Physical controls
7.1 Physical security perimeter unchecked
7.2 Physical entry controls unchecked
7.3 Securing offices, rooms and facilities unchecked
7.4 Physical security monitoring unchecked
7.5 Protecting against physical and environmental threats unchecked
7.6 Working in secure areas unchecked
7.7 Clear desk and clear screen unchecked
7.8 Equipment siting and protection unchecked
7.9 Security of assets off-premises unchecked
7.10 Storage media unchecked
7.11 Supporting utilities unchecked
7.12 Cabling security unchecked
7.13 Equipment maintenance unchecked
7.14 Secure disposal or re-use of equipment unchecked
8 Technological controls
8.1 User endpoint devices unchecked
8.2 Privileged access rights unchecked
8.3 Information access restriction unchecked
8.4 Access to source code unchecked
8.5 Secure authentication unchecked
8.6 Capacity management unchecked
8.7 Protection against malware unchecked
8.8 Management of technical vulnerabilities unchecked
8.9 Configuration management unchecked
8.10 Information deletion unchecked
8.11 Data masking unchecked
8.12 Data leakage prevention unchecked
8.13 Information backup unchecked
8.14 Redundancy of information processing facilities unchecked
8.15 Logging unchecked
8.16 Monitoring activities unchecked
8.17 Clock synchronization unchecked
8.18 Use of privileged utility programs unchecked
8.19 Installation of software on operational systems unchecked
8.20 Network controls unchecked
8.21 Security of network services unchecked
8.22 Segregation in networks unchecked
8.23 Web filtering unchecked
8.24 Use of cryptography unchecked
8.25 Secure development lifecycle unchecked
8.26 Application security requirements unchecked
8.27 Secure system architecture and engineering principles unchecked
8.28 Secure coding unchecked
8.29 Security testing in development and acceptance unchecked
8.30 Outsourced development unchecked
8.31 Separation of development, test and production environments unchecked
8.32 Change management unchecked
8.33 Test information unchecked
8.34 Protection of information systems during audit and testing unchecked