ISO 27001 Implementation Guide

Section 5

Annex A Controls

All 93 controls of ISO/IEC 27001:2022, searchable by number or keyword.

93 / 93 controls
#ThemeTypeControl
5.1A.5Preventive
Policies for information security
Define, approve, publish, communicate and review a set of policies for information security at planned intervals.
5.2A.5Preventive
Information security roles and responsibilities
Define and allocate information security roles and responsibilities across the organisation.
5.3A.5Preventive
Segregation of duties
Segregate conflicting duties and areas of responsibility to reduce the risk of fraud, error and misuse.
5.4A.5Preventive
Management responsibilities
Management requires all personnel to apply information security in accordance with policies and procedures.
5.5A.5Preventive
Contact with authorities
Establish and maintain contact with relevant authorities.
5.6A.5Preventive
Contact with special interest groups
Maintain contact with special interest groups, security forums and professional associations.
5.7A.5Detective
Threat intelligence
Collect and analyse information related to information security threats to produce threat intelligence.
5.8A.5Preventive
Information security in project management
Integrate information security in project management regardless of the type of project.
5.9A.5Preventive
Inventory of information and other associated assets
Develop and maintain an inventory of information and other associated assets, including owners.
5.10A.5Preventive
Acceptable use of information and other associated assets
Identify, document and implement rules for the acceptable use of information and assets.
5.11A.5Preventive
Return of assets
Personnel and other interested parties return all organisational assets on termination of employment or contract.
5.12A.5Preventive
Classification of information
Classify information according to its information security needs based on confidentiality, integrity, availability and stakeholder requirements.
5.13A.5Preventive
Labelling of information
Develop and implement procedures for labelling information in line with the classification scheme.
5.14A.5Preventive
Information transfer
Establish rules, procedures and agreements for transferring information securely within and outside the organisation.
5.15A.5Preventive
Access control
Establish and implement rules to control physical and logical access to information and associated assets based on business and security requirements.
5.16A.5Preventive
Identity management
Manage the full life cycle of identities.
5.17A.5Preventive
Authentication information
Allocate and manage authentication information securely, including advising personnel on its proper handling.
5.18A.5Preventive
Access rights
Provision, review, modify and remove access rights in accordance with the access control policy.
5.19A.5Preventive
Information security in supplier relationships
Define and implement processes and procedures to manage information security risks associated with the use of supplier products and services.
5.20A.5Preventive
Addressing information security within supplier agreements
Establish and agree relevant information security requirements with each supplier based on the type of supplier relationship.
5.21A.5Preventive
Managing information security in the ICT supply chain
Manage information security risks associated with the ICT products and services supply chain.
5.22A.5Detective
Monitoring, review and change management of supplier services
Regularly monitor, review, evaluate and manage changes to supplier information security practices and service delivery.
5.23A.5Preventive
Information security for use of cloud services
Establish processes for the acquisition, use, management and exit from cloud services in accordance with the organisation's security requirements.
5.24A.5Preventive
Information security incident management planning and preparation
Plan and prepare for managing information security incidents by defining, establishing and communicating processes, roles and responsibilities.
5.25A.5Detective
Assessment and decision on information security events
Assess information security events and decide whether they are to be categorised as incidents.
5.26A.5Corrective
Response to information security incidents
Respond to information security incidents in accordance with the documented procedures.
5.27A.5Corrective
Learning from information security incidents
Use knowledge gained from incidents to strengthen and improve information security controls.
5.28A.5Detective
Collection of evidence
Establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events.
5.29A.5Corrective
Information security during disruption
Plan how to maintain information security at an appropriate level during disruption.
5.30A.5Corrective
ICT readiness for business continuity
Plan, implement, maintain and test ICT readiness based on business continuity objectives and ICT continuity requirements.
5.31A.5Preventive
Legal, statutory, regulatory and contractual requirements
Identify, document and keep up to date legal, statutory, regulatory and contractual requirements relevant to information security.
5.32A.5Preventive
Intellectual property rights
Implement procedures to protect intellectual property rights.
5.33A.5Preventive
Protection of records
Protect records from loss, destruction, falsification, unauthorised access and unauthorised release.
5.34A.5Preventive
Privacy and protection of PII
Identify and meet requirements for the preservation of privacy and protection of PII.
5.35A.5Detective
Independent review of information security
Independently review the organisation's approach to managing information security at planned intervals or when significant changes occur.
5.36A.5Detective
Compliance with policies, rules and standards for information security
Regularly review compliance with the organisation's information security policies, topic-specific policies, rules and standards.
5.37A.5Preventive
Documented operating procedures
Document operating procedures for information processing facilities and make them available to those who need them.
6.1A.6Preventive
Screening
Carry out background verification checks on all candidates prior to joining, proportionate to business requirements, classification of information and perceived risks.
6.2A.6Preventive
Terms and conditions of employment
Employment contracts state the personnel's and organisation's responsibilities for information security.
6.3A.6Preventive
Information security awareness, education and training
Provide personnel and relevant interested parties with appropriate awareness, education and training and regular updates.
6.4A.6Corrective
Disciplinary process
Formalise and communicate a disciplinary process to take action against personnel and other interested parties who have committed an information security policy violation.
6.5A.6Preventive
Responsibilities after termination or change of employment
Define, enforce and communicate information security responsibilities and duties that remain valid after termination or change of employment.
6.6A.6Preventive
Confidentiality or non-disclosure agreements
Identify, document, regularly review and have signed by personnel and other relevant interested parties confidentiality or non-disclosure agreements.
6.7A.6Preventive
Remote working
Implement security measures when personnel work remotely to protect information accessed, processed or stored outside the organisation's premises.
6.8A.6Detective
Information security event reporting
Provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.
7.1A.7Preventive
Physical security perimeters
Define and use security perimeters to protect areas that contain information and associated assets.
7.2A.7Preventive
Physical entry
Protect secure areas by appropriate entry controls and access points.
7.3A.7Preventive
Securing offices, rooms and facilities
Design and apply physical security for offices, rooms and facilities.
7.4A.7Detective
Physical security monitoring
Continuously monitor premises for unauthorised physical access.
7.5A.7Preventive
Protecting against physical and environmental threats
Design and implement protection against physical and environmental threats such as natural disasters and intentional attacks.
7.6A.7Preventive
Working in secure areas
Design and implement procedures for working in secure areas.
7.7A.7Preventive
Clear desk and clear screen
Define and enforce clear desk rules for papers and removable storage media, and clear screen rules for information processing facilities.
7.8A.7Preventive
Equipment siting and protection
Site and protect equipment securely.
7.9A.7Preventive
Security of assets off-premises
Protect off-site assets.
7.10A.7Preventive
Storage media
Manage storage media through their life cycle of acquisition, use, transportation and disposal in accordance with the classification scheme and handling requirements.
7.11A.7Preventive
Supporting utilities
Protect information processing facilities from power failures and other disruptions caused by failures in supporting utilities.
7.12A.7Preventive
Cabling security
Protect cables carrying power, data or supporting information services from interception, interference or damage.
7.13A.7Preventive
Equipment maintenance
Correctly maintain equipment to ensure availability, integrity and confidentiality of information.
7.14A.7Preventive
Secure disposal or re-use of equipment
Verify items of equipment containing storage media to ensure that any sensitive data and licensed software have been removed or securely overwritten prior to disposal or re-use.
8.1A.8Preventive
User endpoint devices
Protect information stored on, processed by or accessible via user endpoint devices.
8.2A.8Preventive
Privileged access rights
Restrict and manage the allocation and use of privileged access rights.
8.3A.8Preventive
Information access restriction
Restrict access to information and other associated assets in accordance with the established access control policy.
8.4A.8Preventive
Access to source code
Appropriately manage read and write access to source code, development tools and software libraries.
8.5A.8Preventive
Secure authentication
Implement secure authentication technologies and procedures based on the access restrictions and the topic-specific policy on access control.
8.6A.8Preventive
Capacity management
Monitor and adjust the use of resources in line with current and expected capacity requirements.
8.7A.8Preventive
Protection against malware
Implement protection against malware supported by appropriate user awareness.
8.8A.8Preventive
Management of technical vulnerabilities
Obtain information about technical vulnerabilities, evaluate the exposure and take appropriate measures.
8.9A.8Preventive
Configuration management
Establish, document, implement, monitor and review configurations, including security configurations, of hardware, software, services and networks.
8.10A.8Preventive
Information deletion
Delete information stored in information systems, devices or in any other storage media when no longer required.
8.11A.8Preventive
Data masking
Use data masking in accordance with the access control policy and business requirements, taking applicable legislation into consideration.
8.12A.8Preventive
Data leakage prevention
Apply data leakage prevention measures to systems, networks and other devices that process, store or transmit sensitive information.
8.13A.8Corrective
Information backup
Maintain and regularly test backup copies of information, software and systems in accordance with the agreed backup policy.
8.14A.8Preventive
Redundancy of information processing facilities
Implement information processing facilities with sufficient redundancy to meet availability requirements.
8.15A.8Detective
Logging
Produce, store, protect and analyse logs that record activities, exceptions, faults and other relevant events.
8.16A.8Detective
Monitoring activities
Monitor networks, systems and applications for anomalous behaviour and take appropriate actions to evaluate potential information security incidents.
8.17A.8Preventive
Clock synchronization
Synchronise clocks of information processing systems to approved time sources.
8.18A.8Preventive
Use of privileged utility programs
Restrict and tightly control the use of utility programs that can override system and application controls.
8.19A.8Preventive
Installation of software on operational systems
Implement procedures and measures to securely manage software installation on operational systems.
8.20A.8Preventive
Networks security
Secure, manage and control networks and network devices to protect information in systems and applications.
8.21A.8Preventive
Security of network services
Identify, implement and monitor security mechanisms, service levels and service requirements of network services.
8.22A.8Preventive
Segregation of networks
Segregate groups of information services, users and information systems in the organisation's networks.
8.23A.8Preventive
Web filtering
Manage access to external websites to reduce exposure to malicious content.
8.24A.8Preventive
Use of cryptography
Define and implement rules for the effective use of cryptography, including cryptographic key management.
8.25A.8Preventive
Secure development life cycle
Establish and apply rules for the secure development of software and systems.
8.26A.8Preventive
Application security requirements
Identify, specify and approve information security requirements when developing or acquiring applications.
8.27A.8Preventive
Secure system architecture and engineering principles
Establish, document, maintain and apply secure system engineering principles to information system development activities.
8.28A.8Preventive
Secure coding
Apply secure coding principles to software development.
8.29A.8Preventive
Security testing in development and acceptance
Define and implement security testing processes in the development lifecycle.
8.30A.8Preventive
Outsourced development
Direct, monitor and review activities related to outsourced system development.
8.31A.8Preventive
Separation of development, test and production environments
Separate and secure development, testing and production environments.
8.32A.8Preventive
Change management
Subject changes to information processing facilities and systems to change management procedures.
8.33A.8Preventive
Test information
Select, protect and manage test information appropriately.
8.34A.8Preventive
Protection of information systems during audit testing
Plan and agree audit tests and other assurance activities involving operational systems to minimise disruption.