Section 5
Annex A Controls
All 93 controls of ISO/IEC 27001:2022, searchable by number or keyword.
93 / 93 controls
| # | Theme | Type | Control |
|---|---|---|---|
| 5.1 | A.5 | Preventive | Policies for information security Define, approve, publish, communicate and review a set of policies for information security at planned intervals. |
| 5.2 | A.5 | Preventive | Information security roles and responsibilities Define and allocate information security roles and responsibilities across the organisation. |
| 5.3 | A.5 | Preventive | Segregation of duties Segregate conflicting duties and areas of responsibility to reduce the risk of fraud, error and misuse. |
| 5.4 | A.5 | Preventive | Management responsibilities Management requires all personnel to apply information security in accordance with policies and procedures. |
| 5.5 | A.5 | Preventive | Contact with authorities Establish and maintain contact with relevant authorities. |
| 5.6 | A.5 | Preventive | Contact with special interest groups Maintain contact with special interest groups, security forums and professional associations. |
| 5.7 | A.5 | Detective | Threat intelligence Collect and analyse information related to information security threats to produce threat intelligence. |
| 5.8 | A.5 | Preventive | Information security in project management Integrate information security in project management regardless of the type of project. |
| 5.9 | A.5 | Preventive | Inventory of information and other associated assets Develop and maintain an inventory of information and other associated assets, including owners. |
| 5.10 | A.5 | Preventive | Acceptable use of information and other associated assets Identify, document and implement rules for the acceptable use of information and assets. |
| 5.11 | A.5 | Preventive | Return of assets Personnel and other interested parties return all organisational assets on termination of employment or contract. |
| 5.12 | A.5 | Preventive | Classification of information Classify information according to its information security needs based on confidentiality, integrity, availability and stakeholder requirements. |
| 5.13 | A.5 | Preventive | Labelling of information Develop and implement procedures for labelling information in line with the classification scheme. |
| 5.14 | A.5 | Preventive | Information transfer Establish rules, procedures and agreements for transferring information securely within and outside the organisation. |
| 5.15 | A.5 | Preventive | Access control Establish and implement rules to control physical and logical access to information and associated assets based on business and security requirements. |
| 5.16 | A.5 | Preventive | Identity management Manage the full life cycle of identities. |
| 5.17 | A.5 | Preventive | Authentication information Allocate and manage authentication information securely, including advising personnel on its proper handling. |
| 5.18 | A.5 | Preventive | Access rights Provision, review, modify and remove access rights in accordance with the access control policy. |
| 5.19 | A.5 | Preventive | Information security in supplier relationships Define and implement processes and procedures to manage information security risks associated with the use of supplier products and services. |
| 5.20 | A.5 | Preventive | Addressing information security within supplier agreements Establish and agree relevant information security requirements with each supplier based on the type of supplier relationship. |
| 5.21 | A.5 | Preventive | Managing information security in the ICT supply chain Manage information security risks associated with the ICT products and services supply chain. |
| 5.22 | A.5 | Detective | Monitoring, review and change management of supplier services Regularly monitor, review, evaluate and manage changes to supplier information security practices and service delivery. |
| 5.23 | A.5 | Preventive | Information security for use of cloud services Establish processes for the acquisition, use, management and exit from cloud services in accordance with the organisation's security requirements. |
| 5.24 | A.5 | Preventive | Information security incident management planning and preparation Plan and prepare for managing information security incidents by defining, establishing and communicating processes, roles and responsibilities. |
| 5.25 | A.5 | Detective | Assessment and decision on information security events Assess information security events and decide whether they are to be categorised as incidents. |
| 5.26 | A.5 | Corrective | Response to information security incidents Respond to information security incidents in accordance with the documented procedures. |
| 5.27 | A.5 | Corrective | Learning from information security incidents Use knowledge gained from incidents to strengthen and improve information security controls. |
| 5.28 | A.5 | Detective | Collection of evidence Establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events. |
| 5.29 | A.5 | Corrective | Information security during disruption Plan how to maintain information security at an appropriate level during disruption. |
| 5.30 | A.5 | Corrective | ICT readiness for business continuity Plan, implement, maintain and test ICT readiness based on business continuity objectives and ICT continuity requirements. |
| 5.31 | A.5 | Preventive | Legal, statutory, regulatory and contractual requirements Identify, document and keep up to date legal, statutory, regulatory and contractual requirements relevant to information security. |
| 5.32 | A.5 | Preventive | Intellectual property rights Implement procedures to protect intellectual property rights. |
| 5.33 | A.5 | Preventive | Protection of records Protect records from loss, destruction, falsification, unauthorised access and unauthorised release. |
| 5.34 | A.5 | Preventive | Privacy and protection of PII Identify and meet requirements for the preservation of privacy and protection of PII. |
| 5.35 | A.5 | Detective | Independent review of information security Independently review the organisation's approach to managing information security at planned intervals or when significant changes occur. |
| 5.36 | A.5 | Detective | Compliance with policies, rules and standards for information security Regularly review compliance with the organisation's information security policies, topic-specific policies, rules and standards. |
| 5.37 | A.5 | Preventive | Documented operating procedures Document operating procedures for information processing facilities and make them available to those who need them. |
| 6.1 | A.6 | Preventive | Screening Carry out background verification checks on all candidates prior to joining, proportionate to business requirements, classification of information and perceived risks. |
| 6.2 | A.6 | Preventive | Terms and conditions of employment Employment contracts state the personnel's and organisation's responsibilities for information security. |
| 6.3 | A.6 | Preventive | Information security awareness, education and training Provide personnel and relevant interested parties with appropriate awareness, education and training and regular updates. |
| 6.4 | A.6 | Corrective | Disciplinary process Formalise and communicate a disciplinary process to take action against personnel and other interested parties who have committed an information security policy violation. |
| 6.5 | A.6 | Preventive | Responsibilities after termination or change of employment Define, enforce and communicate information security responsibilities and duties that remain valid after termination or change of employment. |
| 6.6 | A.6 | Preventive | Confidentiality or non-disclosure agreements Identify, document, regularly review and have signed by personnel and other relevant interested parties confidentiality or non-disclosure agreements. |
| 6.7 | A.6 | Preventive | Remote working Implement security measures when personnel work remotely to protect information accessed, processed or stored outside the organisation's premises. |
| 6.8 | A.6 | Detective | Information security event reporting Provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner. |
| 7.1 | A.7 | Preventive | Physical security perimeters Define and use security perimeters to protect areas that contain information and associated assets. |
| 7.2 | A.7 | Preventive | Physical entry Protect secure areas by appropriate entry controls and access points. |
| 7.3 | A.7 | Preventive | Securing offices, rooms and facilities Design and apply physical security for offices, rooms and facilities. |
| 7.4 | A.7 | Detective | Physical security monitoring Continuously monitor premises for unauthorised physical access. |
| 7.5 | A.7 | Preventive | Protecting against physical and environmental threats Design and implement protection against physical and environmental threats such as natural disasters and intentional attacks. |
| 7.6 | A.7 | Preventive | Working in secure areas Design and implement procedures for working in secure areas. |
| 7.7 | A.7 | Preventive | Clear desk and clear screen Define and enforce clear desk rules for papers and removable storage media, and clear screen rules for information processing facilities. |
| 7.8 | A.7 | Preventive | Equipment siting and protection Site and protect equipment securely. |
| 7.9 | A.7 | Preventive | Security of assets off-premises Protect off-site assets. |
| 7.10 | A.7 | Preventive | Storage media Manage storage media through their life cycle of acquisition, use, transportation and disposal in accordance with the classification scheme and handling requirements. |
| 7.11 | A.7 | Preventive | Supporting utilities Protect information processing facilities from power failures and other disruptions caused by failures in supporting utilities. |
| 7.12 | A.7 | Preventive | Cabling security Protect cables carrying power, data or supporting information services from interception, interference or damage. |
| 7.13 | A.7 | Preventive | Equipment maintenance Correctly maintain equipment to ensure availability, integrity and confidentiality of information. |
| 7.14 | A.7 | Preventive | Secure disposal or re-use of equipment Verify items of equipment containing storage media to ensure that any sensitive data and licensed software have been removed or securely overwritten prior to disposal or re-use. |
| 8.1 | A.8 | Preventive | User endpoint devices Protect information stored on, processed by or accessible via user endpoint devices. |
| 8.2 | A.8 | Preventive | Privileged access rights Restrict and manage the allocation and use of privileged access rights. |
| 8.3 | A.8 | Preventive | Information access restriction Restrict access to information and other associated assets in accordance with the established access control policy. |
| 8.4 | A.8 | Preventive | Access to source code Appropriately manage read and write access to source code, development tools and software libraries. |
| 8.5 | A.8 | Preventive | Secure authentication Implement secure authentication technologies and procedures based on the access restrictions and the topic-specific policy on access control. |
| 8.6 | A.8 | Preventive | Capacity management Monitor and adjust the use of resources in line with current and expected capacity requirements. |
| 8.7 | A.8 | Preventive | Protection against malware Implement protection against malware supported by appropriate user awareness. |
| 8.8 | A.8 | Preventive | Management of technical vulnerabilities Obtain information about technical vulnerabilities, evaluate the exposure and take appropriate measures. |
| 8.9 | A.8 | Preventive | Configuration management Establish, document, implement, monitor and review configurations, including security configurations, of hardware, software, services and networks. |
| 8.10 | A.8 | Preventive | Information deletion Delete information stored in information systems, devices or in any other storage media when no longer required. |
| 8.11 | A.8 | Preventive | Data masking Use data masking in accordance with the access control policy and business requirements, taking applicable legislation into consideration. |
| 8.12 | A.8 | Preventive | Data leakage prevention Apply data leakage prevention measures to systems, networks and other devices that process, store or transmit sensitive information. |
| 8.13 | A.8 | Corrective | Information backup Maintain and regularly test backup copies of information, software and systems in accordance with the agreed backup policy. |
| 8.14 | A.8 | Preventive | Redundancy of information processing facilities Implement information processing facilities with sufficient redundancy to meet availability requirements. |
| 8.15 | A.8 | Detective | Logging Produce, store, protect and analyse logs that record activities, exceptions, faults and other relevant events. |
| 8.16 | A.8 | Detective | Monitoring activities Monitor networks, systems and applications for anomalous behaviour and take appropriate actions to evaluate potential information security incidents. |
| 8.17 | A.8 | Preventive | Clock synchronization Synchronise clocks of information processing systems to approved time sources. |
| 8.18 | A.8 | Preventive | Use of privileged utility programs Restrict and tightly control the use of utility programs that can override system and application controls. |
| 8.19 | A.8 | Preventive | Installation of software on operational systems Implement procedures and measures to securely manage software installation on operational systems. |
| 8.20 | A.8 | Preventive | Networks security Secure, manage and control networks and network devices to protect information in systems and applications. |
| 8.21 | A.8 | Preventive | Security of network services Identify, implement and monitor security mechanisms, service levels and service requirements of network services. |
| 8.22 | A.8 | Preventive | Segregation of networks Segregate groups of information services, users and information systems in the organisation's networks. |
| 8.23 | A.8 | Preventive | Web filtering Manage access to external websites to reduce exposure to malicious content. |
| 8.24 | A.8 | Preventive | Use of cryptography Define and implement rules for the effective use of cryptography, including cryptographic key management. |
| 8.25 | A.8 | Preventive | Secure development life cycle Establish and apply rules for the secure development of software and systems. |
| 8.26 | A.8 | Preventive | Application security requirements Identify, specify and approve information security requirements when developing or acquiring applications. |
| 8.27 | A.8 | Preventive | Secure system architecture and engineering principles Establish, document, maintain and apply secure system engineering principles to information system development activities. |
| 8.28 | A.8 | Preventive | Secure coding Apply secure coding principles to software development. |
| 8.29 | A.8 | Preventive | Security testing in development and acceptance Define and implement security testing processes in the development lifecycle. |
| 8.30 | A.8 | Preventive | Outsourced development Direct, monitor and review activities related to outsourced system development. |
| 8.31 | A.8 | Preventive | Separation of development, test and production environments Separate and secure development, testing and production environments. |
| 8.32 | A.8 | Preventive | Change management Subject changes to information processing facilities and systems to change management procedures. |
| 8.33 | A.8 | Preventive | Test information Select, protect and manage test information appropriately. |
| 8.34 | A.8 | Preventive | Protection of information systems during audit testing Plan and agree audit tests and other assurance activities involving operational systems to minimise disruption. |