ISO/IEC 27001:2022 is an international standard for information security management systems (ISMS), providing a framework to protect and manage sensitive information systematically.
Information security controls related to the organization's policies; roles; processes; and relationships.
Information security policies and topic-specific policies should be defined and approved by management; published; communicated to relevant parties and reviewed at planned intervals and if significant changes occur.
Information security roles and responsibilities should be defined and allocated according to the information security management system (ISMS).
Conflicting duties and areas of responsibility should be segregated to reduce the opportunities for unauthorized or unintentional modification or misuse of organizational assets.
Management should require all persons performing information security roles to apply information security in accordance with the ISMS.
Rules for access rights should be established and implemented based on classification of information and other associated assets; and business requirements.
The organization should establish and maintain contact with relevant authorities.
The organization should establish and maintain contact with special interest groups or other specialist information security forums and professional associations.
Information security should be integrated into the project management of the organization.
An inventory of information and other associated assets; including owners; should be developed and maintained.
Rules for the acceptable use of information and other associated assets should be identified and implemented.
Personnel and other interested parties should return all of the organization's assets in their possession upon termination of their employment; contract or agreement.
Information should be classified in accordance with its information security needs based on confidentiality; integrity and availability requirements.
An appropriate set of procedures for labelling information should be developed and implemented in accordance with the organization’s information security policies.
Information transfer rules; procedures and agreements should be in place for all types of transfer facilities.
Rules for controlling physical and logical access to information and other associated assets should be established and implemented.
The unique identification of users should be established and managed throughout the entire information lifecycle.
The allocation and management of authentication information should be controlled by a management process.
The access rights to information and other associated assets should be managed in accordance with the organization's topic-specific policy on access control.
Relevant information security requirements should be established and implemented to manage the information security risks associated with supplier relationships.
Relevant information security requirements should be established and agreed with each supplier that accesses; processes; stores; transmits or provides ICT components for the organization’s information.
Processes and procedures should be implemented to manage information security risks associated with the use of the organization’s ICT supply chain.
Organizations should regularly monitor; review; evaluate and manage changes to supplier information security practices and service delivery.
The acquisition; use; management and exit from cloud services should be governed by the organization's policies; procedures; and agreements.
The organization should plan and prepare for managing information security incidents.
Information security events should be assessed; and decisions should be made on whether they are to be classified as information security incidents.
Information security incidents should be responded to in accordance with the documented information security incident management procedures.
Knowledge gained from information security incidents should be used to strengthen the ISMS.
Where a legal; statutory; regulatory or contractual requirement exists for evidence to be collected; the organization should establish and implement procedures for the identification; collection; acquisition and preservation of evidence relating to information security events.
The organization should plan and prepare for information security during disruption.
ICT continuity should be planned; implemented; maintained and tested in accordance with the organization's business continuity objectives and ICT continuity requirements.
Relevant legal; statutory; regulatory and contractual requirements should be identified; documented and kept up to date for each information system and service and the organization as a whole.
The organization should implement appropriate procedures to protect intellectual property rights.
Records should be protected from loss; destruction; falsification; unauthorized access and unauthorized release.
The organization should establish and implement policies and procedures for the protection of privacy and personally identifiable information (PII) in accordance with relevant laws and regulations.
The organization's approach to managing information security and its implementation (including the ISMS) should be subject to independent review at planned intervals or when significant changes occur.
Compliance of information processing and procedures with the organization's information security policies and standards should be regularly reviewed.
Operational procedures should be documented and made available to all relevant personnel.
Information about information security threats should be collected and analysed to produce threat intelligence.
Information security controls related to people within the organization.
Background verification checks on all candidates for employment and relevant third parties should be carried out in accordance with applicable laws; regulations and ethics and should be proportionate to the business requirements; the classification of the information to be accessed and the perceived risks.
The terms and conditions of employment should state the organization's and the individual’s responsibilities for information security.
All personnel of the organization and relevant interested parties should receive appropriate information security awareness; education and training and regular updates on organizational policies and procedures; as relevant for their job function.
A formal disciplinary process should be in place for personnel who have committed an information security breach.
Information security responsibilities and duties that remain valid after termination or change of employment should be defined; communicated to the relevant personnel or interested parties; and enforced.
Confidentiality or non-disclosure agreements reflecting the organization's needs for the protection of information should be identified; regularly reviewed and signed by personnel and other relevant interested parties.
Information security measures should be implemented to protect information when personnel are working remotely.
Personnel should be required to report information security events and observations of weaknesses in information security procedures or controls.
Information security controls related to physical and environmental security.
Physical security perimeters should be defined and used to protect areas that contain sensitive information and other associated assets.
Secure areas should be protected by appropriate entry controls to ensure that only authorized personnel are allowed access.
Physical security for offices; rooms and facilities should be designed and applied.
Premises should be continuously monitored for unauthorized physical access.
Protection against physical and environmental threats should be designed and applied.
A secure working environment should be designed and applied for secure areas.
Rules on clear desk and clear screen should be defined and implemented.
Equipment should be sited and protected to avoid unauthorized access; damage and interference to information and other associated assets.
Information and other associated assets kept off-premises should be protected from loss; damage; theft or compromise.
Storage media should be managed to protect information from unauthorized access; disclosure; modification or destruction.
Utilities supporting information processing facilities should be available; protected and monitored.
Power and telecommunications cabling carrying information should be protected from interception or damage.
Equipment should be maintained correctly to ensure its continued availability and integrity.
Equipment containing information should be securely disposed of or reused.
Information security controls related to technology; including networks; systems; applications; and data.
Information on user endpoint devices should be protected from loss; unauthorized access or misuse.
The allocation and management of privileged access rights should be restricted and controlled.
Access to information and other associated assets should be restricted in accordance with the topic-specific policy on access control.
Access to source code should be restricted and controlled.
Authentication to information and other associated assets should be secure.
The use of information processing facilities should be monitored; and projections of future capacity requirements should be made to ensure the required processing capacity is available.
Protection against malware should be implemented and regularly updated.
Information about technical vulnerabilities of information systems should be obtained; the organization's exposure to such vulnerabilities evaluated; and appropriate measures taken to address the identified risk.
Configurations; including security configurations; of information; software; applications; services and devices should be established; documented; implemented; monitored and reviewed.
Information stored in information systems; devices or other types of storage media should be deleted when no longer required.
Data masking should be used in accordance with the organization's topic-specific policy on access control and other relevant policies; e.g. topic-specific policy on privacy and protection of PII.
Data leakage prevention measures should be applied to systems; networks and any other devices that process; store or transmit sensitive information.
Backup copies of information; software and systems should be maintained and regularly tested in accordance with the organization's topic-specific policy on information backup.
Information processing facilities should be available with sufficient redundancy to meet availability requirements.
Logs that record events should be produced; stored; protected and analysed.
Networks; systems and applications should be monitored for anomalous behaviour and appropriate action taken.
Clocks of all relevant information processing systems within the organization should be synchronized to a single; agreed source time.
The use of privileged utility programs should be restricted and controlled.
The installation of software on operational systems should be restricted to authorized persons and managed.
Networks should be secured to protect information in systems and applications.
Security mechanisms; service levels and requirements of network services should be identified; implemented and monitored.
Access to external websites should be restricted in accordance with the organization’s topic-specific policies on acceptable use of information and other associated assets.
Secure coding principles should be applied to software and system development.
Security testing should be performed during development and acceptance of information systems.
Secure development environments should be established and managed to ensure information security within the entire system development lifecycle.
The organization should identify and implement appropriate security requirements and controls for outsourced system development.
Secure architecture and design principles should be applied across the entire lifecycle of systems and services, including acquisition, development, deployment, and maintenance.
Information security requirements should be identified and specified during the acquisition or development of information systems.
Information security architecture and engineering principles should be established; applied and periodically reviewed.
Information security should be designed into and implemented throughout the entire engineering process.
Development; test and production environments should be separated.
Changes to information systems; services; applications and information processing facilities should be controlled.
Protection of test information should be designed and applied.
Information systems should be protected during audit testing.
Define and implement network zones to isolate systems based on sensitivity, trust level, and functional requirements.
Organizations should develop and enforce a policy that defines the objectives, usage, and management of cryptographic controls (e.g., encryption, key management).
The organization must ensure that security requirements are considered in all stages of application development and acquisition, including requirements definition, design, implementation, and maintenance.