ISO/IEC 27001:2022 is an international standard for information security management systems (ISMS), providing a framework to protect and manage sensitive information systematically.
This group is the largest of the four and the controls in here have a largely policy and procedure-driven focus ranging from threat intelligence to classification of information to access control and much more.
Establish and maintain information security policies.
Define and assign information security roles and responsibilities.
Segregate conflicting duties and areas of responsibility.
Assign information security responsibilities to management.
Establish and maintain contact with relevant authorities.
Establish and maintain contact with special interest groups.
Collect and analyze information about information security threats.
Integrate information security into project management.
Identify and manage an inventory of information and other associated assets.
Define and implement rules for the acceptable use of information and other associated assets.
Implement a process for the return of assets upon termination of employment or contract.
Classify information according to its security requirements.
Label information according to its classification.
Implement procedures for the secure transfer of information.
Implement access control policies and procedures.
Manage the lifecycle of user identities.
Protect authentication information.
Define and manage access rights.
Address information security when dealing with suppliers.
Include information security requirements in supplier agreements.
Manage information security risks associated with the ICT supply chain.
Monitor review and manage changes to supplier services.
Address information security when using cloud services.
Plan and prepare for managing information security incidents.
Assess and decide whether information security events should be treated as incidents.
Implement procedures to respond to information security incidents.
Learn from information security incidents.
Establish and implement procedures for the collection and preservation of evidence related to information security events and incidents.
Plan for information security during disruption.
Plan for ICT readiness for business continuity.
Identify and document legal statutory regulatory and contractual requirements related to information security.
Protect intellectual property rights.
Protect records from unauthorized access disclosure modification or destruction.
Protect privacy and personally identifiable information (PII) according to applicable laws and regulations.
Conduct independent reviews of the organization's approach to information security.
Provide information security awareness education and training.
Plan for information security aspects of business continuity.
This section focuses on the human element of information security ensuring that individuals within the organization are aware of their responsibilities and act in a secure manner.
Conduct background checks on prospective employees.
Include information security responsibilities in employment contracts.
Provide ongoing information security awareness education and training.
Establish and communicate a disciplinary process for information security breaches.
Define and communicate responsibilities after termination or change of employment.
Implement confidentiality or non-disclosure agreements.
Implement security measures for remote working.
Establish and communicate a process for reporting information security events.
These controls address the physical environment and aim to prevent unauthorized physical access damage and interference to the organization's facilities and information.
Define and implement physical security perimeters.
Control physical entry to facilities.
Secure offices rooms and facilities.
Monitor physical security.
Protect against physical and environmental threats.
Establish and implement procedures for working in secure areas.
Implement a clear desk and clear screen policy.
Securely site and protect equipment.
Secure assets when they are off-premises.
Securely manage storage media.
Ensure the security of supporting utilities.
Secure cabling.
Ensure proper maintenance of equipment.
Ensure the secure disposal or re-use of equipment.
This category focuses on the technical measures implemented to protect information systems and data from unauthorized access use disclosure disruption modification or destruction.
Secure user endpoint devices.
Manage and restrict privileged access rights.
Restrict access to information based on business requirements.
Control access to source code.
Implement secure authentication mechanisms.
Plan and manage IT capacity.
Implement measures to protect against malware.
Manage technical vulnerabilities.
Manage the configuration of IT systems and services.
Securely delete information when it is no longer needed.
Use data masking techniques where appropriate.
Implement data leakage prevention (DLP) measures.
Perform regular backups of information.
Implement redundancy for critical information processing facilities.
Implement logging of relevant events.
Monitor security-related activities.
Synchronize clocks across IT systems.
Restrict and monitor the use of privileged utility programs.
Control the installation of software on operational systems.
Secure network infrastructure.
Ensure the security of network services.
Implement segregation of networks.
Implement web filtering.
Use cryptography to protect data.
Implement a secure development life cycle (SDLC).
Define and implement application security requirements.
Design systems based on secure architecture and engineering principles.
Implement secure coding practices.
Conduct security testing during development and acceptance phases.
Manage security aspects of outsourced development.
Maintain separation of development test and production environments.
Implement a change management process.
Protect test information.
Protect information systems during audit testing.