logo

ISO/IEC 27002


Summary

ISO/IEC 27002 is used as a reference for determining and implementing controls for information security risk treatment in an information security management system (ISMS) based on ISO/IEC 27001. It describes a suite of information security controls to mitigate unacceptable risks to the confidentiality, integrity, and availability of information. Organizations identify and evaluate their own information risks, selecting and applying suitable information security controls to mitigate unacceptable risks using ISO/IEC 27002 for guidance. The version used in this section is ISO/IEC 27002:2022.


Definitions

DefinitionRequirements
ISO27002-5_16. Identity management
ISO27002-5_17. Authentication information
ISO27002-5_22. Monitoring, review and change management of supplier services
ISO27002-5_28. Collection of evidence
ISO27002-5_33. Protection of records
ISO27002-5_34. Privacy and protection of Personal Identifiable Information (PII)
ISO27002-5_35. Independent review of information security
ISO27002-5_37. Documented operating procedures
ISO27002-7_2. Physical entry controls
ISO27002-7_3. Securing offices, rooms and facilities
ISO27002-7_9. Security of assets off-premises
ISO27002-7_10. Storage media
ISO27002-7_14. Secure disposal or re-use of equipment
ISO27002-8_1. User endpoint devices
ISO27002-8_2. Privileged access rights
ISO27002-8_3. Information access restriction
ISO27002-8_4. Access to source code
ISO27002-8_5. Secure authentication
ISO27002-8_7. Protection against malware
ISO27002-8_8. Management of technical vulnerabilities
ISO27002-8_9. Configuration management
ISO27002-8_10. Information deletion
ISO27002-8_11. Data masking
ISO27002-8_15. Logging
ISO27002-8_16. Monitoring activities
ISO27002-8_17. Clock synchronization
ISO27002-8_19. Installation of software on operational systems
ISO27002-8_20. Network controls
ISO27002-8_21. Security of network services
ISO27002-8_22. Web filtering
ISO27002-8_23. Segregation in networks
ISO27002-8_24. Use of cryptography
ISO27002-8_25. Secure development lifecycle
ISO27002-8_26. Application security requirements
ISO27002-8_27. Secure system architecture and engineering principles
ISO27002-8_28. Secure coding
ISO27002-8_31. Separation of development, test and production environments

Last updated

2025/07/23