logo

Database

ISO/IEC 27001

Last updated: 2023/09/18
logo

ISO/IEC 27001 is widely known, providing requirements for an information security management system (ISMS), though there are more than a dozen standards in the ISO/IEC 27000 family. Using them enables organizations of any kind to manage the security of assets such as financial information, intellectual property, employee details or information entrusted by third parties. The version used in this section is ISO/IEC 27001:2022 - Annex A.

Control-Requirement Mapping

DefinitionRequirements
5_16. Identity management
5_17. Authentication information
5_22. Monitoring, review and change management of supplier services
5_28. Collection of evidence
5_33. Protection of records
5_34. Privacy and protection of Personal Identifiable Information (PII)
5_35. Independent review of information security
5_37. Documented operating procedures
7_2. Physical entry controls
7_3. Securing offices, rooms and facilities
7_9. Security of assets off-premises
7_10. Storage media
7_14. Secure disposal or re-use of equipment
8_1. User endpoint devices
8_2. Privileged access rights
8_3. Information access restriction
8_4. Access to source code
8_5. Secure authentication
8_7. Protection against malware
8_8. Management of technical vulnerabilities
8_9. Configuration management
8_10. Information deletion
8_11. Data masking
8_15. Logging
8_16. Monitoring activities
8_17. Clock synchronization
8_19. Installation of software on operational systems
8_20. Network controls
8_21. Security of network services
8_22. Web filtering
8_23. Segregation in networks
8_24. Use of cryptography
8_25. Secure development lifecycle
8_26. Application security requirements
8_27. Secure system architecture and engineering principles
8_28. Secure coding
8_31. Separation of development, test and production environments