logo

Database

ISO/IEC 27002

Last updated: 2025/07/23
logo

ISO/IEC 27002 is used as a reference for determining and implementing controls for information security risk treatment in an information security management system (ISMS) based on ISO/IEC 27001. It describes a suite of information security controls to mitigate unacceptable risks to the confidentiality, integrity, and availability of information. Organizations identify and evaluate their own information risks, selecting and applying suitable information security controls to mitigate unacceptable risks using ISO/IEC 27002 for guidance. The version used in this section is ISO/IEC 27002:2022.

Control-Requirement Mapping

DefinitionRequirements
5_16. Identity management
5_17. Authentication information
5_22. Monitoring, review and change management of supplier services
5_28. Collection of evidence
5_33. Protection of records
5_34. Privacy and protection of Personal Identifiable Information (PII)
5_35. Independent review of information security
5_37. Documented operating procedures
7_2. Physical entry controls
7_3. Securing offices, rooms and facilities
7_9. Security of assets off-premises
7_10. Storage media
7_14. Secure disposal or re-use of equipment
8_1. User endpoint devices
8_2. Privileged access rights
8_3. Information access restriction
8_4. Access to source code
8_5. Secure authentication
8_7. Protection against malware
8_8. Management of technical vulnerabilities
8_9. Configuration management
8_10. Information deletion
8_11. Data masking
8_15. Logging
8_16. Monitoring activities
8_17. Clock synchronization
8_19. Installation of software on operational systems
8_20. Network controls
8_21. Security of network services
8_22. Web filtering
8_23. Segregation in networks
8_24. Use of cryptography
8_25. Secure development lifecycle
8_26. Application security requirements
8_27. Secure system architecture and engineering principles
8_28. Secure coding
8_31. Separation of development, test and production environments