ISO 27001

Progress: 57%

Statement of Applicability

NoControlApplicabilityStatusOwnerDueCompletedJustification / Comments
1
Policies for information security
Policies for information securityPolicies for information security
2
Information security roles and responsibilities
Information security roles and responsibilitiesInformation security roles and responsibilities
3
Segregation of duties
Segregation of dutiesSegregation of duties
4
Management responsiblities
Management responsiblitiesManagement responsiblities
5
Contact with authorities
Contact with authoritiesContact with authorities
6
Contact with special interest groups
Contact with special interest groupsContact with special interest groups
7
Threat intelligence
Threat intelligenceThreat intelligence
8
Information security in project management
Information security in project managementInformation security in project management
9
Inventory of information and other associated assets
Inventory of information and other associated assetsInventory of information and other associated assets
10
Acceptable use of information and associated assets
Acceptable use of information and associated assetsAcceptable use of information and associated assets
11
Return of assets
Return of assetsReturn of assets
12
Classification of information
Classification of informationClassification of information
13
Labelling of information
Labelling of informationLabelling of information
14
Information transfer
Information transferInformation transfer
15
Access control
Access controlAccess control
16
Identity management
Identity managementIdentity management
17
Authentication information
Authentication informationAuthentication information
18
Access rights
Access rightsAccess rights
19
Information security in supplier relationships
Information security in supplier relationshipsInformation security in supplier relationships
20
Addressing information security within supplier agreements
Addressing information security within supplier agreementsAddressing information security within supplier agreements
21
Managing information security in the ICT supply chain
Managing information security in the ICT supply chainManaging information security in the ICT supply chain
22
Monitoring, review and change management of supplier services
Monitoring, review and change management of supplier servicesMonitoring, review and change management of supplier services
23
Information security for use of cloud services
Information security for use of cloud servicesInformation security for use of cloud services
24
Information security incident management responsibliities and preperation
Information security incident management responsibliities and preperationInformation security incident management responsibliities and preperation
25
Assessment and decision of information security events
Assessment and decision of information security eventsAssessment and decision of information security events
26
Response to information security incidents
Response to information security incidentsResponse to information security incidents
27
Learning from information security incidents
Learning from information security incidentsLearning from information security incidents
28
Collection of evidence
Collection of evidenceCollection of evidence
29
Information security during disruption
Information security during disruptionInformation security during disruption
30
ICT readiness for business continuity
ICT readiness for business continuityICT readiness for business continuity
31
Identification of legal, statutory, regulatory and contractual requirements
Identification of legal, statutory, regulatory and contractual requirementsIdentification of legal, statutory, regulatory and contractual requirements
32
Intellectual property rights
Intellectual property rightsIntellectual property rights
33
Protection of records
Protection of recordsProtection of records
34
Privacy and protection of PII
Privacy and protection of PIIPrivacy and protection of PII
35
Independent review of information security
Independent review of information securityIndependent review of information security
36
Compliance with policies and standards for information security
Compliance with policies and standards for information securityCompliance with policies and standards for information security
37
Documented operation procedures
Documented operation proceduresDocumented operation procedures
38
People controls
People controlsPeople controls
39
Screening
ScreeningScreening
40
Terms and conditions of employment
Terms and conditions of employmentTerms and conditions of employment
41
Information security awareness, education and training
Information security awareness, education and trainingInformation security awareness, education and training
42
Disciplinary process
Disciplinary processDisciplinary process
43
Responsibilities after termination or change of employment
Responsibilities after termination or change of employmentResponsibilities after termination or change of employment
44
Confidentiality or non-disclosure agreements
Confidentiality or non-disclosure agreementsConfidentiality or non-disclosure agreements
45
Remote working
Remote workingRemote working
46
Information security event reporting
Information security event reportingInformation security event reporting
47
Physical controls
Physical controlsPhysical controls
48
Physical security perimeter
Physical security perimeterPhysical security perimeter
49
Phyiscal entry controls
Phyiscal entry controlsPhyiscal entry controls
50
Securing offices, rooms and facilities
Securing offices, rooms and facilitiesSecuring offices, rooms and facilities
51
Physical security monitoring
Physical security monitoringPhysical security monitoring
52
Protecting against physical and environmental threats
Protecting against physical and environmental threatsProtecting against physical and environmental threats
53
Working in secure areas
Working in secure areasWorking in secure areas
54
Clear desk and clear screen
Clear desk and clear screenClear desk and clear screen
55
Equipment siting and protection
Equipment siting and protectionEquipment siting and protection
56
Security of assets off-premises
Security of assets off-premisesSecurity of assets off-premises
57
Storage media
Storage mediaStorage media
58
Supporting utilities
Supporting utilitiesSupporting utilities
59
Cabling security
Cabling securityCabling security
60
Equipment maintenance
Equipment maintenanceEquipment maintenance
61
Secure disposal or re-use of equipment
Secure disposal or re-use of equipmentSecure disposal or re-use of equipment
62
Technological controls
Technological controlsTechnological controls
63
User endpoint devices
User endpoint devicesUser endpoint devices
64
Privileged access rights
Privileged access rightsPrivileged access rights
65
Information access restriction
Information access restrictionInformation access restriction
66
Access to source code
Access to source codeAccess to source code
67
Secure authentication
Secure authenticationSecure authentication
68
Capacity management
Capacity managementCapacity management
69
Protection against malware
Protection against malwareProtection against malware
70
Management of technical vulnerabilities
Management of technical vulnerabilitiesManagement of technical vulnerabilities
71
Configuration management
Configuration managementConfiguration management
72
Information deletion
Information deletionInformation deletion
73
Data masking
Data maskingData masking
74
Data leakage prevention
Data leakage preventionData leakage prevention
75
Information backup
Information backupInformation backup
76
Redundancy of information processing facilities
Redundancy of information processing facilitiesRedundancy of information processing facilities
77
Logging
LoggingLogging
78
Monitoring activities
Monitoring activitiesMonitoring activities
79
Clock synchronization
Clock synchronizationClock synchronization
80
Use of privileged utility programs
Use of privileged utility programsUse of privileged utility programs
81
Installation of software on operational systems
Installation of software on operational systemsInstallation of software on operational systems
82
Network security
Network securityNetwork security
83
Security of network services
Security of network servicesSecurity of network services
84
Segregation of networks
Segregation of networksSegregation of networks
85
Web filtering
Web filteringWeb filtering
86
Use of cryptography
Use of cryptographyUse of cryptography
87
Secure development lifecycle
Secure development lifecycleSecure development lifecycle
88
Application security requirements
Application security requirementsApplication security requirements
89
Secure system architecture and engineering principles
Secure system architecture and engineering principlesSecure system architecture and engineering principles
90
Secure coding
Secure codingSecure coding
91
Security testing in development and acceptance
Security testing in development and acceptanceSecurity testing in development and acceptance
92
Outsourced development
Outsourced developmentOutsourced development
93
Seperation of development, test and production environments
Seperation of development, test and production environmentsSeperation of development, test and production environments
94
Change management
Change managementChange management
95
Test information
Test informationTest information
96
Protection of information systems during audit testing
Protection of information systems during audit testingProtection of information systems during audit testing