#iso27001#controls

IDNameTypePropertyConceptDomain
#5.1Policies for information security#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#resilience
#5.2Information security roles and responsibilities#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection#resilience
5.3Segregation of duties#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem
5.4Management responsibilities#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem
5.5Contact with authorities#preventive#corrective#confidentiality#integrity#availability#identify#protect#respond#recover#defence#resilience
5.6Contact with special interest groups#preventive#corrective#confidentiality#integrity#availability#protect#respond#recover#defence
5.7Threat intelligence#preventive#detective#corrective#confidentiality#integrity#availability#identify#detect#respond#defence#resilience
5.8Information security in project management#preventive#confidentiality#integrity#availability#identify#protect#governance_and_Ecosystem#protection
5.9Inventory of information and other associated assets#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection
5.10Acceptable use of information and other associated assets#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem#protection
5.11Return of assets#preventive#confidentiality#integrity#availability#protect#protection
5.12Classification of information#preventive#confidentiality#integrity#availability#identify#protection#defence
5.13Labelling of information#preventive#confidentiality#integrity#availability#protect#defence#protection
5.14Information transfer#preventive#confidentiality#integrity#availability#protect#protection
5.15Access control#preventive#confidentiality#integrity#availability#protect#protection
5.16Identity management#preventive#confidentiality#integrity#availability#protect#protection
5.17Authentication information#preventive#confidentiality#integrity#availability#protect#protection
5.18Access rights#preventive#confidentiality#integrity#availability#protect#protection
5.19Information security in supplier relationships#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection
5.20Addressing information security within supplier agreements#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection
5.21Managing information security in the ICT supply chain#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection
5.22Monitoring, review and change management of supplier services#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection#defence
5.23Information security for use of cloud services#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem#protection
5.24Information security incident management planning and preparation#corrective#confidentiality#integrity#availability#respond#recover#defence
5.25Assessment and decision on information security events#detective#confidentiality#integrity#availability#detect#respond#defence
5.26Response to information security incidents#corrective#confidentiality#integrity#availability#respond#recover#defence
5.27Learning from information security incidents#preventive#confidentiality#integrity#availability#identify#protect#defence
5.28Collection of evidence#corrective#confidentiality#integrity#availability#detect#respond#defence
5.29Information security during disruption#preventive#corrective#confidentiality#integrity#availability#protect#respond#protection#resilience
5.30ICT readiness for business continuity#corrective#availability#respond#resilience
5.31Legal, statutory, regulatory and contractual requirements#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem#protection
5.32Intellectual property rights#preventive#confidentiality#integrity#availability#identify#governance_and_Ecosystem
5.33Protection of records#preventive#confidentiality#integrity#availability#identify#protect#defence
5.34Privacy and protection of PII#preventive#confidentiality#integrity#availability#identify#protect#protection
5.35Independent review of information security#preventive#corrective#confidentiality#integrity#availability#identify#protect#governance_and_Ecosystem
5.36Compliance with policies, rules and standards for information security#preventive#confidentiality#integrity#availability#identify#protect#governance_and_Ecosystem
5.37Documented operating procedures#preventive#corrective#confidentiality#integrity#availability#protect#recover#governance_and_Ecosystem#protection#defence
6.1Screening#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem
6.2Terms and conditions of employment#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem
6.3Information security awareness, education and training#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem
6.4Disciplinary process#preventive#corrective#confidentiality#integrity#availability#protect#respond#governance_and_Ecosystem
6.5Responsibilities after termination or change of employment#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem
6.6Confidentiality or non-disclosure agreements#preventive#confidentiality#protect#governance_and_Ecosystem
6.7Remote working#preventive#confidentiality#integrity#availability#protect#protection
6.8Information security event reporting#detective#confidentiality#integrity#availability#detect#defence
7.1Physical security perimeters#preventive#confidentiality#integrity#availability#protect#protection
7.2Physical entry#preventive#confidentiality#integrity#availability#protect#protection
7.3Securing offices, rooms and facilities#preventive#confidentiality#integrity#availability#protect#protection
7.4Physical security monitoring#preventive#detective#confidentiality#integrity#availability#protect#detect#protection#defence
7.5Protecting against physical and environmental threats#preventive#confidentiality#integrity#availability#protect#protection
7.6Working in secure areas#preventive#confidentiality#integrity#availability#protect#protection
7.7Clear desk and clear screen#preventive#confidentiality#protect#protection
7.8Equipment siting and protection#preventive#confidentiality#integrity#availability#protect#protection
7.9Security of assets off-premises#preventive#confidentiality#integrity#availability#protect#protection
7.10Storage media#preventive#confidentiality#integrity#availability#protect#protection
7.11Supporting utilities#preventive#detective#integrity#availability#protect#detect#protection
7.12Cabling security#preventive#confidentiality#availability#protect#protection
7.13Equipment maintenance#preventive#confidentiality#integrity#availability#protect#protection#resilience
7.14Secure disposal or re-use of equipment#preventive#confidentiality#protect#protection
8.1User endpoint devices#preventive#confidentiality#integrity#availability#protect#protection
8.2Privileged access rights#preventive#confidentiality#integrity#availability#protect#protection
8.3Information access restriction#preventive#confidentiality#integrity#availability#protect#protection
8.4Access to source code#preventive#confidentiality#integrity#availability#protect#protection
8.5Secure authentication#preventive#confidentiality#integrity#availability#protect#protection
8.6Capacity management#preventive#detective#integrity#availability#identify#protect#detect#governance_and_Ecosystem#protection
8.7Protection against malware#preventive#detective#corrective#confidentiality#integrity#availability#protect#detect#protection#defence
8.8Management of technical vulnerabilities#preventive#confidentiality#integrity#availability#identify#protect#governance_and_Ecosystem#protection#defence
8.9Configuration management#preventive#confidentiality#integrity#availability#protect#protection
8.10Information deletion#preventive#confidentiality#protect#protection
8.11Data masking#preventive#confidentiality#protect#protection
8.12Data leakage prevention#preventive#detective#confidentiality#protect#detect#protection#defence
8.13Information backup#corrective#integrity#availability#recover#protection
8.14Redundancy of information processing facilities#preventive#availability#protect#protection#resilience
8.15Logging#detective#confidentiality#integrity#availability#detect#protection#defence
8.16Monitoring activities#detective#corrective#confidentiality#integrity#availability#detect#respond#defence
8.17Clock synchronization#detective#integrity#protect#detect#protection#defence
8.18Use of privileged utility programs#preventive#confidentiality#integrity#availability#protect#protection
8.19Installation of software on operational systems#preventive#confidentiality#integrity#availability#protect#protection
8.20Networks security#preventive#detective#confidentiality#integrity#availability#protect#detect#protection
8.21Security of network services#preventive#confidentiality#integrity#availability#protect#protection
8.22Segregation of networks#preventive#confidentiality#integrity#availability#protect#protection
8.23Web filtering#preventive#confidentiality#integrity#availability#protect#protection
8.24Use of cryptography#preventive#confidentiality#integrity#availability#protect#protection
8.25Secure development life cycle#preventive#confidentiality#integrity#availability#protect#protection
8.26Application security requirements#preventive#confidentiality#integrity#availability#protect#protection#defence
8.27Secure system architecture and engineering principles#preventive#confidentiality#integrity#availability#protect#protection
8.28Secure coding#preventive#confidentiality#integrity#availability#protect#protection
8.29Security testing in development and acceptance#preventive#confidentiality#integrity#availability#identify#protection
8.30Outsourced development#preventive#detective#confidentiality#integrity#availability#identify#protect#detect#governance_and_Ecosystem#protection
8.31Separation of development, test and production environments#preventive#confidentiality#integrity#availability#protect#protection
8.32Change management#preventive#confidentiality#integrity#availability#protect#protection
8.33Test information#preventive#confidentiality#integrity#protect#protection
8.34Protection of information systems during audit testing#preventive#confidentiality#integrity#availability#protect#governance_and_Ecosystem#protection