LexClawFrameworks & Standards
FrameworksISO 27002:2022
control catalogv2022Published

ISO/IEC 27002:2022 Information Security Controls

ISO 27002:2022

ISO/IEC 27002 provides a reference set of generic information security controls including implementation guidance. It is the companion standard to ISO 27001, providing detailed guidance on the Annex A controls.

Issuing Body
International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC)
Version
2022
Published
2022-02-15
Controls
20
Mapped Laws
Control IDTitleDomainMaturity
ISO27002-5.1
Policies for Information Security
Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals or if significant changes occur.
defined
ISO27002-5.2
Information Security Roles and Responsibilities
Information security roles and responsibilities shall be defined and allocated according to the organisation needs.
defined
ISO27002-5.7
Threat Intelligence
Information relating to information security threats shall be collected and analysed to produce threat intelligence.
managed
ISO27002-5.23
Information Security for Use of Cloud Services
Processes for acquisition, use, management and exit from cloud services shall be established in accordance with the organisation's information security requirements.
managed
ISO27002-5.30
ICT Readiness for Business Continuity
ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.
managed
ISO27002-6.1
Screening
Background verification checks on all candidates to become personnel shall be carried out prior to joining the organisation and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.
defined
ISO27002-6.8
Information Security Event Reporting
The organisation shall provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.
managed
ISO27002-7.4
Physical Security Monitoring
Premises shall be continuously monitored for unauthorised physical access.
managed
ISO27002-8.2
Privileged Access Rights
The allocation and use of privileged access rights shall be restricted and managed.
managed
ISO27002-8.4
Access to Source Code
Read and write access to source code, development tools and software libraries shall be appropriately managed.
managed
ISO27002-8.7
Protection Against Malware
Protection against malware shall be implemented and supported by appropriate user awareness.
managed
ISO27002-8.8
Management of Technical Vulnerabilities
Information about technical vulnerabilities of information systems in use shall be obtained, the organisation's exposure to such vulnerabilities shall be evaluated and appropriate measures shall be taken.
managed
ISO27002-8.12
Data Leakage Prevention
Data leakage prevention measures shall be applied to systems, networks and any other devices that process, store or transmit sensitive information.
managed
ISO27002-8.15
Logging
Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analysed.
managed
ISO27002-8.16
Monitoring Activities
Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.
managed
ISO27002-8.23
Web Filtering
Access to external websites shall be managed to reduce exposure to malicious content.
managed
ISO27002-8.24
Use of Cryptography
Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.
managed
ISO27002-8.28
Secure Coding
Secure coding principles shall be applied to software development.
managed
ISO27002-8.29
Security Testing in Development and Acceptance
Security testing processes shall be defined and implemented in the development life cycle.
managed
ISO27002-8.34
Protection of Information Systems During Audit Testing
Audit tests and other assurance activities involving assessment of operational systems shall be planned and agreed between the tester and appropriate management.
defined