FrameworksISO 27002:2022
control catalogv2022Published
ISO/IEC 27002:2022 Information Security Controls
ISO 27002:2022
ISO/IEC 27002 provides a reference set of generic information security controls including implementation guidance. It is the companion standard to ISO 27001, providing detailed guidance on the Annex A controls.
Issuing Body
International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC)
Version
2022
Published
2022-02-15
Controls
20
Mapped Laws
—
| Control ID | Title | Domain | Maturity |
|---|---|---|---|
| ISO27002-5.1 | Policies for Information Security Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals or if significant changes occur. | — | defined |
| ISO27002-5.2 | Information Security Roles and Responsibilities Information security roles and responsibilities shall be defined and allocated according to the organisation needs. | — | defined |
| ISO27002-5.7 | Threat Intelligence Information relating to information security threats shall be collected and analysed to produce threat intelligence. | — | managed |
| ISO27002-5.23 | Information Security for Use of Cloud Services Processes for acquisition, use, management and exit from cloud services shall be established in accordance with the organisation's information security requirements. | — | managed |
| ISO27002-5.30 | ICT Readiness for Business Continuity ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements. | — | managed |
| ISO27002-6.1 | Screening Background verification checks on all candidates to become personnel shall be carried out prior to joining the organisation and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks. | — | defined |
| ISO27002-6.8 | Information Security Event Reporting The organisation shall provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner. | — | managed |
| ISO27002-7.4 | Physical Security Monitoring Premises shall be continuously monitored for unauthorised physical access. | — | managed |
| ISO27002-8.2 | Privileged Access Rights The allocation and use of privileged access rights shall be restricted and managed. | — | managed |
| ISO27002-8.4 | Access to Source Code Read and write access to source code, development tools and software libraries shall be appropriately managed. | — | managed |
| ISO27002-8.7 | Protection Against Malware Protection against malware shall be implemented and supported by appropriate user awareness. | — | managed |
| ISO27002-8.8 | Management of Technical Vulnerabilities Information about technical vulnerabilities of information systems in use shall be obtained, the organisation's exposure to such vulnerabilities shall be evaluated and appropriate measures shall be taken. | — | managed |
| ISO27002-8.12 | Data Leakage Prevention Data leakage prevention measures shall be applied to systems, networks and any other devices that process, store or transmit sensitive information. | — | managed |
| ISO27002-8.15 | Logging Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analysed. | — | managed |
| ISO27002-8.16 | Monitoring Activities Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents. | — | managed |
| ISO27002-8.23 | Web Filtering Access to external websites shall be managed to reduce exposure to malicious content. | — | managed |
| ISO27002-8.24 | Use of Cryptography Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented. | — | managed |
| ISO27002-8.28 | Secure Coding Secure coding principles shall be applied to software development. | — | managed |
| ISO27002-8.29 | Security Testing in Development and Acceptance Security testing processes shall be defined and implemented in the development life cycle. | — | managed |
| ISO27002-8.34 | Protection of Information Systems During Audit Testing Audit tests and other assurance activities involving assessment of operational systems shall be planned and agreed between the tester and appropriate management. | — | defined |