Kategorier: Alle - security - development - testing - communication

af Grandt Grandt 7 år siden

1111

Map IEC/ISO 27001:2013 Annex A - English

The text addresses the ISO 27001 standards, specifically focusing on Annex A which pertains to system acquisition, development, and maintenance. It emphasizes the importance of security throughout the development and support processes, including system security testing, secure development environments, and adherence to secure system engineering principles.

Map IEC/ISO 27001:2013 Annex A - English

ISO 27001 Annex A

A.18 Compliance

A.18.2 Information security reviews
A.18.2.3 Technical compliance review
A.18.2.2 Compliance with security policies and standards
A.18.2.1 Independent review of information security
A.18.1 Compliance with legal and contractual requirements
A.18.1.5 Regulation of cryptographic controls
A.18.1.4 Privacy and protection of personally identifiable information
A.18.1.3 Protection of records
A.18.1.2 Intellectual property rights
A.18.1.1 Identification of applicable legislation and contractual requirements

A.17 Information security aspects of business continuity management

A.17.2 Redundancies
A.17.2.1 Availability of information processing facilities
A.17.1 Information security continuity
A.17.1.3 Verify, review, and evaluate information security continuity
A.17.1.2 Implementing information security continuity
A.17.1.1 Planning information security continuity

A.16 Information security incident management

A.16.1 Management of information security incidents and improvements
A.16.1.7 Collecting and retaining evidence
A.16.1.6 Learning from information security incidents
A.16.1.5 Response to information security incidents
A.16.1.4 Assessment of and decision on information security events
A.16.1.3 Reporting information security weaknesses
A.16.1.2 Reporting information security events
A.16.1.1 "Responsibilities and procedures

A.15 Supplier relationships

A.15.2 Supplier service delivery management
A.15.2.2 Managing change to supplier services
A.15.2.1 Monitoring and review of supplier services
A.15.1 Information security in supplier relationships
A.15.1.3 Information and communication technology supply chain
A.15.1.2 Addressing security within supplier agreements
A.15.1.1 Information security policy for supplier relationships

A.14 System acquisition, development and maintenance

A.14.3 Test data
A.14.3.1 Protection of system test data
A.14.2 Security in development and support processes
A.14.2.9 System acceptance testing
A.14.2.8 System security testing
A.14.2.7 Outsourced development
A.14.2.6 Secure development environment
A.14.2.5 Secure system engineering principles
A.14.2.4 Restrictions on changes to software packages
A.14.2.3 Technical review of applications after operating system changes
A.14.2.2 System change control procedures
A.14.2.1 Secure development policy
A.14.1 Security requirements of information systems
A.14.1.3 Protecting application services transactions
A.14.1.2 Securing application services on public networks
A.14.1.1 Information security requirements analysis and specification

A.13 Communications Security

A.13.2 Information transfer
A.13.2.4 Confidentiality or non-disclosure agreements
A.13.2.3 Electronic messaging
A.13.2.2 Agreements on information transfer
A.13.2.1 Information transfer policies and procedures
A.13.1 Network security management
A.13.1.3 Segregation in networks
A.13.1.2 Security of network services
A.13.1.1 Network controls

A.12 Operations security

A.12.7 Information systems audit considerations
A.12.7.1 Information systems audit controls
A.12.6 Technical vulnerability management
A.12.6.2 Restrictions on software installation
A.12.6.1 Management of technical vulnerabilities
A.12.5 Control of operational software
A.12.5.1 Control of operational software
A.12.4 Logging and Monitoring
A.12.4.4 Clock synchronisation
A.12.4.3 Administrator and operator logs
A.12.4.2 Protection of log information
A.12.4.1 Event logging
A.12.3 Back up
A.12.3.1 Information back-up
A.12.2 Protection from malware
A.12.2.1 Controls against malware
A.12.1 Operational procedures and responsibilities
A.12.1.4 Separation of development, testing and operational environments
A.12.1.3 Capacity planning
A.12.1.2 Change management
A.12.1.1 Documented operating procedures

A.11 Physical and environmental security

A.11.2 Equipment
A.11.2.9 Clear desk and clear screen policy
A.11.2.8 Unattended user equipment
A.11.2.7 Secure disposal or re-use of equipment
A.11.2.6 Security of equipment and assets off premises
A.11.2.5 Removal of assets
A.11.2.4 Equipment maintenance
A.11.2.3 Cabling security
A.11.2.2 Supporting utilities
A.11.2.1 Equipment siting and protection
A.11.1 Secure areas
A.11.1.6 Delivery and loading areas
A.11.1.5 Working in secure areas
A.11.1.4 Protecting against external and environmental threats
A.11.1.3 Securing offices, rooms and facilities
A.11.1.2 Physical entry controls
A.11.1.1 Physical security perimeter

A.10 Cryptography

A.10.1 Cryptographic controls
A.10.1.2 Key management
A.10.1.1 Policy on the use of cryptographic controls

A.9 Access control

A.9.4 System and application access control
A.9.4.5 Access control to program source code
A.9.4.4 Use of privileged utility programs
A.9.4.3 Password management system
A.9.4.2 Secure log on procedures
A.9.4.1 Information access restriction
A.9.3 User responsibilities
A.9.3.1 Use of secret authentication information
A.9.2 User access management
A.9.2.6 Removal or adjustment of access rights
A.9.2.5 Review of user access rights
A.9.2.4 Management of secret authentication information of users
A.9.2.3 Management of privileged access rights
A.9.2.2 User access provisioning
A.9.2.1 User registration and deregistration
A.9.1 Business requirement for access control
A.9.1.2 Access to networks and network services
A.9.1.1 Access control policy

A.8 Asset management

A.8.3 Media handling
A.8.3.3 Physical media transfer
A.8.3.2 Disposal of media
A.8.3.1 Management of removable media
A.8.2 Information classification
A.8.2.3 Handling of Assets
A.8.2.2 Labelling of information
A.8.2.1 Classification of information
A.8.1 Responsibility for assets
A.8.1.4 Return of assets
A.8.1.3 Acceptable use of assets
A.8.1.2 Ownership of assets
A.8.1.1 Inventory of assets

A.7 Human Resources security

A.7.3 Termination and change of employment
A.7.3.1 Termination or change of employment responsibilities
A.7.2 During employment
A.7.2.3 Disciplinary process
A.7.2.2 Information security awareness, education and training
A.7.2.1 Management responsibilities
A.7.1 Prior to employment
A.7.1.2 Terms and conditions of employment
A.7.1.1 Screening

A.6 Organisation of information security

A.6.2 Mobile devices and teleworking
A.6.2.2 Teleworking
A.6.2.1 Mobile device policy
A.6.1 Internal organisation
A.6.1.5 Information Security in project management
A.6.1.4 Contact with special interest groups
A.6.1.3 Contact with authorities
A.6.1.2 Segregation of duties
A.6.1.1 Information security roles and responsibilities

A.5 Information security policies

A.5.1 Management direction for information security
A.5.1.2 Review of the policies for information security
A.5.1.1 Policies for information security