27001:2022
|
27001:2022-10.1
|
Continuous improvement |
1
|
|
27001:2022
|
27001:2022-10.2
|
Non-compliance and corrective actions |
1
|
|
27001:2022
|
27001:2022-4.x
|
Understanding the organization and its context |
1
|
|
27001:2022-5
|
27001:2022-5.01
|
Information Security Policies |
1
|
|
27001:2022-5
|
27001:2022-5.02
|
Information Security Duties and Responsibilities |
1
|
|
27001:2022-5
|
27001:2022-5.03
|
Segregation of duties |
1
|
|
27001:2022-5
|
27001:2022-5.04
|
Management Responsibilities |
1
|
|
27001:2022-5
|
27001:2022-5.05
|
Relations with the authorities |
1
|
|
27001:2022-5
|
27001:2022-5.06
|
Relations with specialized working groups |
1
|
|
27001:2022-5
|
27001:2022-5.07
|
Threat intelligence |
1
|
|
27001:2022-5
|
27001:2022-5.08
|
Information Security in Project Management |
1
|
|
27001:2022-5
|
27001:2022-5.09
|
Inventory of information and other related assets |
1
|
|
27001:2022-5
|
27001:2022-5.10
|
Proper use of information and other associated assets |
1
|
|
27001:2022-5
|
27001:2022-5.11
|
Return of assets |
1
|
|
27001:2022-5
|
27001:2022-5.12
|
Classification of information |
1
|
|
27001:2022-5
|
27001:2022-5.13
|
Marking information |
1
|
|
27001:2022-5
|
27001:2022-5.14
|
Transfer of information |
1
|
|
27001:2022-5
|
27001:2022-5.15
|
Access control |
1
|
|
27001:2022-5
|
27001:2022-5.16
|
Identity management |
1
|
|
27001:2022-5
|
27001:2022-5.17
|
Authentication information |
1
|
|
27001:2022-5
|
27001:2022-5.18
|
Access rights |
1
|
|
27001:2022-5
|
27001:2022-5.19
|
Information security in supplier relationships |
1
|
|
27001:2022-5
|
27001:2022-5.20
|
Consideration of information security in agreements concluded with suppliers |
1
|
|
27001:2022-5
|
27001:2022-5.21
|
Information security management in the ICT supply chain |
1
|
|
27001:2022-5
|
27001:2022-5.22
|
Follow-up, review and change management of supplier services |
1
|
|
27001:2022-5
|
27001:2022-5.23
|
Information security in the use of cloud services |
1
|
|
27001:2022-5
|
27001:2022-5.24
|
Information security incident management planning and preparation |
1
|
|
27001:2022-5
|
27001:2022-5.25
|
Assessment of events related to information security and decision-making |
1
|
|
27001:2022-5
|
27001:2022-5.26
|
Response to information security incidents |
1
|
|
27001:2022-5
|
27001:2022-5.27
|
Learning from Information Security Incidents |
1
|
|
27001:2022-5
|
27001:2022-5.28
|
Collection of evidence |
1
|
|
27001:2022-5
|
27001:2022-5.29
|
Information security during a disruption |
1
|
|
27001:2022-5
|
27001:2022-5.30
|
ICT readiness for business continuity |
1
|
|
27001:2022-5
|
27001:2022-5.31
|
Identification of legal, statutory, regulatory and contractual requirements |
1
|
|
27001:2022-5
|
27001:2022-5.32
|
Intellectual property rights |
1
|
|
27001:2022-5
|
27001:2022-5.33
|
Protection of recordings |
1
|
|
27001:2022-5
|
27001:2022-5.34
|
Personal data privacy and protection |
1
|
|
27001:2022-5
|
27001:2022-5.35
|
Independent Information Security Review |
1
|
|
27001:2022-5
|
27001:2022-5.36
|
Compliance with information security policies and standards |
1
|
|
27001:2022-5
|
27001:2022-5.37
|
Documented operating procedures |
1
|
|
27001:2022
|
27001:2022-5.x
|
Leadership |
1
|
|
27001:2022-6
|
27001:2022-6.01
|
Pre-selection |
1
|
|
27001:2022-6
|
27001:2022-6.02
|
General conditions of employment |
1
|
|
27001:2022-6
|
27001:2022-6.03
|
Information security awareness, learning and training |
1
|
|
27001:2022-6
|
27001:2022-6.04
|
Disciplinary process |
1
|
|
27001:2022-6
|
27001:2022-6.05
|
Responsibilities following the end or modification of the service contract |
1
|
|
27001:2022-6
|
27001:2022-6.06
|
Confidentiality or non-disclosure commitments |
1
|
|
27001:2022-6
|
27001:2022-6.07
|
Remote work |
1
|
|
27001:2022-6
|
27001:2022-6.08
|
Reporting of Information Security Events |
1
|
|
27001:2022
|
27001:2022-6.x
|
Planning |
1
|
|
27001:2022-7
|
27001:2022-7.01
|
Physical security perimeter |
1
|
|
27001:2022-7
|
27001:2022-7.02
|
Physical access controls |
1
|
|
27001:2022-7
|
27001:2022-7.03
|
Securing offices, rooms and equipment |
1
|
|
27001:2022-7
|
27001:2022-7.04
|
Physical Security Monitoring |
1
|
|
27001:2022-7
|
27001:2022-7.05
|
Protection against physical and environmental threats |
1
|
|
27001:2022-7
|
27001:2022-7.06
|
Work in secure areas |
1
|
|
27001:2022-7
|
27001:2022-7.07
|
Clean desktop and blank screen |
1
|
|
27001:2022-7
|
27001:2022-7.08
|
Location and protection of equipment |
1
|
|
27001:2022-7
|
27001:2022-7.09
|
Off-Premises Asset Security |
1
|
|
27001:2022-7
|
27001:2022-7.10
|
Storage media |
1
|
|
27001:2022-7
|
27001:2022-7.11
|
General services |
1
|
|
27001:2022-7
|
27001:2022-7.12
|
Wiring Safety |
1
|
|
27001:2022-7
|
27001:2022-7.13
|
Hardware Maintenance |
1
|
|
27001:2022-7
|
27001:2022-7.14
|
Safe disposal or recycling of equipment |
1
|
|
27001:2022
|
27001:2022-7.2
|
Skills |
1
|
|
27001:2022
|
27001:2022-7.x
|
Support |
1
|
|
27001:2022-8
|
27001:2022-8.01
|
User terminals |
1
|
|
27001:2022-8
|
27001:2022-8.02
|
Access privileges |
1
|
|
27001:2022-8
|
27001:2022-8.03
|
Restriction of access to information |
1
|
|
27001:2022-8
|
27001:2022-8.04
|
Access to source code |
1
|
|
27001:2022-8
|
27001:2022-8.05
|
Secure authentication |
1
|
|
27001:2022-8
|
27001:2022-8.06
|
Sizing |
1
|
|
27001:2022-8
|
27001:2022-8.07
|
Protection against malware |
1
|
|
27001:2022-8
|
27001:2022-8.08
|
Management of technical vulnerabilities |
1
|
|
27001:2022-8
|
27001:2022-8.09
|
Configuration management |
1
|
|
27001:2022-8
|
27001:2022-8.10
|
Deletion of information |
1
|
|
27001:2022-8
|
27001:2022-8.11
|
Data masking |
1
|
|
27001:2022-8
|
27001:2022-8.12
|
Data leak prevention |
1
|
|
27001:2022-8
|
27001:2022-8.13
|
Backing up information |
1
|
|
27001:2022-8
|
27001:2022-8.14
|
Redundancy of information processing means |
1
|
|
27001:2022-8
|
27001:2022-8.15
|
Logging |
1
|
|
27001:2022-8
|
27001:2022-8.16
|
Monitoring activities |
1
|
|
27001:2022-8
|
27001:2022-8.17
|
Clock Synchronization |
1
|
|
27001:2022-8
|
27001:2022-8.18
|
Using Privileged Utility Programs |
1
|
|
27001:2022-8
|
27001:2022-8.19
|
Installing software on operating systems |
1
|
|
27001:2022-8
|
27001:2022-8.20
|
Network measures |
1
|
|
27001:2022-8
|
27001:2022-8.21
|
Network Services Security |
1
|
|
27001:2022-8
|
27001:2022-8.22
|
Internet filtering |
1
|
|
27001:2022-8
|
27001:2022-8.23
|
Network partitioning |
1
|
|
27001:2022-8
|
27001:2022-8.24
|
Use of cryptography |
1
|
|
27001:2022-8
|
27001:2022-8.25
|
Secure development lifecycle |
1
|
|
27001:2022-8
|
27001:2022-8.26
|
Application security requirements |
1
|
|
27001:2022-8
|
27001:2022-8.27
|
Principles of secure system engineering and architecture |
1
|
|
27001:2022-8
|
27001:2022-8.28
|
Secure coding |
1
|
|
27001:2022-8
|
27001:2022-8.29
|
Security testing in development and acceptance |
1
|
|
27001:2022-8
|
27001:2022-8.30
|
Outsourced development |
1
|
|
27001:2022-8
|
27001:2022-8.31
|
Separation of development, test and production environments |
1
|
|
27001:2022-8
|
27001:2022-8.32
|
Change Management |
1
|
|
27001:2022-8
|
27001:2022-8.33
|
Test Information |
1
|
|
27001:2022-8
|
27001:2022-8.34
|
Protection of information systems during audit and testing |
1
|
|
27001:2022
|
27001:2022-8.x
|
Functioning |
1
|
|
27001:2022
|
27001:2022-9.2
|
Internal Audit |
1
|
|
27001:2022
|
27001:2022-9.3
|
Management review |
1
|
|