HOME LAB : HANDS-ON
- Get link
 - X
 - Other Apps
 
- Get link
 - X
 - Other Apps
 
| 
   ISO/IEC
  27002 control identifier  | 
  
   Control
  name  | 
  
   Control
  type  | 
  
   Information
  security properties  | 
  
   Cybersecurity
  concepts  | 
  
   Operational
  capabilities  | 
  
   Security
  domains  | 
 
| 
   5.1  | 
  
   Policies for
  information security  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Governance  | 
  
   #Governance_
  and_Ecosys- tem #Resil- ience  | 
 
| 
   5.2  | 
  
   Information
  security roles and responsi- bilities  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Governance  | 
  
   #Govern-
  ance_and_ Ecosystem#Protection#Resilience  | 
 
| 
   5.3  | 
  
   Segregation
  of duties  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Governance
  #Identity_and_access_man-agement  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   5.4  | 
  
   Management
  responsibili- ties  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Governance  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   5.5  | 
  
   Contact with
  authorities  | 
  
   #Preventive
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect #Respond #Recover  | 
  
   #Governance  | 
  
   #Defence
  #Re- silience  | 
 
| 
   5.6  | 
  
   Contact with
  special inter- est groups  | 
  
   #Preventive
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect#Respond
  #Recover  | 
  
   #Governance  | 
  
   #Defence  | 
 
| 
   5.7  | 
  
   Threat
  intelli- gence  | 
  
   #Preventive
  #Detective #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Detect #Respond  | 
  
   #Threat_and_
  vulnerability_ management  | 
  
   #Defence
  #Re- silience  | 
 
| 
   5.8  | 
  
   Information
  security in project man- agement  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Governance  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.9  | 
  
   Inventory of
  information and other associated assets  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Asset_man-agement  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.10  | 
  
   Acceptable
  use of information and other associated assets  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Asset_man-agement#Information_protection  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.11  | 
  
   Return
  ofassets  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Asset_man-agement  | 
  
   #Protection  | 
 
| 
   5.12  | 
  
   Classification
  of information  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Information_protection  | 
  
   #Protection#Defence  | 
 
| 
   5.13  | 
  
   Labelling of
  information  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Information_protection  | 
  
   #Defence#Protection  | 
 
| 
   5.14  | 
  
   Information
  transfer  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Asset_man-agement#Information_protection  | 
  
   #Protection  | 
 
| 
   5.15  | 
  
   Access
  control  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   5.16  | 
  
   Identity
  man-agement  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   5.17  | 
  
   Authentication
  information  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   5.18  | 
  
   Access
  rights  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   5.19  | 
  
   Information
  security in supplier rela- tionships  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Supplier_re-
  lationships_se- curity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.20  | 
  
   Addressing
  information security with- in supplier agreements  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Supplier_re-
  lationships_se- curity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.21  | 
  
   Managing
  information security in the ICT supply chain  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Supplier_re-
  lationships_se- curity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.22  | 
  
   Monitor-
  ing, review and change management of supplier services  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Supplier_re-
  lationships_se- curity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion #Defence#Information_ security_as- surance  | 
 
| 
   5.23  | 
  
   Information
  security for use of cloud services  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Supplier_re-
  lationships_se- curity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.24  | 
  
   Information
  security inci- dent manage- ment planning and prepara- tion  | 
  
   #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Respond
  #Recover  | 
  
   #Governance#Informa-tion_securi-ty_event_man-agement  | 
  
   #Defence  | 
 
| 
   5.25  | 
  
   Assessment
  and decision on informa- tion security events  | 
  
   #Detective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Detect
  #Respond  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Defence  | 
 
| 
   5.26  | 
  
   Response to
  information security inci- dents  | 
  
   #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Respond
  #Recover  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Defence  | 
 
| 
   5.27  | 
  
   Learning
  from information security inci- dents  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Defence  | 
 
| 
   5.28  | 
  
   Collection
  of evidence  | 
  
   #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Detect
  #Respond  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Defence  | 
 
| 
   5.29  | 
  
   Information
  security dur- ing disruption  | 
  
   #Preventive
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect
  #Respond  | 
  
   #Continuity  | 
  
   #Protection#Resilience  | 
 
| 
   5.30  | 
  
   ICT
  readiness for business continuity  | 
  
   #Corrective  | 
  
   #Availability  | 
  
   #Respond  | 
  
   #Continuity  | 
  
   #Resilience  | 
 
| 
   5.31  | 
  
   Legal,
  statuto- ry, regulatory and contrac- tual require- ments  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Legal_and_compliance  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   5.32  | 
  
   Intellectual
  property rights  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Legal_and_compliance  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   5.33  | 
  
   Protection
  of records  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Legal_and_compliance#Asset_man-agement#Information_protection  | 
  
   #Defence  | 
 
| 
   5.34  | 
  
   Privacy and
  protection of PII  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Information_protection#Legal_and_compliance  | 
  
   #Protection  | 
 
| 
   5.35  | 
  
   Independent
  review of information security  | 
  
   #Preventive
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Information_
  security_as- surance  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   5.36  | 
  
   Compliance
  with policies, rules and standards for information security  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Legal_and_compliance#Information_security_as-surance  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   5.37  | 
  
   Documented
  operating procedures  | 
  
   #Preventive
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect
  #Recover  | 
  
   #Asset_man-agement#Physi-cal_security#System_and_network_secu-rity
  #Applica-tion_security#Secure_con-figuration#Identity_and_access_management#Threat_and_vulnerability_management#Continuity#Informa-tion_securi-ty_event_man-agement  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion #Defence  | 
 
| 
   6.1  | 
  
   Screening  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Human_re-
  source_secu- rity  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   6.2  | 
  
   Terms and
  conditions of employment  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Human_re-
  source_secu- rity  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   6.3  | 
  
   Information
  security awareness, education and training  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Human_re-
  source_secu- rity  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   6.4  | 
  
   Disciplinary process  | 
  
   #Preventive
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect
  #Respond  | 
  
   #Human_re-
  source_secu- rity  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   6.5  | 
  
   Responsi-
  bilities after termination or change of employment  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Human_re-
  source_secu- rity #Asset_ management  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   6.6  | 
  
   Confidentiality
  or non-disclosure agreements  | 
  
   #Preventive  | 
  
   #Confidenti-ality  | 
  
   #Protect  | 
  
   #Human_re-
  source_secu- rity #Infor- mation_pro- tection#Supplier_re-lationships  | 
  
   #Governance_
  and_Ecosys- tem  | 
 
| 
   6.7  | 
  
   Remote working  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Asset_man-agement#Information_protection#Physical_se-curity
  #Sys-tem_and_net-work_security  | 
  
   #Protection  | 
 
| 
   6.8  | 
  
   Information
  security event reporting  | 
  
   #Detective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Detect  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Defence  | 
 
| 
   7.1  | 
  
   Physical
  security perimeters  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-curity  | 
  
   #Protection  | 
 
| 
   7.2  | 
  
   Physical
  entry  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Iden- tity_and_Ac- cess_Manage- ment  | 
  
   #Protection  | 
 
| 
   7.3  | 
  
   Securing
  offices, rooms and facilities  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Asset_ management  | 
  
   #Protection  | 
 
| 
   7.4  | 
  
   Physical
  security monitoring  | 
  
   #Preventive
  #Detective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect
  #Detect  | 
  
   #Physical_se-curity  | 
  
   #Protection#Defence  | 
 
| 
   7.5  | 
  
   Protect-ing
  againstphysical andenvironmentalthreats  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-curity  | 
  
   #Protection  | 
 
| 
   7.6  | 
  
   Working
  insecure areas  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-curity  | 
  
   #Protection  | 
 
| 
   7.7  | 
  
   Clear desk
  and clear screen  | 
  
   #Preventive  | 
  
   #Confidenti-ality  | 
  
   #Protect  | 
  
   #Physical_se-curity  | 
  
   #Protection  | 
 
| 
   7.8  | 
  
   Equipment
  siting and protection  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Asset_ management  | 
  
   #Protection  | 
 
| 
   7.9  | 
  
   Security of
  as- sets off-prem- ises  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Asset_ management  | 
  
   #Protection  | 
 
| 
   7.10  | 
  
   Storage
  media  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Asset_ management  | 
  
   #Protection  | 
 
| 
   7.11  | 
  
   Supporting
  utilities  | 
  
   #Preventive
  #Detective  | 
  
   #Integrity
  #Availability  | 
  
   #Protect
  #Detect  | 
  
   #Physical_se-curity  | 
  
   #Protection  | 
 
| 
   7.12  | 
  
   Cabling
  secu-rity  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Availability  | 
  
   #Protect  | 
  
   #Physical_se-curity  | 
  
   #Protection  | 
 
| 
   7.13  | 
  
   Equipment
  maintenance  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Asset_ management  | 
  
   #Protection#Resilience  | 
 
| 
   7.14  | 
  
   Secure
  dispos- al or re-use of equipment  | 
  
   #Preventive  | 
  
   #Confidenti-ality  | 
  
   #Protect  | 
  
   #Physical_se-
  curity #Asset_ management  | 
  
   #Protection  | 
 
| 
   8.1  | 
  
   User
  endpoint devices  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Asset_man-agement#Information_protection  | 
  
   #Protection  | 
 
| 
   8.2  | 
  
   Privileged
  access rights  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   8.3  | 
  
   Information
  access restric- tion  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   8.4  | 
  
   Access to
  source code  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_
  and_access_ management#Applica-tion_security#Secure_con-figuration  | 
  
   #Protection  | 
 
| 
   8.5  | 
  
   Secure
  authen-tication  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Identity_and_
  access_man- agement  | 
  
   #Protection  | 
 
| 
   8.6  | 
  
   Capacity
  man-agement  | 
  
   #Preventive
  #Detective  | 
  
   #Integrity
  #Availability  | 
  
   #Identify
  #Protect #Detect  | 
  
   #Continuity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   8.7  | 
  
   Protection
  against mal- ware  | 
  
   #Preventive
  #Detective #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect
  #Detect  | 
  
   #System_and_
  network_secu- rity #Informa- tion_protec- tion  | 
  
   #Protection#Defence  | 
 
| 
   8.8  | 
  
   Management
  of technical vulnerabilities  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect  | 
  
   #Threat_and_
  vulnerability_ management  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion #Defence  | 
 
| 
   8.9  | 
  
   Configuration
  management  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Secure_con-figuration  | 
  
   #Protection  | 
 
| 
   8.10  | 
  
   Informationdeletion  | 
  
   #Preventive  | 
  
   #Confidenti-ality  | 
  
   #Protect  | 
  
   #Information_protection#Legal_and_compliance  | 
  
   #Protection  | 
 
| 
   8.11  | 
  
   Data masking  | 
  
   #Preventive  | 
  
   #Confidenti-ality  | 
  
   #Protect  | 
  
   #Information_protection  | 
  
   #Protection  | 
 
| 
   8.12  | 
  
   Data
  leakageprevention  | 
  
   #Preventive
  #Detective  | 
  
   #Confidenti-ality  | 
  
   #Protect
  #Detect  | 
  
   #Information_protection  | 
  
   #Protection#Defence  | 
 
| 
   8.13  | 
  
   Information
  backup  | 
  
   #Corrective  | 
  
   #Integrity
  #Availability  | 
  
   #Recover  | 
  
   #Continuity  | 
  
   #Protection  | 
 
| 
   8.14  | 
  
   Redundancyof
  informationprocessingfacilities  | 
  
   #Preventive  | 
  
   #Availability  | 
  
   #Protect  | 
  
   #Continuity#Asset_man-agement  | 
  
   #Protection#Resilience  | 
 
| 
   8.15  | 
  
   Logging  | 
  
   #Detective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Detect  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Protection#Defence  | 
 
| 
   8.16  | 
  
   Monitoring
  activities  | 
  
   #Detective
  #Corrective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Detect
  #Respond  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Defence  | 
 
| 
   8.17  | 
  
   Clock
  synchro-nization  | 
  
   #Detective  | 
  
   #Integrity  | 
  
   #Protect
  #Detect  | 
  
   #Informa-
  tion_securi- ty_event_man- agement  | 
  
   #Protection#Defence  | 
 
| 
   8.18  | 
  
   Use of
  privi- leged utility programs  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #System_and_
  network_secu- rity #Secure_ configuration#Application_security  | 
  
   #Protection  | 
 
| 
   8.19  | 
  
   Installation
  of software on operational systems  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Secure_con-figuration#Application_security  | 
  
   #Protection  | 
 
| 
   8.20  | 
  
   Networkssecurity  | 
  
   #Preventive
  #Detective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect
  #Detect  | 
  
   #System_and_
  network_secu- rity  | 
  
   #Protection  | 
 
| 
   8.21  | 
  
   Security of
  network ser- vices  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #System_and_
  network_secu- rity  | 
  
   #Protection  | 
 
| 
   8.22  | 
  
   Segregation
  ofnetworks  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #System_and_
  network_secu- rity  | 
  
   #Protection  | 
 
| 
   8.23  | 
  
   Web
  filtering  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #System_and_
  network_secu- rity  | 
  
   #Protection  | 
 
| 
   8.24  | 
  
   Use of
  cryp-tography  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Secure_con-figuration  | 
  
   #Protection  | 
 
| 
   8.25  | 
  
   Secure
  devel- opment life cycle  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Applica-tion_security#System_and_network_secu-rity  | 
  
   #Protection  | 
 
| 
   8.26  | 
  
   Application
  security re- quirements  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Applica-tion_security#System_and_network_secu-rity  | 
  
   #Protection#Defence  | 
 
| 
   8.27  | 
  
   Secure
  system architecture and engineer- ing principles  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Applica-tion_security#System_and_network_secu-rity  | 
  
   #Protection  | 
 
| 
   8.28  | 
  
   Secure
  coding  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Applica-tion_security#System_and_network_secu-rity  | 
  
   #Protection  | 
 
| 
   8.29  | 
  
   Security
  testing in de- velopment and acceptance  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify  | 
  
   #Applica-tion_security#Informa-tion_securi-ty_assurance#System_and_network_secu-rity  | 
  
   #Protection  | 
 
| 
   8.30  | 
  
   Outsourced
  development  | 
  
   #Preventive
  #Detective  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Identify
  #Protect #Detect  | 
  
   #System_and_
  network_secu- rity #Applica- tion_security#Supplier_re- lationships_se-
  curity  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
   8.31  | 
  
   Separation
  of develop- ment, test and production environments  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Applica-tion_security#System_and_network_secu-rity  | 
  
   #Protection  | 
 
| 
   8.32  | 
  
   Change
  man-agement  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #Applica-tion_security#System_and_network_secu-rity  | 
  
   #Protection  | 
 
| 
   8.33  | 
  
   Test
  informa- tion  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity  | 
  
   #Protect  | 
  
   #Information_protection  | 
  
   #Protection  | 
 
| 
   8.34  | 
  
   Protection
  of informa- tion systems during audit testing  | 
  
   #Preventive  | 
  
   #Confidentiality
  #Integrity #Availability  | 
  
   #Protect  | 
  
   #System_and_
  network_secu- rity #Informa- tion_protec- tion  | 
  
   #Governance_
  and_Ecosys- tem #Protec- tion  | 
 
| 
                   Category  | 
                
                   Related Controls  | 
                
                   Description  | 
              
| 
                   
                    1. Information Security Governance and Policies  | 
                
                   
                    5.01, 5.02, 5.03, 5.04, 5.35, 5.36  | 
                
                   
                    Policies, roles, and responsibilities for maintaining
                    information security. Governance and compliance reviews.  | 
              
| 
                   
                    2. Information Asset Management  | 
                
                   
                    5.09, 5.10, 5.11, 5.12, 5.13, 8.10, 8.11, 5.33  | 
                
                   
                    Managing information assets, asset inventory,
                    classification, and labelling. Asset disposal and protection
                    of records.  | 
              
| 
                   
                    3. Access Control and Identity Management  | 
                
                   
                    5.15, 5.16, 5.17, 5.18, 8.02, 8.03, 8.05  | 
                
                   
                    Managing access rights, identity verification, and secure
                    authentication. Controlling access to sensitive
                    information.  | 
              
| 
                   
                    4. Supplier and External Party Management  | 
                
                   
                    5.19, 5.20, 5.21, 5.22, 8.30  | 
                
                   
                    Ensuring information security in relationships with
                    suppliers and service providers. Managing risks in the
                    supply chain.  | 
              
| 
                   
                    5. Incident Management and Response  | 
                
                   
                    5.24, 5.25, 5.26, 5.27, 5.28, 6.08  | 
                
                   
                    Incident response planning, handling security incidents,
                    learning from them, and managing evidence collection.  | 
              
| 
                   
                    6. Business Continuity and Resilience  | 
                
                   5.29, 5.30, 8.13, 8.14  | 
                
                   
                    Ensuring business continuity during disruptions. Backup and
                    redundancy of information processing.  | 
              
| 
                   
                    7. Compliance and Legal Obligations  | 
                
                   5.31, 5.32, 5.34  | 
                
                   
                    Compliance with legal, regulatory, and contractual
                    requirements. Protection of personal and intellectual
                    property information.  | 
              
| 
                   
                    8. Physical and Environmental Security  | 
                
                   
                    7.01, 7.02, 7.03, 7.04, 7.05, 7.06, 7.07, 7.08, 7.09, 7.10,
                    7.11, 7.12, 7.13, 7.14  | 
                
                   
                    Securing the physical environment, facilities, equipment,
                    and utility support. Protection from physical and
                    environmental threats.  | 
              
| 
                   
                    9. User and Employment Security  | 
                
                   
                    6.01, 6.02, 6.03, 6.04, 6.05, 6.06, 6.07  | 
                
                   
                    Ensuring employee-related information security, including
                    screening, training, and responsibilities during and after
                    employment.  | 
              
| 
                   
                    10. System and Network Security  | 
                
                   
                    8.07, 8.08, 8.09, 8.06, 8.18, 8.19, 8.20, 8.21, 8.22,
                    8.23  | 
                
                   
                    Securing systems, networks, and applications from malware,
                    vulnerabilities, and other threats. Network segregation,
                    configuration, and software installation controls.  | 
              
| 
                   
                    11. Logging and Monitoring  | 
                
                   8.15, 8.16, 8.17  | 
                
                   
                    Monitoring and logging activities, including clock
                    synchronization to ensure accurate logs.  | 
              
| 
                   
                    12. Cryptography and Data Protection  | 
                
                   8.24, 8.12  | 
                
                   
                    Encryption and cryptography use, as well as protection
                    against data leakage.  | 
              
| 
                   
                    13. Secure Development and Testing  | 
                
                   
                    8.04, 8.25, 8.26, 8.27, 8.28, 8.29, 8.31, 8.33  | 
                
                   
                    Security in development, testing, and coding. Separation of
                    environments and secure application lifecycle
                    management.  | 
              
| 
                   
                    14. Change and Audit Management  | 
                
                   8.32, 8.34  | 
                
                   
                    Change management and protecting systems during audits.
                    Ensuring smooth transitions and minimal risk during
                    audits.  | 
              
| 
                   
                    15. Threat Intelligence and External Relations  | 
                
                   5.07, 5.05, 5.06  | 
                
                   
                    Monitoring and addressing external threats, including
                    contacts with authorities and interest groups.  | 
              
| 
                   16. Cloud Security  | 
                
                   5.23  | 
                
                   
                    Managing security related to the use of cloud services.  | 
              
Training will be 4 days and what will take away from this Training.
Two words on Knowledge and Skill.
Learning Objectives
Means unaltered information. Information cannot be changed in-between end to end.
Why is Information security management important within the organization?
Top management should create and provide resources,
Create security Policy, security objectives
Directions:
As directed by your tutor, consider clause 5 and in particular sub-clause 5.1 and identify
which leadership/commitment behaviours and competencies, with respect to information
security management, you would expect from the organization provided
****************************************************************
Notes:
Top management will provide the support.
Clause 8 is also the DO part from PDCA
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
Problem Statement:
Internal Issues:
Directions, Part 1:
Points Discussed:
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit
9.3 Management review
10.1 Nonconformity and corrective action
10.2 Continual improvement
Read the standards 27001 and 27002
Remaining activities to be completed
Annexure A has to be read.
A.5 Information security policies
A.5.1 Management direction for information security
A.5.1.1 Policies for information security
A.5.1.2 Review of the policies for information security
A.6 Organization of information security
A.6.1 Internal organization
A.6.1.1 Information security roles and responsibilities
A.6.1.2 Segregation of duties
A.6.1.3 Contact with authorities
A.6.1.4 Contact with special interest groups
A.6.1.5 Information security in project management
A.6.2 Mobile devices and teleworking
A.6.2.1 Mobile device policy
A.6.2.2 Teleworking
A.7 Human resource security
A.7.1 Prior to employment
A.7.1.1 Screening
A.7.1.2 Terms and conditions of employment
A.7.2 During employment
A.7.2.1 Management responsibilities
A.7.2.2 Information security awareness, education and training
A.7.2.3 Disciplinary process
A.7.3 Termination and change of employment
A.7.3.1 Termination or change of employment responsibilities
A.8 Asset management
A.8.1 Responsibility for assets
A.8.1.1 Inventory of assets
A.8.1.2 Ownership of assets
A.8.1.3 Acceptable use of assets
A.8.1.4 Return of assets
A.8.2 Information classification
A.8.2.1 Classification of information
*******************************************************************************
Process: is the key for the organization to last for centuries
Plan : requirements: - Clause 4 Context of the org. / 5 leadership / 6 Planning / 7 Support
DO : implement: - Clause 8 Operation
Check : Audits/ gaps/ managements review: - Clause 9 Performance evaluation
Act : Results/ improvement: - Clause 10 Improvement
Required documented information
Control of documentation information
Exercises Activity 18: home work
Activity 19: Create Gantt Chart
Create a Excel and do the Gantt chart
Define the scope: Decide of the organization
Call Centre: 50 to 100 people will be working, for Airtel, dealing with customers of the Airtel
Telecom Company: SIM CARD
Department:
It Network Department, HR Department, Telecom regulatory, Physical Scope, Centre situated, Staff,
Core Business activities:
In bound: answering the question from the custom
Call centre 24/7
Scope:
Type of activities: InboundWill show the intention of the organization and will be the driving force.
Roles, Responsibility and authorities: for an ISMS Manager
            
          
            
          
CIA on information assets
Risk criteria 🡪 Risk acceptance Criteria/ Criteria for performing
Asset Register
Cause
Sources
Statement of applicability
            
          
Activity 26 / 27 / 28 / 29: home work
****************************************************************
Documentation must be revisited every year, why?
Activity 30: Communication Process
What is the process? Certain input, to get desired output based on the certain steps
Risk treatment Plan:
Performance Evaluation
Internal AuditAlso called as Aide Memory
Has Security been employed?
Scope: Physical Security
Leadership = guidance’s [leadership are Born]
Management = controls [Mangers are created]
            
Example:
****************************************************************
Why ISMS?
Improved security for the organization and its clientsClause 4: Context of Org
Clause 6: Planning
A risk assessment process should then be defined that identifies risks associated with the
loss of confidentiality, integrity and availability for information within the scope of the ISMS,
analyses the risks and then evaluates them
Clause 7: Support
Leadership will provide the support
Clause 8: Operation
Info sec Risk Assessment
Info sec Risk Treatment
Statement of Applicability: 114 Controls are present. When the controls are not applied, then the reason will be provided.
Clause 9: Performance evaluation
Internal Audits
Management Review
Clause 10: Improvement
Non-Conformity and corrective action
Continual Improvement
Implementation: of ISMS -
Determine the Need for Documentation
Baseline Gap Analysis
Project Plan: Gannt Chart
Scope of ISMS
Leadership Commitments and Roles, responsibility & Authorities.
Reduce/ Treat
Avoid/ Terminate
Accept/ Tolerate
Transfer/ share
Audit:
Intent
implement
Effectiveness
Non conformity reports
Management Review
Change Management
Comments
Post a Comment