-
Main Sections
-
1 Scope
- Organisation Scope
- Physical Scope
- Information Systems Scope
- 2 Normative references
- 3 Terms & definitions
- 4 Context of the Organisation
- 5 Leadership (Top Mgt)
-
6 Planning
- Information security objectives and planning to achieve them
- Actions to address risks and opportunities
-
7 Support
- Resources
- Competence, Determine competence of people working
- Awareness, Security awareness for people working
- Communication, Determine need for internal and external communications
- Documented information, Documented and publish necessary information
-
8 Operation
- Operational planning and control, Plan, implement and control the required processes
- Information security risk assessment, Perform risk assessments at planned intervals or after significant changes
- Information security risk treatment, Implement risk treatment plan
-
9 Performance evaluation
- Monitoring, measurement, analysis and evaluation, Evaluate performance and effectiveness of ISMS
- Internal audit, Conduct internal audits at planned intervals
- Management review, Review of ISMS by management at regular intervals
-
10 Improvement
- Nonconformity and corrective action, Actions for nonconformity
- Continual improvement, Continually improve ISMS
-
Annex A Controls
-
14 Domains
- A5 Information security policies
- A6 Organization of information security
- A7 Human resource security
- A8 Asset management
- A9 Access control
- A10 Cryptography
- A11 Physical and environmental security
- A12 Operations security
- A13 Communications security
- A14 System acquisition, development and maintenance
- A15 Supplier relationships
- A16 Incident management
- A17 Business continuity management
- A18 Compliance
-
114 Controls
- A5.1 Management direction for information security
- A6.1 Internal organization
- A6.2 Mobile devices and teleworking
- A7.1 Prior to employment
- A7.2 During employment
- A7.3 Termination and change of employment
- A8.2 Information classification
- A8.1 Responsibility of assets
- A8.3 Media handling
- A9.1 Business requirements of access control
- A9.4 System and application access control
- A9.2 User access management
- A9.3 User responsibilities
- A10.1 Cryptographic controls
- A11.1 Secure areas
- A11.2 Equipment
- A12.1 Operational procedures and responsibilities
- A12.2 Protection from malware
- A12.4 Logging and monitoring
- A12.3 Backup
- A12.5 Control of operational software
- A12.6 Technical vulnerability management
- A12.7 Information systems audit considerations
- A13.1 Network security management
- A13.2 Information transfer
- A14.1 Security requirements of information systems
- A14.2 Security in development and support processes
- A14.3 Test data
- A15.1 Information security in supplier relationships
- A15.2 Supplier service delivery management
- A16.1 Management of security incidents and improvements
- A17.1 Information security continuity
- A17.2 Redundancies
- A18.1 Compliance with legal and contractual requirements
- A18.2 Information security reviews