Date: Feb 21, 2022, 11:44:03 AM
Date: Feb 21, 2022, 11:47:31 AM
Name: ISO/IEC 27002 [2022]
Name: ISO/IEC 27002 [2022]
Description: ISO/IEC 27002:2022 controls
Description: ISO/IEC 27002:2022 controls
f | 1 | { | f | 1 | { |
2 | "label": "ISO/IEC 27002 [2013]", | 2 | "label": "ISO/IEC 27002 [2013]", | ||
3 | "language": "EN", | 3 | "language": "EN", | ||
4 | "refs": [ | 4 | "refs": [ | ||
5 | "https://www.iso.org/standard/54533.html" | 5 | "https://www.iso.org/standard/54533.html" | ||
6 | ], | 6 | ], | ||
7 | "uuid": "98ca84fb-db87-11e8-ac77-0800279aaa2b", | 7 | "uuid": "98ca84fb-db87-11e8-ac77-0800279aaa2b", | ||
t | 8 | "values": [ | t | 8 | "values": [], |
9 | { | ||||
10 | "category": "Information security policies", | ||||
11 | "code": "5.1.1", | ||||
12 | "label": "Policies for information security", | ||||
13 | "uuid": "267fc596-f705-11e8-b555-0800279aaa2b" | ||||
14 | }, | ||||
15 | { | ||||
16 | "category": "Information security policies", | ||||
17 | "code": "5.1.2", | ||||
18 | "label": "Review of the policies for information security", | ||||
19 | "uuid": "267fc6a6-f705-11e8-b555-0800279aaa2b" | ||||
20 | }, | ||||
21 | { | ||||
22 | "category": "Organization of information security", | ||||
23 | "code": "6.1.1", | ||||
24 | "label": "Information security roles and responsibilities", | ||||
25 | "uuid": "267fc73c-f705-11e8-b555-0800279aaa2b" | ||||
26 | }, | ||||
27 | { | ||||
28 | "category": "Organization of information security", | ||||
29 | "code": "6.1.2", | ||||
30 | "label": "Segregation of duties", | ||||
31 | "uuid": "267fd0b1-f705-11e8-b555-0800279aaa2b" | ||||
32 | }, | ||||
33 | { | ||||
34 | "category": "Organization of information security", | ||||
35 | "code": "6.1.3", | ||||
36 | "label": "Contact with authorities", | ||||
37 | "uuid": "267fc7c0-f705-11e8-b555-0800279aaa2b" | ||||
38 | }, | ||||
39 | { | ||||
40 | "category": "Organization of information security", | ||||
41 | "code": "6.1.4", | ||||
42 | "label": "Contact with special interest groups", | ||||
43 | "uuid": "267fc80f-f705-11e8-b555-0800279aaa2b" | ||||
44 | }, | ||||
45 | { | ||||
46 | "category": "Organization of information security", | ||||
47 | "code": "6.1.5", | ||||
48 | "label": "Information Security in Project Management", | ||||
49 | "uuid": "267fe6b9-f705-11e8-b555-0800279aaa2b" | ||||
50 | }, | ||||
51 | { | ||||
52 | "category": "Organization of information security", | ||||
53 | "code": "6.2.1", | ||||
54 | "label": "Mobile device policy", | ||||
55 | "uuid": "267fd9d0-f705-11e8-b555-0800279aaa2b" | ||||
56 | }, | ||||
57 | { | ||||
58 | "category": "Organization of information security", | ||||
59 | "code": "6.2.2", | ||||
60 | "label": "Teleworking", | ||||
61 | "uuid": "267fda0e-f705-11e8-b555-0800279aaa2b" | ||||
62 | }, | ||||
63 | { | ||||
64 | "category": "Human resource security", | ||||
65 | "code": "7.1.1", | ||||
66 | "label": "Screening", | ||||
67 | "uuid": "267fca6b-f705-11e8-b555-0800279aaa2b" | ||||
68 | }, | ||||
69 | { | ||||
70 | "category": "Human resource security", | ||||
71 | "code": "7.1.2", | ||||
72 | "label": "Terms and conditions of employment", | ||||
73 | "uuid": "267fcaad-f705-11e8-b555-0800279aaa2b" | ||||
74 | }, | ||||
75 | { | ||||
76 | "category": "Human resource security", | ||||
77 | "code": "7.2.1", | ||||
78 | "label": "Management responsibilities", | ||||
79 | "uuid": "267fc6f7-f705-11e8-b555-0800279aaa2b" | ||||
80 | }, | ||||
81 | { | ||||
82 | "category": "Human resource security", | ||||
83 | "code": "7.2.2", | ||||
84 | "label": "Information security awareness, education and training", | ||||
85 | "uuid": "267fcaeb-f705-11e8-b555-0800279aaa2b" | ||||
86 | }, | ||||
87 | { | ||||
88 | "category": "Human resource security", | ||||
89 | "code": "7.2.3", | ||||
90 | "label": "Disciplinary process", | ||||
91 | "uuid": "267fcb29-f705-11e8-b555-0800279aaa2b" | ||||
92 | }, | ||||
93 | { | ||||
94 | "category": "Human resource security", | ||||
95 | "code": "7.3.1", | ||||
96 | "label": "Termination or change of employment responsibilities", | ||||
97 | "uuid": "267fcb79-f705-11e8-b555-0800279aaa2b" | ||||
98 | }, | ||||
99 | { | ||||
100 | "category": "Asset management", | ||||
101 | "code": "8.1.1", | ||||
102 | "label": "Inventory of Assets", | ||||
103 | "uuid": "267fc90c-f705-11e8-b555-0800279aaa2b" | ||||
104 | }, | ||||
105 | { | ||||
106 | "category": "Asset management", | ||||
107 | "code": "8.1.2", | ||||
108 | "label": "Ownership of assets", | ||||
109 | "uuid": "267fc94c-f705-11e8-b555-0800279aaa2b" | ||||
110 | }, | ||||
111 | { | ||||
112 | "category": "Asset management", | ||||
113 | "code": "8.1.3", | ||||
114 | "label": "Acceptable use of assets", | ||||
115 | "uuid": "267fc989-f705-11e8-b555-0800279aaa2b" | ||||
116 | }, | ||||
117 | { | ||||
118 | "category": "Asset management", | ||||
119 | "code": "8.1.4", | ||||
120 | "label": "Return of assets", | ||||
121 | "uuid": "267fcbce-f705-11e8-b555-0800279aaa2b" | ||||
122 | }, | ||||
123 | { | ||||
124 | "category": "Asset management", | ||||
125 | "code": "8.2.1", | ||||
126 | "label": "Classification guidelines", | ||||
127 | "uuid": "267fc9c9-f705-11e8-b555-0800279aaa2b" | ||||
128 | }, | ||||
129 | { | ||||
130 | "category": "Asset management", | ||||
131 | "code": "8.2.2", | ||||
132 | "label": "Labelling of information", | ||||
133 | "uuid": "267fca19-f705-11e8-b555-0800279aaa2b" | ||||
134 | }, | ||||
135 | { | ||||
136 | "category": "Asset management", | ||||
137 | "code": "8.2.3", | ||||
138 | "label": "Handling of assets", | ||||
139 | "uuid": "267fe71a-f705-11e8-b555-0800279aaa2b" | ||||
140 | }, | ||||
141 | { | ||||
142 | "category": "Asset management", | ||||
143 | "code": "8.3.1", | ||||
144 | "label": "Management of removeable media", | ||||
145 | "uuid": "267fd32a-f705-11e8-b555-0800279aaa2b" | ||||
146 | }, | ||||
147 | { | ||||
148 | "category": "Asset management", | ||||
149 | "code": "8.3.2", | ||||
150 | "label": "Disposal of media", | ||||
151 | "uuid": "267fd369-f705-11e8-b555-0800279aaa2b" | ||||
152 | }, | ||||
153 | { | ||||
154 | "category": "Asset management", | ||||
155 | "code": "8.3.3", | ||||
156 | "label": "Physical Media transfer", | ||||
157 | "uuid": "267fd421-f705-11e8-b555-0800279aaa2b" | ||||
158 | }, | ||||
159 | { | ||||
160 | "category": "Access control", | ||||
161 | "code": "9.1.1", | ||||
162 | "label": "Access control policy", | ||||
163 | "uuid": "267fd659-f705-11e8-b555-0800279aaa2b" | ||||
164 | }, | ||||
165 | { | ||||
166 | "category": "Access control", | ||||
167 | "code": "9.1.2", | ||||
168 | "label": "Access to networks and network services", | ||||
169 | "uuid": "267fd81b-f705-11e8-b555-0800279aaa2b" | ||||
170 | }, | ||||
171 | { | ||||
172 | "category": "Access control", | ||||
173 | "code": "9.2.1", | ||||
174 | "label": "User registration and deregistration", | ||||
175 | "uuid": "267fd899-f705-11e8-b555-0800279aaa2b" | ||||
176 | }, | ||||
177 | { | ||||
178 | "category": "Access control", | ||||
179 | "code": "9.2.2", | ||||
180 | "label": "User access provisioning", | ||||
181 | "uuid": "267fe782-f705-11e8-b555-0800279aaa2b" | ||||
182 | }, | ||||
183 | { | ||||
184 | "category": "Access control", | ||||
185 | "code": "9.2.3", | ||||
186 | "label": "Management of privileged access rights", | ||||
187 | "uuid": "267fd69f-f705-11e8-b555-0800279aaa2b" | ||||
188 | }, | ||||
189 | { | ||||
190 | "category": "Access control", | ||||
191 | "code": "9.2.4", | ||||
192 | "label": "Management of secret authentication information of users", | ||||
193 | "uuid": "267fd6e4-f705-11e8-b555-0800279aaa2b" | ||||
194 | }, | ||||
195 | { | ||||
196 | "category": "Access control", | ||||
197 | "code": "9.2.5", | ||||
198 | "label": "Review of user access rights", | ||||
199 | "uuid": "267fd723-f705-11e8-b555-0800279aaa2b" | ||||
200 | }, | ||||
201 | { | ||||
202 | "category": "Access control", | ||||
203 | "code": "9.2.6", | ||||
204 | "label": "Removal or adjustment of access rights", | ||||
205 | "uuid": "267fcc3c-f705-11e8-b555-0800279aaa2b" | ||||
206 | }, | ||||
207 | { | ||||
208 | "category": "Access control", | ||||
209 | "code": "9.3.1", | ||||
210 | "label": "Use of secret authentication information", | ||||
211 | "uuid": "267fd761-f705-11e8-b555-0800279aaa2b" | ||||
212 | }, | ||||
213 | { | ||||
214 | "category": "Access control", | ||||
215 | "code": "9.4.1", | ||||
216 | "label": "Information access restriction", | ||||
217 | "uuid": "267fd993-f705-11e8-b555-0800279aaa2b" | ||||
218 | }, | ||||
219 | { | ||||
220 | "category": "Access control", | ||||
221 | "code": "9.4.2", | ||||
222 | "label": "Secure log-on procedures", | ||||
223 | "uuid": "267fd954-f705-11e8-b555-0800279aaa2b" | ||||
224 | }, | ||||
225 | { | ||||
226 | "category": "Access control", | ||||
227 | "code": "9.4.3", | ||||
228 | "label": "Password management system", | ||||
229 | "uuid": "267fd8d8-f705-11e8-b555-0800279aaa2b" | ||||
230 | }, | ||||
231 | { | ||||
232 | "category": "Access control", | ||||
233 | "code": "9.4.4", | ||||
234 | "label": "Use of privileged utility programs", | ||||
235 | "uuid": "267fd917-f705-11e8-b555-0800279aaa2b" | ||||
236 | }, | ||||
237 | { | ||||
238 | "category": "Access control", | ||||
239 | "code": "9.4.5", | ||||
240 | "label": "Access control to program source code", | ||||
241 | "uuid": "267fdbf1-f705-11e8-b555-0800279aaa2b" | ||||
242 | }, | ||||
243 | { | ||||
244 | "category": "Cryptography", | ||||
245 | "code": "10.1.1", | ||||
246 | "label": "Policy on the use of cryptographic controls", | ||||
247 | "uuid": "267fda8c-f705-11e8-b555-0800279aaa2b" | ||||
248 | }, | ||||
249 | { | ||||
250 | "category": "Cryptography", | ||||
251 | "code": "10.1.2", | ||||
252 | "label": "Key management", | ||||
253 | "uuid": "267fdacc-f705-11e8-b555-0800279aaa2b" | ||||
254 | }, | ||||
255 | { | ||||
256 | "category": "Physical and environmental security", | ||||
257 | "code": "11.1.1", | ||||
258 | "label": "Physical security perimeter", | ||||
259 | "uuid": "267fcca4-f705-11e8-b555-0800279aaa2b" | ||||
260 | }, | ||||
261 | { | ||||
262 | "category": "Physical and environmental security", | ||||
263 | "code": "11.1.2", | ||||
264 | "label": "Physical entry controls", | ||||
265 | "uuid": "267fcce9-f705-11e8-b555-0800279aaa2b" | ||||
266 | }, | ||||
267 | { | ||||
268 | "category": "Physical and environmental security", | ||||
269 | "code": "11.1.3", | ||||
270 | "label": "Securing offices, rooms and facilities", | ||||
271 | "uuid": "267fcd30-f705-11e8-b555-0800279aaa2b" | ||||
272 | }, | ||||
273 | { | ||||
274 | "category": "Physical and environmental security", | ||||
275 | "code": "11.1.4", | ||||
276 | "label": "Protecting against external and environmental attacks", | ||||
277 | "uuid": "267fcd6f-f705-11e8-b555-0800279aaa2b" | ||||
278 | }, | ||||
279 | { | ||||
280 | "category": "Physical and environmental security", | ||||
281 | "code": "11.1.5", | ||||
282 | "label": "Working in secure areas", | ||||
283 | "uuid": "267fcdac-f705-11e8-b555-0800279aaa2b" | ||||
284 | }, | ||||
285 | { | ||||
286 | "category": "Physical and environmental security", | ||||
287 | "code": "11.1.6", | ||||
288 | "label": "Delivery and loading areas", | ||||
289 | "uuid": "267fcdec-f705-11e8-b555-0800279aaa2b" | ||||
290 | }, | ||||
291 | { | ||||
292 | "category": "Physical and environmental security", | ||||
293 | "code": "11.2.1", | ||||
294 | "label": "Equipment siting and protection", | ||||
295 | "uuid": "267fce44-f705-11e8-b555-0800279aaa2b" | ||||
296 | }, | ||||
297 | { | ||||
298 | "category": "Physical and environmental security", | ||||
299 | "code": "11.2.2", | ||||
300 | "label": "Supporting utilities", | ||||
301 | "uuid": "267fce8a-f705-11e8-b555-0800279aaa2b" | ||||
302 | }, | ||||
303 | { | ||||
304 | "category": "Physical and environmental security", | ||||
305 | "code": "11.2.3", | ||||
306 | "label": "Cabling Security", | ||||
307 | "uuid": "267fcecb-f705-11e8-b555-0800279aaa2b" | ||||
308 | }, | ||||
309 | { | ||||
310 | "category": "Physical and environmental security", | ||||
311 | "code": "11.2.4", | ||||
312 | "label": "Equipment maintenance", | ||||
313 | "uuid": "267fcf0a-f705-11e8-b555-0800279aaa2b" | ||||
314 | }, | ||||
315 | { | ||||
316 | "category": "Physical and environmental security", | ||||
317 | "code": "11.2.5", | ||||
318 | "label": "Security of equipment off-premises", | ||||
319 | "uuid": "267fcfdf-f705-11e8-b555-0800279aaa2b" | ||||
320 | }, | ||||
321 | { | ||||
322 | "category": "Physical and environmental security", | ||||
323 | "code": "11.2.6", | ||||
324 | "label": "Security of equipment and assets off-premises", | ||||
325 | "uuid": "267fcf4f-f705-11e8-b555-0800279aaa2b" | ||||
326 | }, | ||||
327 | { | ||||
328 | "category": "Physical and environmental security", | ||||
329 | "code": "11.2.7", | ||||
330 | "label": "Secure disposal or re-use of equipment", | ||||
331 | "uuid": "267fcf90-f705-11e8-b555-0800279aaa2b" | ||||
332 | }, | ||||
333 | { | ||||
334 | "category": "Physical and environmental security", | ||||
335 | "code": "11.2.8", | ||||
336 | "label": "Unattended user equipment", | ||||
337 | "uuid": "267fd7a0-f705-11e8-b555-0800279aaa2b" | ||||
338 | }, | ||||
339 | { | ||||
340 | "category": "Physical and environmental security", | ||||
341 | "code": "11.2.9", | ||||
342 | "label": "Clear desk and clear screen policy", | ||||
343 | "uuid": "267fd7dd-f705-11e8-b555-0800279aaa2b" | ||||
344 | }, | ||||
345 | { | ||||
346 | "category": "Operations security", | ||||
347 | "code": "12.1.1", | ||||
348 | "label": "Documented operating procedures", | ||||
349 | "uuid": "267fd029-f705-11e8-b555-0800279aaa2b" | ||||
350 | }, | ||||
351 | { | ||||
352 | "category": "Operations security", | ||||
353 | "code": "12.1.2", | ||||
354 | "label": "Change management", | ||||
355 | "uuid": "267fd073-f705-11e8-b555-0800279aaa2b" | ||||
356 | }, | ||||
357 | { | ||||
358 | "category": "Operations security", | ||||
359 | "code": "12.1.3", | ||||
360 | "label": "Capacity management", | ||||
361 | "uuid": "267fd1a8-f705-11e8-b555-0800279aaa2b" | ||||
362 | }, | ||||
363 | { | ||||
364 | "category": "Operations security", | ||||
365 | "code": "12.1.4", | ||||
366 | "label": "Separation of development, testing and operational environments", | ||||
367 | "uuid": "267fd0ef-f705-11e8-b555-0800279aaa2b" | ||||
368 | }, | ||||
369 | { | ||||
370 | "category": "Operations security", | ||||
371 | "code": "12.2.1", | ||||
372 | "label": "Controls against malicious code", | ||||
373 | "uuid": "267fd22e-f705-11e8-b555-0800279aaa2b" | ||||
374 | }, | ||||
375 | { | ||||
376 | "category": "Operations security", | ||||
377 | "code": "12.3.1", | ||||
378 | "label": "Information Backup", | ||||
379 | "uuid": "267fd272-f705-11e8-b555-0800279aaa2b" | ||||
380 | }, | ||||
381 | { | ||||
382 | "category": "Operations security", | ||||
383 | "code": "12.4.1", | ||||
384 | "label": "Event logging", | ||||
385 | "uuid": "267fd529-f705-11e8-b555-0800279aaa2b" | ||||
386 | }, | ||||
387 | { | ||||
388 | "category": "Operations security", | ||||
389 | "code": "12.4.2", | ||||
390 | "label": "Protection of log information", | ||||
391 | "uuid": "267fd567-f705-11e8-b555-0800279aaa2b" | ||||
392 | }, | ||||
393 | { | ||||
394 | "category": "Operations security", | ||||
395 | "code": "12.4.3", | ||||
396 | "label": "Administrator and operator logs", | ||||
397 | "uuid": "267fd5ae-f705-11e8-b555-0800279aaa2b" | ||||
398 | }, | ||||
399 | { | ||||
400 | "category": "Operations security", | ||||
401 | "code": "12.4.4", | ||||
402 | "label": "Clock synchronisation", | ||||
403 | "uuid": "267fd610-f705-11e8-b555-0800279aaa2b" | ||||
404 | }, | ||||
405 | { | ||||
406 | "category": "Operations security", | ||||
407 | "code": "12.5.1", | ||||
408 | "label": "Installation of software on operational systems", | ||||
409 | "uuid": "267fdb18-f705-11e8-b555-0800279aaa2b" | ||||
410 | }, | ||||
411 | { | ||||
412 | "category": "Operations security", | ||||
413 | "code": "12.6.1", | ||||
414 | "label": "Management of technical vulnerabilities", | ||||
415 | "uuid": "267fdda3-f705-11e8-b555-0800279aaa2b" | ||||
416 | }, | ||||
417 | { | ||||
418 | "category": "Operations security", | ||||
419 | "code": "12.6.2", | ||||
420 | "label": "Restrictions on software installation", | ||||
421 | "uuid": "267fe8fe-f705-11e8-b555-0800279aaa2b" | ||||
422 | }, | ||||
423 | { | ||||
424 | "category": "Operations security", | ||||
425 | "code": "12.7.1", | ||||
426 | "label": "Information systems audit controls", | ||||
427 | "uuid": "267fe660-f705-11e8-b555-0800279aaa2b" | ||||
428 | }, | ||||
429 | { | ||||
430 | "category": "Communications security", | ||||
431 | "code": "13.1.1", | ||||
432 | "label": "Network controls", | ||||
433 | "uuid": "267fd2b1-f705-11e8-b555-0800279aaa2b" | ||||
434 | }, | ||||
435 | { | ||||
436 | "category": "Communications security", | ||||
437 | "code": "13.1.2", | ||||
438 | "label": "Security of network services", | ||||
439 | "uuid": "267fd2ee-f705-11e8-b555-0800279aaa2b" | ||||
440 | }, | ||||
441 | { | ||||
442 | "category": "Communications security", | ||||
443 | "code": "13.1.3", | ||||
444 | "label": "Segregation in networks", | ||||
445 | "uuid": "267fd85b-f705-11e8-b555-0800279aaa2b" | ||||
446 | }, | ||||
447 | { | ||||
448 | "category": "Communications security", | ||||
449 | "code": "13.2.1", | ||||
450 | "label": "Information transfer policies and procedures", | ||||
451 | "uuid": "267fd3a6-f705-11e8-b555-0800279aaa2b" | ||||
452 | }, | ||||
453 | { | ||||
454 | "category": "Communications security", | ||||
455 | "code": "13.2.2", | ||||
456 | "label": "Agreements on information transfer", | ||||
457 | "uuid": "267fd3e3-f705-11e8-b555-0800279aaa2b" | ||||
458 | }, | ||||
459 | { | ||||
460 | "category": "Communications security", | ||||
461 | "code": "13.2.3", | ||||
462 | "label": "Electronic messaging", | ||||
463 | "uuid": "267fd462-f705-11e8-b555-0800279aaa2b" | ||||
464 | }, | ||||
465 | { | ||||
466 | "category": "Communications security", | ||||
467 | "code": "13.2.4", | ||||
468 | "label": "Confidentiality or non-disclosure agreements", | ||||
469 | "uuid": "267fc77e-f705-11e8-b555-0800279aaa2b" | ||||
470 | }, | ||||
471 | { | ||||
472 | "category": "System acquisition, development and maintenance", | ||||
473 | "code": "14.1.1", | ||||
474 | "label": "Information security requirements analysis and specification", | ||||
475 | "uuid": "267fda50-f705-11e8-b555-0800279aaa2b" | ||||
476 | }, | ||||
477 | { | ||||
478 | "category": "System acquisition, development and maintenance", | ||||
479 | "code": "14.1.2", | ||||
480 | "label": "Securing application services on public networks", | ||||
481 | "uuid": "267fd4ac-f705-11e8-b555-0800279aaa2b" | ||||
482 | }, | ||||
483 | { | ||||
484 | "category": "System acquisition, development and maintenance", | ||||
485 | "code": "14.1.3", | ||||
486 | "label": "Protecting application services transactions", | ||||
487 | "uuid": "267fd4ed-f705-11e8-b555-0800279aaa2b" | ||||
488 | }, | ||||
489 | { | ||||
490 | "category": "System acquisition, development and maintenance", | ||||
491 | "code": "14.2.1", | ||||
492 | "label": "Secure development policy", | ||||
493 | "uuid": "267fe8a1-f705-11e8-b555-0800279aaa2b" | ||||
494 | }, | ||||
495 | { | ||||
496 | "category": "System acquisition, development and maintenance", | ||||
497 | "code": "14.2.2", | ||||
498 | "label": "System change control procedures", | ||||
499 | "uuid": "267fdc38-f705-11e8-b555-0800279aaa2b" | ||||
500 | }, | ||||
501 | { | ||||
502 | "category": "System acquisition, development and maintenance", | ||||
503 | "code": "14.2.3", | ||||
504 | "label": "Technical review of applications after operating platform changes", | ||||
505 | "uuid": "267fdc8c-f705-11e8-b555-0800279aaa2b" | ||||
506 | }, | ||||
507 | { | ||||
508 | "category": "System acquisition, development and maintenance", | ||||
509 | "code": "14.2.4", | ||||
510 | "label": "Restrictions on changes to software packages", | ||||
511 | "uuid": "267fdcf3-f705-11e8-b555-0800279aaa2b" | ||||
512 | }, | ||||
513 | { | ||||
514 | "category": "System acquisition, development and maintenance", | ||||
515 | "code": "14.2.5", | ||||
516 | "label": "Secure system engineering principles", | ||||
517 | "uuid": "267fdf36-f705-11e8-b555-0800279aaa2b" | ||||
518 | }, | ||||
519 | { | ||||
520 | "category": "System acquisition, development and maintenance", | ||||
521 | "code": "14.2.6", | ||||
522 | "label": "Secure development environment", | ||||
523 | "uuid": "267fe847-f705-11e8-b555-0800279aaa2b" | ||||
524 | }, | ||||
525 | { | ||||
526 | "category": "System acquisition, development and maintenance", | ||||
527 | "code": "14.2.7", | ||||
528 | "label": "Outsourced software development", | ||||
529 | "uuid": "267fdd55-f705-11e8-b555-0800279aaa2b" | ||||
530 | }, | ||||
531 | { | ||||
532 | "category": "System acquisition, development and maintenance", | ||||
533 | "code": "14.2.8", | ||||
534 | "label": "System security testing", | ||||
535 | "uuid": "267fe7e9-f705-11e8-b555-0800279aaa2b" | ||||
536 | }, | ||||
537 | { | ||||
538 | "category": "System acquisition, development and maintenance", | ||||
539 | "code": "14.2.9", | ||||
540 | "label": "System acceptance testing", | ||||
541 | "uuid": "267fd1ea-f705-11e8-b555-0800279aaa2b" | ||||
542 | }, | ||||
543 | { | ||||
544 | "category": "System acquisition, development and maintenance", | ||||
545 | "code": "14.3.1", | ||||
546 | "label": "Protection of test data", | ||||
547 | "uuid": "267fdb78-f705-11e8-b555-0800279aaa2b" | ||||
548 | }, | ||||
549 | { | ||||
550 | "category": "Supplier relationships", | ||||
551 | "code": "15.1.1", | ||||
552 | "label": "Information security policy for supplier relationships", | ||||
553 | "uuid": "267fc88e-f705-11e8-b555-0800279aaa2b" | ||||
554 | }, | ||||
555 | { | ||||
556 | "category": "Supplier relationships", | ||||
557 | "code": "15.1.2", | ||||
558 | "label": "Addressing security within supplier agreements", | ||||
559 | "uuid": "267fc8cc-f705-11e8-b555-0800279aaa2b" | ||||
560 | }, | ||||
561 | { | ||||
562 | "category": "Supplier relationships", | ||||
563 | "code": "15.1.3", | ||||
564 | "label": "Informaiton and communication technology supply chain", | ||||
565 | "uuid": "267fe959-f705-11e8-b555-0800279aaa2b" | ||||
566 | }, | ||||
567 | { | ||||
568 | "category": "Supplier relationships", | ||||
569 | "code": "15.2.1", | ||||
570 | "label": "Monitoring and review of supplier services", | ||||
571 | "uuid": "267fd12f-f705-11e8-b555-0800279aaa2b" | ||||
572 | }, | ||||
573 | { | ||||
574 | "category": "Supplier relationships", | ||||
575 | "code": "15.2.2", | ||||
576 | "label": "Managing changes to supplier services", | ||||
577 | "uuid": "267fd16b-f705-11e8-b555-0800279aaa2b" | ||||
578 | }, | ||||
579 | { | ||||
580 | "category": "information security incident management", | ||||
581 | "code": "16.1.1", | ||||
582 | "label": "Responsibilities and procedures", | ||||
583 | "uuid": "267fde78-f705-11e8-b555-0800279aaa2b" | ||||
584 | }, | ||||
585 | { | ||||
586 | "category": "information security incident management", | ||||
587 | "code": "16.1.2", | ||||
588 | "label": "Reporting information security events", | ||||
589 | "uuid": "267fddeb-f705-11e8-b555-0800279aaa2b" | ||||
590 | }, | ||||
591 | { | ||||
592 | "category": "information security incident management", | ||||
593 | "code": "16.1.3", | ||||
594 | "label": "Reporting information security weaknesses", | ||||
595 | "uuid": "267fde31-f705-11e8-b555-0800279aaa2b" | ||||
596 | }, | ||||
597 | { | ||||
598 | "category": "information security incident management", | ||||
599 | "code": "16.1.4", | ||||
600 | "label": "Assessment of and decision on information security events", | ||||
601 | "uuid": "267fe9b4-f705-11e8-b555-0800279aaa2b" | ||||
602 | }, | ||||
603 | { | ||||
604 | "category": "information security incident management", | ||||
605 | "code": "16.1.5", | ||||
606 | "label": "Response in information security incidents", | ||||
607 | "uuid": "267fea11-f705-11e8-b555-0800279aaa2b" | ||||
608 | }, | ||||
609 | { | ||||
610 | "category": "information security incident management", | ||||
611 | "code": "16.1.6", | ||||
612 | "label": "Learning from information security incidents", | ||||
613 | "uuid": "267fdeb8-f705-11e8-b555-0800279aaa2b" | ||||
614 | }, | ||||
615 | { | ||||
616 | "category": "information security incident management", | ||||
617 | "code": "16.1.7", | ||||
618 | "label": "Collection of evidence", | ||||
619 | "uuid": "267fdef6-f705-11e8-b555-0800279aaa2b" | ||||
620 | }, | ||||
621 | { | ||||
622 | "category": "Information security aspects of business continuity management", | ||||
623 | "code": "17.1.1", | ||||
624 | "label": "Planning information security continuity", | ||||
625 | "uuid": "267fdf76-f705-11e8-b555-0800279aaa2b" | ||||
626 | }, | ||||
627 | { | ||||
628 | "category": "Information security aspects of business continuity management", | ||||
629 | "code": "17.1.2", | ||||
630 | "label": "Implementing information security continuity", | ||||
631 | "uuid": "267fdfbe-f705-11e8-b555-0800279aaa2b" | ||||
632 | }, | ||||
633 | { | ||||
634 | "category": "Information security aspects of business continuity management", | ||||
635 | "code": "17.1.3", | ||||
636 | "label": "Verify, review and evaluate information security continuity", | ||||
637 | "uuid": "267fe022-f705-11e8-b555-0800279aaa2b" | ||||
638 | }, | ||||
639 | { | ||||
640 | "category": "Information security aspects of business continuity management", | ||||
641 | "code": "17.2.1", | ||||
642 | "label": "Availability of information processing facilities", | ||||
643 | "uuid": "267fea72-f705-11e8-b555-0800279aaa2b" | ||||
644 | }, | ||||
645 | { | ||||
646 | "category": "Compliance", | ||||
647 | "code": "18.1.1", | ||||
648 | "label": "Identification of applicable legislation", | ||||
649 | "uuid": "267fe08b-f705-11e8-b555-0800279aaa2b" | ||||
650 | }, | ||||
651 | { | ||||
652 | "category": "Compliance", | ||||
653 | "code": "18.1.2", | ||||
654 | "label": "Intellectual Property Rights", | ||||
655 | "uuid": "267fe307-f705-11e8-b555-0800279aaa2b" | ||||
656 | }, | ||||
657 | { | ||||
658 | "category": "Compliance", | ||||
659 | "code": "18.1.3", | ||||
660 | "label": "Protection of records", | ||||
661 | "uuid": "267fe37d-f705-11e8-b555-0800279aaa2b" | ||||
662 | }, | ||||
663 | { | ||||
664 | "category": "Compliance", | ||||
665 | "code": "18.1.4", | ||||
666 | "label": "Privacy and protection of personally identifiable information", | ||||
667 | "uuid": "267fe3de-f705-11e8-b555-0800279aaa2b" | ||||
668 | }, | ||||
669 | { | ||||
670 | "category": "Compliance", | ||||
671 | "code": "18.1.5", | ||||
672 | "label": "Regulation of cryptographic controls", | ||||
673 | "uuid": "267fe510-f705-11e8-b555-0800279aaa2b" | ||||
674 | }, | ||||
675 | { | ||||
676 | "category": "Compliance", | ||||
677 | "code": "18.2.1", | ||||
678 | "label": "Independent review of information security", | ||||
679 | "uuid": "267fc84f-f705-11e8-b555-0800279aaa2b" | ||||
680 | }, | ||||
681 | { | ||||
682 | "category": "Compliance", | ||||
683 | "code": "18.2.2", | ||||
684 | "label": "Compliance with security policies and standards", | ||||
685 | "uuid": "267fe58f-f705-11e8-b555-0800279aaa2b" | ||||
686 | }, | ||||
687 | { | ||||
688 | "category": "Compliance", | ||||
689 | "code": "18.2.3", | ||||
690 | "label": "Technical compliance review", | ||||
691 | "uuid": "267fe600-f705-11e8-b555-0800279aaa2b" | ||||
692 | } | ||||
693 | ], | ||||
694 | "version": 1, | 9 | "version": 1, | ||
695 | "version_ext": "ISO/IEC 27002:2013" | 10 | "version_ext": "ISO/IEC 27002:2013" | ||
696 | } | 11 | } |