Date: Feb 21, 2022, 11:44:03 AM
Date: Feb 21, 2022, 11:47:31 AM
Name: ISO/IEC 27002 [2022]
Name: ISO/IEC 27002 [2022]
Description: ISO/IEC 27002:2022 controls
Description: ISO/IEC 27002:2022 controls
| f | 1 | { | f | 1 | { |
| 2 | "label": "ISO/IEC 27002 [2013]", | 2 | "label": "ISO/IEC 27002 [2013]", | ||
| 3 | "language": "EN", | 3 | "language": "EN", | ||
| 4 | "refs": [ | 4 | "refs": [ | ||
| 5 | "https://www.iso.org/standard/54533.html" | 5 | "https://www.iso.org/standard/54533.html" | ||
| 6 | ], | 6 | ], | ||
| 7 | "uuid": "98ca84fb-db87-11e8-ac77-0800279aaa2b", | 7 | "uuid": "98ca84fb-db87-11e8-ac77-0800279aaa2b", | ||
| t | 8 | "values": [ | t | 8 | "values": [], |
| 9 | { | ||||
| 10 | "category": "Information security policies", | ||||
| 11 | "code": "5.1.1", | ||||
| 12 | "label": "Policies for information security", | ||||
| 13 | "uuid": "267fc596-f705-11e8-b555-0800279aaa2b" | ||||
| 14 | }, | ||||
| 15 | { | ||||
| 16 | "category": "Information security policies", | ||||
| 17 | "code": "5.1.2", | ||||
| 18 | "label": "Review of the policies for information security", | ||||
| 19 | "uuid": "267fc6a6-f705-11e8-b555-0800279aaa2b" | ||||
| 20 | }, | ||||
| 21 | { | ||||
| 22 | "category": "Organization of information security", | ||||
| 23 | "code": "6.1.1", | ||||
| 24 | "label": "Information security roles and responsibilities", | ||||
| 25 | "uuid": "267fc73c-f705-11e8-b555-0800279aaa2b" | ||||
| 26 | }, | ||||
| 27 | { | ||||
| 28 | "category": "Organization of information security", | ||||
| 29 | "code": "6.1.2", | ||||
| 30 | "label": "Segregation of duties", | ||||
| 31 | "uuid": "267fd0b1-f705-11e8-b555-0800279aaa2b" | ||||
| 32 | }, | ||||
| 33 | { | ||||
| 34 | "category": "Organization of information security", | ||||
| 35 | "code": "6.1.3", | ||||
| 36 | "label": "Contact with authorities", | ||||
| 37 | "uuid": "267fc7c0-f705-11e8-b555-0800279aaa2b" | ||||
| 38 | }, | ||||
| 39 | { | ||||
| 40 | "category": "Organization of information security", | ||||
| 41 | "code": "6.1.4", | ||||
| 42 | "label": "Contact with special interest groups", | ||||
| 43 | "uuid": "267fc80f-f705-11e8-b555-0800279aaa2b" | ||||
| 44 | }, | ||||
| 45 | { | ||||
| 46 | "category": "Organization of information security", | ||||
| 47 | "code": "6.1.5", | ||||
| 48 | "label": "Information Security in Project Management", | ||||
| 49 | "uuid": "267fe6b9-f705-11e8-b555-0800279aaa2b" | ||||
| 50 | }, | ||||
| 51 | { | ||||
| 52 | "category": "Organization of information security", | ||||
| 53 | "code": "6.2.1", | ||||
| 54 | "label": "Mobile device policy", | ||||
| 55 | "uuid": "267fd9d0-f705-11e8-b555-0800279aaa2b" | ||||
| 56 | }, | ||||
| 57 | { | ||||
| 58 | "category": "Organization of information security", | ||||
| 59 | "code": "6.2.2", | ||||
| 60 | "label": "Teleworking", | ||||
| 61 | "uuid": "267fda0e-f705-11e8-b555-0800279aaa2b" | ||||
| 62 | }, | ||||
| 63 | { | ||||
| 64 | "category": "Human resource security", | ||||
| 65 | "code": "7.1.1", | ||||
| 66 | "label": "Screening", | ||||
| 67 | "uuid": "267fca6b-f705-11e8-b555-0800279aaa2b" | ||||
| 68 | }, | ||||
| 69 | { | ||||
| 70 | "category": "Human resource security", | ||||
| 71 | "code": "7.1.2", | ||||
| 72 | "label": "Terms and conditions of employment", | ||||
| 73 | "uuid": "267fcaad-f705-11e8-b555-0800279aaa2b" | ||||
| 74 | }, | ||||
| 75 | { | ||||
| 76 | "category": "Human resource security", | ||||
| 77 | "code": "7.2.1", | ||||
| 78 | "label": "Management responsibilities", | ||||
| 79 | "uuid": "267fc6f7-f705-11e8-b555-0800279aaa2b" | ||||
| 80 | }, | ||||
| 81 | { | ||||
| 82 | "category": "Human resource security", | ||||
| 83 | "code": "7.2.2", | ||||
| 84 | "label": "Information security awareness, education and training", | ||||
| 85 | "uuid": "267fcaeb-f705-11e8-b555-0800279aaa2b" | ||||
| 86 | }, | ||||
| 87 | { | ||||
| 88 | "category": "Human resource security", | ||||
| 89 | "code": "7.2.3", | ||||
| 90 | "label": "Disciplinary process", | ||||
| 91 | "uuid": "267fcb29-f705-11e8-b555-0800279aaa2b" | ||||
| 92 | }, | ||||
| 93 | { | ||||
| 94 | "category": "Human resource security", | ||||
| 95 | "code": "7.3.1", | ||||
| 96 | "label": "Termination or change of employment responsibilities", | ||||
| 97 | "uuid": "267fcb79-f705-11e8-b555-0800279aaa2b" | ||||
| 98 | }, | ||||
| 99 | { | ||||
| 100 | "category": "Asset management", | ||||
| 101 | "code": "8.1.1", | ||||
| 102 | "label": "Inventory of Assets", | ||||
| 103 | "uuid": "267fc90c-f705-11e8-b555-0800279aaa2b" | ||||
| 104 | }, | ||||
| 105 | { | ||||
| 106 | "category": "Asset management", | ||||
| 107 | "code": "8.1.2", | ||||
| 108 | "label": "Ownership of assets", | ||||
| 109 | "uuid": "267fc94c-f705-11e8-b555-0800279aaa2b" | ||||
| 110 | }, | ||||
| 111 | { | ||||
| 112 | "category": "Asset management", | ||||
| 113 | "code": "8.1.3", | ||||
| 114 | "label": "Acceptable use of assets", | ||||
| 115 | "uuid": "267fc989-f705-11e8-b555-0800279aaa2b" | ||||
| 116 | }, | ||||
| 117 | { | ||||
| 118 | "category": "Asset management", | ||||
| 119 | "code": "8.1.4", | ||||
| 120 | "label": "Return of assets", | ||||
| 121 | "uuid": "267fcbce-f705-11e8-b555-0800279aaa2b" | ||||
| 122 | }, | ||||
| 123 | { | ||||
| 124 | "category": "Asset management", | ||||
| 125 | "code": "8.2.1", | ||||
| 126 | "label": "Classification guidelines", | ||||
| 127 | "uuid": "267fc9c9-f705-11e8-b555-0800279aaa2b" | ||||
| 128 | }, | ||||
| 129 | { | ||||
| 130 | "category": "Asset management", | ||||
| 131 | "code": "8.2.2", | ||||
| 132 | "label": "Labelling of information", | ||||
| 133 | "uuid": "267fca19-f705-11e8-b555-0800279aaa2b" | ||||
| 134 | }, | ||||
| 135 | { | ||||
| 136 | "category": "Asset management", | ||||
| 137 | "code": "8.2.3", | ||||
| 138 | "label": "Handling of assets", | ||||
| 139 | "uuid": "267fe71a-f705-11e8-b555-0800279aaa2b" | ||||
| 140 | }, | ||||
| 141 | { | ||||
| 142 | "category": "Asset management", | ||||
| 143 | "code": "8.3.1", | ||||
| 144 | "label": "Management of removeable media", | ||||
| 145 | "uuid": "267fd32a-f705-11e8-b555-0800279aaa2b" | ||||
| 146 | }, | ||||
| 147 | { | ||||
| 148 | "category": "Asset management", | ||||
| 149 | "code": "8.3.2", | ||||
| 150 | "label": "Disposal of media", | ||||
| 151 | "uuid": "267fd369-f705-11e8-b555-0800279aaa2b" | ||||
| 152 | }, | ||||
| 153 | { | ||||
| 154 | "category": "Asset management", | ||||
| 155 | "code": "8.3.3", | ||||
| 156 | "label": "Physical Media transfer", | ||||
| 157 | "uuid": "267fd421-f705-11e8-b555-0800279aaa2b" | ||||
| 158 | }, | ||||
| 159 | { | ||||
| 160 | "category": "Access control", | ||||
| 161 | "code": "9.1.1", | ||||
| 162 | "label": "Access control policy", | ||||
| 163 | "uuid": "267fd659-f705-11e8-b555-0800279aaa2b" | ||||
| 164 | }, | ||||
| 165 | { | ||||
| 166 | "category": "Access control", | ||||
| 167 | "code": "9.1.2", | ||||
| 168 | "label": "Access to networks and network services", | ||||
| 169 | "uuid": "267fd81b-f705-11e8-b555-0800279aaa2b" | ||||
| 170 | }, | ||||
| 171 | { | ||||
| 172 | "category": "Access control", | ||||
| 173 | "code": "9.2.1", | ||||
| 174 | "label": "User registration and deregistration", | ||||
| 175 | "uuid": "267fd899-f705-11e8-b555-0800279aaa2b" | ||||
| 176 | }, | ||||
| 177 | { | ||||
| 178 | "category": "Access control", | ||||
| 179 | "code": "9.2.2", | ||||
| 180 | "label": "User access provisioning", | ||||
| 181 | "uuid": "267fe782-f705-11e8-b555-0800279aaa2b" | ||||
| 182 | }, | ||||
| 183 | { | ||||
| 184 | "category": "Access control", | ||||
| 185 | "code": "9.2.3", | ||||
| 186 | "label": "Management of privileged access rights", | ||||
| 187 | "uuid": "267fd69f-f705-11e8-b555-0800279aaa2b" | ||||
| 188 | }, | ||||
| 189 | { | ||||
| 190 | "category": "Access control", | ||||
| 191 | "code": "9.2.4", | ||||
| 192 | "label": "Management of secret authentication information of users", | ||||
| 193 | "uuid": "267fd6e4-f705-11e8-b555-0800279aaa2b" | ||||
| 194 | }, | ||||
| 195 | { | ||||
| 196 | "category": "Access control", | ||||
| 197 | "code": "9.2.5", | ||||
| 198 | "label": "Review of user access rights", | ||||
| 199 | "uuid": "267fd723-f705-11e8-b555-0800279aaa2b" | ||||
| 200 | }, | ||||
| 201 | { | ||||
| 202 | "category": "Access control", | ||||
| 203 | "code": "9.2.6", | ||||
| 204 | "label": "Removal or adjustment of access rights", | ||||
| 205 | "uuid": "267fcc3c-f705-11e8-b555-0800279aaa2b" | ||||
| 206 | }, | ||||
| 207 | { | ||||
| 208 | "category": "Access control", | ||||
| 209 | "code": "9.3.1", | ||||
| 210 | "label": "Use of secret authentication information", | ||||
| 211 | "uuid": "267fd761-f705-11e8-b555-0800279aaa2b" | ||||
| 212 | }, | ||||
| 213 | { | ||||
| 214 | "category": "Access control", | ||||
| 215 | "code": "9.4.1", | ||||
| 216 | "label": "Information access restriction", | ||||
| 217 | "uuid": "267fd993-f705-11e8-b555-0800279aaa2b" | ||||
| 218 | }, | ||||
| 219 | { | ||||
| 220 | "category": "Access control", | ||||
| 221 | "code": "9.4.2", | ||||
| 222 | "label": "Secure log-on procedures", | ||||
| 223 | "uuid": "267fd954-f705-11e8-b555-0800279aaa2b" | ||||
| 224 | }, | ||||
| 225 | { | ||||
| 226 | "category": "Access control", | ||||
| 227 | "code": "9.4.3", | ||||
| 228 | "label": "Password management system", | ||||
| 229 | "uuid": "267fd8d8-f705-11e8-b555-0800279aaa2b" | ||||
| 230 | }, | ||||
| 231 | { | ||||
| 232 | "category": "Access control", | ||||
| 233 | "code": "9.4.4", | ||||
| 234 | "label": "Use of privileged utility programs", | ||||
| 235 | "uuid": "267fd917-f705-11e8-b555-0800279aaa2b" | ||||
| 236 | }, | ||||
| 237 | { | ||||
| 238 | "category": "Access control", | ||||
| 239 | "code": "9.4.5", | ||||
| 240 | "label": "Access control to program source code", | ||||
| 241 | "uuid": "267fdbf1-f705-11e8-b555-0800279aaa2b" | ||||
| 242 | }, | ||||
| 243 | { | ||||
| 244 | "category": "Cryptography", | ||||
| 245 | "code": "10.1.1", | ||||
| 246 | "label": "Policy on the use of cryptographic controls", | ||||
| 247 | "uuid": "267fda8c-f705-11e8-b555-0800279aaa2b" | ||||
| 248 | }, | ||||
| 249 | { | ||||
| 250 | "category": "Cryptography", | ||||
| 251 | "code": "10.1.2", | ||||
| 252 | "label": "Key management", | ||||
| 253 | "uuid": "267fdacc-f705-11e8-b555-0800279aaa2b" | ||||
| 254 | }, | ||||
| 255 | { | ||||
| 256 | "category": "Physical and environmental security", | ||||
| 257 | "code": "11.1.1", | ||||
| 258 | "label": "Physical security perimeter", | ||||
| 259 | "uuid": "267fcca4-f705-11e8-b555-0800279aaa2b" | ||||
| 260 | }, | ||||
| 261 | { | ||||
| 262 | "category": "Physical and environmental security", | ||||
| 263 | "code": "11.1.2", | ||||
| 264 | "label": "Physical entry controls", | ||||
| 265 | "uuid": "267fcce9-f705-11e8-b555-0800279aaa2b" | ||||
| 266 | }, | ||||
| 267 | { | ||||
| 268 | "category": "Physical and environmental security", | ||||
| 269 | "code": "11.1.3", | ||||
| 270 | "label": "Securing offices, rooms and facilities", | ||||
| 271 | "uuid": "267fcd30-f705-11e8-b555-0800279aaa2b" | ||||
| 272 | }, | ||||
| 273 | { | ||||
| 274 | "category": "Physical and environmental security", | ||||
| 275 | "code": "11.1.4", | ||||
| 276 | "label": "Protecting against external and environmental attacks", | ||||
| 277 | "uuid": "267fcd6f-f705-11e8-b555-0800279aaa2b" | ||||
| 278 | }, | ||||
| 279 | { | ||||
| 280 | "category": "Physical and environmental security", | ||||
| 281 | "code": "11.1.5", | ||||
| 282 | "label": "Working in secure areas", | ||||
| 283 | "uuid": "267fcdac-f705-11e8-b555-0800279aaa2b" | ||||
| 284 | }, | ||||
| 285 | { | ||||
| 286 | "category": "Physical and environmental security", | ||||
| 287 | "code": "11.1.6", | ||||
| 288 | "label": "Delivery and loading areas", | ||||
| 289 | "uuid": "267fcdec-f705-11e8-b555-0800279aaa2b" | ||||
| 290 | }, | ||||
| 291 | { | ||||
| 292 | "category": "Physical and environmental security", | ||||
| 293 | "code": "11.2.1", | ||||
| 294 | "label": "Equipment siting and protection", | ||||
| 295 | "uuid": "267fce44-f705-11e8-b555-0800279aaa2b" | ||||
| 296 | }, | ||||
| 297 | { | ||||
| 298 | "category": "Physical and environmental security", | ||||
| 299 | "code": "11.2.2", | ||||
| 300 | "label": "Supporting utilities", | ||||
| 301 | "uuid": "267fce8a-f705-11e8-b555-0800279aaa2b" | ||||
| 302 | }, | ||||
| 303 | { | ||||
| 304 | "category": "Physical and environmental security", | ||||
| 305 | "code": "11.2.3", | ||||
| 306 | "label": "Cabling Security", | ||||
| 307 | "uuid": "267fcecb-f705-11e8-b555-0800279aaa2b" | ||||
| 308 | }, | ||||
| 309 | { | ||||
| 310 | "category": "Physical and environmental security", | ||||
| 311 | "code": "11.2.4", | ||||
| 312 | "label": "Equipment maintenance", | ||||
| 313 | "uuid": "267fcf0a-f705-11e8-b555-0800279aaa2b" | ||||
| 314 | }, | ||||
| 315 | { | ||||
| 316 | "category": "Physical and environmental security", | ||||
| 317 | "code": "11.2.5", | ||||
| 318 | "label": "Security of equipment off-premises", | ||||
| 319 | "uuid": "267fcfdf-f705-11e8-b555-0800279aaa2b" | ||||
| 320 | }, | ||||
| 321 | { | ||||
| 322 | "category": "Physical and environmental security", | ||||
| 323 | "code": "11.2.6", | ||||
| 324 | "label": "Security of equipment and assets off-premises", | ||||
| 325 | "uuid": "267fcf4f-f705-11e8-b555-0800279aaa2b" | ||||
| 326 | }, | ||||
| 327 | { | ||||
| 328 | "category": "Physical and environmental security", | ||||
| 329 | "code": "11.2.7", | ||||
| 330 | "label": "Secure disposal or re-use of equipment", | ||||
| 331 | "uuid": "267fcf90-f705-11e8-b555-0800279aaa2b" | ||||
| 332 | }, | ||||
| 333 | { | ||||
| 334 | "category": "Physical and environmental security", | ||||
| 335 | "code": "11.2.8", | ||||
| 336 | "label": "Unattended user equipment", | ||||
| 337 | "uuid": "267fd7a0-f705-11e8-b555-0800279aaa2b" | ||||
| 338 | }, | ||||
| 339 | { | ||||
| 340 | "category": "Physical and environmental security", | ||||
| 341 | "code": "11.2.9", | ||||
| 342 | "label": "Clear desk and clear screen policy", | ||||
| 343 | "uuid": "267fd7dd-f705-11e8-b555-0800279aaa2b" | ||||
| 344 | }, | ||||
| 345 | { | ||||
| 346 | "category": "Operations security", | ||||
| 347 | "code": "12.1.1", | ||||
| 348 | "label": "Documented operating procedures", | ||||
| 349 | "uuid": "267fd029-f705-11e8-b555-0800279aaa2b" | ||||
| 350 | }, | ||||
| 351 | { | ||||
| 352 | "category": "Operations security", | ||||
| 353 | "code": "12.1.2", | ||||
| 354 | "label": "Change management", | ||||
| 355 | "uuid": "267fd073-f705-11e8-b555-0800279aaa2b" | ||||
| 356 | }, | ||||
| 357 | { | ||||
| 358 | "category": "Operations security", | ||||
| 359 | "code": "12.1.3", | ||||
| 360 | "label": "Capacity management", | ||||
| 361 | "uuid": "267fd1a8-f705-11e8-b555-0800279aaa2b" | ||||
| 362 | }, | ||||
| 363 | { | ||||
| 364 | "category": "Operations security", | ||||
| 365 | "code": "12.1.4", | ||||
| 366 | "label": "Separation of development, testing and operational environments", | ||||
| 367 | "uuid": "267fd0ef-f705-11e8-b555-0800279aaa2b" | ||||
| 368 | }, | ||||
| 369 | { | ||||
| 370 | "category": "Operations security", | ||||
| 371 | "code": "12.2.1", | ||||
| 372 | "label": "Controls against malicious code", | ||||
| 373 | "uuid": "267fd22e-f705-11e8-b555-0800279aaa2b" | ||||
| 374 | }, | ||||
| 375 | { | ||||
| 376 | "category": "Operations security", | ||||
| 377 | "code": "12.3.1", | ||||
| 378 | "label": "Information Backup", | ||||
| 379 | "uuid": "267fd272-f705-11e8-b555-0800279aaa2b" | ||||
| 380 | }, | ||||
| 381 | { | ||||
| 382 | "category": "Operations security", | ||||
| 383 | "code": "12.4.1", | ||||
| 384 | "label": "Event logging", | ||||
| 385 | "uuid": "267fd529-f705-11e8-b555-0800279aaa2b" | ||||
| 386 | }, | ||||
| 387 | { | ||||
| 388 | "category": "Operations security", | ||||
| 389 | "code": "12.4.2", | ||||
| 390 | "label": "Protection of log information", | ||||
| 391 | "uuid": "267fd567-f705-11e8-b555-0800279aaa2b" | ||||
| 392 | }, | ||||
| 393 | { | ||||
| 394 | "category": "Operations security", | ||||
| 395 | "code": "12.4.3", | ||||
| 396 | "label": "Administrator and operator logs", | ||||
| 397 | "uuid": "267fd5ae-f705-11e8-b555-0800279aaa2b" | ||||
| 398 | }, | ||||
| 399 | { | ||||
| 400 | "category": "Operations security", | ||||
| 401 | "code": "12.4.4", | ||||
| 402 | "label": "Clock synchronisation", | ||||
| 403 | "uuid": "267fd610-f705-11e8-b555-0800279aaa2b" | ||||
| 404 | }, | ||||
| 405 | { | ||||
| 406 | "category": "Operations security", | ||||
| 407 | "code": "12.5.1", | ||||
| 408 | "label": "Installation of software on operational systems", | ||||
| 409 | "uuid": "267fdb18-f705-11e8-b555-0800279aaa2b" | ||||
| 410 | }, | ||||
| 411 | { | ||||
| 412 | "category": "Operations security", | ||||
| 413 | "code": "12.6.1", | ||||
| 414 | "label": "Management of technical vulnerabilities", | ||||
| 415 | "uuid": "267fdda3-f705-11e8-b555-0800279aaa2b" | ||||
| 416 | }, | ||||
| 417 | { | ||||
| 418 | "category": "Operations security", | ||||
| 419 | "code": "12.6.2", | ||||
| 420 | "label": "Restrictions on software installation", | ||||
| 421 | "uuid": "267fe8fe-f705-11e8-b555-0800279aaa2b" | ||||
| 422 | }, | ||||
| 423 | { | ||||
| 424 | "category": "Operations security", | ||||
| 425 | "code": "12.7.1", | ||||
| 426 | "label": "Information systems audit controls", | ||||
| 427 | "uuid": "267fe660-f705-11e8-b555-0800279aaa2b" | ||||
| 428 | }, | ||||
| 429 | { | ||||
| 430 | "category": "Communications security", | ||||
| 431 | "code": "13.1.1", | ||||
| 432 | "label": "Network controls", | ||||
| 433 | "uuid": "267fd2b1-f705-11e8-b555-0800279aaa2b" | ||||
| 434 | }, | ||||
| 435 | { | ||||
| 436 | "category": "Communications security", | ||||
| 437 | "code": "13.1.2", | ||||
| 438 | "label": "Security of network services", | ||||
| 439 | "uuid": "267fd2ee-f705-11e8-b555-0800279aaa2b" | ||||
| 440 | }, | ||||
| 441 | { | ||||
| 442 | "category": "Communications security", | ||||
| 443 | "code": "13.1.3", | ||||
| 444 | "label": "Segregation in networks", | ||||
| 445 | "uuid": "267fd85b-f705-11e8-b555-0800279aaa2b" | ||||
| 446 | }, | ||||
| 447 | { | ||||
| 448 | "category": "Communications security", | ||||
| 449 | "code": "13.2.1", | ||||
| 450 | "label": "Information transfer policies and procedures", | ||||
| 451 | "uuid": "267fd3a6-f705-11e8-b555-0800279aaa2b" | ||||
| 452 | }, | ||||
| 453 | { | ||||
| 454 | "category": "Communications security", | ||||
| 455 | "code": "13.2.2", | ||||
| 456 | "label": "Agreements on information transfer", | ||||
| 457 | "uuid": "267fd3e3-f705-11e8-b555-0800279aaa2b" | ||||
| 458 | }, | ||||
| 459 | { | ||||
| 460 | "category": "Communications security", | ||||
| 461 | "code": "13.2.3", | ||||
| 462 | "label": "Electronic messaging", | ||||
| 463 | "uuid": "267fd462-f705-11e8-b555-0800279aaa2b" | ||||
| 464 | }, | ||||
| 465 | { | ||||
| 466 | "category": "Communications security", | ||||
| 467 | "code": "13.2.4", | ||||
| 468 | "label": "Confidentiality or non-disclosure agreements", | ||||
| 469 | "uuid": "267fc77e-f705-11e8-b555-0800279aaa2b" | ||||
| 470 | }, | ||||
| 471 | { | ||||
| 472 | "category": "System acquisition, development and maintenance", | ||||
| 473 | "code": "14.1.1", | ||||
| 474 | "label": "Information security requirements analysis and specification", | ||||
| 475 | "uuid": "267fda50-f705-11e8-b555-0800279aaa2b" | ||||
| 476 | }, | ||||
| 477 | { | ||||
| 478 | "category": "System acquisition, development and maintenance", | ||||
| 479 | "code": "14.1.2", | ||||
| 480 | "label": "Securing application services on public networks", | ||||
| 481 | "uuid": "267fd4ac-f705-11e8-b555-0800279aaa2b" | ||||
| 482 | }, | ||||
| 483 | { | ||||
| 484 | "category": "System acquisition, development and maintenance", | ||||
| 485 | "code": "14.1.3", | ||||
| 486 | "label": "Protecting application services transactions", | ||||
| 487 | "uuid": "267fd4ed-f705-11e8-b555-0800279aaa2b" | ||||
| 488 | }, | ||||
| 489 | { | ||||
| 490 | "category": "System acquisition, development and maintenance", | ||||
| 491 | "code": "14.2.1", | ||||
| 492 | "label": "Secure development policy", | ||||
| 493 | "uuid": "267fe8a1-f705-11e8-b555-0800279aaa2b" | ||||
| 494 | }, | ||||
| 495 | { | ||||
| 496 | "category": "System acquisition, development and maintenance", | ||||
| 497 | "code": "14.2.2", | ||||
| 498 | "label": "System change control procedures", | ||||
| 499 | "uuid": "267fdc38-f705-11e8-b555-0800279aaa2b" | ||||
| 500 | }, | ||||
| 501 | { | ||||
| 502 | "category": "System acquisition, development and maintenance", | ||||
| 503 | "code": "14.2.3", | ||||
| 504 | "label": "Technical review of applications after operating platform changes", | ||||
| 505 | "uuid": "267fdc8c-f705-11e8-b555-0800279aaa2b" | ||||
| 506 | }, | ||||
| 507 | { | ||||
| 508 | "category": "System acquisition, development and maintenance", | ||||
| 509 | "code": "14.2.4", | ||||
| 510 | "label": "Restrictions on changes to software packages", | ||||
| 511 | "uuid": "267fdcf3-f705-11e8-b555-0800279aaa2b" | ||||
| 512 | }, | ||||
| 513 | { | ||||
| 514 | "category": "System acquisition, development and maintenance", | ||||
| 515 | "code": "14.2.5", | ||||
| 516 | "label": "Secure system engineering principles", | ||||
| 517 | "uuid": "267fdf36-f705-11e8-b555-0800279aaa2b" | ||||
| 518 | }, | ||||
| 519 | { | ||||
| 520 | "category": "System acquisition, development and maintenance", | ||||
| 521 | "code": "14.2.6", | ||||
| 522 | "label": "Secure development environment", | ||||
| 523 | "uuid": "267fe847-f705-11e8-b555-0800279aaa2b" | ||||
| 524 | }, | ||||
| 525 | { | ||||
| 526 | "category": "System acquisition, development and maintenance", | ||||
| 527 | "code": "14.2.7", | ||||
| 528 | "label": "Outsourced software development", | ||||
| 529 | "uuid": "267fdd55-f705-11e8-b555-0800279aaa2b" | ||||
| 530 | }, | ||||
| 531 | { | ||||
| 532 | "category": "System acquisition, development and maintenance", | ||||
| 533 | "code": "14.2.8", | ||||
| 534 | "label": "System security testing", | ||||
| 535 | "uuid": "267fe7e9-f705-11e8-b555-0800279aaa2b" | ||||
| 536 | }, | ||||
| 537 | { | ||||
| 538 | "category": "System acquisition, development and maintenance", | ||||
| 539 | "code": "14.2.9", | ||||
| 540 | "label": "System acceptance testing", | ||||
| 541 | "uuid": "267fd1ea-f705-11e8-b555-0800279aaa2b" | ||||
| 542 | }, | ||||
| 543 | { | ||||
| 544 | "category": "System acquisition, development and maintenance", | ||||
| 545 | "code": "14.3.1", | ||||
| 546 | "label": "Protection of test data", | ||||
| 547 | "uuid": "267fdb78-f705-11e8-b555-0800279aaa2b" | ||||
| 548 | }, | ||||
| 549 | { | ||||
| 550 | "category": "Supplier relationships", | ||||
| 551 | "code": "15.1.1", | ||||
| 552 | "label": "Information security policy for supplier relationships", | ||||
| 553 | "uuid": "267fc88e-f705-11e8-b555-0800279aaa2b" | ||||
| 554 | }, | ||||
| 555 | { | ||||
| 556 | "category": "Supplier relationships", | ||||
| 557 | "code": "15.1.2", | ||||
| 558 | "label": "Addressing security within supplier agreements", | ||||
| 559 | "uuid": "267fc8cc-f705-11e8-b555-0800279aaa2b" | ||||
| 560 | }, | ||||
| 561 | { | ||||
| 562 | "category": "Supplier relationships", | ||||
| 563 | "code": "15.1.3", | ||||
| 564 | "label": "Informaiton and communication technology supply chain", | ||||
| 565 | "uuid": "267fe959-f705-11e8-b555-0800279aaa2b" | ||||
| 566 | }, | ||||
| 567 | { | ||||
| 568 | "category": "Supplier relationships", | ||||
| 569 | "code": "15.2.1", | ||||
| 570 | "label": "Monitoring and review of supplier services", | ||||
| 571 | "uuid": "267fd12f-f705-11e8-b555-0800279aaa2b" | ||||
| 572 | }, | ||||
| 573 | { | ||||
| 574 | "category": "Supplier relationships", | ||||
| 575 | "code": "15.2.2", | ||||
| 576 | "label": "Managing changes to supplier services", | ||||
| 577 | "uuid": "267fd16b-f705-11e8-b555-0800279aaa2b" | ||||
| 578 | }, | ||||
| 579 | { | ||||
| 580 | "category": "information security incident management", | ||||
| 581 | "code": "16.1.1", | ||||
| 582 | "label": "Responsibilities and procedures", | ||||
| 583 | "uuid": "267fde78-f705-11e8-b555-0800279aaa2b" | ||||
| 584 | }, | ||||
| 585 | { | ||||
| 586 | "category": "information security incident management", | ||||
| 587 | "code": "16.1.2", | ||||
| 588 | "label": "Reporting information security events", | ||||
| 589 | "uuid": "267fddeb-f705-11e8-b555-0800279aaa2b" | ||||
| 590 | }, | ||||
| 591 | { | ||||
| 592 | "category": "information security incident management", | ||||
| 593 | "code": "16.1.3", | ||||
| 594 | "label": "Reporting information security weaknesses", | ||||
| 595 | "uuid": "267fde31-f705-11e8-b555-0800279aaa2b" | ||||
| 596 | }, | ||||
| 597 | { | ||||
| 598 | "category": "information security incident management", | ||||
| 599 | "code": "16.1.4", | ||||
| 600 | "label": "Assessment of and decision on information security events", | ||||
| 601 | "uuid": "267fe9b4-f705-11e8-b555-0800279aaa2b" | ||||
| 602 | }, | ||||
| 603 | { | ||||
| 604 | "category": "information security incident management", | ||||
| 605 | "code": "16.1.5", | ||||
| 606 | "label": "Response in information security incidents", | ||||
| 607 | "uuid": "267fea11-f705-11e8-b555-0800279aaa2b" | ||||
| 608 | }, | ||||
| 609 | { | ||||
| 610 | "category": "information security incident management", | ||||
| 611 | "code": "16.1.6", | ||||
| 612 | "label": "Learning from information security incidents", | ||||
| 613 | "uuid": "267fdeb8-f705-11e8-b555-0800279aaa2b" | ||||
| 614 | }, | ||||
| 615 | { | ||||
| 616 | "category": "information security incident management", | ||||
| 617 | "code": "16.1.7", | ||||
| 618 | "label": "Collection of evidence", | ||||
| 619 | "uuid": "267fdef6-f705-11e8-b555-0800279aaa2b" | ||||
| 620 | }, | ||||
| 621 | { | ||||
| 622 | "category": "Information security aspects of business continuity management", | ||||
| 623 | "code": "17.1.1", | ||||
| 624 | "label": "Planning information security continuity", | ||||
| 625 | "uuid": "267fdf76-f705-11e8-b555-0800279aaa2b" | ||||
| 626 | }, | ||||
| 627 | { | ||||
| 628 | "category": "Information security aspects of business continuity management", | ||||
| 629 | "code": "17.1.2", | ||||
| 630 | "label": "Implementing information security continuity", | ||||
| 631 | "uuid": "267fdfbe-f705-11e8-b555-0800279aaa2b" | ||||
| 632 | }, | ||||
| 633 | { | ||||
| 634 | "category": "Information security aspects of business continuity management", | ||||
| 635 | "code": "17.1.3", | ||||
| 636 | "label": "Verify, review and evaluate information security continuity", | ||||
| 637 | "uuid": "267fe022-f705-11e8-b555-0800279aaa2b" | ||||
| 638 | }, | ||||
| 639 | { | ||||
| 640 | "category": "Information security aspects of business continuity management", | ||||
| 641 | "code": "17.2.1", | ||||
| 642 | "label": "Availability of information processing facilities", | ||||
| 643 | "uuid": "267fea72-f705-11e8-b555-0800279aaa2b" | ||||
| 644 | }, | ||||
| 645 | { | ||||
| 646 | "category": "Compliance", | ||||
| 647 | "code": "18.1.1", | ||||
| 648 | "label": "Identification of applicable legislation", | ||||
| 649 | "uuid": "267fe08b-f705-11e8-b555-0800279aaa2b" | ||||
| 650 | }, | ||||
| 651 | { | ||||
| 652 | "category": "Compliance", | ||||
| 653 | "code": "18.1.2", | ||||
| 654 | "label": "Intellectual Property Rights", | ||||
| 655 | "uuid": "267fe307-f705-11e8-b555-0800279aaa2b" | ||||
| 656 | }, | ||||
| 657 | { | ||||
| 658 | "category": "Compliance", | ||||
| 659 | "code": "18.1.3", | ||||
| 660 | "label": "Protection of records", | ||||
| 661 | "uuid": "267fe37d-f705-11e8-b555-0800279aaa2b" | ||||
| 662 | }, | ||||
| 663 | { | ||||
| 664 | "category": "Compliance", | ||||
| 665 | "code": "18.1.4", | ||||
| 666 | "label": "Privacy and protection of personally identifiable information", | ||||
| 667 | "uuid": "267fe3de-f705-11e8-b555-0800279aaa2b" | ||||
| 668 | }, | ||||
| 669 | { | ||||
| 670 | "category": "Compliance", | ||||
| 671 | "code": "18.1.5", | ||||
| 672 | "label": "Regulation of cryptographic controls", | ||||
| 673 | "uuid": "267fe510-f705-11e8-b555-0800279aaa2b" | ||||
| 674 | }, | ||||
| 675 | { | ||||
| 676 | "category": "Compliance", | ||||
| 677 | "code": "18.2.1", | ||||
| 678 | "label": "Independent review of information security", | ||||
| 679 | "uuid": "267fc84f-f705-11e8-b555-0800279aaa2b" | ||||
| 680 | }, | ||||
| 681 | { | ||||
| 682 | "category": "Compliance", | ||||
| 683 | "code": "18.2.2", | ||||
| 684 | "label": "Compliance with security policies and standards", | ||||
| 685 | "uuid": "267fe58f-f705-11e8-b555-0800279aaa2b" | ||||
| 686 | }, | ||||
| 687 | { | ||||
| 688 | "category": "Compliance", | ||||
| 689 | "code": "18.2.3", | ||||
| 690 | "label": "Technical compliance review", | ||||
| 691 | "uuid": "267fe600-f705-11e8-b555-0800279aaa2b" | ||||
| 692 | } | ||||
| 693 | ], | ||||
| 694 | "version": 1, | 9 | "version": 1, | ||
| 695 | "version_ext": "ISO/IEC 27002:2013" | 10 | "version_ext": "ISO/IEC 27002:2013" | ||
| 696 | } | 11 | } |