Statement of Applicability For ISO 27001
Statement of Applicability For ISO 27001
Statement of Applicability For ISO 27001
N
A.5.1
Control
Objective/Control
6.1
A.6.1.1
A.6.1.2
A.6.1.3
A.6
Organization of A.6.1.4
Information
security
Current
Control
(Y N TSE)
LR
CO
A.5 Information
Policies for information
A.5.1.1
security
security
policies
A.5.1.2
Control Details
Internal Organization
Objective: To establish a management framework to initiate and control the implementation and
operation of information security within the organization.
Information security
All information security responsibilities shall be defined
roles and responsibilities
and allocated.
Conflicting duties and areas of responsibility shall be
segregated to reduce opportunities for unauthorized or
Segregation of duties
unintentional modification or misuse of the
organizations
assets.with relevant authorities shall be
Appropriate contacts
Contact with authorities
maintained. contacts with special interest groups or
Appropriate
Contact with special
other specialist security forums and professional
interest groups
associations shall be maintained.
1OF 34
Statement of Applicability
Control Details
Current
Control
(Y N TSE)
CO
A.7.1
Prior to Employment
To ensure that employees and contractors understand their responsibilities and are suitable
for the roles for which they are considered.
Background verification checks on all candidates for
employment shall be carried out in accordance with
relevant laws, regulations and ethics and shall be
A.7.1.1 Screening
proportional to the business requirements, the
classification of the information to be accessed and the
perceived risks.
The contractual agreements with employees and
Terms and conditions
A.7.1.2
contractors shall state their and the organizations
of employment
responsibilities for information security.
A.7.2
A.7 Human
resources
security
During Employment
To ensure that employees and contractors are aware of and fulfil their information security
responsibilities.
Management shall require all employees and
contractors to apply information security in accordance
A.7.2.1 Management responsibilities
with the established policies and procedures of the
organization.
2OF 34
Statement of Applicability
Control Details
Current
Control
(Y N TSE)
CO
A.7.3.1 of employment
responsibilities
A.8.1
A.8.1.1
A.8.1.2
A.8.1.3
A.8.1.4
A.8.2
A.8 Asset
INTERNAL
USE ONLY
Management
3OF 34
Statement of Applicability
Control
Objective/Control
Control Details
Current
Control
(Y N TSE)
CO
A.8 Asset
Management
A.8.3
Media handling
To prevent unauthorized disclosure, modification, removal or destruction of information
stored on media.
Procedures shall be implemented for the management
Management of removable
A.8.3.1
of removable media in accordance with the
media
classification scheme adopted by the organization.
A.8.3.2 Disposal of media
A.8.3.3 Physical media transfer
documented and
reviewed based on business and information security
requirements.
4OF 34
Statement of Applicability
Control
Objective/Control
Access to networks
A.A.11.1.2
and network services
Control Details
Current
Control
(Y N TSE)
CO
A.9 Access
Control
5OF 34
A.9 Access
Statement
of Applicability
Control
Control
Objective/Control
Control Details
Current
Control
(Y N TSE)
CO
A.10
Cryptography
6OF 34
Statement of Applicability
Control
Objective/Control
A.11.1.4
A.11.1.6
A.11 Physical
and
Environmental
Security
Control Details
Current
Control
(Y N TSE)
CO
7OF 34
A.11 Physical
and
Statement of Applicability
Environmental
Legend (for Selected Controls and Reasons for controls selection)
Security
LR: legal requirements, CO: contractual obligations, BR/BP: business requirements/adopted best practices, RRA: results of risk assessment, TSE: to some extent
Control
Objective/Control
Security of equipment
and assets off-premises
A.11.2.7
A.11.2.8
Unattended user
equipment
A.11.2.9
Control Details
Current
Control
(Y N TSE)
CO
8OF 34
Statement of Applicability
Control Details
Control
Objective/Control
Separation of development,
A.12.1.4 testing and operational
environments
Current
Control
(Y N TSE)
CO
A.12
Operations
Security
9OF 34
A.12
Operations
Statement of Applicability
Security
Legend (for Selected Controls and Reasons for controls selection)
LR: legal requirements, CO: contractual obligations, BR/BP: business requirements/adopted best practices, RRA: results of risk assessment, TSE: to some extent
N
A.12.5
A.12.5.1
Control
Objective/Control
Control Details
Current
Control
(Y N TSE)
CO
Control of operational
software
To ensure the integrity of operational systems.
Installation of software
on operational systems
A.13
10OF 34
Statement of Applicability
Control
Objective/Control
Security of network
A.13.1.2
services
A.13.1.3 Segregation in networks
Control Details
Current
Control
(Y N TSE)
CO
A.13
A.13.2 Information transfer
Communication
To maintain the security of information transferred within an organization and with any
external entity.
s Security
A.13.2.1
Information transfer
policies and procedures
A.13.2.2
Agreements on information
transfer
A.14.1 Security
of information
To ensurerequirements
that information
security is systems
an integral part of information systems across the
entire lifecycle. This also includes the requirements for information systems which provide services
The information security related requirements shall be
over
public networks.
Information
security
included in the requirements for new information
A.14.1.1 requirements analysis
systems or enhancements to existing information
and specification
systems.
11OF 34
Statement of Applicability
Control
Objective/Control
Control Details
Current
Control
(Y N TSE)
CO
Securing application
A.14.1.2 services on public
networks
A.14.1.3
A.14.2
A.14.2.1
A.14 System
acquisition,
development
and
maintenance
A.14.2.2
A.14.2.3
A.14.2.4
A.14.2.5
A.14.2.6
12OF 34
A.14 System
acquisition,
development
and
Statement
maintenance of Applicability
Control
Objective/Control
System acceptance
testing
Control Details
Current
Control
(Y N TSE)
CO
A.15 Supplier
relationships
13OF 34
Statement of Applicability
A.15 Supplier
ISO/IEC 27001:2013 Controls
relationships
Control
Clause Title
N
Objective/Control
A.16
Information
security
incident
management
A.15.2.1
A.15.2.2
Managing changes to
supplier services
Control Details
Current
Control
(Y N TSE)
CO
14OF 34
Statement of Applicability
Legend
A.16 (for Selected Controls and Reasons for controls selection)
LR: legal requirements, CO: contractual obligations, BR/BP: business requirements/adopted best practices, RRA: results of risk assessment, TSE: to some extent
Information
security
incident ISO/IEC 27001:2013 Controls
management
Control
Clause Title
N
Objective/Control
Learning from
A.16.1.6 information security
incidents
A.16.1.7 Collection of evidence
A.17.1
A.17
Information
security
aspects of
business
continuity
management
Control Details
Current
Control
(Y N TSE)
CO
Information security
continuity
Information security continuity shall be embedded in the organizations business continuity
management systems.
The organization shall determine its requirements for
A.17.1.1
Planning information
security continuity
A.17.1.2
Implementing information
security continuity
Verify, review and
evaluate information
security continuity
Information security
continuity
Information security continuity shall be embedded in the organizations business continuity
management systems.
Information processing facilities shall be implemented
Availability of information
A.17.2.1
with redundancy sufficient to meet availability
processing facilities
requirements.
A.17.2
15OF 34
Statement of Applicability
A.18.1.1
A.18.1.2
A.18.1.3
A.18
Compliance
A.18.1.4
A.18.1.5
A.18.2
A.18.2.1
Control
Objective/Control
Control Details
Current
Control
(Y N TSE)
CO
16OF 34
A.18
Statement
Compliance of Applicability
Control
Objective/Control
Compliance with
A.18.2.2 security policies and
standards
A.18.2.3
Technical compliance
review
Control Details
Current
Control
(Y N TSE)
CO
17OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
18OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
19OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
20OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
21OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
22OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
23OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
24OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
25OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
26OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
27OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
28OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
29OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
30OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
31OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
32OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
33OF 34
Updated by
E: to some extent
RRA
Justification
for
Exclusion
Overview of implementation
34OF 34