Risk Control Report Sample
Risk Control Report Sample
Objective: To provide management direction and support for information security in accordance with business requirements and
relevant laws and regulations.
Clause Title Description Applied
A.5.1.1 Policies for information security A set of policies for information security shall be defined, approved by management, True
published and communicated to employees and relevant external parties.
Business disasters (e.g. financial collapse) due to Inadequate information security policy
Insufficient or untested back-ups due to Inadequate back-up procedures
A.5.1.2 Review of the policies for information security The policies for information security shall be reviewed at planned intervals or if True
significant changes occur to ensure their continuing suitability, adequacy and
effectiveness.
Business disasters (e.g. financial collapse) due to Inadequate information security policy
ISO 27001:2013 A.6.1 Internal organization
Objective: To establish a management framework to initiate and control the implementation and operation of information
security within the organization.
Clause Title Description Applied
A.6.1.1 Information security roles and responsibilities All information security responsibilities shall be defined and allocated. True
Business disasters (e.g. financial collapse) due to Inadequate incident reporting arrangements
Objective: To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which
they are considered.
Clause Title Description Applied
A.7.1.1 Screening Background verification checks on all candidates for employment shall be carried out True
in accordance with relevant laws, regulations and ethics and shall be proportional to
the business requirements, the classification of the information to be accessed and
the perceived risks.
Inappropriate employee selection due to Inadequate vetting of staff
A.7.1.2 Terms and conditions of employment The contractual agreements with employees and contractors shall state their and the True
organizations responsibilities for information security.
Data breach due to Inadequate job definition
Objective: To ensure that employees and contractors are aware of and fulfil their information security responsibilities.
Objective: To protect the organizations interests as part of the process of changing or terminating employment.
Objective: To ensure that information receives an appropriate level of protection in accordance with its importance to the
organization.
Clause Title Description Applied
A.8.2.1 Classification of information Information shall be classified in terms of legal requirements, value, criticality and True
sensitivity to unauthorised disclosure or modification.
Data breach due to Inadequate classification / labelling of information
Data breach due to Inadequate classification / labelling of information
A.8.2.2 Labelling of information An appropriate set of procedures for information labelling shall be developed and True
implemented in accordance with the information classification scheme adopted by the
organization.
Data breach due to Inadequate classification / labelling of information
Objective: To prevent unauthorized disclosure, modification, removal or destruction of information stored on media.
Objective: To ensure authorized user access and to prevent unauthorized access to systems and services.
Introduction of unauthorized or untested code due to Inadequate or incorrect access control policies
ISO 27001:2013 A.10.1 Cryptographic controls
Objective: To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of
information.
Clause Title Description Applied
A.10.1.1 Policy on the use of cryptographic controls A policy on the use of cryptographic controls for protection of information shall be True
developed and implemented.
Network intrusion due to Default factory settings not changed
A.10.1.2 Key management A policy on the use, protection and lifetime of cryptographic keys shall be developed True
and implemented through their whole lifecycle.
Network intrusion due to Default factory settings not changed
ISO 27001:2013 A.11.1 Secure areas
Objective: To prevent unauthorized physical access, damage and interference to the organizations information and information
processing facilities.
Organisation: Sample Company Isms: Sample Company ISMS
Published: 6/5/2017 11:40:52 PM Published by: Sample User
Page 7 of 21
Clause Title Description Applied
A.11.1.1 Physical security perimeter Security perimeters shall be defined and used to protect areas that contain either True
sensitive or critical information and information processing facilities.
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate control access to server rooms
A.11.1.2 Physical entry controls Secure areas shall be protected by appropriate entry controls to ensure that only True
authorized personnel are allowed access.
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate physical security
Unauthorised access to facillities due to Inadequate control access to server rooms
A.11.1.3 Securing offices, rooms and facilities Physical security for offices, rooms and facilities shall be designed and applied. True
Objective: To prevent loss, damage, theft or compromise of assets and interruption to the organizations operations.
Objective: To ensure that information and information processing facilities are protected against malware.
Objective: To ensure the protection of information in networks and its supporting information processing facilities.
Objective: To maintain the security of information transferred within an organization and with any external entity.
Objective: To ensure that information security is an integral part of information systems across the entire lifecycle. This also
includes the requirements for information systems which provide services over public networks.
Clause Title Description Applied
A.14.1.1 Information security requirements analysis and The information security related requirements shall be included in the requirements True
specification for new information systems or enhancements to existing information systems.
Hacking due to Application vulnerabilities
Software errors due to Inadequate or poor specifications for developers
A.14.1.2 Securing application services on public Information involved in application services passing over public networks shall be True
networks protected from fraudulent activity, contract dispute and unauthorized disclosure and
modification.
Publishing of incorrect/unapproved information due to Electronic commerce
Fraud (incl. white-collar crime) due to Electronic commerce
Hacking due to Inadequate control over system access
A.14.1.3 Protecting application services transactions Information involved in application service transactions shall be protected to prevent True
incomplete transmission, mis-routing, unauthorized message alteration, unauthorized
disclosure, unauthorized message duplication or replay.
Publishing of incorrect/unapproved information due to Electronic commerce
Fraud (incl. white-collar crime) due to Electronic commerce
ISO 27001:2013 A.14.2 Security in development and support processes
Objective: To ensure that information security is designed and implemented within the development lifecycle of information
systems.
Clause Title Description Applied
Objective: To maintain an agreed level of information security and service delivery in line with supplier agreements.
Objective: To ensure a consistent and effective approach to the management of information security incidents, including
communication on security events and weaknesses.
Clause Title Description Applied
A.16.1.1 Responsibilities and procedures Management responsibilities and procedures shall be established to ensure a quick, True
effective and orderly response to information security incidents.
Business disasters (e.g. financial collapse) due to Inadequate incident reporting arrangements
A.16.1.2 Reporting information security events Information security events shall be reported through appropriate management True
channels as quickly as possible.
Business disasters (e.g. financial collapse) due to Inadequate incident reporting arrangements
A.16.1.3 Reporting information security weaknesses Employees and contractors using the organizations information systems and services True
shall be required to note and report any observed or suspected information security
weaknesses in systems or services.
Business disasters (e.g. financial collapse) due to Inadequate incident reporting arrangements
A.16.1.4 Assessment of and decision on information Information security events shall be assessed and it shall be decided if they are to be True
security events classified as information security incidents.
Business disasters (e.g. financial collapse) due to Inadequate incident reporting arrangements
Objective: Information security continuity shall be embedded in the organizations business continuity management systems.
Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any
security requirements.
Objective: To ensure that information security is implemented and operated in accordance with the organizational policies and
procedures.
Clause Title Description Applied