ISO 27001 Controls List
ISO 27001 Controls List
Meanwhile, Annex A.6.2 addresses mobile devices and remote working. It’s
designed to ensure that anyone who works from home or on the go – either part-
time or full-time – follows appropriate practices.
It’s divided into four sections, addressing the business requirements of access
controls, user access management, user responsibilities and system and
application access controls, respectively.
Annex A.12.2 addresses malware, ensuring that the organization has the
necessary defenses to mitigate infection risk.
Finally, Annex A.12.7 addresses information systems and audit considerations. It’s
designed to minimize the disruption that audit activities have on operation
systems.
It’s divided into two sections. Annex A.13.1 concerns network security
management, ensuring that the confidentiality, integrity and availability of
information in those networks remain intact.
Meanwhile, Annex A.13.2 deals with information security in transit, whether it’s
going to a different part of the organization, a third party, a customer or another
interested party.
Its 13 controls address the security requirements for internal systems and those
that provide services over public networks.
It’s divided into two sections. Annex A.17.1 addresses information security
continuity – outlining the measures that can be taken to ensure that information
security continuity is embedded in the organization’s business continuity
management system.