SOA for ISO 27001 2022

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Control Group Ref Name Control Applicable Justification for any Implementation Status Comment References Owner Date

Applicable Justification for any Implementation Status Comment References Owner Date of Last Review Additional Notes
(Yes/No) exclusion
Organisational Controls 5.1 Policies for information security Information security policy and topic-specific policies Yes Implemented Policies documents created, starting with Information Security Policy
should be defined, approved by management, published,
"Information Security Policy", and sub Sub-policies
communicated to and acknowledged by relevant personnel
and relevant interested parties, and reviewed at planned policies. These are all signed and Information Security Communications
intervals and if significant changes occur. approved by management and subject to a Plan
communication plan "
Organisational Controls 5.2 Information security roles and Information security roles and responsibilities should be Yes Implemented Roles & Responsibilities documented in ISMS Roles & Responsibilities Document
defined and allocated according to the organisation needs
responsibilities each policy and procedure and in ISMS Information Security Steering Group Terms
R&Rs documentation. of Reference
Organisational Controls 5.3 Segregation of duties Conflicting duties and conflicting areas of responsibility Yes Implemented Access control is based upon the principle Access Control Policy
should be segregated.
of least privilege and separation of
permissions.
Organisational Controls 5.4 Management responsibilities Management should require all personnel to apply Yes Implemented A top down approach is taken to Information Security Statement
information security in accordance with the established communication of responsibilities across Action plans from management meetings
information security policy, topic-specific policies and the organisation to staff at all levels. ISMS Objectives
procedures of the organisation. Information Security Communications
Plan

Organisational Controls 5.5 Contact with authorities The organisation should establish and maintain contact Yes Implemented In the UK, the key point of contact is the Cyber Security Incident Response Plan
with relevant authorities.
ICO for personal data breaches under Data Protection Policy
GDPR, PECR, NIS and other directives. The Incident Management Records
contact details and procedure is outlined
in the incident response plan and Data
Protection policy.

Incident management records will


document any external contact with
agencies or customers.
Organisational Controls 5.6 Contact with special interest The organisation should establish and maintain contact Yes Implemented Staff have registered with specialist Special Interest Groups & Forums
with special interest groups or other specialist security
groups forums and are regularly updated as to document
forums and professional associations.
new practices and emerging threats. A list
is maintained of the groups and
memberships.
Organisational Controls 5.7 Threat intelligence Information relating to information security threats should Yes Implemented Membership of forums, newsletters and Special Interest Groups & Forums
be collected and analysed to produce threat intelligence.
external groups provides up to date document
knowledge and warning of emerging
threats.
Organisational Controls 5.8 Information security in project Information security should be integrated into project Yes Implemented Guidance is provided to all projects M2 Secure Development Guidelines, P10
management.
management regardless of their size to ensure security Secure Development Policy, M3 Project
is baked into the solution from the outset. Management Guidelines
A development policy and guidelines are
also available.
Organisational Controls 5.9 Inventory of information and other An inventory of information and other associated assets, Yes Implemented All assets are maintained in an inventory, P12 Asset Management Policy, R1 Asset
including owners, should be developed and maintained.
associated assets including laptops and other hardware, and Inventory
information assets.
Organisational Controls 5.10 Acceptable use of information and Rules for the acceptable use and procedures for handling Yes Implemented An acceptable use policy is in place P2 Acceptable use policy
information and other associated assets should be
other associated assets
identified, documented and implemented.
Organisational Controls 5.11 Return of assets Personnel and other interested parties as appropriate Yes Implemented The return of company assets is outlined P2 Acceptable use policy, P1 Information
should return all the organisation’s assets in their
in several policies outlining the Security Policy, P12 Asset Management
possession upon change or termination of their
employment, contract or agreement. responsibilities for the return of all Policy, R1 Asset Inventory
company assets upon termination of
employment or contracts and specifying
procedures to prevent unauthorised
retention or reuse of organisational
information and assets.
Organisational Controls 5.12 Classification of information Information should be classified according to the Yes Implemented The Information Security Policy (P1) P1 Information Security Policy
information security needs of the organisation based on
addresses control 5.12 by defining a clear
confidentiality, integrity, availability and relevant interested
party requirements. classification scheme for information,
documenting and communicating it to
relevant personnel, and providing specific
handling guidelines for each classification
level to ensure proper protection based on
sensitivity and criticality.

Organisational Controls 5.13 Labelling of information An appropriate set of procedures for information labelling Yes Implemented P1 Information Security Policy, P12 Asset
should be developed and implemented in accordance with The Information Security Policy (P1), Management Policy, R1 Asset Inventory
the information classification scheme adopted by the
organisation.
supported by the Asset Management
Policy (P12) and Asset Inventory (R1),
meets the requirements of control 5.13 by
providing a clear classification scheme,
detailing handling guidelines, and
emphasizing training and awareness.
Organisational Controls 5.14 Information transfer Information transfer rules, procedures, or agreements Yes Implemented The Information Security Policy (P1) meets P1 Information Security Policy
should be in place for all types of transfer facilities within
the requirements of control 5.14 by
the organisation and between the organisation and other
parties. establishing comprehensive rules and
procedures for the secure transfer of
information, both electronically and
physically. It ensures information is
protected in transit, maintains
traceability, and includes necessary
transfer agreements and labelling
systems.
Organisational Controls 5.15 Access control Rules to control physical and logical access to information Yes Implemented The policies collectively meet the P1 Information Security Policy, P3 Access
and other associated assets should be established and
requirements of control 5.15 by ensuring Control Policy
implemented based on business and information security
requirements. relevant information security
requirements are included in third-party
agreements, defining supplier obligations,
including incident management
procedures, ensuring confidentiality
agreements, and emphasizing periodic
review of these agreements.

Organisational Controls 5.16 Identity management The full life cycle of identities should be managed. Yes Implemented The Access Control Policy (P3) and P1 Information Security Policy, P3 Access
Information Security Policy (P1) Control Policy
collectively meet the requirements of
control 5.16 by ensuring unique
identification, managing the identity
lifecycle, documenting shared identities,
managing non-human entities, timely
disabling/removing identities, maintaining
event records, verifying identities, and
ensuring third-party identities meet trust
requirements.
Organisational Controls 5.17 Authentication information Allocation and management of authentication information Yes Implemented The policies meet the requirements of P8 Password policy, P3 Access Control
should be controlled by a management process, including
control 5.17 by establishing Policy, P1 Information Security Policy
advising personnel on the appropriate handling of
authentication information. comprehensive policies and procedures
for managing user access and secret
authentication information. This includes
detailed guidelines on password creation,
the use of multi-factor authentication,
regular reviews of access rights, and
procedures for reporting compromised
passwords.
Organisational Controls 5.18 Access rights Access rights to information and other associated assets Yes Implemented Comprehensive policies and procedures P8 Password policy, P3 Access Control
should be provisioned, reviewed, modified and removed in
for system and application access control Policy, P1 Information Security Policy, P2
accordance with the organisation’s topic-specific policy on
and rules for access control. exist. This includes proper authorization, Acceptable Use Policy
documentation, regular reviews,
segregation of duties, and robust access
control mechanisms for protecting
sensitive information.
Organisational Controls 5.19 Information security in supplier Processes and procedures should be defined and Yes Implemented The Supplier Security Policy and Supplier P11 Supplier Security Policy, P3 Access
implemented to manage the information security risks
relationships Performance Reviews, supported by the Control Policy, P1 Information Security
associated with the use of supplier’s products or services.
Access Control Policy and Information Policy, R5 Supplier Performance Review
Security Policy, collectively meets the records
requirements of ISO 27002:2022 control
5.19 by defining and implementing
comprehensive processes and procedures
to manage information security risks in
supplier relationships. This includes
thorough risk identification and
assessment, detailed contractual security
requirements, regular monitoring and
review of supplier performance and
compliance, and effective incident
management.
Organisational Controls 5.20 Addressing information security Relevant information security requirements should be Yes Implemented The Supplier Security Policy meets the P11 Supplier Security Policy
established and agreed with each supplier based on the
within supplier agreements requirements of ISO 27002:2022 control
type of supplier relationship.
5.20 by establishing and documenting
comprehensive information security
requirements within supplier agreements.
It ensures a clear understanding of
obligations between the organisation and
suppliers, covering confidentiality, asset
return, compliance with security
standards, and regular monitoring and
review.
Organisational Controls 5.21 Managing information security in Processes and procedures should be defined and Yes Implemented The Supplier Security Policy meets the P11 Supplier Security Policy
implemented to manage the information security risks
the ICT supply chain requirements of ISO 27002:2022 control
associated with the ICT products and services supply
chain. 5.21 by defining and implementing
comprehensive processes and procedures
to manage information security risks in the
ICT supply chain. It ensures that security
requirements are propagated through the
supply chain, includes robust monitoring
and evaluation methods, addresses
critical component assurance, and
provides effective incident management.

Organisational Controls 5.22 Monitoring, review and change The organisation should regularly monitor, review, evaluate Yes Implemented The Supplier Security Policy and Supplier P11 Supplier Security Policy, R5 Supplier
and manage change in supplier information security
management of supplier services Performance Review Template collectively Performance Review
practices and service delivery.
meet the requirements of ISO 27002:2022
control 5.22 by implementing
comprehensive risk management
processes, including specific information
security requirements in supplier
agreements, regularly monitoring and
reviewing supplier performance, managing
security incidents effectively, and
ensuring proper procedures for the
termination of supplier relationships.

Organisational Controls 5.23 Information security for use of Processes for acquisition, use, management and exit from Yes Implemented The Cloud Service Catalogue (R6), SaaS & R6 Cloud Service Catalogue, P13 Cloud
cloud services should be established in accordance with
cloud services Cloud Services Policy (P13), and Supplier Services Policy, P11 Supplier Security
the organisation’s information security requirements.
Security Policy (P11) collectively address Policy
the requirements of control 5.23. They
provide comprehensive guidelines for
managing cloud services, conducting risk
assessments, enforcing security
requirements, implementing access
controls, ensuring data protection, and
monitoring and reviewing cloud service
performance.

Organisational Controls 5.24 Information security incident The organisation should plan and prepare for managing Yes Implemented The Major Incident Report Template (IR 2), IR2 Major Incident Reports, IR3 Cyber
information security incidents by defining, establishing and
management planning and Cyber Security Incident Response Plan (IR Security Incident Response Plan, IR1,
communicating information security incident management
preparation processes, roles and responsibilities 3), Incident & Major Incident Processes (IR Incident & Major Incident Processes, P11
1), and Supplier Security Policy (P11) Supplier Security Policy
collectively address the requirements of
ISO 27002:2022 control 5.24. They
establish comprehensive procedures for
managing information security incidents
in the ICT supply chain, ensure suppliers
comply with notification requirements,
and emphasize the importance of post-
incident reviews to improve future
incident management and supplier
relationships.

Organisational Controls 5.25 Assessment and decision on The organisation should assess information security events Yes Implemented The Cyber Security Incident Response IR3 Cyber Security Incident Response
and decide if they are to be categorised as information
information security events Plan (IR 3) and Incident & Major Incident Plan, IR 1 Incident & Major Incident
security incidents.
Processes (IR 1) address the requirements Processes
of ISO 27002:2022 control 5.25 by
providing comprehensive procedures for
assessing information security events,
categorizing and prioritizing them, and
maintaining detailed documentation of
assessments and decisions.

Organisational Controls 5.26 Response to information security Information security incidents should be responded to in Yes Implemented The Cyber Security Incident Response The Cyber Security Incident Response
accordance with the documented procedures.
incidents Plan (IR 3), Incident & Major Incident Plan (IR 3), Incident & Major Incident
Processes (IR 1), and Supplier Security Processes (IR 1), Supplier Security Policy
Policy (P11) collectively address the (P11)
requirements of ISO 27002:2022 control
5.26 by establishing comprehensive and
documented procedures for responding to
information security incidents. They
ensure designated teams handle
incidents, include necessary response
steps, integrate with crisis management,
and maintain detailed logs of incident
management activities.
Organisational Controls 5.27 Learning from information security Knowledge gained from information security incidents Yes Implemented The Cyber Security Incident Response The Cyber Security Incident Response
should be used to strengthen and improve the information
incidents Plan (IR 3), Incident & Major Incident Plan (IR 3), Incident & Major Incident
security controls.
Processes (IR 1), and Supplier Security Processes (IR 1), Supplier Security Policy
Policy (P11) collectively address the (P11)
requirements of ISO 27002:2022 control
5.27 by establishing procedures to
quantify and monitor information security
incidents, conducting post-incident
analyses, updating the incident
management plan, and using insights to
enhance user awareness and training.
Organisational Controls 5.28 Collection of evidence The organisation should establish and implement Yes Implemented The Cyber Security Incident Response The Cyber Security Incident Response
procedures for the identification, collection, acquisition and
Plan (IR 3), Incident & Major Incident Plan (IR 3), Incident & Major Incident
preservation of evidence related to information security
events. Processes (IR 1), Major Incident Report Processes (IR 1), Major Incident Report
Template (IR 2), and Supplier Security Template (IR 2), Supplier Security Policy
Policy (P11) collectively address the (P11)
requirements of ISO 27002:2022 control
5.28 by establishing procedures for the
identification, collection, acquisition, and
preservation of evidence related to
information security events. They also
ensure the proper documentation of
evidence handling to support disciplinary
and legal actions, maintaining the integrity
and admissibility of the evidence.

Organisational Controls 5.29 Information security during The organisation should plan how to maintain information Yes Implemented The Cyber Security Incident Response The Cyber Security Incident Response
security at an appropriate level during disruption.
disruption Plan (IR 3), Incident & Major Incident Plan (IR 3), Incident & Major Incident
Processes (IR 1), and Supplier Security Processes (IR 1), Supplier Security Policy
Policy (P11) collectively address the (P11)
requirements of ISO 27002:2022 control
5.29 by developing and implementing
information security continuity plans,
ensuring regular testing and updates,
coordinating with business continuity
plans, and maintaining thorough
documentation.
Organisational Controls 5.30 ICT readiness for business ICT readiness should be planned, implemented, Yes Implemented The Disaster Recovery Plan (G12), Cyber The Disaster Recovery Plan (G12), Cyber
maintained and tested based on business continuity
continuity Security Incident Response Plan (IR 3), Security Incident Response Plan (IR 3),
objectives and ICT continuity requirements.
and Incident & Major Incident Processes Incident & Major Incident Processes (IR 1)
(IR 1) collectively address the
requirements of ISO 27002:2022 control
5.30 by establishing ICT continuity plans,
ensuring regular testing and updates,
coordinating with business continuity
plans, and maintaining thorough
documentation and communication.
Organisational Controls 5.31 Legal, statutory, regulatory and Legal, statutory, regulatory and contractual requirements Yes Implemented The Statutory Regulatory & Contractual Statutory Regulatory & Contractual
relevant to information security and the organisation’s
contractual requirements Requirements document (G11), Disaster Requirements document (G11), Disaster
approach to meet these requirements should be identified,
documented and kept up to date. Recovery Plan (G12), and Cyber Security Recovery Plan (G12), Cyber Security
Incident Response Plan (IR 3) collectively Incident Response Plan (IR 3)
address the requirements of ISO
27002:2022 control 5.31 by identifying
and documenting applicable
requirements, specifying regular review
processes, ensuring communication to
relevant stakeholders, and ongoing
compliance monitoring.
Organisational Controls 5.32 Intellectual property rights The organisation should implement appropriate procedures Yes Implemented The Statutory Regulatory & Contractual Statutory Regulatory & Contractual
to protect intellectual property rights.
Requirements document (G11), Requirements document (G11),
Information Security Policy (P1), and SaaS Information Security Policy (P1), SaaS &
& Cloud Services Policy (P13) collectively Cloud Services Policy (P13)
address the requirements of ISO
27002:2022 control 5.32 by identifying
and documenting IP rights, implementing
measures to protect these rights, ensuring
compliance with IP laws, and promoting
awareness and training on IP rights.

Organisational Controls 5.33 Protection of records Records should be protected from loss, destruction, Yes Implemented It is likely your system (google, SharePoint,
falsification, unauthorised access and unauthorised
365, etc) manages this for you, allowing
release.
for historical views of documents and who
updated what, when.

Organisational Controls 5.34 Privacy and protection of PII The organisation should identify and meet the Yes Implemented The Information Security Policy, Data The Information Security Policy, Data
requirements regarding the preservation of privacy and
Protection Policy, and Data Retention Protection Policy, Data Retention Policy
protection of PII according to applicable laws and
regulations and contractual requirements. Policy collectively ensure compliance with
ISO 27002:2022 control 5.34, establishing
and implementing procedures for the
preservation of privacy and protection of
PII.
Organisational Controls 5.35 Independent review of information The organisation’s approach to managing information Yes Implemented External Audit Reports, Certifications & External Audit Reports, Certifications &
security and its implementation including people,
security Assessments from Pen Test Results, etc. Assessments, Pen Test Results
processes and technologies should be reviewed
independently at planned intervals, or when significant
changes occur.

Organisational Controls 5.36 Compliance with policies, rules Compliance with the organisation’s information security Yes Implemented The Information Security Policy includes
policy, topic-specific policies, rules and standards should
and standards for information procedures for regular reviews and audits,
be regularly reviewed.
security ensuring compliance with the
organisation's information security
policies, rules, and standards. All policies
must be reviewed at least annually.

Organisational Controls 5.37 Documented operating Operating procedures for information processing facilities Yes Implemented See M4 Standard Operating Procedures M4 Standard Operating Procedures
should be documented and made available to personnel
procedures
who need them.
People Controls 6.1 Screening Background verification checks on all candidates to Yes Implemented The Information Security Policy includes Information Security Policy, ISO
become personnel should be carried out prior to joining the
procedures for conducting background 27002:2022, Risk Treatment Plan for
organisation and on an ongoing basis taking into
consideration applicable laws, regulations and ethics and checks as part of the employment Insider Threats
be proportional to the business requirements, the process, ensuring compliance with ISO
classification of the information to be accessed and the 27002:2022 control 6.1. Additionally, the
perceived risks.
Risk Treatment Plan for Insider Threats
outlines the practice of background
checks to mitigate potential risks
associated with new hires.
People Controls 6.2 Terms and conditions of The employment contractual agreements should state the Yes Implemented [Insert evidence of staff contracts]
personnel’s and the organisation’s responsibilities for
employment
information security.
People Controls 6.3 Information security awareness, Personnel of the organisation and relevant interested Yes Implemented The Information Security Communications Information Security Communications
parties should receive appropriate information security
education and training Plan includes a comprehensive awareness Plan, R4 - Training Competency records
awareness, education and training and regular updates of
the organisation's information security policy, topic-specific campaign, covering essential information
policies and procedures, as relevant for their job function. security topics. This plan ensures all
employees receive ongoing education and
training, aligning with ISO 27002:2022
control 6.3. Newly inducted staff are sign-
posted to all materials and policies. R4 -
Training Competency records are
maintained for all staff who are required to
take specific / advanced information
security training for their roles.

People Controls 6.4 Disciplinary process A disciplinary process should be formalised and Yes Implemented The organisation has a disciplinary
communicated to take actions against personnel and other
process, and policies underline the need
relevant interested parties who have committed an
information security policy violation. for compliance.

People Controls 6.5 Responsibilities after termination Information security responsibilities and duties that remain Yes Implemented Our policies, including the Information Information Security Policy, Access
valid after termination or change of employment should be
or change of employment Security Policy, Access Control Policy, Control Policy, Acceptable Use Policy,
defined, enforced and communicated to relevant personnel
and other interested parties. Acceptable Use Policy, and BYOD Policy, BYOD Policy
collectively address responsibilities after
termination or change of employment.
These policies ensure access rights are
revoked, company assets are returned,
and data is securely handled. [Include
reference to any leavers procedure]

People Controls 6.6 Confidentiality or non-disclosure Confidentiality or non-disclosure agreements reflecting the Yes Implemented [Insert evidence of any non-disclosure
organisation’s needs for the protection of information
agreements legal agreements or clauses in contracts].
should be identified, documented, regularly reviewed and
signed by personnel and other relevant interested parties.

People Controls 6.7 Remote working Security measures should be implemented when personnel Yes Implemented The Remote Working Policy, Acceptable Remote Working Policy, Acceptable Use
are working remotely to protect information accessed,
Use Policy, and Information Security Policy, Information Security Policy
processed or stored outside the organisation’s premises.
Policy collectively ensure compliance by
providing comprehensive guidelines and
procedures for secure remote working,
covering aspects such as secure remote
access, device security, data handling,
incident reporting, physical security, and
compliance monitoring.
People Controls 6.8 Information security event The organisation should provide a mechanism for Yes Implemented The Information Security Policy, The Information Security Policy,
personnel to report observed or suspected information
reporting Acceptable Use Policy, and Remote Acceptable Use Policy, Remote Working
security events through appropriate channels in a timely
manner. Working Policy collectively support ISO Policy
27002:2022 control 6.8 by ensuring
system activity monitoring, logging, and
compliance with relevant laws. To fully
align with the control, enhance these
policies with detailed logging procedures,
baseline and anomaly detection methods,
and the use of advanced monitoring tools
which are unique to your organisation's
infrastructure.
Physical Controls 7.1 Physical security perimeters Security perimeters should be defined and used to protect Yes Implemented Access Control to Physical Locations SOP
areas that contain information and other associated assets. The organisation has implemented access
control systems for secure areas,
including card readers and biometric
scanners, managed by the Facilities
Manager and Security Personnel. Access
requests are processed through a formal
approval system. The Access Control to
Physical Locations SOP establishes
guidelines for setting up, monitoring, and
maintaining physical security perimeters
to protect information processing
facilities, ensuring only authorised
personnel have access.
Physical Controls 7.2 Physical entry Secure areas should be protected by appropriate entry Yes Implemented Physical entry to secure areas is Access Control to Physical Locations SOP,
controls and access points. controlled through a formal access access logs
request and approval process, issuance of
access credentials, and continuous
monitoring using security cameras and
access logs. The Access Control to
Physical Locations SOP includes
measures for installing and configuring
access control systems (e.g., card
readers, biometric scanners), maintaining
logs of access events, and regularly
reviewing access permissions to secure
physical entry points.
Physical Controls 7.3 Securing offices, rooms and Physical security for offices, rooms and facilities should be Yes Implemented Access Control to Physical Locations SOP
designed and implemented. Security measures, including access
facilities
control systems and continuous
monitoring, are applied to offices, rooms,
and facilities to ensure the protection of
sensitive information and assets. The
Access Control to Physical Locations SOP
outlines procedures for securing offices,
rooms, and facilities, including continuous
monitoring and review of access controls
to prevent unauthorised access.
Physical Controls 7.4 Physical security monitoring Premises should be continuously monitored for Yes Implemented Access Control to Physical Locations SOP,
unauthorised physical access. Real-time monitoring and detailed logging access control logs
of access events are conducted to ensure
security in secure areas, with periodic
reviews to address anomalies or
unauthorised access. The Access Control
to Physical Locations SOP ensures real-
time monitoring of physical access using
security cameras and access control logs,
with established procedures for periodic
reviews and incident response
Physical Controls 7.5 Protecting against physical and Protection against physical and environmental threats, Yes Implemented Physical security measures, including the Information Security Policy
such as natural disasters and other intentional or use of key or swipe cards, are in place to
environmental threats
unintentional physical threats to infrastructure should be
designed and implemented.
protect against physical threats.
Environmental controls are implemented
to mitigate risks. The Information Security
Policy includes guidelines for protecting
information processing facilities against
physical and environmental threats,
ensuring the resilience and security of
critical assets.
Physical Controls 7.6 Working in secure areas Security measures for working in secure areas should be Yes Implemented Procedures for working in secure areas Access Control to Physical Locations SOP
designed and implemented.
include controlled access authorization
and continuous monitoring to ensure
security compliance. "Access Control to
Physical Locations SOP" outlines the
procedures for access authorization and
monitoring (Sections 4 and 5)
Physical Controls 7.7 Clear desk and clear screen Clear desk rules for papers and removable storage media Yes Implemented The "Acceptable Use Policy" includes Acceptable Use Policy, Section on Clear
and clear screen rules for information processing facilities
clear desk and screen policies (Section on Desk & Screen
should be defined and appropriately enforced.
Clear Desk & Screen).
Physical Controls 7.8 Equipment siting and protection Equipment should be sited securely and protected. Yes Implemented The "Information Security Policy" covers Information Security Policy, Remote
securing equipment through physical Working Policy
restrictions (Section on Physical Security).
The Remote Working Policy includes
guidelines for the secure siting and
protection of equipment used remotely,
reducing risks from environmental threats
and unauthorised access.
Physical Controls 7.9 Security of assets off-premises Off-site assets should be protected. Yes Implemented Acceptable Use Policy, Information
The "Acceptable Use Policy" and Security Policy
"Information Security Policy" both address
remote working and the protection of
mobile devices (Sections on Remote
Working and Mobile Storage Devices).
Physical Controls 7,10 Storage media Storage media should be managed through their life cycle Yes Implemented The Acceptable Use Policy mandates the
of acquisition, use, transportation and disposal in
secure management of storage media,
accordance with the organisation’s classification scheme
and handling requirements. including the use of encryption and secure
handling procedures to protect sensitive
data.
Physical Controls 7.11 Supporting utilities Information processing facilities should be protected from Yes Implemented The Information Security Policy ensures
power failures and other disruptions caused by failures in
that supporting utilities are secured and
supporting utilities.
properly maintained, supporting the
continuous operation and security of
information processing facilities.
Physical Controls 7.12 Cabling security Cables carrying power, data or supporting information Yes Implemented The Access Control to Physical Locations Access Control to Physical Locations SOP
services should be protected from interception,
SOP includes measures to secure physical
interference or damage.
infrastructure, implicitly covering the
protection of power and
telecommunications cabling from
interception or damage.
Physical Controls 7.13 Equipment maintenance Equipment should be maintained correctly to ensure Yes Implemented The Information Security Policy includes
availability, integrity and confidentiality of information.
guidelines for the regular maintenance of
information processing equipment to
ensure its availability and integrity.
Physical Controls 7.14 Secure disposal or re-use of Items of equipment containing storage media should be Yes Implemented The "Acceptable Use Policy" and Acceptable Use Policy, Information
verified to ensure that any sensitive data and licensed "Information Security Policy" cover the
equipment Security Policy
software has been removed or securely overwritten prior to
disposal or re-use.
secure disposal of equipment and data
(Sections on Actions upon Leaving and
Handling Guidance for Confidential
Information).
Technological Controls 8.1 User endpoint devices Information stored on, processed by or accessible via user Yes Implemented BYOD and Mobile Device Policies
endpoint devices should be protected. The BYOD and Mobile Device Policies
outline comprehensive security measures
for user endpoint devices, including strong
authentication, encryption, antivirus
software, and incident reporting
procedures to protect against
unauthorised access and threats.
Technological Controls 8.2 Privileged access rights The allocation and use of privileged access rights should Yes Implemented The Access Control Policy includes strict Access Control Policy
be restricted and managed. guidelines for managing privileged access
rights, ensuring that only authorised users
have the necessary privileges and that
these rights are regularly reviewed and
audited.
Technological Controls 8.3 Information access restriction Access to information and other associated assets should Yes Implemented The Access Control Policy and Information Access Control Policy, Information
be restricted in accordance with the established topic- Security Policy enforce the principle of Security Policy
specific policy on access control.
least privilege by ensuring that access
rights are granted based on roles and
responsibilities, regularly reviewed, and
updated as needed.
Technological Controls 8.4 Access to source code Read and write access to source code, development tools Yes Implemented The Information Security Policy enforces
and software libraries should be appropriately managed. access controls to sensitive information,
including source code, ensuring that only
authorised personnel can access and
modify it."
Technological Controls 8.5 Secure authentication Secure authentication technologies and procedures should Yes Implemented The Access Control and Mobile Device Access Control and Mobile Device Policies
be implemented based on information access restrictions Policies enforce strict password
and the topic-specific policy on access control.
management practices, including the use
of strong passwords, regular updates, and
secure storage, to protect secret
authentication information.
Technological Controls 8.6 Capacity management The use of resources should be monitored and adjusted in Yes Implemented The Access Control and Mobile Device Access Control and Mobile Device Policies
line with current and expected capacity requirements. Policies enforce strict password
management practices, including the use
of strong passwords, regular updates, and
secure storage, to protect secret
authentication information.
Technological Controls 8.7 Protection against malware Protection against malware should be implemented and Yes Implemented Acceptable Use Policy, Mobile Device
supported by appropriate user awareness. The Acceptable Use Policy and Mobile Policy
Device Policy mandate the use of antivirus
software, anti-ransomware tools, and web
filtering to protect against malware.
Technological Controls 8.8 Management of technical Information about technical vulnerabilities of information Yes Implemented The Information Security Policy includes
systems in use should be obtained, the organisation’s processes for identifying, assessing, and
vulnerabilities
exposure to such vulnerabilities should be evaluated and
appropriate measures should be taken.
mitigating technical vulnerabilities,
ensuring that systems are regularly
updated to address new security threats. A
Patching Policy and Vulnerability
Management SOP also exist to provide
guidance.
Technological Controls 8.9 Configuration management Configurations, including security configurations, of Yes Implemented
hardware, software, services and networks should be The Access Control Policy outlines
established, documented, implemented, monitored and
reviewed.
procedures for the secure configuration
and management of information systems,
ensuring their integrity and security
Technological Controls 8.10 Information deletion Information stored in information systems, devices or in any Yes Implemented
other storage media should be deleted when no longer The Access Control Policy outlines
required.
procedures for the secure configuration
and management of information systems,
ensuring their integrity and security
Technological Controls 8.11 Data masking Data masking should be used in accordance with the Yes Implemented Our Secure Development Policy includes
organisation’s topic-specific policy on access control and specific data masking techniques such as
other related topic-specific policies, and business
requirements, taking applicable legislation into
substitution, shuffling, redaction, and
consideration. encryption. These techniques are
integrated into the secure development
lifecycle, ensuring that sensitive data,
including PII, is protected during
processing, storage, and transmission.
Regular audits and security assessments
ensure the effectiveness of our data
masking practices.
Technological Controls 8.12 Data leakage prevention Data leakage prevention measures should be applied to Yes Implemented Our organisation has implemented
systems, networks and any other devices that process,
comprehensive data leakage prevention
store or transmit sensitive information.
measures, including the deployment of
DLP tools, monitoring and controlling data
channels, restricting unauthorised data
transfers, and providing regular employee
training.
Technological Controls 8.13 Information backup Backup copies of information, software and systems should Yes Implemented Our organisation has implemented a
be maintained and regularly tested in accordance with the
comprehensive backup policy that
agreed topic-specific policy on backup.
includes regular backups of information,
software, and systems. These backups are
encrypted and stored securely. We
conduct regular tests to ensure that
backups can be successfully restored, and
we continuously monitor and update our
backup procedures to maintain data
availability and integrity. The Data
Protection Policy, Data Retention Policy,
and Cloud Services Policy collectively
support Control 8.13 by addressing
backup frequency, secure storage, regular
testing, and procedures for handling
backups in both local and cloud
environments.
Technological Controls 8.14 Redundancy of information Information processing facilities should be implemented Yes Implemented Our organisation has implemented
with redundancy sufficient to meet availability
processing facilities comprehensive redundancy measures for
requirements.
critical information processing facilities.
These measures include geographic
redundancy, high availability solutions,
and regular backups and replication. Our
Disaster Recovery Plan outlines detailed
steps for maintaining redundancy and
ensuring continuous operation and
availability in case of a failure. Regular
testing and maintenance ensure the
effectiveness of our redundancy systems.
The Disaster Recovery Plan, along with the
Data Protection Policy, Data Retention
Policy, and Cloud Services Policy,
collectively support Control 8.14

Technological Controls 8.15 Logging Logs that record activities, exceptions, faults and other Yes Implemented The combined implementation of the
relevant events should be produced, stored, protected and Network Monitoring & Logging SOP,
analysed.
Information Security Policy, and Metrics &
Reporting Approach ensures compliance
with Control 8.15. These documents
provide comprehensive guidelines for
continuous monitoring, log capture,
analysis, retention, and protection, as well
as regular reporting and review of key
metrics derived from logs to support
security investigations and incident
response
Technological Controls 8.16 Monitoring activities Networks, systems and applications should be monitored Yes Implemented
for anomalous behaviour and appropriate actions taken to The requirements for Control 8.16
evaluate potential information security incidents.
(Monitoring Activities) are met through the
combined implementation of the Network
Monitoring & Logging SOP, Information
Security Policy, and Metrics & Reporting
Approach. These documents provide
guidelines for continuous monitoring of
network traffic, anomaly detection, real-
time alerts, and regular analysis and
reporting of key metrics. They ensure that
networks, systems, and applications are
monitored for anomalous behaviour, and
appropriate actions are taken to evaluate
and respond to potential information
security incidents.
Technological Controls 8.17 Clock synchronization The clocks of information processing systems used by the Yes Implemented The requirements for Control 8.17 (Clock
organisation should be synchronized to approved time Synchronization) are addressed by the
sources.
updated Network Monitoring & Logging
SOP. This document specifies that all
network devices, servers, and security
appliances must synchronize their clocks
with an approved time source using the
Network Time Protocol (NTP). The IT
Administrator is responsible for
configuring and monitoring clock
synchronization, with regular audits
conducted to verify accuracy and
synchronization of system clocks. This
ensures accurate time-stamping for
security-related events and supports
effective forensic investigations
Technological Controls 8.18 Use of privileged utility programs The use of utility programs that can be capable of Yes Implemented
overriding system and application controls should be The requirements for Control 8.18 (Use of
restricted and tightly controlled.
Privileged Utility Programs) are addressed
by updating the Network Monitoring &
Logging SOP to include procedures for
managing, authorizing, and logging the use
of utility programs that can override
system and application controls. This
ensures that only trusted, authorised
users have access to these programs, and
all usage is logged for audit purposes
Technological Controls 8.19 Installation of software on Procedures and measures should be implemented to Yes Implemented The Acceptable Use Policy stipulates that
securely manage software installation on operational only authorised IT personnel can install
operational systems
systems.
software on operational systems,
following a defined process that includes
authorization, verification, testing, and
logging to ensure the integrity and security
of operational systems.
Technological Controls 8.20 Networks security Networks and network devices should be secured, Yes Implemented
managed and controlled to protect information in systems The requirements for Control 8.20
and applications.
(Network Security) are addressed through
the Network Monitoring & Logging SOP,
Acceptable Use Policy, and Asset
Management Policy. These documents
provide guidelines for continuous
monitoring, logging, and protection of
network activity, appropriate use of
network devices, malware protection, and
secure management of network assets.
Technological Controls 8.21 Security of network services Security mechanisms, service levels and service Yes Implemented
requirements of network services should be identified, The requirements for Control 8.21
implemented and monitored.
(Security of Network Services) are
addressed through the Network Monitoring
& Logging SOP. This document outlines
the deployment and configuration of
network monitoring tools to capture and
analyse network traffic, supporting the
secure management of network services.
It includes procedures for continuous
monitoring, real-time alerting, and
incident management, ensuring that
network services are securely managed
and monitored
Technological Controls 8.22 Segregation of networks Groups of information services, users and information Yes Implemented
systems should be segregated in the organisation’s The requirements for Control 8.22
networks.
(Segregation of Networks) are partially
addressed by the Network Monitoring &
Logging SOP. This document specifies the
scope of network monitoring, including the
definition of monitored devices, systems,
and traffic types, which supports network
segregation. It emphasizes the need for
baseline performance metrics and
continuous traffic analysis to maintain
effective segregation and monitoring of
network segments
Technological Controls 8.23 Web filtering Access to external websites should be managed to reduce Yes Implemented Summarise any web filtering tools in
exposure to malicious content.
place.
Technological Controls 8.24 Use of cryptography Rules for the effective use of cryptography, including Yes Implemented The Information Security Policy and
cryptographic key management, should be defined and Secure Development Policy
implemented.
comprehensively address Control 8.24 by
outlining detailed procedures for
cryptographic key management,
specifying the use of approved
cryptographic algorithms, and ensuring
compliance with relevant regulations.
These policies collectively ensure that
cryptographic measures are effectively
implemented and managed to protect
sensitive information.
Technological Controls 8.25 Secure development life cycle Rules for the secure development of software and systems Yes Implemented The Secure Development Policy
should be established and applied. establishes comprehensive rules for the
secure development of software and
systems, including secure coding
practices, environment separation, and
security checkpoints throughout the
development lifecycle, ensuring
information security is integrated and
maintained .
Technological Controls 8.26 Application security requirements Information security requirements should be identified, Yes Implemented The Secure Development Policy requires
specified and approved when developing or acquiring that all security requirements be
applications.
identified, specified, and approved during
the development and acquisition of
applications, incorporating necessary
security measures such as data
protection, access control, and secure
communication .
Technological Controls 8.27 Secure system architecture and Principles for engineering secure systems should be Yes Implemented
established, documented, maintained and applied to any The Secure Development Policy
engineering principles
information system development activities.
incorporates principles for secure system
architecture and engineering, ensuring
security is designed into all layers of the
architecture and maintaining compliance
with security standards and practices .
Technological Controls 8.28 Secure coding Secure coding principles should be applied to software Yes Implemented The Secure Development Policy mandates
development. the application of secure coding
principles, including regular code reviews,
static and dynamic analysis, and
adherence to secure coding standards to
minimize vulnerabilities and ensure robust
software security .
Technological Controls 8.29 Security testing in development Security testing processes should be defined and Yes Implemented The Secure Development Policy includes
implemented in the development life cycle. procedures for continuous security testing
and acceptance
throughout the development lifecycle,
encompassing static and dynamic
analysis, penetration testing, and
vulnerability scanning to identify and
address security issues promptly .
Technological Controls 8.30 Outsourced development The organisation should direct, monitor and review the Yes Implemented The Supplier Security Policy ensures that
activities related to outsourced system development. outsourced development activities
comply with the organisation's security
requirements, including secure design,
coding, and testing practices, and
mandates ongoing monitoring and review
of supplier compliance.
Technological Controls 8.31 Separation of development, test Development, testing and production environments should Yes Implemented The Secure Development Policy requires
be separated and secured. the separation and security of
and production environments
development, test, and production
environments, preventing unauthorised
access and ensuring that production
environments are protected from
development and test activities .
Technological Controls 8.32 Change management Changes to information processing facilities and Yes Implemented
information systems should be subject to change The Change Management SOPs, including
management procedures.
Change Request and Approval, Change
Implementation & Testing, and Change
Documentation & Review, collectively
ensure thorough technical reviews of
applications after operating platform
changes. These procedures include
comprehensive impact assessments,
detailed documentation, and rigorous post-
implementation testing, aligning with
Control 8.32 requirements
Technological Controls 8.33 Test information Test information should be appropriately selected, Yes Implemented
protected and managed.
The Secure Development Policy mandates
the use of data masking techniques and
secure handling of sensitive data in test
environments, ensuring that test
information is protected and managed
appropriately. These measures include the
substitution, shuffling, redaction, and
encryption of sensitive data, providing
comprehensive protection during testing .
Technological Controls 8.34 Protection of information systems Audit tests and other assurance activities involving Yes Implemented The Information Security Policy requires
assessment of operational systems should be planned and that all access requests and scope of
during audit testing
agreed between the tester and appropriate management.
technical audits be agreed upon and
controlled by appropriate management,
limiting audit tests to read-only access
where possible. This ensures minimal
impact on operational systems and
maintains confidentiality, integrity, and
availability during audit and assurance
activities .

You might also like