{"id":415481,"date":"2024-10-20T06:05:27","date_gmt":"2024-10-20T06:05:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-270022022\/"},"modified":"2024-10-26T11:19:31","modified_gmt":"2024-10-26T11:19:31","slug":"bs-en-iso-iec-270022022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-270022022\/","title":{"rendered":"BS EN ISO\/IEC 27002:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nEuropean foreword
Endorsement notice <\/td>\n<\/tr>\n
8<\/td>\nForeword <\/td>\n<\/tr>\n
9<\/td>\nIntroduction <\/td>\n<\/tr>\n
13<\/td>\n1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
18<\/td>\n3.2 Abbreviated terms <\/td>\n<\/tr>\n
19<\/td>\n4 Structure of this document
4.1 Clauses <\/td>\n<\/tr>\n
20<\/td>\n4.2 Themes and attributes <\/td>\n<\/tr>\n
21<\/td>\n4.3 Control layout
5 Organizational controls
5.1 Policies for information security <\/td>\n<\/tr>\n
23<\/td>\n5.2 Information security roles and responsibilities <\/td>\n<\/tr>\n
24<\/td>\n5.3 Segregation of duties <\/td>\n<\/tr>\n
25<\/td>\n5.4 Management responsibilities <\/td>\n<\/tr>\n
26<\/td>\n5.5 Contact with authorities <\/td>\n<\/tr>\n
27<\/td>\n5.6 Contact with special interest groups
5.7 Threat intelligence <\/td>\n<\/tr>\n
29<\/td>\n5.8 Information security in project management <\/td>\n<\/tr>\n
30<\/td>\n5.9 Inventory of information and other associated assets <\/td>\n<\/tr>\n
32<\/td>\n5.10 Acceptable use of information and other associated assets <\/td>\n<\/tr>\n
33<\/td>\n5.11 Return of assets <\/td>\n<\/tr>\n
34<\/td>\n5.12 Classification of information <\/td>\n<\/tr>\n
35<\/td>\n5.13 Labelling of information <\/td>\n<\/tr>\n
36<\/td>\n5.14 Information transfer <\/td>\n<\/tr>\n
39<\/td>\n5.15 Access control <\/td>\n<\/tr>\n
41<\/td>\n5.16 Identity management <\/td>\n<\/tr>\n
42<\/td>\n5.17 Authentication information <\/td>\n<\/tr>\n
44<\/td>\n5.18 Access rights <\/td>\n<\/tr>\n
45<\/td>\n5.19 Information security in supplier relationships <\/td>\n<\/tr>\n
47<\/td>\n5.20 Addressing information security within supplier agreements <\/td>\n<\/tr>\n
49<\/td>\n5.21 Managing information security in the ICT supply chain <\/td>\n<\/tr>\n
51<\/td>\n5.22 Monitoring, review and change management of supplier services <\/td>\n<\/tr>\n
53<\/td>\n5.23 Information security for use of cloud services <\/td>\n<\/tr>\n
55<\/td>\n5.24 Information security incident management planning and preparation <\/td>\n<\/tr>\n
57<\/td>\n5.25 Assessment and decision on information security events
5.26 Response to information security incidents <\/td>\n<\/tr>\n
58<\/td>\n5.27 Learning from information security incidents <\/td>\n<\/tr>\n
59<\/td>\n5.28 Collection of evidence <\/td>\n<\/tr>\n
60<\/td>\n5.29 Information security during disruption
5.30 ICT readiness for business continuity <\/td>\n<\/tr>\n
62<\/td>\n5.31 Legal, statutory, regulatory and contractual requirements <\/td>\n<\/tr>\n
63<\/td>\n5.32 Intellectual property rights <\/td>\n<\/tr>\n
65<\/td>\n5.33 Protection of records <\/td>\n<\/tr>\n
66<\/td>\n5.34 Privacy and protection of PII <\/td>\n<\/tr>\n
67<\/td>\n5.35 Independent review of information security <\/td>\n<\/tr>\n
68<\/td>\n5.36 Compliance with policies, rules and standards for information security <\/td>\n<\/tr>\n
69<\/td>\n5.37 Documented operating procedures <\/td>\n<\/tr>\n
70<\/td>\n6 People controls
6.1 Screening <\/td>\n<\/tr>\n
71<\/td>\n6.2 Terms and conditions of employment <\/td>\n<\/tr>\n
72<\/td>\n6.3 Information security awareness, education and training <\/td>\n<\/tr>\n
74<\/td>\n6.4 Disciplinary process <\/td>\n<\/tr>\n
75<\/td>\n6.5 Responsibilities after termination or change of employment
6.6 Confidentiality or non-disclosure agreements <\/td>\n<\/tr>\n
77<\/td>\n6.7 Remote working <\/td>\n<\/tr>\n
78<\/td>\n6.8 Information security event reporting <\/td>\n<\/tr>\n
79<\/td>\n7 Physical controls
7.1 Physical security perimeters <\/td>\n<\/tr>\n
80<\/td>\n7.2 Physical entry <\/td>\n<\/tr>\n
82<\/td>\n7.3 Securing offices, rooms and facilities
7.4 Physical security monitoring <\/td>\n<\/tr>\n
83<\/td>\n7.5 Protecting against physical and environmental threats <\/td>\n<\/tr>\n
84<\/td>\n7.6 Working in secure areas <\/td>\n<\/tr>\n
85<\/td>\n7.7 Clear desk and clear screen <\/td>\n<\/tr>\n
86<\/td>\n7.8 Equipment siting and protection <\/td>\n<\/tr>\n
87<\/td>\n7.9 Security of assets off-premises <\/td>\n<\/tr>\n
88<\/td>\n7.10 Storage media <\/td>\n<\/tr>\n
89<\/td>\n7.11 Supporting utilities <\/td>\n<\/tr>\n
90<\/td>\n7.12 Cabling security <\/td>\n<\/tr>\n
91<\/td>\n7.13 Equipment maintenance <\/td>\n<\/tr>\n
92<\/td>\n7.14 Secure disposal or re-use of equipment <\/td>\n<\/tr>\n
93<\/td>\n8 Technological controls
8.1 User endpoint devices <\/td>\n<\/tr>\n
95<\/td>\n8.2 Privileged access rights <\/td>\n<\/tr>\n
96<\/td>\n8.3 Information access restriction <\/td>\n<\/tr>\n
98<\/td>\n8.4 Access to source code <\/td>\n<\/tr>\n
99<\/td>\n8.5 Secure authentication <\/td>\n<\/tr>\n
101<\/td>\n8.6 Capacity management <\/td>\n<\/tr>\n
102<\/td>\n8.7 Protection against malware <\/td>\n<\/tr>\n
104<\/td>\n8.8 Management of technical vulnerabilities <\/td>\n<\/tr>\n
107<\/td>\n8.9 Configuration management <\/td>\n<\/tr>\n
109<\/td>\n8.10 Information deletion <\/td>\n<\/tr>\n
110<\/td>\n8.11 Data masking <\/td>\n<\/tr>\n
112<\/td>\n8.12 Data leakage prevention <\/td>\n<\/tr>\n
113<\/td>\n8.13 Information backup <\/td>\n<\/tr>\n
114<\/td>\n8.14 Redundancy of information processing facilities <\/td>\n<\/tr>\n
115<\/td>\n8.15 Logging <\/td>\n<\/tr>\n
118<\/td>\n8.16 Monitoring activities <\/td>\n<\/tr>\n
120<\/td>\n8.17 Clock synchronization <\/td>\n<\/tr>\n
121<\/td>\n8.18 Use of privileged utility programs <\/td>\n<\/tr>\n
122<\/td>\n8.19 Installation of software on operational systems <\/td>\n<\/tr>\n
123<\/td>\n8.20 Networks security <\/td>\n<\/tr>\n
124<\/td>\n8.21 Security of network services <\/td>\n<\/tr>\n
125<\/td>\n8.22 Segregation of networks <\/td>\n<\/tr>\n
126<\/td>\n8.23 Web filtering <\/td>\n<\/tr>\n
127<\/td>\n8.24 Use of cryptography <\/td>\n<\/tr>\n
129<\/td>\n8.25 Secure development life cycle <\/td>\n<\/tr>\n
130<\/td>\n8.26 Application security requirements <\/td>\n<\/tr>\n
132<\/td>\n8.27 Secure system architecture and engineering principles <\/td>\n<\/tr>\n
134<\/td>\n8.28 Secure coding <\/td>\n<\/tr>\n
136<\/td>\n8.29 Security testing in development and acceptance <\/td>\n<\/tr>\n
138<\/td>\n8.30 Outsourced development <\/td>\n<\/tr>\n
139<\/td>\n8.31 Separation of development, test and production environments <\/td>\n<\/tr>\n
140<\/td>\n8.32 Change management <\/td>\n<\/tr>\n
141<\/td>\n8.33 Test information <\/td>\n<\/tr>\n
142<\/td>\n8.34 Protection of information systems during audit testing <\/td>\n<\/tr>\n
144<\/td>\nAnnex A (informative) Using attributes <\/td>\n<\/tr>\n
155<\/td>\nAnnex B (informative) Correspondence of ISO\/IEC 27002:2022 (this document) with ISO\/IEC 27002:2013 <\/td>\n<\/tr>\n
162<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Information security controls<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n166<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":415491,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-415481","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/415481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/415491"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=415481"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=415481"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=415481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}