{"id":415481,"date":"2024-10-20T06:05:27","date_gmt":"2024-10-20T06:05:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-270022022\/"},"modified":"2024-10-26T11:19:31","modified_gmt":"2024-10-26T11:19:31","slug":"bs-en-iso-iec-270022022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-270022022\/","title":{"rendered":"BS EN ISO\/IEC 27002:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4 Structure of this document 4.1 Clauses <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.2 Themes and attributes <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.3 Control layout 5 Organizational controls 5.1 Policies for information security <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.2 Information security roles and responsibilities <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.3 Segregation of duties <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.4 Management responsibilities <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.5 Contact with authorities <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.6 Contact with special interest groups 5.7 Threat intelligence <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.8 Information security in project management <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.9 Inventory of information and other associated assets <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.10 Acceptable use of information and other associated assets <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.11 Return of assets <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.12 Classification of information <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.13 Labelling of information <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.14 Information transfer <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.15 Access control <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.16 Identity management <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.17 Authentication information <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 5.18 Access rights <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 5.19 Information security in supplier relationships <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 5.20 Addressing information security within supplier agreements <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 5.21 Managing information security in the ICT supply chain <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 5.22 Monitoring, review and change management of supplier services <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.23 Information security for use of cloud services <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 5.24 Information security incident management planning and preparation <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 5.25 Assessment and decision on information security events 5.26 Response to information security incidents <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 5.27 Learning from information security incidents <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 5.28 Collection of evidence <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.29 Information security during disruption 5.30 ICT readiness for business continuity <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 5.31 Legal, statutory, regulatory and contractual requirements <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 5.32 Intellectual property rights <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 5.33 Protection of records <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 5.34 Privacy and protection of PII <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 5.35 Independent review of information security <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 5.36 Compliance with policies, rules and standards for information security <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 5.37 Documented operating procedures <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 6 People controls 6.1 Screening <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 6.2 Terms and conditions of employment <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 6.3 Information security awareness, education and training <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 6.4 Disciplinary process <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 6.5 Responsibilities after termination or change of employment 6.6 Confidentiality or non-disclosure agreements <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 6.7 Remote working <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.8 Information security event reporting <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 7 Physical controls 7.1 Physical security perimeters <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 7.2 Physical entry <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 7.3 Securing offices, rooms and facilities 7.4 Physical security monitoring <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 7.5 Protecting against physical and environmental threats <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 7.6 Working in secure areas <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 7.7 Clear desk and clear screen <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 7.8 Equipment siting and protection <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 7.9 Security of assets off-premises <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 7.10 Storage media <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 7.11 Supporting utilities <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 7.12 Cabling security <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 7.13 Equipment maintenance <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 7.14 Secure disposal or re-use of equipment <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 8 Technological controls 8.1 User endpoint devices <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 8.2 Privileged access rights <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 8.3 Information access restriction <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 8.4 Access to source code <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 8.5 Secure authentication <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 8.6 Capacity management <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 8.7 Protection against malware <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 8.8 Management of technical vulnerabilities <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 8.9 Configuration management <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 8.10 Information deletion <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 8.11 Data masking <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 8.12 Data leakage prevention <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 8.13 Information backup <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 8.14 Redundancy of information processing facilities <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 8.15 Logging <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 8.16 Monitoring activities <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 8.17 Clock synchronization <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 8.18 Use of privileged utility programs <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 8.19 Installation of software on operational systems <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 8.20 Networks security <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 8.21 Security of network services <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 8.22 Segregation of networks <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 8.23 Web filtering <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 8.24 Use of cryptography <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 8.25 Secure development life cycle <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 8.26 Application security requirements <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 8.27 Secure system architecture and engineering principles <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 8.28 Secure coding <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 8.29 Security testing in development and acceptance <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 8.30 Outsourced development <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 8.31 Separation of development, test and production environments <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 8.32 Change management <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 8.33 Test information <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 8.34 Protection of information systems during audit testing <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | Annex A (informative) Using attributes <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | Annex B (informative) Correspondence of ISO\/IEC 27002:2022 (this document) with ISO\/IEC 27002:2013 <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Information security controls<\/b><\/p>\n |