4.1 Understanding the organization and its context
4.2 Understanding the needs and expectations of interested parties
A5.31 Legal, statutory, regulatory and contractual requirements
6.1.3 Information security risk treatment
4. Context of the organization
A5. Organizational controls
6. Planning
Chapter II ICT risk management
82
Article 5 Governance and organisation
13
Art. 5.1
4.4
5.1
5.2
4.4 Information security management system
5.1 Leadership and commitment
5.2 Policy
4. Context of the organization
5. Leadership
Art. 5.2
A5.4
5.1
A5.4 Management responsibilities
5.1 Leadership and commitment
A5. Organizational controls
5. Leadership
Art. 5.3
A5.22
A5.22 Monitoring, review and change management of supplier services
A5. Organizational controls
Art. 5.4
7.2
7.3
7.2 Competence
7.3 Awareness
7. Support
Article 6 ICT risk management framework
18
Art. 6.1
A5.1
6.1.3
7.5
A5.1 Policies for information security
6.1.3 Information security risk treatment
7.5 Documented information
A5. Organizational controls
6. Planning
7. Support
Art. 6.2
4.4
A5.1
A5.37
6.1.3
4.4 Information security management system
A5.1 Policies for information security
A5.37 Documented operating procedures
6.1.3 Information security risk treatment
4. Context of the organization
A5. Organizational controls
6. Planning
Art. 6.3
A5.5
6.1.3
7.4
8.1
A5.5 Contact with authorities
6.1.3 Information security risk treatment
7.4 Communication
8.1 Operational planning and control
A5. Organizational controls
6. Planning
7. Support
8. Operation
Art. 6.4
A5.2
A5.3
A5.4
5.1
5.3
9.1
9.2
9.3
A5.2 Information security roles and responsibilities
A5.3 Segregation of duties
A5.4 Management responsibilities
5.1 Leadership and commitment
5.3 Organizational roles, responsibilities and authorities
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit
9.3 Management review
A5. Organizational controls
5. Leadership
9. Performance evaluation
Art. 6.5
A5.1
A5.5
7.4
7.5
10.1
A5.1 Policies for information security
A5.5 Contact with authorities
7.4 Communication
7.5 Documented information
10.1 Continual improvement
A5. Organizational controls
7. Support
10. Improvement
Art. 6.6
A5.36
9.2
A5.36 Compliance with policies, rules and standards for information security
9.2 Internal audit
A5. Organizational controls
9. Performance evaluation
Art. 6.7
10.2
10.2 Nonconformity and corrective action
10. Improvement
Art. 6.8
A5.29
A5.30
A8.14
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
A8.14 Redundancy of information processing facilities
A5. Organizational controls
A8. Technological controls
Art. 6.9
A5.19
A5.30
A8.14
A5.19 Information security in supplier relationships
A5.30 ICT readiness for business continuity
A8.14 Redundancy of information processing facilities
A5. Organizational controls
A8. Technological controls
Art. 6.10
A5.35
A5.35 Independent review of information security
A5. Organizational controls
Article 7 ICT systems, protocols and tools
1
Art. 7
6.1.1
6.1.3
6.1.1 General
6.1.3 Information security risk treatment
6. Planning
Article 8 Identification
7
Art. 8.1
A5.9
A5.12
A5.9 Inventory of information and other associated assets
A5.12 Classification of information
A5. Organizational controls
Art. 8.2
6.1.2
6.1.2 Information security risk assessment
6. Planning
Art. 8.3
8.1
8.2
8.1 Operational planning and control
8.2 Information security risk assessment
8. Operation
Art. 8.4
A5.9
A5.9 Inventory of information and other associated assets
A5. Organizational controls
Art. 8.5
A5.9
A5.22
8.1
A5.9 Inventory of information and other associated assets
A5.22 Monitoring, review and change management of supplier services
8.1 Operational planning and control
A5. Organizational controls
8. Operation
Art. 8.6
A5.9
A5.22
8.1
A5.9 Inventory of information and other associated assets
A5.22 Monitoring, review and change management of supplier services
8.1 Operational planning and control
A5. Organizational controls
8. Operation
Art. 8.7
A8.9
A8.29
6.1.2
8.2
A8.9 Configuration management
A8.29 Security testing in development and acceptance
6.1.2 Information security risk assessment
8.2 Information security risk assessment
A8. Technological controls
6. Planning
8. Operation
Article 9 Protection and prevention
12
Art. 9.1
A8.16
6.1.3
8.1
8.3
9.1
A8.16 Monitoring activities
6.1.3 Information security risk treatment
8.1 Operational planning and control
8.3 Information security risk treatment
9.1 Monitoring, measurement, analysis and evaluation
A8. Technological controls
6. Planning
8. Operation
9. Performance evaluation
Art. 9.2
6.1.3
8.3
6.1.3 Information security risk treatment
8.3 Information security risk treatment
6. Planning
8. Operation
Art. 9.3
A5.14
A8.1
A8.2
A8.3
A8.4
A8.5
A8.12
6.1.3
8.3
A5.14 Information transfer
A8.1 User end point devices
A8.2 Privileged access rights
A8.3 Information access restriction
A8.4 Access to source code
A8.5 Secure authentication
A8.12 Data leakage prevention
6.1.3 Information security risk treatment
8.3 Information security risk treatment
A5. Organizational controls
A8. Technological controls
6. Planning
8. Operation
Art. 9.4
[]
Art. 9.4(a)
A5.1
5.2
A5.1 Policies for information security
5.2 Policy
A5. Organizational controls
5. Leadership
Art. 9.4(b)
A5.24
A5.26
A8.16
A8.20
A8.21
A8.22
6.1.3
A5.24 Information security incident management planning and preparation
A5.26 Response to information security incidents
A8.16 Monitoring activities
A8.20 Networks security
A8.21 Security of network services
A8.22 Segregation of networks
6.1.3 Information security risk treatment
A5. Organizational controls
A8. Technological controls
6. Planning
Art. 9.4(c)
A5.15
A5.18
A7.2
A7.3
A7.4
A8.2
A8.3
A8.4
A5.15 Access control
A5.18 Access rights
A7.2 Physical entry
A7.3 Securing offices, rooms and facilities
A7.4 Physical security monitoring
A8.2 Privileged access rights
A8.3 Information access restriction
A8.4 Access to source code
A5. Organizational controls
A7. Physical controls
A8. Technological controls
Art. 9.4(d)
A5.12
A5.17
A8.5
A8.24
A5.12 Classification of information
A5.17 Authentication information
A8.5 Secure authentication
A8.24 Use of cryptography
A5. Organizational controls
A8. Technological controls
Art. 9.4(e)
A8.32
8.1
8.2
A8.32 Change management
8.1 Operational planning and control
8.2 Information security risk assessment
A8. Technological controls
8. Operation
Art. 9.4(f)
A8.8
A8.9
A8.8 Management of technical vulnerabilities
A8.9 Configuration management
A8. Technological controls
Art. 9.4
A8.22
A8.22 Segregation of networks
A8. Technological controls
Art. 9.4
A8.32
A8.32 Change management
A8. Technological controls
Article 10 Detection
4
Art. 10.1
A8.16
A8.16 Monitoring activities
A8. Technological controls
Art. 10.2
A5.25
A5.26
A8.16
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
A8.16 Monitoring activities
A5. Organizational controls
A8. Technological controls
Art. 10.3
A5.24
A8.16
7.1
A5.24 Information security incident management planning and preparation
A8.16 Monitoring activities
7.1 Resources
A5. Organizational controls
A8. Technological controls
7. Support
Art. 10.4
A5.6
A5.7
A5.6 Contact with special interest groups
A5.7 Threat intelligence
A5. Organizational controls
Article 11 Response and recovery
10
Art. 11.1
A5.30
A5.30 ICT readiness for business continuity
A5. Organizational controls
Art. 11.2
A5.29
A5.30
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
A5. Organizational controls
Art. 11.3
A5.29
A5.30
9.2
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
9.2 Internal audit
A5. Organizational controls
9. Performance evaluation
Art. 11.4
A5.20
A5.22
A5.29
A5.30
A5.20 Addressing information security within supplier agreements
A5.22 Monitoring, review and change management of supplier services
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
A5. Organizational controls
Art. 11.5
A5.9
A5.30
A5.9 Inventory of information and other associated assets
A5.30 ICT readiness for business continuity
A5. Organizational controls
Art. 11.6
A5.29
A5.30
A8.13
7.4
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
A8.13 Information backup
7.4 Communication
A5. Organizational controls
A8. Technological controls
7. Support
Art. 11.7
A5.5
A5.6
A5.26
A5.30
7.4
A5.5 Contact with authorities
A5.6 Contact with special interest groups
A5.26 Response to information security incidents
A5.30 ICT readiness for business continuity
7.4 Communication
A5. Organizational controls
7. Support
Art. 11.8
A5.28
A5.28 Collection of evidence
A5. Organizational controls
Art. 11.9
A5.5
A5.30
7.4
A5.5 Contact with authorities
A5.30 ICT readiness for business continuity
7.4 Communication
A5. Organizational controls
7. Support
Art. 11.10
A5.5
7.4
A5.5 Contact with authorities
7.4 Communication
A5. Organizational controls
7. Support
Article 12 Backup policies and procedures, restoration and recovery procedures and methods
7
Art. 12.1
A8.13
A8.13 Information backup
A8. Technological controls
Art. 12.2
A8.13
A8.13 Information backup
A8. Technological controls
Art. 12.3
A5.29
A5.30
A8.13
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
A8.13 Information backup
A5. Organizational controls
A8. Technological controls
Art. 12.4
A8.14
A8.14 Redundancy of information processing facilities
A8. Technological controls
Art. 12.5
A8.14
A8.14 Redundancy of information processing facilities
A8. Technological controls
Art. 12.6
A5.9
A5.30
8.1
A5.9 Inventory of information and other associated assets
A5.30 ICT readiness for business continuity
8.1 Operational planning and control
A5. Organizational controls
8. Operation
Art. 12.7
A5.26
A8.13
A5.26 Response to information security incidents
A8.13 Information backup
A5. Organizational controls
A8. Technological controls
Article 13 Learning and evolving
7
Art. 13.1
A5.24
7.1
A5.24 Information security incident management planning and preparation
7.1 Resources
A5. Organizational controls
7. Support
Art. 13.2
A5.5
A5.27
7.4
A5.5 Contact with authorities
A5.27 Learning from information security incidents
7.4 Communication
A5. Organizational controls
7. Support
Art. 13.3
8.2
10.1
10.2
8.2 Information security risk assessment
10.1 Continual improvement
10.2 Nonconformity and corrective action
8. Operation
10. Improvement
Art. 13.4
8.2
10.1
8.2 Information security risk assessment
10.1 Continual improvement
8. Operation
10. Improvement
Art. 13.5
9.3
10.2
9.3 Management review
10.2 Nonconformity and corrective action
9. Performance evaluation
10. Improvement
Art. 13.6
A6.3
7.3
A6.3 Information security awareness, education and training
7.3 Awareness
A6. People controls
7. Support
Art. 13.7
4.1
6.1.2
8.2
4.1 Understanding the organization and its context
6.1.2 Information security risk assessment
8.2 Information security risk assessment
4. Context of the organization
6. Planning
8. Operation
Article 14 Communication
3
Art. 14.1
A5.26
7.4
A5.26 Response to information security incidents
7.4 Communication
A5. Organizational controls
7. Support
Art. 14.2
A5.26
7.4
A5.26 Response to information security incidents
7.4 Communication
A5. Organizational controls
7. Support
Art. 14.3
A5.26
7.4
A5.26 Response to information security incidents
7.4 Communication
A5. Organizational controls
7. Support
Chapter III ICT-related incident management, classification and reporting
12
Article 17 ICT-related incident management process
3
Art. 17.1
A5.24
A5.24 Information security incident management planning and preparation
A5. Organizational controls
Art. 17.2
A5.24
A5.25
A5.26
A5.27
A5.28
A5.24 Information security incident management planning and preparation
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
A5.27 Learning from information security incidents
A5.28 Collection of evidence
A5. Organizational controls
Art. 17.3
A5.24
A5.25
A5.26
7.4
A5.24 Information security incident management planning and preparation
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
7.4 Communication
A5. Organizational controls
7. Support
Article 18 Classification of ICT-related incidents and cyber threats
2
Art. 18.1
A5.24
A5.25
A5.24 Information security incident management planning and preparation
A5.25 Assessment and decision on information security events
A5. Organizational controls
Art. 18.2
6.1.2
6.1.2 Information security risk assessment
6. Planning
Article 19 Reporting of major ICT-related incidents and voluntary notification of significant cyber threats
5
Art. 19.1
A5.5
A5.24
A5.25
A5.26
A5.27
A5.28
7.4
A5.5 Contact with authorities
A5.24 Information security incident management planning and preparation
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
A5.27 Learning from information security incidents
A5.28 Collection of evidence
7.4 Communication
A5. Organizational controls
7. Support
Art. 19.2
A5.5
A5.7
A5.5 Contact with authorities
A5.7 Threat intelligence
A5. Organizational controls
Art. 19.3
A5.25
A5.26
7.4
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
7.4 Communication
A5. Organizational controls
7. Support
Art. 19.4
A5.5
A5.24
A5.25
A5.26
A5.27
A5.28
7.4
A5.5 Contact with authorities
A5.24 Information security incident management planning and preparation
A5.25 Assessment and decision on information security events
A5.26 Response to information security incidents
A5.27 Learning from information security incidents
A5.28 Collection of evidence
7.4 Communication
A5. Organizational controls
7. Support
Art. 19.5
A5.24
A5.24 Information security incident management planning and preparation
A5. Organizational controls
Article 22 Supervisory feedback
1
Art. 22.1
A5.5
7.4
A5.5 Contact with authorities
7.4 Communication
A5. Organizational controls
7. Support
Article 23 Operational or security payment-related incidents concerning credit institutions, payment institutions, account information service providers, and electronic money institutions
1
Art. 23
A5.24
A5.24 Information security incident management planning and preparation
A5. Organizational controls
CHAPTER IV Digital operational resilience testing
20
Article 24 General requirements for the performance of digital operational resilience testing
6
Art. 24.1
A5.30
A5.35
A8.29
A8.31
A8.33
9.2
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
A8.29 Security testing in development and acceptance
A8.31 Separation of development, test and production environments
A8.33 Test information
9.2 Internal audit
A5. Organizational controls
A8. Technological controls
9. Performance evaluation
Art. 24.2
A5.30
A5.35
A8.29
A8.31
A8.33
9.2
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
A8.29 Security testing in development and acceptance
A8.31 Separation of development, test and production environments
A8.33 Test information
9.2 Internal audit
A5. Organizational controls
A8. Technological controls
9. Performance evaluation
Art. 24.3
4.1
A5.30
A5.35
9.2
4.1 Understanding the organization and its context
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
9.2 Internal audit
4. Context of the organization
A5. Organizational controls
9. Performance evaluation
Art. 24.4
A5.30
A5.35
9.2
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
9.2 Internal audit
A5. Organizational controls
9. Performance evaluation
Art. 24.5
10.1
10.2
10.1 Continual improvement
10.2 Nonconformity and corrective action
10. Improvement
Art. 24.6
A5.30
A5.35
9.2
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
9.2 Internal audit
A5. Organizational controls
9. Performance evaluation
Article 25 Testing of ICT tools and systems
3
Art. 25.1
A5.30
A5.35
A8.8
9.2
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
A8.8 Management of technical vulnerabilities
9.2 Internal audit
A5. Organizational controls
A8. Technological controls
9. Performance evaluation
Art. 25.2
A8.4
A8.8
A8.9
A8.19
A8.25
A8.26
A8.27
A8.28
A8.29
A8.30
A8.4 Access to source code
A8.8 Management of technical vulnerabilities
A8.9 Configuration management
A8.19 Installation of software on operational systems
A8.25 Secure development life cycle
A8.26 Application security requirements
A8.27 Secure system architecture and engineering principles
A8.28 Secure coding
A8.29 Security testing in development and acceptance
A8.30 Outsourced development
A8. Technological controls
Art. 25.3
A5.30
A5.35
6.1.2
9.2
A5.30 ICT readiness for business continuity
A5.35 Independent review of information security
6.1.2 Information security risk assessment
9.2 Internal audit
A5. Organizational controls
6. Planning
9. Performance evaluation
Article 26 Advanced testing of ICT tools, systems and processes based on TLPT
8
Art. 26.1
A5.35
7.4
A5.35 Independent review of information security
7.4 Communication
A5. Organizational controls
7. Support
Art. 26.2
A5.5
A5.9
A5.20
A5.35
7.4
A5.5 Contact with authorities
A5.9 Inventory of information and other associated assets
A5.20 Addressing information security within supplier agreements
A5.35 Independent review of information security
7.4 Communication
A5. Organizational controls
7. Support
Art. 26.3
A5.19
A5.20
A5.21
A5.22
A5.23
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
A5.22 Monitoring, review and change management of supplier services
A5.23 Information security for use of cloud services
A5. Organizational controls
Art. 26.4
A5.19
A5.20
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Art. 26.5
A5.21
A5.22
A5.23
6.1.3
8.3
A5.21 Managing information security in the information and communication technology (ICT) supply chain
A5.22 Monitoring, review and change management of supplier services
A5.23 Information security for use of cloud services
6.1.3 Information security risk treatment
8.3 Information security risk treatment
A5. Organizational controls
6. Planning
8. Operation
Art. 26.6
A5.5
7.4
10.1
10.2
A5.5 Contact with authorities
7.4 Communication
10.1 Continual improvement
10.2 Nonconformity and corrective action
A5. Organizational controls
7. Support
10. Improvement
Art. 26.7
A5.5
A5.35
7.4
10.1
10.2
A5.5 Contact with authorities
A5.35 Independent review of information security
7.4 Communication
10.1 Continual improvement
10.2 Nonconformity and corrective action
A5. Organizational controls
7. Support
10. Improvement
Art. 26.8
A5.35
A5.35 Independent review of information security
A5. Organizational controls
Article 27 Requirements for testers for the carrying out of TLPT
3
Art. 27.1
A5.35
A5.35 Independent review of information security
A5. Organizational controls
Art. 27.2
A5.35
A5.35 Independent review of information security
A5. Organizational controls
Art. 27.3
A5.20
A5.35
A5.20 Addressing information security within supplier agreements
A5.35 Independent review of information security
A5. Organizational controls
CHAPTER V Managing of ICT third-party risk
14
Article 28 General principles
8
Art. 28.1
A5.19
A5.20
A5.21
6.1
8.1
8.2
8.3
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
6.1 Actions to address risks and opportunities
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
A5. Organizational controls
6. Planning
8. Operation
Art. 28.2
A5.19
A5.20
A5.21
6.1.2
8.1
8.2
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
6.1.2 Information security risk assessment
8.1 Operational planning and control
8.2 Information security risk assessment
A5. Organizational controls
6. Planning
8. Operation
Art. 28.3
A5.5
A5.9
A5.20
7.4
A5.5 Contact with authorities
A5.9 Inventory of information and other associated assets
A5.20 Addressing information security within supplier agreements
7.4 Communication
A5. Organizational controls
7. Support
Art. 28.4
A5.20
6.1.2
8.2
A5.20 Addressing information security within supplier agreements
6.1.2 Information security risk assessment
8.2 Information security risk assessment
A5. Organizational controls
6. Planning
8. Operation
Art. 28.5
A5.19
A5.20
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Art. 28.6
A5.19
A5.20
A5.21
A5.22
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
A5.22 Monitoring, review and change management of supplier services
A5. Organizational controls
Art. 28.7
A5.20
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Art. 28.8
A5.19
A5.20
A5.22
A5.23
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.22 Monitoring, review and change management of supplier services
A5.23 Information security for use of cloud services
A5. Organizational controls
Article 29 Preliminary assessment of ICT concentration risk at entity level
2
Art. 29.1
A5.19
A5.20
A5.21
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
A5. Organizational controls
Art. 29.2
A5.19
A5.20
A5.21
A5.34
A5.19 Information security in supplier relationships
A5.20 Addressing information security within supplier agreements
A5.21 Managing information security in the information and communication technology (ICT) supply chain
A5.34 Privacy and protection of personal identifiable information (PII)
A5. Organizational controls
Article 30 Key contractual provisions
4
Art. 30.1
A5.20
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Art. 30.2
A5.20
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Art. 30.3
A5.20
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Art. 30.4
A5.20
A5.20 Addressing information security within supplier agreements
A5. Organizational controls
Want to print your doc? This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (