A5.1 Policies for information security
15. Service Provider Management 15.2 Establish and Maintain a Service Provider Management Policy A5.2 Information security roles and responsibilities
17. Incident Response Management 17.5 Assign Key Roles and Responsibilities A5.3 Segregation of duties
6. Access Control Management 6.8 Define and Maintain Role-Based Access Control A5.5 Contact with authorities
17. Incident Response Management 17.2 Establish and Maintain Contact Information for Reporting Security Incidents A5.6 Contact with special interest groups
17. Incident Response Management 17.2 Establish and Maintain Contact Information for Reporting Security Incidents A5.8 Information security in project management
16. Application Software Security 16.1 Establish and Maintain a Secure Application Development Process A5.9 Inventory of information and other associated assets
1. Inventory and Control of Enterprise Assets 2. Inventory and Control of Software Assets 1.1 Establish and Maintain Detailed Enterprise Asset Inventory 2.1 Establish and Maintain a Software Inventory 3.1 Establish and Maintain a Data Management Process 3.2 Establish and Maintain a Data Inventory 3.7 Establish and Maintain a Data Classification Scheme A5.10 Acceptable use of information and other associated assets
14. Security Awareness and Skills Training 15. Service Provider Management 3.1 Establish and Maintain a Data Management Process 3.3 Configure Data Access Control Lists 3.5 Securely Dispose of Data 14.4 Train Workforce on Data Handling Best Practices 15.2 Establish and Maintain a Service Provider Management Policy A5.12 Classification of information
3.7 Establish and Maintain a Data Classification Scheme A5.13 Labelling of information
3.7 Establish and Maintain a Data Classification Scheme A5.14 Information transfer
15. Service Provider Management 3.9 Encrypt Data on Removable Media 3.1 Encrypt Sensitive Data in Transit 3.13 Deploy a Data Loss Prevention Solution 15.4 Ensure Service Provider Contracts Include Security Requirements A5.15 Access control
6. Access Control Management 3.3 Configure Data Access Control Lists 5.4 Restrict Administrator Privileges to Dedicated Administrator Accounts 5.5 Establish and Maintain an Inventory of Service Accounts 5.6 Centralize Account Management 6.1 Establish an Access Granting Process 6.3 Require MFA for Externally-Exposed Applications 6.8 Define and Maintain Role-Based Access Control A5.16 Identity management
6. Access Control Management 5.1 Establish and Maintain an Inventory of Accounts 6.1 Establish an Access Granting Process 6.2 Establish an Access Revoking Process A5.17 Authentication information
A5.18 Access rights
6. Access Control Management 6.1 Establish an Access Granting Process 6.2 Establish an Access Revoking Process 6.7 Centralize Access Control A5.19 Information security in supplier relationships
15. Service Provider Management 15.1 Establish and Maintain an Inventory of Service Providers 15.2 Establish and Maintain a Service Provider Management Policy 15.3 Classify Service Providers 15.5 Assess Service Providers 15.6 Monitor Service Providers 15.7 Securely Decommission Service Providers A5.20 Addressing information security within supplier agreements
15. Service Provider Management 17. Incident Response Management 15.2 Establish and Maintain a Service Provider Management Policy 15.4 Ensure Service Provider Contracts Include Security Requirements 15.6 Monitor Service Providers 15.7 Securely Decommission Service Providers 17.2 Establish and Maintain Contact Information for Reporting Security Incidents A5.21 Managing information security in the information and communication technology (ICT) supply chain
15. Service Provider Management 15.4 Ensure Service Provider Contracts Include Security Requirements 15.6 Monitor Service Providers A5.22 Monitoring, review and change management of supplier services
15. Service Provider Management 15.5 Assess Service Providers 15.6 Monitor Service Providers A5.23 Information security for use of cloud services
15. Service Provider Management 15.2 Establish and Maintain a Service Provider Management Policy 15.4 Ensure Service Provider Contracts Include Security Requirements 15.5 Assess Service Providers A5.24 Information security incident management planning and preparation
17.1
17.2
17.4
17.5
17.6
17.8
17.9
17. Incident Response Management 17.1 Designate Personnel to Manage Incident Handling 17.2 Establish and Maintain Contact Information for Reporting Security Incidents 17.4 Establish and Maintain an Incident Response Process 17.5 Assign Key Roles and Responsibilities 17.6 Define Mechanisms for Communicating During Incident Response 17.8 Conduct Post-Incident Reviews 17.9 Establish and Maintain Security Incident Thresholds A5.25 Assessment and decision on information security events
17. Incident Response Management 8.11 Conduct Audit Log Reviews 17.9 Establish and Maintain Security Incident Thresholds A5.26 Response to information security incidents
17. Incident Response Management 17.4 Establish and Maintain an Incident Response Process A5.27 Learning from information security incidents
17. Incident Response Management 17.8 Conduct Post-Incident Reviews A5.28 Collection of evidence
8.5 Collect Detailed Audit Logs A5.30 ICT readiness for business continuity
17. Incident Response Management 17.7 Conduct Routine Incident Response Exercises A5.33 Protection of records
3.4 Enforce Data Retention 3.7 Establish and Maintain a Data Classification Scheme 3.11 Encrypt Sensitive Data at Rest