A5.1 Policies for information security
Governance_and_Ecosystem
Resilience
A5.2 Information security roles and responsibilities
Protection
Resilience
Governance_and_Ecosystem
A5.3 Segregation of duties
Governance
Identity_and_access_management
A5.4 Management responsibilities
A5.5 Contact with authorities
Respond
Identify
Protect
Recover
A5.6 Contact with special interest groups
A5.7 Threat intelligence
Threat_and_vulnerability_management
Preventive
Detective
Corrective
A5.8 Information security in project management
Governance_and_Ecosystem
Protection
A5.9 Inventory of information and other associated assets
Governance_and_Ecosystem
Protection
A5.10 Acceptable use of information and other associated assets
Asset_management
Information_protection
Governance_and_Ecosystem
Protection
A5.12 Classification of information
A5.13 Labelling of information
A5.14 Information transfer
Asset_management
Information_protection
A5.15 Access control
Identity_and_access_management
A5.16 Identity management
Identity_and_access_management
A5.17 Authentication information
Identity_and_access_management
A5.18 Access rights
Identity_and_access_management
A5.19 Information security in supplier relationships
Supplier_relationships_security
Governance_and_Ecosystem
Protection
A5.20 Addressing information security within supplier agreements
Supplier_relationships_security
Governance_and_Ecosystem
Protection
A5.21 Managing information security in the information and communication technology (ICT) supply chain
Supplier_relationships_security
Governance_and_Ecosystem
Protection
A5.22 Monitoring, review and change management of supplier services
Supplier_relationships_security
Governance_and_Ecosystem
Protection
Defence
Information_security_assurance
A5.23 Information security for use of cloud services
Supplier_relationships_security
Governance_and_Ecosystem
Protection
A5.24 Information security incident management planning and preparation
Governance
Information_security_event_management
A5.25 Assessment and decision on information security events
Information_security_event_management
A5.26 Response to information security incidents
Information_security_event_management
A5.27 Learning from information security incidents
Information_security_event_management
A5.28 Collection of evidence
Information_security_event_management
A5.29 Information security during disruption
A5.30 ICT readiness for business continuity
A5.31 Legal, statutory, regulatory and contractual requirements
Governance_and_Ecosystem
Protection
A5.32 Intellectual property rights
A5.33 Protection of records
Legal_and_compliance
Asset_management
Information_protection
A5.34 Privacy and protection of personal identifiable information (PII)
Information_protection
Legal_and_compliance
A5.35 Independent review of information security
Information_security_assurance
A5.36 Compliance with policies, rules and standards for information security
Legal_and_compliance
Information_security_assurance
A5.37 Documented operating procedures
Asset_management
Physical_security
System_and_network_security
Application_security
Secure_configuration
Identity_and_access_management
Continuity
Information_security_event_management
Threat_and_vulnerability_management
Governance_and_Ecosystem
Protection
Defence