100% found this document useful (2 votes)
1K views

ISO 27001 Mapping

This document maps controls from ISO 27001:2013 to controls in the updated ISO 27001:2022. It lists all controls that were renamed, consolidated, or had new controls added. The purpose is to show organizations how the updated standard maps back to the previous version to assist with transitioning from one version to the next.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views

ISO 27001 Mapping

This document maps controls from ISO 27001:2013 to controls in the updated ISO 27001:2022. It lists all controls that were renamed, consolidated, or had new controls added. The purpose is to show organizations how the updated standard maps back to the previous version to assist with transitioning from one version to the next.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.5.1.1 Policies for information security A.5.1 Policies for information security

A.5.1.2 Review of the policies for information security A.5.1 Policies for information security

A.6.1.1 Information security roles and A.5.2 Information security roles and
responsibilities responsibilities

A.6.1.2 Segregation of duties A.5.3 Segregation of duties

A.6.1.3 Contact with authorities A.5.5 Contact with authorities

A.6.1.4 Contact with special interest groups A.5.6 Contact with special interest groups

A.5.8 Information security in project


A.6.1.5 Information security in project management
management

A.6.2.1 Mobile device policy A.8.1 User endpoint devices

1
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.6.2.2 Teleworking A.6.7 Remote Working

A.7.1.1 Screening A.6.1 Screening

A.7.1.2 Terms and conditions of employment A.6.2 Terms and conditions of employment

A.7.2.1 Management responsibilities A.5.4 Management responsibilities

A.7.2.2 Information security awareness, education, A.6.3 Information security awareness,


and training education, and training

A.7.2.3 Disciplinary process A.6.4 Disciplinary process

A.7.3.1 Termination or change of employment A.6.5 Responsibilities after termination or


responsibilities change of employment

A.5.9 Inventory of information and other


A.8.1.1 Inventory of assets
associated assets

2
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.5.9 Inventory of information and other


A.8.1.2 Ownership of assets
associated assets

A.5.10 Acceptable use of assets and other


A.8.1.3 Acceptable use of assets
associated information assets

A.8.1.4 Return of assets A.5.11 Return of assets

A.8.2.1 Classification of information A.5.12 Classification of information

A.8.2.2 Labelling of Information A.5.13 Labelling of Information

A.5.10 Acceptable use of assets and other


A.8.2.3 Handling of Assets
associated information assets

A.8.3.1 Management of removable media A.7.10 Storage media

A.8.3.2 Disposal of media A.7.10 Storage media

3
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.8.3.3 Physical media transfer A.7.10 Storage media

A.9.1.1 Access control policy A.5.15 Access control

A.9.1.2 Access to networks and network services A.5.15 Access control

A.9.2.1 User registration and de-registration A.5.16 Identity management

A.9.2.2 User access provisioning A.5.18 Access rights

A.9.2.3 Management of privileged access rights A.8.2 Privileged access rights

A.9.2.4 Management of secret authentication


A.5.17 Authentication of information
information of users

A.9.2.5 Review of user access rights A.5.18 Access rights

4
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.9.2.6 Removal or adjustment of access rights A.5.18 Access rights

A.9.3.1 Use of secret authentication information A.5.17 Authentication of information

A.9.4.1 Information access restriction A.8.3 Information access restriction

A.9.4.2 Secure logon procedures A.8.5 Secure authentication

A.9.4.3 Password management system A.5.17 Authentication of information

A.9.4.4 Use of privileged utility programs A.8.18 Use of privileged utility programs

A.9.4.5 Access control to program source code A.8.4 Access to source code

A.10.1.1 Policy on the use of cryptographic controls A.8.24 Use of cryptography

5
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.10.1.2 Key Management A.8.24 Use of cryptography

A.11.1.1 Physical security perimeter A.7.1 Physical security perimeter

A.11.1.2 Physical entry controls A.7.2 Physical entry controls

A.11.1.3 Securing offices, rooms and facilities A.7.3 Securing offices, rooms and facilities

A.11.1.4 Protecting against external and A.7.5 Protecting against physical and
environmental threats environmental threats

A.11.1.5 Working in secure areas A.7.6 Working in secure areas

A.11.1.6 Delivery and loading areas A.7.2 Physical entry controls

A.11.2.1 Equipment siting and protection A.7.8 Equipment siting and protection

6
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.11.2.2 Supporting utilities A.7.11 Supporting utilities

A.11.2.3 Cabling security A.7.12 Cabling security

A.11.2.4 Equipment maintenance A.7.13 Equipment maintenance

A.11.2.5 Removal of assets A.7.10 Storage Media

A.11.2.6 Security of equipment and assets off-


A.7.9 Security of assets off-premises
premises

A.11.2.7 Secure disposal or reuse of equipment A.7.14 Secure disposal or reuse of equipment

A.11.2.8 Unattended user equipment A.8.1 User endpoint devices

A.11.2.9 Clear desk and clear screen policy A.7.7 Clear desk and clear screen policy

7
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.12.1.1 Documented operating procedures A.5.37 Documented operating procedures

A.12.1.2 Change management A.8.32 Change management

A.12.1.3 Capacity management A.8.6 Capacity management

A.12.1.4 Separation of development, testing, and A.8.31 Separation of development, test, and
operational environments production environments

A.12.2.1 Controls against malware A.8.7 Protection against malware

A.12.3.1 Information backup A.8.13 Information backup

A.12.4.1 Event logging A.8.15 Logging

A.12.4.2 Protection of log information A.8.15 Logging

8
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.12.4.3 Administrator and operator logs A.8.15 Logging

A.12.4.4 Clock synchronization A.8.17 Clock synchronization

A.12.5.1 Installation of software on operational A.8.19 Installation of software on operational


systems systems

A.12.6.1 Management of technical vulnerabilities A.8.8 Management of technical vulnerabilities

A.8.19 Installation of software on operational


A.12.6.2 Restrictions on software installation
systems

A.8.34 Protection of information systems


A.12.7.1 Information systems audit controls
during audit testing

A.13.1.1 Network controls A.8.20 Network controls

A.13.1.2 Security of network services A.8.21 Security of network services

9
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.13.1.3 Segregation in networks A.8.22 Segregation in networks

A.13.2.1 Information transfer policies and


A.5.14 Information transfer
procedures

A.13.2.2 Agreements on information transfer A.5.14 Information transfer

A.13.2.3 Electronic messaging A.5.14 Information transfer

A.6.6 Confidentiality or nondisclosure


A.13.2.4 Confidentiality or nondisclosure agreements
agreements

A.14.1.1 Information security requirements analysis A.5.8 Information security in project


and specification management

A.14.1.2 Securing application services on public


A.8.26 Application security requirements
networks

A.14.1.3 Protecting application services transactions A.8.26 Application security requirements

10
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.14.2.1 Secure development policy A.8.25 Secure development lifecycle

A.14.2.2 System change control procedures A.8.32 Change management

A.14.2.3 Technical review of applications after


A.8.32 Change management
operating platform changes

A.14.2.4 Restrictions on changes to software


A.8.32 Change management
packages

A.8.27 Secure system architecture and


A.14.2.5 Secure system engineering principles
engineering principles

A.8.31 Separation of development, test, and


A.14.2.6 Secure development environment
production environments

A.14.2.7 Outsourced development A.8.30 Outsourced development

A.8.29 Security testing in development and


A.14.2.8 System security testing
acceptance

11
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.8.29 Security testing in development and


A.14.2.9 System acceptance testing
acceptance

A.14.3.1 Protection of test data A.8.33 Test information

A.15.1.1 Information security policy for supplier A.5.19 Information security policy for supplier
relationships relationships

A.5.20 Address security within supplier


A.15.1.2 Address security within supplier agreements
agreements

A.15.1.3 Information and communication technology A.5.21 Managing information security in the
supply chain ICT supply chain

A.5.22 Monitoring, review, and change


A.15.2.1 Monitoring and review of supplier services
management of supplier services

A.5.22 Monitoring, review, and change


A.15.2.2 Managing changes to supplier services
management of supplier services

A.5.24 Information security incident


A.16.1.1 Responsibilities and procedures
management planning and preparation

12
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.16.1.2 Reporting information security events A.6.8 Information security event reporting

A.16.1.3 Reporting information security weaknesses A.6.8 Information security event reporting

A.16.1.4 Assessment of and decision on information A.5.25 Assessment and decision on


security events information security events

A.5.26 Response to information security


A.16.1.5 Response to information security incidents
incidents

A.16.1.6 Learning from information security A.5.27 Learning from information security
incidents incidents

A.16.1.7 Collection of evidence A.5.28 Collection of evidence

A.17.1.1 Planning information security continuity A.5.29 Information security during disruption

A.17.1.2 Implementing information security


A.5.29 Information security during disruption
continuity

13
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.17.1.3 Verify, review, and evaluate information


A.5.29 Information security during disruption
security continuity

A.17.2.1 Availability of information processing A.8.14 Redundancy of information processing


facilities facilities

A.18.1.1 Identification of applicable legislation and A.5.31 Identification of applicable legislation


contractual requirements and contractual requirements

A.18.1.2 Intellectual property rights A.5.32 Intellectual property rights

A.18.1.3 Protection of records A.5.33 Protection of records

A.18.1.4 Privacy and protection of personal


A.5.34 Privacy and protection of PII
information

A.5.31 Identification of applicable legislation


A.18.1.5 Regulation of cryptographic controls
and contractual requirements

A.5.35 Independent review of information


A.18.2.1 Independent review of information security
security

14
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

A.18.2.2 Compliance with security policies and A.5.36 Compliance with security policies and
standards standards

A.5.36 Compliance with security policies and


A.18.2.3 Technical compliance review
standards

A.18.2.3 Technical compliance review A.8.8 Management of technical vulnerabilities

NEW A.5.7 Threat intelligence

NEW A.7.4 Physical security monitoring

NEW A.8.16 Monitoring activities

NEW A.8.9 Configuration management

NEW A.8.10 Information deletion

15
ISO 27001 Mapping

ISO 27001:2013 Control ISO 27001:2022 Control

NEW A.8.11 Data masking

NEW A.8.12 Data leakage prevention

NEW A.8.23 Web filtering

NEW A.8.28 Secure coding

A.5.23 Information security for use of cloud


NEW
services

NEW A.5.30 ICT readiness for business continuity

16
Subscribe to my
newsletter, to receive
another free mapping
table next Monday.

Aron Lange

17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy