ISO 27001 Mapping
ISO 27001 Mapping
A.5.1.1 Policies for information security A.5.1 Policies for information security
A.5.1.2 Review of the policies for information security A.5.1 Policies for information security
A.6.1.1 Information security roles and A.5.2 Information security roles and
responsibilities responsibilities
A.6.1.4 Contact with special interest groups A.5.6 Contact with special interest groups
1
ISO 27001 Mapping
A.7.1.2 Terms and conditions of employment A.6.2 Terms and conditions of employment
2
ISO 27001 Mapping
3
ISO 27001 Mapping
4
ISO 27001 Mapping
A.9.4.4 Use of privileged utility programs A.8.18 Use of privileged utility programs
A.9.4.5 Access control to program source code A.8.4 Access to source code
5
ISO 27001 Mapping
A.11.1.3 Securing offices, rooms and facilities A.7.3 Securing offices, rooms and facilities
A.11.1.4 Protecting against external and A.7.5 Protecting against physical and
environmental threats environmental threats
A.11.2.1 Equipment siting and protection A.7.8 Equipment siting and protection
6
ISO 27001 Mapping
A.11.2.7 Secure disposal or reuse of equipment A.7.14 Secure disposal or reuse of equipment
A.11.2.9 Clear desk and clear screen policy A.7.7 Clear desk and clear screen policy
7
ISO 27001 Mapping
A.12.1.4 Separation of development, testing, and A.8.31 Separation of development, test, and
operational environments production environments
8
ISO 27001 Mapping
9
ISO 27001 Mapping
10
ISO 27001 Mapping
11
ISO 27001 Mapping
A.15.1.1 Information security policy for supplier A.5.19 Information security policy for supplier
relationships relationships
A.15.1.3 Information and communication technology A.5.21 Managing information security in the
supply chain ICT supply chain
12
ISO 27001 Mapping
A.16.1.2 Reporting information security events A.6.8 Information security event reporting
A.16.1.3 Reporting information security weaknesses A.6.8 Information security event reporting
A.16.1.6 Learning from information security A.5.27 Learning from information security
incidents incidents
A.17.1.1 Planning information security continuity A.5.29 Information security during disruption
13
ISO 27001 Mapping
14
ISO 27001 Mapping
A.18.2.2 Compliance with security policies and A.5.36 Compliance with security policies and
standards standards
15
ISO 27001 Mapping
16
Subscribe to my
newsletter, to receive
another free mapping
table next Monday.
Aron Lange
17