Back to Frameworks
ISO
ISO 27001
v2022ACTIVEISO/IEC 27001
International standard for information security management systems (ISMS). The gold standard for security certification recognized worldwide.
25
Total Controls
3
Domains
24
Cross-Framework Mappings
International
Region
Organizational Controls
15A.5.1HIGH1 mappingPolicies for information security
A.5.1HIGH1 mappingPolicies for information security
Mapped to Other Frameworks
A.5.10MEDIUM1 mappingAcceptable use of information and assets
A.5.10MEDIUM1 mappingAcceptable use of information and assets
Mapped to Other Frameworks
A.5.15HIGH1 mappingAccess control
A.5.15HIGH1 mappingAccess control
Mapped to Other Frameworks
A.5.16HIGH1 mappingIdentity management
A.5.16HIGH1 mappingIdentity management
Mapped to Other Frameworks
A.5.17HIGH1 mappingAuthentication information
A.5.17HIGH1 mappingAuthentication information
Mapped to Other Frameworks
A.5.2HIGH1 mappingInformation security roles and responsibilities
A.5.2HIGH1 mappingInformation security roles and responsibilities
Mapped to Other Frameworks
A.5.24HIGH1 mappingInformation security incident management planning
A.5.24HIGH1 mappingInformation security incident management planning
Mapped to Other Frameworks
A.5.25HIGH1 mappingAssessment and decision on information security events
A.5.25HIGH1 mappingAssessment and decision on information security events
Mapped to Other Frameworks
A.5.26HIGH1 mappingResponse to information security incidents
A.5.26HIGH1 mappingResponse to information security incidents
Mapped to Other Frameworks
A.5.27MEDIUM1 mappingLearning from information security incidents
A.5.27MEDIUM1 mappingLearning from information security incidents
Mapped to Other Frameworks
A.5.29HIGH1 mappingInformation security during disruption
A.5.29HIGH1 mappingInformation security during disruption
Mapped to Other Frameworks
A.5.3MEDIUM1 mappingSegregation of duties
A.5.3MEDIUM1 mappingSegregation of duties
Mapped to Other Frameworks
A.5.30HIGH1 mappingICT readiness for business continuity
A.5.30HIGH1 mappingICT readiness for business continuity
Mapped to Other Frameworks
A.5.4HIGH1 mappingManagement responsibilities
A.5.4HIGH1 mappingManagement responsibilities
Mapped to Other Frameworks
A.5.8MEDIUM1 mappingInformation security in project management
A.5.8MEDIUM1 mappingInformation security in project management
Mapped to Other Frameworks
Physical Controls
3A.7.1MEDIUM1 mappingPhysical security perimeters
A.7.1MEDIUM1 mappingPhysical security perimeters
Mapped to Other Frameworks
A.7.2MEDIUM1 mappingPhysical entry
A.7.2MEDIUM1 mappingPhysical entry
Mapped to Other Frameworks
A.7.4MEDIUM1 mappingPhysical security monitoring
A.7.4MEDIUM1 mappingPhysical security monitoring
Mapped to Other Frameworks
Technological Controls
7A.8.1HIGHUser endpoint devices
A.8.1HIGHUser endpoint devices
A.8.15HIGH1 mappingLogging
A.8.15HIGH1 mappingLogging
Mapped to Other Frameworks
A.8.16HIGH1 mappingMonitoring activities
A.8.16HIGH1 mappingMonitoring activities
Mapped to Other Frameworks
A.8.5HIGH1 mappingSecure authentication
A.8.5HIGH1 mappingSecure authentication
Mapped to Other Frameworks
A.8.7HIGH1 mappingProtection against malware
A.8.7HIGH1 mappingProtection against malware
Mapped to Other Frameworks
A.8.8HIGH1 mappingManagement of technical vulnerabilities
A.8.8HIGH1 mappingManagement of technical vulnerabilities
Mapped to Other Frameworks
A.8.9HIGH1 mappingConfiguration management
A.8.9HIGH1 mapping