ISO 27001 2022 Changes in Annex A Controls
ISO 27001 2022 Changes in Annex A Controls
ISO 27001 2022 Changes in Annex A Controls
A.5.1.1
A.6.1.5
A.5.1.2
A.8.1.1.
A.14.1.1
A.13.2.1
A.8.1.3
A.8.1.2
A.9.2.4
A.8.2.3
A.9.1.1
A.13.2.2
A.9.2.4
A.13.3.3
A.9.2.5
A.15.1.1
A.9.1.2
A.9.2.5
A.17.1.1
A.9.2.6
A.15.1.2
A.9.2.6
A.18.1.1
A.17.1.2
A.18.2.2
A.17.1.3
A.16.1.2
A.18.1.5
A.11.1.2
A.18.2.3
A.8.3.1
A.16.1.3
A.8.3.2
A.11.1.6
A.6.2.1
A.11.2.5
A.8.3.3
A.12.4.1
A.12.6.1
A.11.2.8
A.12.5.1
A.18.2.3
A.12.4.2
A.10.1.1
A.12.6.2
A.14.1.2
A.12.4.3
A.10.1.2
A.14.2.8
A.12.1.2
A.12.1.4
A.14.1.3
A.14.2.9
A.14.2.2
A.14.2.6
A.14.2.3
A.14.2.4
Policies for information
Information security
security
in Control & Objective
project management ISO/IEC 27002:2022
5.01
Review of the
Information policies
security
Information
for information
Inventory of transfer
assets 5.8
requirements
policies anduse analysis
procedures
Acceptable
security
and specification of 5.9
assets
Ownership of assets
Agreements on
Management ofinformation
secret 5.10
Access
transfercontrol
authentication
Handling of assets policy
information of users 5.14
User access provisioning 5.15
Electronic
Review messaging
of access rights
Access to networks and network services 5.17
Information
Review
Planning security
ofinformation
access insecurity
rights supplier
relationships 5.18
continuity
Removal or adjustment of access 5.22
Identification
rights
Addressing of applicable
security within supplieragreements
Removal
legislativeorand
Implementing adjustment
information
contractual of access
securityrights
continuity 5.29
Compliance
requirements with security
Reporting information security policies and standards 5.31
Verify,
events review, and evaluate
information 5.36
Regulation
Physical ofsecurity
entry
continuity
cryptographic
controlsreviewcontrols
Technical compliance 6.8
Management of removable media
Reporting information security 7.2
weaknesses
Disposal
Delivery of media
and loading areas 7.10
Mobile devices (Moved to Asset
Removal
management)of assets DELETED
Physical
Managementmediaoftransfer
technical 8.1
Event logging
vulnerabilities
8.8
Installation
Unattendedofuser software on
equipment
Protection
Technical
operational ofsystems
log information
compliance review 8.15
Policy on the use of cryptographic 8.19
Change management
Administrator
controls
Restrictions
Securing onand operator
software
applications logs
services on 8.24
installation
public
System networks
securitycontrol
change testing
Key management 8.26
Separation
proceduresof development, testing
Protecting
and application
operational transactions
environments 8.29
System acceptance testing
Technical review of 8.31
Secure development
applications after environment 8.32
operating platform
changes
Restrictions on
changes to software
packages
Control & Objective
Policies for information
security
Information security in project
management
Inventory of information and other
associated
Acceptableassets
use of assets and other
associated information assets
Information transfer
Access Control
Authentication of information
Access rights
Monitoring, review, and change
managementsecurity
Information of supplier services
during
Identification of applicable
disruption
legislative and contractual
Compliance with security policies
requirements
and standards
Information security event reporting
Physical entry controls
Storage media
DELETED
User endpoint devices
Management of technical
vulnerabilities
Logging
Installation of software on
operational systems
Use of cryptography
Application security requirements
Security testing in development and
acceptance
Separation of development, test, and
production environments
Change management