ISO 27001 Organizational Controls
Policies, procedures, and organizational measures for information security governance. Covers 37 controls from security policies to compliance requirements.
Showing 37 controls in Organizational Controls
Policies for information security
To provide management direction and support for information security in accordance with business requirements and relevant laws and regulations.
Information security roles and responsibilities
To establish accountability for information security activities and ensure clear ownership of security responsibilities.
Segregation of duties
To reduce opportunities for unauthorized or unintentional modification or misuse of the organization's assets.
Management responsibilities
To ensure information security policies and procedures are implemented through clear management direction and support.
Contact with authorities
To maintain appropriate communication channels with relevant authorities for security incident reporting and regulatory compliance.
Contact with special interest groups
To stay informed about security threats, vulnerabilities, and best practices through engagement with the security community.
Threat intelligence
To enable proactive identification and response to relevant information security threats.
Information security in project management
To ensure information security requirements are identified and addressed throughout the project lifecycle.
Inventory of information and other associated assets
To identify organizational assets and define appropriate protection responsibilities to ensure they receive an appropriate level of protection.
Acceptable use of information and other associated assets
To ensure that information and assets are used in accordance with organizational policies and legal requirements.
Return of assets
To ensure organizational assets are returned and access rights are revoked when personnel or external parties leave the organization.
Classification of information
To ensure that information receives an appropriate level of protection in accordance with its importance to the organization.
Labelling of information
To ensure that information is clearly marked with its classification to enable appropriate handling and protection.
Information transfer
To maintain the security of information transferred within an organization and with external parties.
Access control
To limit access to information and information processing facilities to authorized users only.
Identity management
To ensure that only authorized users have access to systems and services, and to prevent unauthorized access.
Authentication information
To ensure the secure management of authentication credentials throughout their lifecycle.
Access rights
To ensure authorized user access and prevent unauthorized access to systems and services.
Information security in supplier relationships
To ensure protection of the organization's information that is accessible by suppliers.
Addressing information security within supplier agreements
To ensure suppliers understand and meet the organization's information security expectations.
Managing information security in the ICT supply chain
To address information security risks within the ICT supply chain.
Monitoring, review and change management of supplier services
To ensure suppliers continue to meet security requirements throughout the relationship.
Information security for use of cloud services
To ensure cloud services meet the organization's information security requirements.
Information security incident management planning and preparation
To ensure a quick, effective, and orderly response to information security incidents.
Assessment and decision on information security events
To ensure consistent evaluation and appropriate response to security events.
Response to information security incidents
To minimize the impact of information security incidents through effective response.
Learning from information security incidents
To continuously improve information security through lessons learned from incidents.
Collection of evidence
To ensure evidence is properly handled for potential legal or disciplinary proceedings.
Information security during disruption
To ensure availability of information security controls during adverse conditions.
ICT readiness for business continuity
To ensure availability of ICT systems during and after disruptions.
Legal, statutory, regulatory and contractual requirements
To ensure compliance with legal, statutory, regulatory and contractual requirements related to information security.
Intellectual property rights
To ensure compliance with intellectual property laws and protect organizational intellectual property.
Protection of records
To protect important organizational records in accordance with legal, regulatory and business requirements.
Privacy and protection of personal information
To ensure privacy and protection of personal information as required by law and organizational policy.
Independent review of information security
To provide assurance that information security practices are effective and aligned with organizational needs.
Compliance with policies, rules and standards for information security
To ensure conformity with organizational information security policies and standards.
Documented operating procedures
To ensure correct and secure operation of information processing facilities.
