Sie sind auf Seite 1von 4

5 Information security policies

A.5
5.1.1

Information security policies.


Policies for information security

5.1.2

Review of the policies for information


security

6 Organizing information security


A.6.2
A.6.2.1

Mobile devices and teleworking


Mobile device policy

A.6.2.2

Teleworking

7 Human resource security


A.7.2
7.2.2

During employment
Information security awareness,
education and training

A.7.3
7.3.1

Termination or change of employment


Termination or change of employment
responsibilities

8 Asset management
A.8.2
8.2.3

Information classification
Handling of assets

A.8.3
8.3.1

Media Handling
Management of removable media

8.3.2

Disposal of media

9 Access control
A.9.1

Business requirements of access control

9.1.1

Access control policy

9.1.2

Access to networks and network services

A.9.2
9.2.1

User access management


User registration and de-registration

9.2.2

User access provisioning

9.2.3

Management of privileged access rights

9.2.4

Management of secret authentication


information of users

9.2.5

Review of user access rights

9.2.6

Removal or adjustment of access rights

A.9.3
9.3.1

User responsibilities
Use of secret authentication information

A.9.4
9.4.2

System and application access control


Secure log-on procedures

9.4.3

Password management system

9.4.4

Use of privileged utility programs

10 Cryptography
A.10.1
10.1.1

Cryptographic controls
Policy on the use of cryptographic
controls

10.1.2

Key management

11 Physical and environmental security


A 11.2
11.2.1

Equipment Security
Equipment siting and protection

11.2.7

Secure disposal or re-use of equipment

11.2.8

Unattended user equipment

12 Operations security
A.12.1
12.1.4

Operational procedures and responsibilities


Separation of development, testing and
operational environments

A.12.2
12.2.1

Protection from malware


Controls against malware

A.12.3
12.3.1

Protect against loss of data


Information backup

A.12.4
12.4.1

Logging and monitoring


Event logging

12.4.2

Protection of log information

12.4.3

Administrator and operator logs

12.4.4

Clock synchronisation

13 Communications security
A.13.1
13.1.1

Network Security Management


Network controls

13.1.2

Security of network services

13.1.3

Segregation in networks

14 System acquisition, development and


maintenance
A.14.1
14.1.2

Security requirements of information systems.


Securing application services on public
networks

14.1.3

Protecting application services


transactions

15 Supplier relationships
A.15.1
15.1.1

Information security in supplier relationships.


Information security policy for supplier
relationships

15.1.2

Addressing security within supplier


agreements

15.1.3

Information and communication


technology supply chain

A.15.2
15.2.1

Supplier service delivery management.


Monitoring and review of supplier
services

15.2.2

Managing changes to supplier services

18 Compliance
A.18.2
18.2.1

Information Security Review


Independent review of information
security

Das könnte Ihnen auch gefallen