ISO/IEC27001:2013 Statement of Applicability: Luciano Quartarone Con Link A HTTP://WWW - Lucianoquartarone.it)
ISO/IEC27001:2013 Statement of Applicability: Luciano Quartarone Con Link A HTTP://WWW - Lucianoquartarone.it)
ISO/IEC27001:2013 S
ver.
La presente opera è c
Attribuzione 4.0 Internazio
http://creativecommon
(http://creativecommons.o
Per distribuire il presente docum
Luciano Quartarone con link a htt
qSOA
7001:2013 Statement of Applicability
ver. 1.0.0 - 14.04.2016
1
A.5.1 Management
A.5 INFORMATION
direction for
SECURITY POLICY
information security
2
5 A.6.1 Internal
Organization
6 A.6 ORGANIZATION
OF INFORMATION
SECURITY
8
A.6.2 Mobile devices
and teleworking
9
10
A.7.1 Prior to
employment
11
12
A.7 HUMAN
RESOURCE
SECURITY
A.7.2 During
13
employment
14
16
17
19
A.8 ASSET
MANAGEMENT
20
A.8 ASSET
MANAGEMENT
21 A.8.2 Information
classification
22
23
25
26
A.9.1 Business
requirements of access
control
27
28
29
30
A.9.2 User access
management
31
32
A.9 ACCESS
CONTROL
A.9.2 User access
management
A.9 ACCESS
CONTROL
33
A.9.3 User
34
responsibilities
35
36
38
39
40
A.10.1 Cryptographic
A.10 CRYPTOGRAPHY
controls
41
42
43
44
46
A.11.1 Secure areas
47
48
50
51
52
A.11.2 Equipment
53
54
55
56
57
58
A.12.1 Operational
procedures and
responsibilities
013
A.12.1 Operational
procedures and
59 responsibilities
ISO/IEC 27001:2013
60
62 A.12.3 Backup
63
A.12 OPERATIONAL
64 SECURITY
66
A.12.5 Control of
67
operational software
68
A.12.6 Technical
vulnerability
management
69
A.12.7 Information
70 systems audit
considerations
71
A.13.1 Network
72
security management
73
A. 13
COMMUNICATIONS
74 SECURITY
75
A.13.2 Information
transfer
76
77
78
79 A.14.1 Security
requirements of
information systems
80
81
A. 14 SYSTEM
ACQUISITION,
DEVELOPMENT AND
MAINTENENCE
82
A. 14 SYSTEM
83 ACQUISITION,
DEVELOPMENT AND
MAINTENENCE
84
A.14.2 Security in
development and
85 support processes
86
87
88
89
91
A.15.1 Information
92 security in supplier
relationships
93 A.15 SUPPLIER
RELATIONSHIP
A.15 SUPPLIER
RELATIONSHIP
94
96
97
98
A.16.1 Management of
A.16 INFORMATION
information security
SECURITY INCIDENT
incidents and
MANAGEMENT
99 improvements
100
101
102
103
105
107
108
109
110
A.18 COMPLIANCE
111
112
A.18.2 Information
security reviews
A.18.2 Information
security reviews
113
114
tement of Applicability
To establish a management
framework to initiate and control the
A.6.1.3 - Contact with
implementation and operation of
authorities
information security within the
organization.
A.6.1.4 - Contact with special
interest groups
A.6.2.2 - Teleworking
To ensure that employees and A.7.1.1 - Screening
contractors understand their
responsibilities and are suitable for
the roles for which they are
considered.
A.7.2.1 - Management
responsibilities
A.8.3.1 - Management of
removable media
A.9.2.3 - Management of
To ensure authorized user access and privileged access rights
to prevent unauthorized access to
systems and services. A.9.2.4 - Management of secret
authentication information of
users
A.9.2.5 - Review of user access
rights
to prevent unauthorized access to
systems and services.
A.11.2.4 - Equipment
maintenance
A.12.1.1 - Documented
operating procedures
A.12.1.4 - Separation of
development, testing and
operational environments
A.12.5.1 - Installation of
To ensure the integrity of operational
software on operational
systems.
systems
A.12.6.1 - Management of
technical vulnerabilities
To prevent exploitation of technical
vulnerabilities.
A.12.6.2 - Restrictions on
software installation
A.13.1.3 - Segregation in
networks
A.13.2.2 - Agreements on
To maintain the security of information transfer
information transferred within an
organization and with any external
entity. A.13.2.3 - Electronic messaging
A.13.2.4 - Confidentiality or
nondisclosure agreements
A.14.2.4 - Restrictions on
changes to software packages
A.14.2.7 - Outsourced
development
A.15.1.1 - Information
security policy for supplier
relationships
A.16.1.5 - Response to
information security
incidents
A.18.1.1 - Identification of
applicable legislation and
contractual requirements
A.18.1.5 - Regulation of
cryptographic controls
Legal
Contractual
Control Description Necessary Requirement
Obligations
s
Business
Risk
Requirement
Assessment Implemented
s / Best
Results
Practices
X X Yes
X X No
X Yes
X X Yes
X X Yes
X X Yes
X Yes
X X Yes
No
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X Yes
X Yes
X Yes
X X Yes
X Yes
X X Yes
X X Yes
X X Yes
X Yes
X Yes
X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
No
X X Yes
X X Yes
X Yes
X Yes
X Yes
X Yes
X Yes
X Yes
X Yes
X Yes
X X Yes
X Yes
X Yes
X Yes
X Yes
X X Yes
X X Yes
X X Yes
X Yes
X X Yes
X X Yes
X X Yes
X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X Yes
No
No
X Yes
X Yes
X Yes
X Yes
X Yes
X Yes
No
X Yes
X X Yes
X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X Yes
X X Yes
X Yes
X Yes
X X Yes
X X Yes
X Yes
X Yes
X Yes
X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
X X Yes
Justification for exclusion
Security
Control
Note
Maturity
Level
Optimized
Optimized
Optimized
Managed
Managed
Optimized
Optimized
Not Applicable
Managed
Optimized
Optimized
Managed
Optimized
Optimized
Managed
Managed
Optimized
Optimized
Optimized
Limited
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Managed
Managed
Managed
Managed
Optimized
Optimized
Defined
Optimized
Managed
Optimized
Optimized
Not Applicable
Managed
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Managed
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Not Applicable
Not Applicable
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Not Applicable
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Defined
Defined
Defined
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Optimized
Ratio of
Level Meaning Security
Controls
Non existent Complete lack of recognizable policy, procedure, control etc. 0.00%
checksum 95.61%
Ratio of Security Controls
Optimized
80%