ISMS Annex A Information Security Control Checklist
ISMS Annex A Information Security Control Checklist
Page 1 of 21
A.6.1.4 Contact with special Appropriate contacts with special interest groups or
interest groups other specialist security forums and professional
associations shall be maintained.
A.6.1.5 Information security in Information security shall be addressed in project
project management management, regardless of the type of the project.
Page 3 of 21
inventory of these assets shall be drawn up and
maintained.
A.8.1.2 Ownership of assets Assets maintained in the inventory shall be owned.
A.8.1.3 Acceptable use of assets Rules for the acceptable use of information and of
assets associated with information and information
processing facilities shall be identified, documented
and implemented.
A.8.1.4 Return of assets All employees and external party users shall return
all of the organisational assets in their possession
upon termination of their employment, contract or
agreement.
Page 4 of 21
with the classification scheme adopted by the
organisation.
A.8.3.2 Disposal of media Media shall be disposed of securely when no
longer required, using formal procedures.
A.8.3.3 Physical media transfer Media containing information shall be protected
against unauthorised access, misuse or corruption
during transportation.
Page 5 of 21
information of users process.
A.9.2.5 Review of user access Asset owners shall review users’ access rights at
rights regular intervals.
A.9.2.6 Removal or adjustment The access rights of all employees and external
of access rights party users to information and information
processing facilities shall be removed upon
termination of their employment, contract or
agreement, or adjusted upon change.
Page 6 of 21
A.10 Cryptography
A.10.1 Cryptographic controls
Control Objective: To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information.
Clause Item Expected Control Comments
A.10.1.1 Policy on the use of A policy on the use of cryptographic controls for
cryptographic controls protection of information shall be developed and
implemented.
A.10.1.2 Key management A policy on the use, protection and lifetime of
cryptographic keys shall be developed and
implemented through their whole lifecycle.
Page 7 of 21
enter the premises shall be controlled and, if
possible, isolated from information processing
facilities to avoid unauthorised access.
A.11.2 Equipment
Control Objective: To prevent loss, damage, theft or compromise of assets and interruption to the organisation’s operations.
Clause Item Expected Control Comments
A.11.2.1 Equipment siting and Equipment shall be sited and protected to reduce
protection the risks from environmental threats and hazards,
and opportunities for unauthorised access.
A.11.2.2 Supporting utilities Equipment shall be protected from power failures
and other disruptions caused by failures in
supporting utilities.
Page 8 of 21
A.11.2.9 Clear desk and clear A clear desk policy for papers and removable
screen policy storage media and a clear screen policy for
information processing facilities shall be adopted.
A.12.3 Backup
Page 9 of 21
Control Objective: To protect against loss of data.
Clause Item Expected Control Comments
A.12.3.1 Information backup Backup copies of information, software and system
images shall be taken and tested regularly in
accordance with an agreed backup policy.
Page 10 of 21
Clause Item Expected Control Comments
A.12.6.1 Management of technical Information about technical vulnerabilities of
vulnerabilities information systems being used shall be obtained
in a timely fashion, the organisation’s exposure to
such vulnerabilities evaluated and appropriate
measures taken to address the associated risk.
A.12.6.2 Restrictions on software Rules governing the installation of software by
installation users shall be established and implemented.
Page 11 of 21
A.13.2 Information transfer
Control Objective: To maintain the security of information transferred within an organisation and with any external entity.
Clause Item Expected Control Comments
A.13.2.1 Information transfer Formal transfer policies, procedures and controls
policies and procedures shall be in place to protect the transfer of
information through the use of all types of
communication facilities.
A.13.2.2 Agreements on Agreements shall address the secure transfer of
information transfer business information between the organisation and
external parties.
A.13.2.3 Electronic messaging Information involved in electronic messaging shall
be appropriately protected.
A.13.2.4 Confidentiality or Requirements for confidentiality or non-disclosure
nondisclosure agreements reflecting the organisation’s needs for
agreements the protection of information shall be identified,
regularly reviewed and documented.
Page 12 of 21
A.14.1.3 Protecting application Information involved in application service
services transactions transactions shall be protected to prevent
incomplete transmission, mis-routing, unauthorised
message alteration, unauthorised disclosure,
unauthorised message duplication or replay.
Page 13 of 21
A.14.2.9 System acceptance Acceptance testing programs and related criteria
testing shall be established for new information systems,
upgrades and new versions.
Page 14 of 21
A.15.2.1 Monitoring and review of Organisations shall regularly monitor, review and
supplier services audit supplier service delivery.
A.15.2.2 Managing changes to Changes to the provision of services by suppliers,
supplier services including maintaining and improving existing
information security policies, procedures and
controls, shall be managed, taking account of the
criticality of business information, systems and
processes involved and re-assessment of risks.
Page 15 of 21
A.16.1.7 Collection of evidence The organisation shall define and apply procedures
for the identification, collection, acquisition and
preservation of information, which can serve as
evidence.
A.17.2 Redundancies
Control Objective: To ensure availability of information processing facilities.
Clause Item Expected Control Comments
A.17.2.1 Availability of information Information processing facilities shall be
processing facilities implemented with redundancy sufficient to meet
availability requirements.
A.18 Compliance
Page 16 of 21
A.18.1 Compliance with legal and contractual requirements
Control Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any security
requirements.
Clause Item Expected Control Comments
A.18.1.1 Identification of All relevant legislative statutory, regulatory,
applicable legislation and contractual requirements and the organisation’s
contractual requirements approach to meet these requirements shall be
explicitly identified, documented and kept up to
date for each information system and the
organisation.
A.18.1.2 Intellectual property Appropriate procedures shall be implemented to
rights ensure compliance with legislative, regulatory and
contractual requirements related to intellectual
property rights and use of proprietary software
products.
A.18.1.3 Protection of records Records shall be protected from loss, destruction,
falsification, unauthorised access and unauthorised
release, in accordance with legislatory, regulatory,
contractual and business requirements.
A.18.1.4 Privacy and protection of Privacy and protection of personally identifiable
personally identifiable information shall be ensured as required in relevant
information legislation and regulation where applicable.
A.18.1.5 Regulation of Cryptographic controls shall be used in compliance
cryptographic controls with all relevant agreements, legislation and
regulations.
Page 17 of 21
reviewed independently at planned intervals or
when significant changes occur.
A.18.2.2 Compliance with security Managers shall regularly review the compliance of
policies and standards information processing and procedures within their
area of responsibility with the appropriate security
policies, standards and any other security
requirements.
A.18.2.3 Technical compliance Information systems shall be regularly reviewed for
review compliance with the organisation’s information
security policies and standards.
Page 18 of 21
B. Additional (Organisation-specific) Control Objectives & Controls
B.1
Control
Objective:
Page 19 of 21