Book12
Book12
6.1.1-Actions to address
risks and opportunities
6.1.2- Information
3 Risk Management 6.1.1, 6.1.2, 6.1
security risk assessment
6.1.3-Information
security risk treatment
A.5.9-Inventory of
information and
other associated assets
A.5.9,
A.5.10-Acceptable use
A.5.10,
of information assets
4 Asset Management A.5.11,A.7.1,A
A.5.11- return of assets
.7.9
A.7.1- Physical security
perimeters
A.7.9- Security of assets
off-premises
A.8.32-Change
Management
A.5.22- Monitoring,
5 Change ManagementA.8.32, A.5.22
review and change
management of
supplier services
A.8.15- Logging
6 Logging and MonitorA.8.15. A.8.16 A.8.16- monitoring
activities
A.6.1-Screening
A.6.2-Terms and
conditions of
employment
A.6.3-Information
security awareness,
education and training
A.6.4-Disciplinary
process
7 Human Resources A.6.1,A.6.2,A.6
A.6.5-Responsibilities
after termination
or change of
employment
A.6.6-Confidentiality or
non-disclosure
A.6.7-Remote working
A.6.8-Information
security event reportin
8 Third Party Management
Business Continuity
ICT readiness for
9 & Disaster
business continuity
Management
9.1- Monitoring,
measurement, analysis
10 Monitoring, Audit a 9.1, 9.2
and evaluation
9.2-Internal audit
,