Untitled Note
Here's the JSON format for the ISO 27002 controls, covering controls 5.1 through 8.34:
```json
{
"iso27002controls": [
{
"domain": "Organizational",
"control_number": "5.1",
"control_title": "Policies for information security",
"scope": "Overall information security management within the organization, encompassing high-level and topic-specific policies",
"purpose": "Ensure continuing suitability, adequacy, effectiveness of management direction and support for information security",
"guidance": "Define, approve, publish, communicate, and acknowledge information security and topic-specific policies; review at planned intervals and after significant changes",
"acceptance_criteria": "All policies defined, approved, published, communicated, and acknowledged; evidence of regular review",
"evidence_requirements": "Approved policies, communication records, acknowledgement records, review minutes, records of policy updates",
"attributes": {
"control_type": ["Preventive"],
"information_security": ["Confidentiality", "Integrity", "Availability"],
"cybersecurity_concepts": ["Identify"],
"operational_capabilities": ["Governance"],
"securitydomains": ["Governanceand_Ecosystem", "Resilience"]
}
},
{
"domain": "Organizational",
"control_number": "5.2",
"control_title": "Information security roles and responsibilities",
"scope": "Defining and allocating roles and responsibilities for information security across the organization",
"purpose": "Establish a defined, approved, and understood structure for implementing, operating, and managing information security",
"guidance": "Define and manage responsibilities for information asset protection, security process execution, risk management",
"acceptance_criteria": "Roles and responsibilities clearly defined, documented, communicated, and understood",
"evidence_requirements": "RACI matrix, job descriptions, training records, competency assessments"
},
{
"domain": "Organizational",
"control_number": "5.3",
"control_title": "Segregation of duties",
"scope": "Preventing conflicts of interest and unauthorized actions by separating duties",
"purpose": "Reduce the risk of fraud, error, and bypass of security controls",
"guidance": "Segregate conflicting duties and responsibilities (e.g., initiating, approving, executing changes; requesting, approving, implementing access rights); consider collusion risk; use automated tools to identify conflicts in role-based systems",
"acceptance_criteria": "Conflicting duties segregated; documented procedures for handling conflicts where segregation is impossible",
"evidence_requirements": "Documentation of segregation of duties, procedures for handling conflicts, role-based access control system documentation"
},
{
"domain": "Organizational",
"control_number": "5.4",
"control_title": "Management responsibilities",
"scope": "Ensuring management's oversight and support of information security",
"purpose": "Ensure management understands its role and ensures personnel are aware of and fulfil their security responsibilities",
"guidance": "Management demonstrates support for policies, procedures, and controls; personnel are briefed on their responsibilities, provided with guidelines, mandated to comply with policies, and provided with adequate resources and whistleblowing mechanisms",
"acceptance_criteria": "Evidence of management support for information security; documented processes for briefing personnel and providing resources",
"evidence_requirements": "Management review minutes, training records, documented processes and procedures"
},
{
"domain": "Organizational",
"control_number": "5.5",
"control_title": "Contact with authorities",
"scope": "Establishing and maintaining contact with relevant legal, regulatory, and supervisory authorities",
"purpose": "Ensure appropriate information flow related to information security between the organization and relevant authorities",
"guidance": "Specify when, by whom, and how authorities should be contacted; report incidents timely; use contacts to understand current and upcoming expectations of authorities",
"acceptance_criteria": "Contact information documented and maintained; documented procedures for incident reporting to authorities",
"evidence_requirements": "Contact lists, incident reporting records"
},
{
"domain": "Organizational",
"control_number": "5.6",
"control_title": "Contact with special interest groups",
"scope": "Maintaining contact with relevant security forums and professional associations",
"purpose": "Ensure appropriate information flow related to information security",
"guidance": "Consider membership to improve knowledge, understand the security environment, receive warnings and alerts, gain access to expert advice, and share information",
"acceptance_criteria": "Documented contacts with relevant special interest groups; evidence of information exchange and knowledge updates",
"evidence_requirements": "Membership records, communication logs, evidence of knowledge updates (e.g., training materials, meeting minutes)"
},
{
"domain": "Organizational",
"control_number": "5.7",
"control_title": "Threat intelligence",
"scope": "Collecting and analyzing information on information security threats",
"purpose": "Provide awareness of the organization's threat environment to take appropriate mitigation actions",
"guidance": "Collect and analyze threat intelligence (strategic, tactical, operational); ensure information is relevant, insightful, contextual, and actionable; integrate intelligence into risk management, preventive and detective controls, and testing processes",
"acceptance_criteria": "Threat intelligence process defined and documented; evidence of regular threat intelligence updates and integration into risk management and security controls",
"evidence_requirements": "Threat intelligence reports, risk assessments, documentation of security control updates"
},
{
"domain": "Organizational",
"control_number": "5.8",
"control_title": "Information security in project management",
"scope": "Integrating information security into project management processes",
"purpose": "Ensure information security risks related to projects are effectively addressed throughout the project lifecycle",
"guidance": "Integrate information security into project management, assess and treat risks, address requirements early, review progress, and evaluate effectiveness; define security requirements",
"acceptance_criteria": "Information security risks considered in project planning and execution; evidence of risk assessment and treatment; implementation of security requirements",
"evidence_requirements": "Project plans including security risk assessments, security requirements specifications, test results, review minutes"
},
{
"domain": "Organizational",
"control_number": "5.9",
"control_title": "Inventory of information and other associated assets",
"scope": "Identifying and maintaining an inventory of information and other assets, including ownership",
"purpose": "Identify the organization's information and other assets to preserve their information security and assign appropriate ownership",
"guidance": "Identify and document assets, ensure accuracy, assign ownership, and define owner duties (inventory, classification, protection, access, deletion/disposal)",
"acceptance_criteria": "Accurate and up-to-date asset inventory; clear assignment of asset ownership; documented owner responsibilities",
"evidence_requirements": "Asset register, documentation of ownership assignments, documented owner responsibilities"
},
{
"domain": "Organizational",
"control_number": "5.10",
"control_title": "Acceptable use of information and other associated assets",
"scope": "Defining and implementing rules for the acceptable use and handling of information and assets",
"purpose": "Ensure information and assets are appropriately protected, used, and handled",
"guidance": "Establish a policy on acceptable use, communicate to users, define expected and unacceptable behaviors, permitted and prohibited uses, and monitoring activities; develop procedures for the information lifecycle",
"acceptance_criteria": "Acceptable use policy established and communicated; documented procedures for handling information and assets",
"evidence_requirements": "Acceptable use policy, user training records, documented procedures"
},
{
"domain": "Organizational",
"control_number": "5.11",
"control_title": "Return of assets",
"scope": "Ensuring the return of organizational assets upon termination or change of employment, contract, or agreement",
"purpose": "Protect organizational assets during employment changes or terminations",
"guidance": "Formalize the return process; include procedures for purchased or personally owned equipment; ensure knowledge transfer; identify assets to be returned",
"acceptance_criteria": "All organizational assets returned upon termination or change; documented procedures for asset return",
"evidence_requirements": "Asset return forms, confirmation of asset return, documented procedures"
},
{
"domain": "Organizational",
"control_number": "5.12",
"control_title": "Information security in supplier relationships",
"scope": "Managing information security risks associated with suppliers and third-party services",
"purpose": "Ensure that information security is adequately managed in supplier relationships and that risks are assessed and mitigated",
"guidance": "Identify and assess security requirements for suppliers; establish criteria for selecting suppliers; integrate information security requirements into contracts; monitor supplier performance; perform regular reviews and audits of supplier information security",
"acceptance_criteria": "Supplier security requirements defined and integrated into contracts; evidence of supplier performance monitoring and audits",
"evidence_requirements": "Supplier contracts, assessment records, audit reports, performance review documentation"
},
{
"domain": "Organizational",
"control_number": "5.13",
"control_title": "Information security for third-party services",
"scope": "Ensuring security measures are in place for third-party services that access or process organizational information",
"purpose": "Protect sensitive information when using third-party services to reduce risk exposure",
"guidance": "Assess third-party service security practices, include security requirements in agreements, conduct due diligence, monitor service delivery, and address vulnerabilities proactively",
"acceptance_criteria": "Third-party services assessed for security; security requirements documented in agreements; monitoring processes established",
"evidence_requirements": "Third-party service agreements, assessment reports, monitoring logs, vulnerability management documentation"
},
{
"domain": "Organizational",
"control_number": "5.14",
"control_title": "Information security incident management",
"scope": "Managing incidents that affect information security, including reporting, response, recovery, and lessons learned",
"purpose": "Minimize the impact of information security incidents on the organization",
"guidance": "Establish an incident management process; ensure incidents are reported, investigated, and resolved; analyze incidents to improve response and prevent recurrence; train personnel on reporting procedures, and maintain an incident log",
"acceptance_criteria": "Incident management process established; incidents reported and logged; lessons learned documented",
"evidence_requirements": "Incident logs, investigation reports, training records, documentation of lessons learned and improvements"
},
{
"domain": "Organizational",
"control_number": "5.15",
"control_title": "Information security continuity management",
"scope": "Ensuring that information security is maintained during disruptive events",
"purpose": "Protect the organization's information assets during disruptions through effective continuity planning",
"guidance": "Develop an information security continuity plan that addresses potential disruptions; test and review the plan regularly, and ensure personnel are trained in their roles during disruptions; coordinate with business continuity and disaster recovery plans",
"acceptance_criteria": "Information security continuity plan developed and tested; personnel trained on their roles",
"evidence_requirements": "Continuity plan documentation, test results, training records, incident response evaluations"
},
{
"domain": "Organizational",
"control_number": "5.16",
"control_title": "Compliance with legal and contractual requirements",
"scope": "Ensuring compliance with applicable legal, regulatory, and contractual obligations related to information security",
"purpose": "Protect the organization from legal and financial penalties by ensuring compliance with relevant laws and regulations",
"guidance": "Identify applicable legal and contractual requirements; establish processes to ensure compliance; regularly audit compliance and maintain documentation of compliance actions",
"acceptance_criteria": "Legal and contractual requirements identified; compliance processes established and audited",
"evidence_requirements": "Compliance audit reports, documentation of legal and regulatory requirements, compliance action records"
},
{
"domain": "Organizational",
"control_number": "5.17",
"control_title": "Data protection and privacy",
"scope": "Ensuring that personal data is processed in accordance with applicable data protection laws and regulations",
"purpose": "Protect the rights of individuals and comply with data protection regulations",
"guidance": "Identify, document, and assess data protection requirements; conduct data processing impact assessments; establish processes for handling personal data breaches; provide training on data protection",
"acceptance_criteria": "Data protection requirements documented and assessed; training provided; data processing impacts assessed",
"evidence_requirements": "Data protection assessments, training records, documentation of data breaches and responses"
},
{
"domain": "Organizational",
"control_number": "5.18",
"control_title": "Physical and environmental security",
"scope": "Protecting information and information processing facilities from physical threats",
"purpose": "Ensure that physical threats do not compromise information security",
"guidance": "Implement physical security controls such as access controls, surveillance, and environmental controls (e.g., fire protection, climate control); regularly assess physical security risks and review the effectiveness of controls",
"acceptance_criteria": "Physical security measures documented and implemented; regular assessments conducted",
"evidence_requirements": "Physical security assessment reports, access control logs, incident records related to physical security"
},
{
"domain": "Organizational",
"control_number": "5.19",
"control_title": "Security of information systems and applications",
"scope": "Ensuring the security of information systems and applications throughout their lifecycle",
"purpose": "Protect information systems and applications from vulnerabilities and threats",
"guidance": "Implement security controls throughout the system/application lifecycle; conduct vulnerability assessments; apply security patchesThere has been an error in the Anthropic response. Please try again