Untitled Note

Here's the JSON format for the ISO 27002 controls, covering controls 5.1 through 8.34:

```json
{
"iso27002controls": [
{
"domain": "Organizational",
"control_number": "5.1",
"control_title": "Policies for information security",
"scope": "Overall information security management within the organization, encompassing high-level and topic-specific policies",
"purpose": "Ensure continuing suitability, adequacy, effectiveness of management direction and support for information security",
"guidance": "Define, approve, publish, communicate, and acknowledge information security and topic-specific policies; review at planned intervals and after significant changes",
"acceptance_criteria": "All policies defined, approved, published, communicated, and acknowledged; evidence of regular review",
"evidence_requirements": "Approved policies, communication records, acknowledgement records, review minutes, records of policy updates",
"attributes": {
"control_type": ["Preventive"],
"information_security": ["Confidentiality", "Integrity", "Availability"],
"cybersecurity_concepts": ["Identify"],
"operational_capabilities": ["Governance"],
"securitydomains": ["Governanceand_Ecosystem", "Resilience"]
}
},
{
"domain": "Organizational",
"control_number": "5.2",
"control_title": "Information security roles and responsibilities",
"scope": "Defining and allocating roles and responsibilities for information security across the organization",
"purpose": "Establish a defined, approved, and understood structure for implementing, operating, and managing information security",
"guidance": "Define and manage responsibilities for information asset protection, security process execution, risk management",
"acceptance_criteria": "Roles and responsibilities clearly defined, documented, communicated, and understood",
"evidence_requirements": "RACI matrix, job descriptions, training records, competency assessments"
},
{
"domain": "Organizational",
"control_number": "5.3",
"control_title": "Segregation of duties",
"scope": "Preventing conflicts of interest and unauthorized actions by separating duties",
"purpose": "Reduce the risk of fraud, error, and bypass of security controls",
"guidance": "Segregate conflicting duties and responsibilities (e.g., initiating, approving, executing changes; requesting, approving, implementing access rights); consider collusion risk; use automated tools to identify conflicts in role-based systems",
"acceptance_criteria": "Conflicting duties segregated; documented procedures for handling conflicts where segregation is impossible",
"evidence_requirements": "Documentation of segregation of duties, procedures for handling conflicts, role-based access control system documentation"
},
{
"domain": "Organizational",
"control_number": "5.4",
"control_title": "Management responsibilities",
"scope": "Ensuring management's oversight and support of information security",
"purpose": "Ensure management understands its role and ensures personnel are aware of and fulfil their security responsibilities",
"guidance": "Management demonstrates support for policies, procedures, and controls; personnel are briefed on their responsibilities, provided with guidelines, mandated to comply with policies, and provided with adequate resources and whistleblowing mechanisms",
"acceptance_criteria": "Evidence of management support for information security; documented processes for briefing personnel and providing resources",
"evidence_requirements": "Management review minutes, training records, documented processes and procedures"
},
{
"domain": "Organizational",
"control_number": "5.5",
"control_title": "Contact with authorities",
"scope": "Establishing and maintaining contact with relevant legal, regulatory, and supervisory authorities",
"purpose": "Ensure appropriate information flow related to information security between the organization and relevant authorities",
"guidance": "Specify when, by whom, and how authorities should be contacted; report incidents timely; use contacts to understand current and upcoming expectations of authorities",
"acceptance_criteria": "Contact information documented and maintained; documented procedures for incident reporting to authorities",
"evidence_requirements": "Contact lists, incident reporting records"
},
{
"domain": "Organizational",
"control_number": "5.6",
"control_title": "Contact with special interest groups",
"scope": "Maintaining contact with relevant security forums and professional associations",
"purpose": "Ensure appropriate information flow related to information security",
"guidance": "Consider membership to improve knowledge, understand the security environment, receive warnings and alerts, gain access to expert advice, and share information",
"acceptance_criteria": "Documented contacts with relevant special interest groups; evidence of information exchange and knowledge updates",
"evidence_requirements": "Membership records, communication logs, evidence of knowledge updates (e.g., training materials, meeting minutes)"
},
{
"domain": "Organizational",
"control_number": "5.7",
"control_title": "Threat intelligence",
"scope": "Collecting and analyzing information on information security threats",
"purpose": "Provide awareness of the organization's threat environment to take appropriate mitigation actions",
"guidance": "Collect and analyze threat intelligence (strategic, tactical, operational); ensure information is relevant, insightful, contextual, and actionable; integrate intelligence into risk management, preventive and detective controls, and testing processes",
"acceptance_criteria": "Threat intelligence process defined and documented; evidence of regular threat intelligence updates and integration into risk management and security controls",
"evidence_requirements": "Threat intelligence reports, risk assessments, documentation of security control updates"
},
{
"domain": "Organizational",
"control_number": "5.8",
"control_title": "Information security in project management",
"scope": "Integrating information security into project management processes",
"purpose": "Ensure information security risks related to projects are effectively addressed throughout the project lifecycle",
"guidance": "Integrate information security into project management, assess and treat risks, address requirements early, review progress, and evaluate effectiveness; define security requirements",
"acceptance_criteria": "Information security risks considered in project planning and execution; evidence of risk assessment and treatment; implementation of security requirements",
"evidence_requirements": "Project plans including security risk assessments, security requirements specifications, test results, review minutes"
},
{
"domain": "Organizational",
"control_number": "5.9",
"control_title": "Inventory of information and other associated assets",
"scope": "Identifying and maintaining an inventory of information and other assets, including ownership",
"purpose": "Identify the organization's information and other assets to preserve their information security and assign appropriate ownership",
"guidance": "Identify and document assets, ensure accuracy, assign ownership, and define owner duties (inventory, classification, protection, access, deletion/disposal)",
"acceptance_criteria": "Accurate and up-to-date asset inventory; clear assignment of asset ownership; documented owner responsibilities",
"evidence_requirements": "Asset register, documentation of ownership assignments, documented owner responsibilities"
},
{
"domain": "Organizational",
"control_number": "5.10",
"control_title": "Acceptable use of information and other associated assets",
"scope": "Defining and implementing rules for the acceptable use and handling of information and assets",
"purpose": "Ensure information and assets are appropriately protected, used, and handled",
"guidance": "Establish a policy on acceptable use, communicate to users, define expected and unacceptable behaviors, permitted and prohibited uses, and monitoring activities; develop procedures for the information lifecycle",
"acceptance_criteria": "Acceptable use policy established and communicated; documented procedures for handling information and assets",
"evidence_requirements": "Acceptable use policy, user training records, documented procedures"
},
{
"domain": "Organizational",
"control_number": "5.11",
"control_title": "Return of assets",
"scope": "Ensuring the return of organizational assets upon termination or change of employment, contract, or agreement",
"purpose": "Protect organizational assets during employment changes or terminations",
"guidance": "Formalize the return process; include procedures for purchased or personally owned equipment; ensure knowledge transfer; identify assets to be returned",
"acceptance_criteria": "All organizational assets returned upon termination or change; documented procedures for asset return",
"evidence_requirements": "Asset return forms, confirmation of asset return, documented procedures"
},
{
"domain": "Organizational",
"control_number": "5.12",
"control_title": "Information security in supplier relationships",
"scope": "Managing information security risks associated with suppliers and third-party services",
"purpose": "Ensure that information security is adequately managed in supplier relationships and that risks are assessed and mitigated",
"guidance": "Identify and assess security requirements for suppliers; establish criteria for selecting suppliers; integrate information security requirements into contracts; monitor supplier performance; perform regular reviews and audits of supplier information security",
"acceptance_criteria": "Supplier security requirements defined and integrated into contracts; evidence of supplier performance monitoring and audits",
"evidence_requirements": "Supplier contracts, assessment records, audit reports, performance review documentation"
},
{
"domain": "Organizational",
"control_number": "5.13",
"control_title": "Information security for third-party services",
"scope": "Ensuring security measures are in place for third-party services that access or process organizational information",
"purpose": "Protect sensitive information when using third-party services to reduce risk exposure",
"guidance": "Assess third-party service security practices, include security requirements in agreements, conduct due diligence, monitor service delivery, and address vulnerabilities proactively",
"acceptance_criteria": "Third-party services assessed for security; security requirements documented in agreements; monitoring processes established",
"evidence_requirements": "Third-party service agreements, assessment reports, monitoring logs, vulnerability management documentation"
},
{
"domain": "Organizational",
"control_number": "5.14",
"control_title": "Information security incident management",
"scope": "Managing incidents that affect information security, including reporting, response, recovery, and lessons learned",
"purpose": "Minimize the impact of information security incidents on the organization",
"guidance": "Establish an incident management process; ensure incidents are reported, investigated, and resolved; analyze incidents to improve response and prevent recurrence; train personnel on reporting procedures, and maintain an incident log",
"acceptance_criteria": "Incident management process established; incidents reported and logged; lessons learned documented",
"evidence_requirements": "Incident logs, investigation reports, training records, documentation of lessons learned and improvements"
},
{
"domain": "Organizational",
"control_number": "5.15",
"control_title": "Information security continuity management",
"scope": "Ensuring that information security is maintained during disruptive events",
"purpose": "Protect the organization's information assets during disruptions through effective continuity planning",
"guidance": "Develop an information security continuity plan that addresses potential disruptions; test and review the plan regularly, and ensure personnel are trained in their roles during disruptions; coordinate with business continuity and disaster recovery plans",
"acceptance_criteria": "Information security continuity plan developed and tested; personnel trained on their roles",
"evidence_requirements": "Continuity plan documentation, test results, training records, incident response evaluations"
},
{
"domain": "Organizational",
"control_number": "5.16",
"control_title": "Compliance with legal and contractual requirements",
"scope": "Ensuring compliance with applicable legal, regulatory, and contractual obligations related to information security",
"purpose": "Protect the organization from legal and financial penalties by ensuring compliance with relevant laws and regulations",
"guidance": "Identify applicable legal and contractual requirements; establish processes to ensure compliance; regularly audit compliance and maintain documentation of compliance actions",
"acceptance_criteria": "Legal and contractual requirements identified; compliance processes established and audited",
"evidence_requirements": "Compliance audit reports, documentation of legal and regulatory requirements, compliance action records"
},
{
"domain": "Organizational",
"control_number": "5.17",
"control_title": "Data protection and privacy",
"scope": "Ensuring that personal data is processed in accordance with applicable data protection laws and regulations",
"purpose": "Protect the rights of individuals and comply with data protection regulations",
"guidance": "Identify, document, and assess data protection requirements; conduct data processing impact assessments; establish processes for handling personal data breaches; provide training on data protection",
"acceptance_criteria": "Data protection requirements documented and assessed; training provided; data processing impacts assessed",
"evidence_requirements": "Data protection assessments, training records, documentation of data breaches and responses"
},
{
"domain": "Organizational",
"control_number": "5.18",
"control_title": "Physical and environmental security",
"scope": "Protecting information and information processing facilities from physical threats",
"purpose": "Ensure that physical threats do not compromise information security",
"guidance": "Implement physical security controls such as access controls, surveillance, and environmental controls (e.g., fire protection, climate control); regularly assess physical security risks and review the effectiveness of controls",
"acceptance_criteria": "Physical security measures documented and implemented; regular assessments conducted",
"evidence_requirements": "Physical security assessment reports, access control logs, incident records related to physical security"
},
{
"domain": "Organizational",
"control_number": "5.19",
"control_title": "Security of information systems and applications",
"scope": "Ensuring the security of information systems and applications throughout their lifecycle",
"purpose": "Protect information systems and applications from vulnerabilities and threats",
"guidance": "Implement security controls throughout the system/application lifecycle; conduct vulnerability assessments; apply security patchesThere has been an error in the Anthropic response. Please try again

Chunk Created with Chunk

Start thinking in

connected pieces.

Upgrade when you're ready.

No credit card required · Available on iOS, macOS, and Web