This gap analysis document provides a simple framework for evaluation the current status of a CSMS controls according to ISO/IEC27002:2022 standard. The status column is marked by one of the following identifiers:
The evidence shall be provided by the target user, while optional comment maybe added by the target user or the assessor.
Requirement | Status (V, P, M, N/A) | Evidence | Comments |
---|---|---|---|
5.1. Policies for information security | |||
5.2. Information security roles and responsabilities | |||
5.3. Segregation of duties | |||
5.4. Management responsabilities | |||
5.5. Contact with authorities | |||
5.6. Contact with special interest groups | |||
5.7. Threat intelligence | |||
5.8. Information security in project management | |||
5.9. Inventory of information and other associated assets | |||
5.10. Acceptable use of information and other associated assets | |||
5.11. Return of assets | |||
5.12. Classification of information | |||
5.13. Labelling of information | |||
5.14. Information transfer | |||
5.15. Access control | |||
5.16. Identity management | |||
5.17. Authentication information | |||
5.18. Access rights | |||
5.19. Information security in supplier relationships | |||
5.20. Addressing information security within supplier agreements | |||
5.21. Managing information security in the information and communication technology (ICT) supply chain | |||
5.22. Monitoring, review and change management of supplier services | |||
5.23. Information security for use of cloud services | |||
5.24. Information security incident management planning and preparation | |||
5.25. Access and decision on information security events | |||
5.26. Response to information security incidents | |||
5.27. Learning from information security incidents | |||
5.28. Collection of evidence | |||
5.29. Information security during disruption | |||
5.30. ICT readiness for business continuity | |||
5.31. Legal, statutory, regulatory and contractual requirements | |||
5.32. Intellectual property rights | |||
5.33. Protection of records | |||
5.34. Privacy and protection of personal identifiable information (PII) | |||
5.35. Independant review of information security | |||
5.36. Compliance with policies, rules, and standards for information security | |||
5.37. Documented operation procedures |
Requirement | Status (V, P, M, N/A) | Evidence | Comments |
---|---|---|---|
6.1. Screening | |||
6.2. Terms and condition of employments | |||
6.3. Information security awareness, education and training | |||
6.4. Disciplinary process | |||
6.5. Responsabilities after termination or change of employment | |||
6.6. Confidentiality or non discolsure agreements | |||
6.7. Remote working | |||
6.8. Information security event reporting |
Requirement | Status (V, P, M, N/A) | Evidence | Comments |
---|---|---|---|
7.1. Physical security perimeters | |||
7.2. Physical entry | |||
7.3. Securing offices, rooms, and facilities | |||
7.4. Physical security monitoring | |||
7.5. Protecting against physical and environmental threats | |||
7.6. Working in secure areas | |||
7.7. Clear desk and clear screen | |||
7.8. Equipment sitting and protection | |||
7.9. Security of assets off-premises | |||
7.10. Storage media | |||
7.11. Supporting utilities | |||
7.12. Cabling security | |||
7.13. Equipment maintenance | |||
7.14. Secure disposal or re-use of equipment |
Requirement | Status (V, P, M, N/A) | Evidence | Comments |
---|---|---|---|
8.1. Use end point devices | |||
8.2. Privileged access rights | |||
8.3. Information access restriction | |||
8.4. Access to source code | |||
8.5. Secure authentication | |||
8.6. Capacity management | |||
8.7. Protection against malware | |||
8.8. Management of technical vulnerabilities | |||
8.9. Configuration management | |||
8.10. Information deletion | |||
8.11. Data masking | |||
8.12. Data leakage prevention | |||
8.13. Information backup | |||
8.14. Redundancy of information processing facilities | |||
8.15. Logging | |||
8.16. Monitoring activities | |||
8.17. Clock synchronization | |||
8.18. Use of privileged utilities programs | |||
8.19. Installation of software on operational systems | |||
8.20. Network security | |||
8.21. Security of network services | |||
8.22. Segragation of networks | |||
8.23. Web filtering | |||
8.24. Use of cryptography | |||
8.25. Secure development life cycle | |||
8.26. Application security requirements | |||
8.27. Secure system architecture and engineering principles | |||
8.28. Secure coding | |||
8.29. Security testing in development and acceptance | |||
8.30. Outsourced development | |||
8.31. Separation of development, test, and production environments | |||
8.32. Change management | |||
8.33. Test information | |||
8.34. Protection of information systems during audit testing |