cyris360-framework

Instructions

This gap analysis document provides a simple framework for evaluation the current status of a CSMS controls according to ISO/IEC27002:2022 standard. The status column is marked by one of the following identifiers:

The evidence shall be provided by the target user, while optional comment maybe added by the target user or the assessor.

Part 1: Controls

Chapter 5: Organizational controls

Requirement Status (V, P, M, N/A) Evidence Comments
5.1. Policies for information security      
5.2. Information security roles and responsabilities      
5.3. Segregation of duties      
5.4. Management responsabilities      
5.5. Contact with authorities      
5.6. Contact with special interest groups      
5.7. Threat intelligence      
5.8. Information security in project management      
5.9. Inventory of information and other associated assets      
5.10. Acceptable use of information and other associated assets      
5.11. Return of assets      
5.12. Classification of information      
5.13. Labelling of information      
5.14. Information transfer      
5.15. Access control      
5.16. Identity management      
5.17. Authentication information      
5.18. Access rights      
5.19. Information security in supplier relationships      
5.20. Addressing information security within supplier agreements      
5.21. Managing information security in the information and communication technology (ICT) supply chain      
5.22. Monitoring, review and change management of supplier services      
5.23. Information security for use of cloud services      
5.24. Information security incident management planning and preparation      
5.25. Access and decision on information security events      
5.26. Response to information security incidents      
5.27. Learning from information security incidents      
5.28. Collection of evidence      
5.29. Information security during disruption      
5.30. ICT readiness for business continuity      
5.31. Legal, statutory, regulatory and contractual requirements      
5.32. Intellectual property rights      
5.33. Protection of records      
5.34. Privacy and protection of personal identifiable information (PII)      
5.35. Independant review of information security      
5.36. Compliance with policies, rules, and standards for information security      
5.37. Documented operation procedures      

Chapter 6: People controls

Requirement Status (V, P, M, N/A) Evidence Comments
6.1. Screening      
6.2. Terms and condition of employments      
6.3. Information security awareness, education and training      
6.4. Disciplinary process      
6.5. Responsabilities after termination or change of employment      
6.6. Confidentiality or non discolsure agreements      
6.7. Remote working      
6.8. Information security event reporting      

Chapter 7: Physical controls

Requirement Status (V, P, M, N/A) Evidence Comments
7.1. Physical security perimeters      
7.2. Physical entry      
7.3. Securing offices, rooms, and facilities      
7.4. Physical security monitoring      
7.5. Protecting against physical and environmental threats      
7.6. Working in secure areas      
7.7. Clear desk and clear screen      
7.8. Equipment sitting and protection      
7.9. Security of assets off-premises      
7.10. Storage media      
7.11. Supporting utilities      
7.12. Cabling security      
7.13. Equipment maintenance      
7.14. Secure disposal or re-use of equipment      

Chapter 8: Technological controls

Requirement Status (V, P, M, N/A) Evidence Comments
8.1. Use end point devices      
8.2. Privileged access rights      
8.3. Information access restriction      
8.4. Access to source code      
8.5. Secure authentication      
8.6. Capacity management      
8.7. Protection against malware      
8.8. Management of technical vulnerabilities      
8.9. Configuration management      
8.10. Information deletion      
8.11. Data masking      
8.12. Data leakage prevention      
8.13. Information backup      
8.14. Redundancy of information processing facilities      
8.15. Logging      
8.16. Monitoring activities      
8.17. Clock synchronization      
8.18. Use of privileged utilities programs      
8.19. Installation of software on operational systems      
8.20. Network security      
8.21. Security of network services      
8.22. Segragation of networks      
8.23. Web filtering      
8.24. Use of cryptography      
8.25. Secure development life cycle      
8.26. Application security requirements      
8.27. Secure system architecture and engineering principles      
8.28. Secure coding      
8.29. Security testing in development and acceptance      
8.30. Outsourced development      
8.31. Separation of development, test, and production environments      
8.32. Change management      
8.33. Test information      
8.34. Protection of information systems during audit testing