Policies for information security
Information security roles and responsibilities
Management responsibilities
Contact with special interest groups
Information security in project management
Inventory of information and other associated assets
Acceptable use of information and other associated assets
Classification of information
Authentication information
Information security in supplier relationships
Addressing information security within supplier agreements
Managing information security in the ICT supply chain
Monitoring review and change management of supplier services
Information security for use of cloud services
Information security incident management planning and preparation
Assessment and decision on information security events
Response to information security incidents
Learning from information security incidents
Information security during disruption
ICT readiness for business continuity
Legal statutory regulatory and contractual requirements
Intellectual property rights
Privacy and protection of PII
Independent review of information security
Conformance with policies rules and standards for information security
Documented operating procedures
Recapitulation organizational controls
Terms and conditions of employment
Information security awareness education and training
Responsibilities after termination or change of employment
Confidentiality or non-disclosure agreements
Information security event reporting
Recapitulation people controls
Physical security perimeters
Securing offices rooms and facilities
Physical security monitoring
Protecting against physical and environmental threats
Clear desk and clear screen
Equipment siting and protection
Security of assets off-premises
Secure disposal or re-use of equipment
Recapitulation physical controls
Information access restriction
Protection against malware
Management of technical vulnerabilities
Redundancy of information processing facilities
Use of privileged utility programs
Installation of software on operational systems
Security of network services
Secure development life cycle
Application security requirements
Secure system architecture and engineering principles
Security testing in development and acceptance
Separation of development test and production environments
Protection of information systems during audit testing
Recapitulation technological controls