Policies for information security 
 
Information security roles and responsibilities 
 
Management responsibilities 
 
Contact with special interest groups 
 
Information security in project management 
 
Inventory of information and other associated assets 
 
Acceptable use of information and other associated assets 
 
Classification of information 
 
Authentication information 
 
Information security in supplier relationships 
 
Addressing information security within supplier agreements 
 
Managing information security in the ICT supply chain 
 
Monitoring review and change management of supplier services 
 
Information security for use of cloud services 
 
Information security incident management planning and preparation 
 
Assessment and decision on information security events 
 
Response to information security incidents 
 
Learning from information security incidents 
 
Information security during disruption 
 
ICT readiness for business continuity 
 
Legal statutory regulatory and contractual requirements 
 
Intellectual property rights 
 
Privacy and protection of PII 
 
Independent review of information security 
 
Conformance with policies rules and standards for information security 
 
Documented operating procedures 
 
Recapitulation organizational controls 
 
Terms and conditions of employment 
 
Information security awareness education and training 
 
Responsibilities after termination or change of employment 
 
Confidentiality or non-disclosure agreements 
 
Information security event reporting 
 
Recapitulation people controls 
 
Physical security perimeters 
 
Securing offices rooms and facilities 
 
Physical security monitoring 
 
Protecting against physical and environmental threats 
 
Clear desk and clear screen 
 
Equipment siting and protection 
 
Security of assets off-premises 
 
Secure disposal or re-use of equipment 
 
Recapitulation physical controls 
 
Information access restriction 
 
Protection against malware 
 
Management of technical vulnerabilities 
 
Redundancy of information processing facilities 
 
Use of privileged utility programs 
 
Installation of software on operational systems 
 
Security of network services 
 
Secure development life cycle 
 
Application security requirements 
 
Secure system architecture and engineering principles 
 
Security testing in development and acceptance 
 
Separation of development test and production environments 
 
Protection of information systems during audit testing 
 
Recapitulation technological controls