0% found this document useful (0 votes)
11 views2 pages

ISO27001 2022 Controls Clean

The document outlines the mapping of controls from ISO/IEC 27001:2013 to ISO/IEC 27001:2022, highlighting the status of each control, whether it conforms or has non-conformities. It includes a detailed comparison of control titles and notes changes in structure and content. Additionally, it lists recommendations for ISMS activities, all of which currently show major non-conformities.

Uploaded by

onehacker417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

ISO27001 2022 Controls Clean

The document outlines the mapping of controls from ISO/IEC 27001:2013 to ISO/IEC 27001:2022, highlighting the status of each control, whether it conforms or has non-conformities. It includes a detailed comparison of control titles and notes changes in structure and content. Additionally, it lists recommendations for ISMS activities, all of which currently show major non-conformities.

Uploaded by

onehacker417
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Mapping Kontrol ISO/IEC 27001:2013 ke ISO/IEC 27001:2022

| Versi 2013 | Judul Kontrol (2013) | Status | Versi 2022 | Judul Kontrol (2022)
| Catatan |
|------------|------------------------------------------------------|---------------------|------------|---------------------------------------------------------
---------------------|----------------------------------------------|
| A.5.1 | Management direction for information security | Major non-conformity| 5.1 | Policies for information
security | Langsung sesuai |
| A.6.1 | Internal Organisation | Minor non-conformity| 5.2 | Information security roles and
responsibilities | Langsung sesuai |
| A.6.2 | Mobile devices and teleworking | Major non-conformity| 5.10 | Remote working
| Terpisah dari kontrol sebelumnya |
| A.7.1 | Prior to employment | Conforms | 5.3 | Information security responsibilities
before employment | Direvisi redaksi |
| A.7.2 | During employment | Major non-conformity| 5.4 | Information security
responsibilities during employment | Direvisi redaksi |
| A.8.1 | Responsibility for assets | Major non-conformity| 5.9 | Inventory of information and
other associated assets | Digabung kontrol |
| A.8.2 | Information Classification | Major non-conformity| 5.12 | Classification of information
| Langsung sesuai |
| A.8.3 | Media handling | Major non-conformity| 5.13 | Information transfer
| Digabung ke transfer & media handling |
| A.9.1 | Business requirements for access control | Minor non-conformity| 5.15 | Access control
| Direstrukturisasi |
| A.9.2 | User access management | Minor non-conformity| 5.16 | Identity management
| Kontrol baru digabung |
| A.9.3 | User responsibilities | Major non-conformity| 5.17 | Authentication information
| Diperluas |
| A.9.4 | System and application access control | Major non-conformity| 5.18 | Access rights
| |
| A.10.1 | Cryptographic controls | Major non-conformity| 5.25 | Cryptography
| |
| A.11.1 | Secure areas | Minor non-conformity| 5.8 | Physical security perimeter
| |
| A.11.2 | Equipment | Major non-conformity| 5.11 | Equipment security
| |
| A.12.1 | Operational procedures and responsibilities | Minor non-conformity| 5.28 | IT security
responsibilities | |
| A.12.2 | Protection from malware | Major non-conformity| 5.20 | Protection from malware
| |
| A.12.3 | Backup | Minor non-conformity| 5.14 | Information backup
| |
| A.12.4 | Control of operational software | Major non-conformity| 5.29 | Information systems
configuration | Digabung |
| A.12.5 | Controls against malware | Major non-conformity| 5.20 | Protection from malware
| Sama seperti A.12.2 |
| A.12.6 | Technical vulnerability management | Major non-conformity| 5.30 | Technical vulnerability
management | Langsung sesuai |
| A.12.7 | Information systems audit considerations | Cannot be assessed | 5.31 | Information systems
audit considerations | |
| A.13.1 | Network security management | Minor non-conformity| 5.22 | Network security
| |
| A.13.2 | Information transfer | Major non-conformity| 5.13 | Information transfer
| Termasuk media handling |
| A.14.1 | Security requirements of information systems | Major non-conformity| 5.32 | Secure development
lifecycle | |
| A.14.2 | Security in development and support processes | Minor non-conformity| 5.36 | Secure coding
| |
| A.14.3 | Test data | Cannot be assessed | 5.37 | Secure testing data
| |
| A.15.1 | Information security in supplier relationships | Minor non-conformity| 5.19 | Supplier relationships
| |
| A.15.2 | Supplier service delivery management | Cannot be assessed | 5.19 | Supplier relationships
| Digabung ke atas |
| A.16.1 | Management of information security incidents | Major non-conformity| 5.28 | Information security
event reporting | |
| A.17.1 | Information security continuity | Minor non-conformity| 5.29 | ICT readiness for business
continuity | Digabung dalam kontrol baru |
| A.17.2 | Redundancies | Conforms | 5.26 | Redundancy of information
processing facilities | |
| A.18.1 | Compliance with legal and contractual requirements | Minor non-conformity| 5.33 | Compliance with
legal, statutory, regulatory and contractual requirements | |
| A.18.2 | Information security reviews | Major non-conformity| 5.34 | Information security review
| |

Rekomendasi Tambahan Aktivitas ISMS (non-Appendix A)

| Area | Status |
|-------------------------------------------|---------------------|
| Scope Definition | Major non-conformity|
| Risk Assessment Approach and Execution | Major non-conformity|
| Treatment of Risks & Statement of Applicability | Major non-conformity|
| Risk Treatment Plan | Major non-conformity|
| Monitoring, Review & Effectiveness | Major non-conformity|
| ISMS Improvement (Corrective & Preventive Actions) | Major non-conformity|

You might also like