0% found this document useful (0 votes)
57 views3 pages

ISO 27001 Security Controls Categories

ISO/IEC 27001:2022 outlines security controls across four categories: Organizational, People, Physical, and Technological, focusing on governance, risk management, human error prevention, physical access security, and technical measures against cyber threats. Each category includes specific controls and identifies relevant departments responsible for implementation and compliance. The framework aims to enhance information security and ensure the protection of sensitive data across organizations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views3 pages

ISO 27001 Security Controls Categories

ISO/IEC 27001:2022 outlines security controls across four categories: Organizational, People, Physical, and Technological, focusing on governance, risk management, human error prevention, physical access security, and technical measures against cyber threats. Each category includes specific controls and identifies relevant departments responsible for implementation and compliance. The framework aims to enhance information security and ensure the protection of sensitive data across organizations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ISO/IEC 27001:2022 - Security Controls

Categories
1. Organizational Controls (37 Controls)
Focus: Governance, risk management, and organizational processes for managing security.

Key Areas:
- Risk management: Identifying and assessing risks to information security.
- Information security policies: Establishing and maintaining clear policies to guide security
efforts.
- Supplier and third-party security: Ensuring external vendors meet security requirements.
- Incident management: Creating processes to handle information security incidents.
- Business continuity: Ensuring the continuity of critical information processes in case of
disruption.

Departments Concerned:
- Risk & Compliance – Overseeing risk assessments and ensuring adherence to policies.
- Legal & Governance – Managing contracts and legal requirements for security.
- Internal Audit – Auditing and ensuring the effectiveness of controls.
- Human Resources (HR) – Employee responsibilities, training, and security awareness.

2. People Controls (8 Controls)


Focus: Protecting the organization from human error, insider threats, and ensuring
employees understand their security roles.

Key Areas:
- Employee screening: Conducting background checks before hiring to minimize the risk of
insider threats.
- Confidentiality agreements: Ensuring employees understand the importance of
information protection.
- Security awareness training: Educating staff about security risks and how to mitigate
them.
- Disciplinary processes: Defining consequences for breaches of security policies.

Departments Concerned:
- Human Resources (HR) – Conducting background checks and security training for staff.
- Compliance & Legal – Ensuring proper documentation and confidentiality agreements are
in place.
- Operations & Customer Service – Ensuring security procedures are followed on the
ground.

3. Physical Controls (14 Controls)


Focus: Securing physical access to information, devices, and systems to prevent
unauthorized physical access and environmental threats.

Key Areas:
- Physical entry controls: Controlling who can access secure areas like data centers.
- Visitor management: Ensuring visitors are monitored and their access is controlled.
- Workplace security: Protecting offices, workstations, and other areas where sensitive
information is processed.
- Device security: Ensuring that equipment is protected from theft or damage.
- Secure disposal of media: Safely disposing of physical storage media to prevent data
leakage.

Departments Concerned:
- Facilities Management & Security – Overseeing physical security measures such as access
control systems.
- IT Operations – Securing physical devices and servers.
- Compliance – Ensuring physical security measures comply with regulations.

4. Technological Controls (34 Controls)


Focus: Implementing technical measures to protect information from cyber threats and
ensuring secure operation of information systems.

Key Areas:
- Access control: Ensuring that only authorized users can access sensitive systems and data.
- Cryptography: Encrypting data both in transit and at rest to ensure confidentiality and
integrity.
- Network security: Protecting against unauthorized access, cyberattacks, and data
breaches.
- System acquisition and maintenance: Ensuring systems are securely configured and
updated to defend against vulnerabilities.
- Incident monitoring and logging: Continuously monitoring systems for potential security
threats and maintaining logs for forensic purposes.
- Secure software development: Ensuring that software developed in-house follows security
best practices.

Departments Concerned:
- IT Security / Cybersecurity – Handling firewalls, encryption, and monitoring systems.
- Software Development – Implementing secure coding practices and ensuring applications
are free of vulnerabilities.
- Operations & Infrastructure – Managing secure IT infrastructure and hardware.
- Risk & Compliance – Ensuring technology aligns with security policies and regulations.

You might also like