Bip 0072-2014 PDF
Bip 0072-2014 PDF
Bip 0072-2014 PDF
Secon d ed i ti on
S e co n d e d i ti o n 2 002
Th i rd e d i ti o n 2 005
Re p ri n t e d 2 008
F o u rt h e d i ti o n 2 01 4
by
B SI S ta n d a rd s Li m i t e d
3 89 C h i swi ck H i g h Roa d
Lo n d o n W4 4AL
© Th e B ri t i s h S t a n d a rd s I n st i tu ti o n 2 01 4
Wh i l st e ve ry c a re h a s been t a ke n in d e ve l o p i n g and co m p i l i n g th i s p u b l i c a t i o n , B SI a cc e p ts no l i a b i l i t y fo r a n y l o ss o r
su ch l i a b i l i ty m a y n o t b e e xcl u d e d in l a w.
th i s b o o k. An yo n e wh o b e l i e ve s t h a t t h e y h a ve a cl a i m o f co p yri g h t i n a n y o f th e co n te n t o f t h i s b o o k sh o u l d
co n ta ct B S I a t th e a b o ve a d d re ss.
to in th i s b o o k, and d o e s n o t g u a ra n te e th a t a n y co n te n t o n su ch we b si t e s i s, o r wi l l re m a i n , a ccu ra te or
a p p ro p ri a t e .
Typ e se t i n G re a t B ri t a i n b y Le tt e rp a rt Li m i t e d - l e tt e rp a rt . c o m
I SB N 978 0 580 82 91 3 0
Con ten ts
F o re wo rd vi i
1 I n trod u cti on 1
1 .1 S co p e o f th i s g u i d e 1
1 .2 U se o f th e s t a n d a rd s 2
1 .3 Co m p a n i o n g u i d es 2
2 I SM S scope 3
3 H ow to u se th i s g u i d e 4
3.1 I SM S p ro ce s s re q u i re m e n ts 4
3.2 An n e x A Re fe re n ce co n t ro l o b j e ct i ve s a n d co n tro l s 5
3.3 A sa m p l e of a co m p l e te d q u e s ti o n n a i re 7
The Information Security Management Systems (ISMS) series of books is designed to provide users with assistance on
establishing, implementing, maintaining, checking and auditing their ISMS in order to prepare for certification. Titles
in this Information Security Management Systems Guidance series include:
• B I P 00 7 1 , Guidelin es o n requirem en ts a n d p rep a ra tio n fo r ISMS certifica tion ba sed o n ISO/IEC 27001 ;
• B I P 00 7 3 , Guide to th e im plem en ta tio n a n d a uditin g of ISMS con trols b a sed on ISO/IEC 27001 ;
• B I P 00 7 4, Mea surin g th e effectiven ess o f your ISMS im plem en ta tio n s b a sed on ISO/IEC 27001 ;
Information is one of your organization’s most valuable assets. The objectives of information security
are to protect the confidentiality, integrity and availability of information. These basic elements of
information security help to ensure that an organization can protect against:
• sensitive or confidential information being given away, leaked or disclosed both accidentally or in
an unauthorized way;
• personally identifiable information being compromised;
• critical information being accidentally or intentionally modified without your knowledge;
• any important business information being lost without trace or hope of recovery;
• any important business information being rendered unavailable when needed
It should be the responsibility of all managers, information system owners or custodians, and users in
general, to ensure that the information they are processing is properly managed and protected from a
variety of risks and threats faced by every organization. The two standards ISO/IEC 27001 :201 3,
Information technology – Security techniques – Information security management systems —
Requirements and ISO/IEC 27002:201 3, Information technology — Security techniques — Code of
practice for information security controls together provide a basis for organizations to develop an
effective information security management framework for managing and protecting their important
business assets whilst minimizing their risks, helping to maximize the organization’s investments and
business opportunities and ensuring their information systems continue to be available and
operational.
ISO/IEC 27001 :201 3 is the requirements standard that can be used for accredited third-party information
security management system (ISMS) certifications. Organizations going through the accredited
certification route to obtain an ISMS certificate would need their ISMS to be audited and assessed by
an accredited certification body to ensure that they have appropriate management processes and
systems in place that conform to the requirements specified in the ISO/IEC 27001 ISMS standard
The standard ISO/IEC 27002:201 3, Information technology — Security techniques — Code of practice for
information security controls provides a comprehensive set of best practice controls for information
security and implementation guidance Organizations can adopt these controls as part of the risk
treatment process specified in ISO/IEC 27001 :201 3 in order to manage the risks they face to their
information assets.
This guide, BIP 0072, as with the other guides in the BIP 0070 series, is designed to provide users with
assistance in checking the processes and controls in place in their ISMS against the requirements laid
out in ISO/IEC 27001 :201 3 and ISO/IEC 27002:201 3.
Note: The information provided in this document is provided with the best of intentions. It reflects
common practice that is derived by a consensus among those with a wide variety of skills, knowledge
and experience in the subject. This guide makes no claim to be exhaustive or definitive and users of
this guide may need to seek further guidance more specific to the business context of the organization
implementing the requirements of ISO/IEC 27001:2013. Furthermore, there will always be other aspects
where additional guidance is required relevant.
Are you ready for an ISMS audit based on ISO/IEC 27001? vii
1 Introduction
This document is one of a set of five guides published by BSI to support the use and application of
ISO/IEC 27001 :201 3 and ISO/IEC 27002:201 3. Other guides include:
• BIP 0071 , Guidelines on requirements and preparation for ISMS certification based on
ISO/IEC 27001 ;
• BIP 0073, Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001;
• BIP 0074, Measuring the effectiveness of your ISMS implementation based on ISO/IEC 27001;
• BIP 0076, Information security risk management. Handbook for ISO/IEC 27001 .
This guide is intended primarily for use by organizations wishing to carry out internal assessment of
their ISMS against the requirements in ISO/IEC 27001 :201 3 either as a precursor to an internal ISMS
audit (see Clause 9 of ISO/IEC 27001 :201 3) or in preparation for a formal third-party ISMS certification
audit (see BIP 0071 ). It is recommended that the assessments specified in this guide be carried out by
those persons responsible for information security management in the organization or by internal audit
staff ISMS developers and implementers may also find this guide a useful reference document when
considering the security aspects of new systems. This assessment guide is intended as an aid to
satisfying the requirements for a formal compliance audit and is not a replacement for a compliance
audit.
1 .1 S co p e o f th i s g u i d e
This guide provides a means to help organizations assess their ISMS with respect to the requirements
specified in ISO/IEC 27001 :201 3 using the following workbooks.
• ISMS processes workbook – a gap analysis to check whether the organization has a set of systems
and processes in place to satisfy the requirements specified in Clauses 4 to 1 0 of
ISO/IEC 27001 :201 3.
• Annex A Gap analysis workbook – this workbook lists the controls that are defined in Annex A of
ISO/IEC 27001 :201 3. This workbook can be used either as part of the risk treatment process as
defined in ISO/IEC 27001 :201 3, 6.1 .3 or as a stand-alone gap analysis tool to check the
implementation of Annex A controls. After determining the controls needed
(6.1 .3.b)), organizations are directed to Annex A to do a comparison check to ensure that no
necessary controls are overlooked (6.1 .3 c). This workbook can be used to check and document
whether Annex A controls are implemented or not, and to record the justification for any
exclusions. The reasons and justification why a particular control has or has not been implemented
are subsequently used to satisfy the mandatory requirement for production of a Statement of
Applicability (SoA) (6.1 .3.d).
Note: For accredited certification, this type of gap analysis has no formal status and should not be taken as a
replacement for the SoA.
These workbooks can be useful to those organizations preparing for a formal third-party accredited
certification, as well as for those preparing for post-certification activities such as surveillance audits
and for recertification. They provide a means of checking how many activities have been carried out
and what activities still need to be undertaken. Assessments using both these workbooks should not be
taken as a definitive quality check on the completeness of these activities, or the correctness and
effectiveness of the results and the implementation of these processes and activities. These workbooks
only provide a high level ‘health check’ on the state of ISMS progress.
Please note that the use of these workbooks and this guide does not constitute a replacement for a
formal compliance audit with ISO/IEC 27001 :201 3.
1 .2 U se o f th e s ta n d a rd s
This guide will be updated following any changes to these standards. Organizations must therefore
ensure that the correct version is being used for compliance checks related to pre-certification,
certification and post-certification purposes.
1 .3 Co m p a n i o n g u i d es
Additional guides are available that provide a more detailed interpretation of ISO/IEC 27001 :201 3 and
practical development advice, e.g. BIP 0071 on preparing for ISMS certification and BIP 0073 on the
implementation and auditing of ISMS controls.
It is important both for the organization whose ISMS is being assessed, and for the auditors’
understanding of the ISMS, that the scope of the ISMS is well defined and unambiguous. Given the
complexity of many business applications and processes, as well as the growth of information systems,
IT and networking, there are many possible ways to define the ISMS boundaries. Similarly, the size of
organization and its geographical spread will influence the view of what is a suitable scope It is very
rare that business systems and processes work in isolation or are self-contained, as they will have
interfaces with other systems. Therefore, in defining the scope of the ISMS, any interfaces with other
systems and processes outside the ISMS boundaries need to be taken into consideration.
Guidance on the identification and definition of the ISMS scope is given in BIP 0071 , which expands on
the requirement that the organization shall determine the boundaries and applicability of the ISMS to
establish its scope as given in ISO/IEC 27001 :201 3. It is important that when determining this scope, the
organization shall consider: a) the external and internal issues that are relevant to its purpose and that
affect its ability to achieve the intended outcome(s) of its ISMS; b) the requirements of these interested
parties relevant to information security; and c) interfaces and dependencies between activities
performed by the organization, and those that are performed by other organizations.
The aim of the guide is to allow organizations to assess the extent of their ISMS processes and controls
in place against the requirements specified in ISO/IEC 27001 :201 3. This Section tells you how to prepare
for, and complete, these workbook assessments; the major component of the workbooks is carried out
using questionnaires. The form and content of these questionnaires is described below and a sample of
a completed questionnaire is shown in Section 3.3. The workbooks are contained in sections 4 and 5 of
this guide
3.1 I S M S p ro ce ss re q u i re m e n ts
I n tro d u cti o n
The ISMS process requirements workbook deals with the set of requirements defined in
ISO/IEC 27001 :201 3. It covers an ongoing life cycle of activities aimed at establishing effective
information security management, providing a programme of ISMS continual improvement.
The ISMS requirements defined in ISO/IEC 27001 :201 3 require the implementation of a systematic
information security risk management process and the implementation of a set of processes used to
establish, implement, monitor and maintain an ISMS (see clauses of ISO/IEC 27001 :201 3 for details):
• Context of the organization (Clause 4);
• Leadership (Clause 5);
• Planning (Clause 6);
• Support (Clause 7);
• Operation (Clause 8);
• Performance evaluation (Clause 9);
• Improvement (Clause 1 0).
This includes having an appropriate system of documented information in place that is kept up to date,
accurate and available for inspection and reference with appropriate documented information in
accordance with the requirements of ISO/IEC 27001 :201 3, 7.5.
The third-party certification or internal ISMS audit will need to check, based on appropriate evidence
being provided, that the organization has a set of ISMS processes in place, as well as an ISMS system of
controls (based on Annex A of ISO/IEC 27001 :201 3) to cover the requirements of Clauses 4 to 1 0 of
ISO/IEC 27001 :201 3.
Wo rkb o o k ch e ckl i s t
Section 4 of this guide considers the workbook checklists for the ISMS process requirements. The two
basic questions, which may be addressed to each of the process requirements, are as follows.
Q1 .Is a relevant process in place to satisfy the mandatory prescriptive ‘shall’ requirements specified in
Clauses 4 to 1 0 of ISO/IEC 27001 :201 3?
Three answers are possible:
• YE S – This indicates that there is a process in place that completely fulfils the requirement. Some
explanation should be given justifying and providing evidence to support this answer.
• PARTI AL – This indicates that a process is in place but not sufficiently developed or implemented to
allow an answer of ‘yes‘ for this requirement. Further action is needed to meet the requirements
specified in ISO/IEC 27001 .
• NO – This indicates that there is no process in place to address the requirement and action is
needed to meet the requirements specified in ISO/IEC 27001 .
Q2. If the requirement has been either not implemented or only partially implemented, why is this the
case?
It will be important to provide an explanation to understand the reasons and justification for partial
implementation or non-implementation and to provide appropriate evidence to support this. Also, an
indication needs to be given as to what action shall be taken to address this gap in meeting the
requirements of ISO/IEC 27001 . An explanation justifying and providing evidence for the answer that a
requirement of ISO/IEC 27001 has been completely addressed is also helpful.
Annex A of ISO/IEC 27001 :201 3 contains the control objectives and controls that are to be used in
context with the risk treatment process in 6.1 .3. These are directly derived from and aligned with those
listed in ISO/IEC 27002:201 3 Clauses 5 to 1 8. This guide presents each of the control requirements in
question form and should be used in conjunction with the ISMS processes workbook to support as
appropriate the implementation of the risk treatment processes (see ISO/IEC 27001 :201 3, 6.1 .3 and 8.3).
The risk treatment process defined in ISO/IEC 27001 :201 3, 6.1 .3 states the following:
The o rganizatio n shall define and ap p ly an info rmatio n security risk treatment p ro cess to :
a) S elect ap p ro p riate info rmatio n security risk treatment o p tio ns, taking acco unt o f the risk assessment results;
b) D etermine all co ntro ls that are necessary to imp lement the info rmatio n security risk treatment o p tio n(s) cho sen;
NOTE: Organizations can design controls as required, or identify them from any source
c) C o mp are the co ntro ls determined in 6 . 1 . 3 b ) ab o ve with tho se in Annex A and verify that no necessary co ntro ls have
b een o mitted;
NOTE: Annex A contains a comprehensive list of control objectives and controls. Users of this International Standard are
directed to Annex A to ensure that no necessary controls are overlooked
NOTE: Control objectives are implicitly included in the controls chosen. The control objectives and controls listed in Annex A are
not exhaustive and additional control objectives and controls may be needed
d) P ro duce a S tatement o f Ap p licab ility that co ntains the necessary co ntro ls (see 6 . 1 . 3 b ) and c) ) and j ustificatio n fo r
inclusio ns, whether they are imp lemented o r no t, and the j ustificatio n fo r exclusio ns o f co ntro ls fro m Annex A.
Wo rkb o o k ch e ckl i s t
The two basic questions that may be addressed to each of the control requirements are as follows.
Q1 . Has this control requirement been implemented? Three answers are possible:
• YE S – This indicates that there is a control in place that completely fulfils the control requirements.
An explanation with reference to supporting evidence should be given justifying this answer – see
‘Comments’.
• PARTI AL – This indicates that some measures are in place that address the control requirements but
not sufficiently to allow an answer of ‘yes’ to be given. An explanation with reference to
supporting evidence should be given justifying this answer – see ‘Comments’.
• NO – This indicates that no measures have been taken to address the control requirements. This is
also the correct answer if the control is not relevant to the system under review as determined by
the risk assessment and risk treatment processes (see ISO/IEC 27001 :201 3, 6.1 .2 to 6.1 .3). A ‘no’
response may also be given if a control requirement is relevant but is not yet implemented or the
requirement has been satisfied by deploying another control.
Q2. If the control requirement has not been fully implemented then why is this the case?
It will be important to understand the reasons and justification for either partial or
non-implementation. Supporting evidence for an answer stating that the control requirement, has been
completely addressed would also be helpful.
The ISMS implementation is based on a risk management process. A third-party certification or internal
ISMS audit will check and require evidence that the ISMS has been developed and implemented based
on a risk management process. One important audit requirement is that any implemented ISMS system
of controls can be traced back to the risk assessment and risk treatment processes. Consequently, if this
workbook check is carried out just prior to the certification, e.g. as a pre-certification assessment, then
the absence or non-applicability of controls should be documented and justified with supporting
evidence based on the results of the risk assessment. One example of such a justification is that the
implementation of a particular control could not be justified by the levels of risk exposure, or that the
risk treatment decision was different from reducing the risk.
COM M E N TS: In all cases some further comment should be given to expand on the particular control
implementation, or reasons for partial or non-implementation. Such comments could include:
• where there are controls deemed to be in place, it may be useful to describe evidence and
justifications for their implementation, and the way in which they have been implemented This in
itself may lead to identification and recognition that further action and work still needs to be done
in that area, or to support the activities described in the ‘Performance evaluation’ stage (Clause 9).
Alternatively, setting out the implemented controls in this way may indicate that more is being
done than necessary and that savings can be made by reducing some controls;
• where control requirements have not or have only been partially met, an indication should be
given of what steps are to be taken and over what time period to mitigate the (partial) absence of
the control requirement, and justification for this status should be given;
• where a decision has been made to take no further action to implement controls in a given area,
in effect, a decision has been taken to accept this as a potential risk. Such a decision should be
clearly documented and justified to be fully understood and explained.
To help those completing this guide, an example page from one of the questionnaire sections follows.
7. Support
7. 2 . c. Co m p e te n ce
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reason in the
following table
A.6.2.1 There is a process in place but it is not Management needs to take action
fully operational. Although actions have to ensure that this evaluation
been taken to acquire the necessary activity gets done: by reassessing
competence, the evaluation of the the resources needed, and to
effectiveness of these actions has yet to reassign the work if necessary, and
be carried out. The reason for this that to properly schedule and prioritise
those tasked with carrying the work the work to ensure the resource is
were employed on other tasks. available to do the work within a
given time frame
It is important to lay a firm foundation for the ISMS process within which a system of controls is
implemented Clauses 4 to 1 0 of ISO/IEC 27001 :201 3 provide requirements for establishing,
implementing, maintaining and continually improving an ISMS. The user guide BIP 0071 expands on the
issues involved By referring to these two documents as necessary, you should review and follow the
compliance checks addressed in this Clause in the following tables.
Guidance on completing the questionnaires can be found in Section 3.1 of this guide
Please note that the question given in the tables below are based on requirements that are mandatory
for any organization claiming compliance with ISO/IEC 27001 :201 3, and should be addressed by any
organization that aims for accredited ISO/IEC 27001 :201 3 certification.
Q1 . Consider the following aspect relating to the organizational context of the ISMS. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
4.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate Where
aspects are already addressed it may be helpful to provide detail on actions taken.
Q1 . Consider the following aspects relating to interested parties. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
4.2.a
4.2.b
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
Q1 . Consider the following aspects relating to the scope of the ISMS. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
4.3.a
4.3.b
4.3.c
4.3.d
4.3.e
CO M M E N TS:Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
Q1 . Consider the following aspects relating to the status of the ISMS. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
4.4.a
4.4.b
4.4.c
4.4.d
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
5 Lea d ersh i p
5. 1 Leadership and commitment
As p e ct YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
5.1 .a
5.1 .b
5.1 .c
5.1 .d
5.1 .e
5.1 .f
5.1 .g
5.1 .h
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
5 Leadership
5. 2 Policy
Q1 . Consider the following aspects relating to the information security policy. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
5.2.a
5.2.b
5.2.c
5.2.d
5.2.e
5.2.f
5.2.g
CO M M E N TS:Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
5 Leadership
5. 3 Organizational roles, responsibilities and authorities
Q1 . Consider the following aspects relating to roles, responsibilities and authorities. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
5.3.a
5.3.b
5.3.c
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
6 Pl a n n i n g
6. 1 Actions to address risks and opportunities
6. 1 . 1 General
As p e ct YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
6.1 .1 .a
6.1 .1 .b
6.1 .1 .c
6.1 .1 .d
6.1 .1 .e
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
6 Pl a n n i n g
As p e ct YE S PARTI AL NO
6 . 1 . 2 . a D o e s th e o rg a n i za ti o n d e fi n e a n d a p p l y a n i n fo rm a ti o n
i n fo rm a ti o n se cu ri ty ri sk cri te ri a th a t i n cl u d e : 1 ) th e ri sk
6 . 1 . 2 . b D o e s th e o rg a n i za ti o n d e fi n e a n d a p p l y a n
i n fo rm a ti o n se cu ri ty ri sk a ssessm e n t p ro ce ss th a t e n su re s th a t
co n si ste n t, va l i d a n d co m p a ra b l e re su l ts?
6 . 1 . 2 . c D o e s th e o rg a n i za ti o n d e fi n e a n d a p p l y a n i n fo rm a ti o n
a sso ci a te d wi th th e l o ss o f co n fi d e n ti a l i ty, i n te g ri ty a n d
a va i l a b i l i ty fo r i n fo rm a ti o n wi th i n th e sco p e o f th e
i n fo rm a ti o n se cu ri ty m a n a g em e n t syste m ; a n d 2 ) i d e n ti fi es th e
ri sk o wn e rs?
6 . 1 . 2 . d D o e s th e o rg a n i za ti o n d e fi n e a n d a p p l y a n
i n fo rm a ti o n se cu ri ty ri sk a ssessm e n t p ro ce ss th a t a n a l yse s th e
co n se q u e n ce s th a t wo u l d re su l t i f th e ri sks i d e n ti fi e d i n 6 . 1 . 2
d e te rm i n e s th e l e ve l s o f ri sk?
6 . 1 . 2 . e D o e s th e o rg a n i za ti o n d e fi n e a n d a p p l y a n i n fo rm a ti o n
wi th th e ri sk cri te ri a e sta b l i sh e d i n 6 . 1 . 2 a ) ; a n d 2 ) p ri o ri ti ze s
6 . 1 . 2 . f D o e s th e o rg a n i za ti o n re ta i n d o cu m e n te d i n fo rm a ti o n
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
6.1 .2.a
6.1 .2.b
6.1 .2.c
6.1 .2.d
6.1 .2.e
6.1 .2.f
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
6 Pl a n n i n g
6. 1 Actions to address risks and opportunities
6. 1 . 3 Information security risk treatment
As p e ct YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
6.1 .3.a
6.1 .3.b
6.1 .3.c
6.1 .3.d
6.1 .3.e
6.1 .3.f
6.1 .3.h
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
6 Pl a n n i n g
6. 2 Information security objectives and plans to achieve them
Q1 . Con si d er th e fol l owi n g a spects rel a ti n g to i n form a ti on secu ri ty obj ecti ves. Ti ck on e box.
As p e ct YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
6.2.a
6.2.b
6.2.c
6.2.d
6.2.e
6.2.f
6.2.h
6.2.i
6.2.j
6.2.k
6.2.l
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7 Support
7. 1 Resources
Q1 . Consider the following aspect relating to resources required Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7. Support
7. 2 Competence
Q1 . Consider the following aspects relating to training and competence Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.2.a
7.2.b
7.2.c
7.2.d
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7. Support
7. 3 Awareness
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.3.a
7.3.b
7.3.c
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7. Support
7. 4 Communication
Q1 . Consider the following aspects relating to training, awareness and competence Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.4.a
7.4.b
7.4.c
7.4.d
7.4.e
7.4.f
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7. Support
7. 5 Documented information
7. 5. 1 General
Q1 . Consider the following aspects relating to the existence of ISMS documentation. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.5.1 .a
7.5.1 .b
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7. Support
7. 5 Documented information
7. 5. 2 Creating and updating
Q1 . Consider the following aspects relating to creating and updating ISMS documentation. Tick one
box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.5.2.a
7.5.2.b
7.5.2.c
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
7 Su pport
7. 5 Documented information
7. 5. 3 Control of documented information
Q1 . Con si d er th e fol l owi n g a spects rel a ti n g to con trol of d ocu m en ted i n form a ti on . Ti ck on e box.
As p e ct YE S PARTI AL NO
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
7.5.3.a
7.5.3.b
7.5.3.c
7.5.3.d
7.5.3.e
7.5.3.f
7.5.3.g
7.5.3.h
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
8 Operations
8. 1 Operational planning and control
Q1 . Consider the following aspects relating to operational planning and control. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
8.1 .a
8.1 .b
8.1 .c
8.1 .d
8.1 .e
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
8 Operations
8. 2 Information security risk management
Q1 . Consider the following aspects relating to risk assessments. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
8.2.a
8.2.b
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
8. Operations
8. 3 Information security risk treatment
Q1 . Consider the following aspects relating to risk treatment. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
8.3.a
8.3.b
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
9 P e rfo rm a n ce e va l u a ti o n
Q 1 . C o n s i d e r t h e fo l l o wi n g a s p e cts re l a t i n g to m e a s u re m e n t o f p e rfo rm a n ce o f th e I SM S. Ti ck o n e b o x.
As p e ct YE S PARTI AL NO
9. 1 . a I s th e re a p ro ce s s i n p l a ce and bei n g u se d to e va l u a t e
th e i n fo rm a t i o n s e cu ri ty m a n a g e m e n t s ys te m ?
9. 1 . b D o e s th e p ro ce s s d e te rm i n e wh a t n e e d s to be
m o n i to re d and m e a s u re d , i n cl u d i n g i n fo rm a ti o n s e cu ri ty
p ro ce s s e s a n d co n t ro l s ?
9 . 1 . c D o e s th e p ro ce s s d e te rm i n e th e m e th o d s fo r m o n i to ri n g ,
m e a s u re m e n t, a n a l ys i s a n d e va l u a ti o n , a s a p p l i ca b l e , to
e n s u re va l i d re s u l t s ?
9. 1 . d D o e s th e p ro ce s s d e te rm i n e wh e n th e m o n i to ri n g and
m e a s u ri n g sh a l l be p e rfo rm e d ?
9. 1 . e D o e s th e p ro ce s s d e te rm i n e wh o sh a l l m o n i to r a n d
m e a s u re ?
9 . 1 . f D o e s th e p ro ce s s d e te rm i n e wh e n th e re s u l t s fro m
m o n i to ri n g and m e a s u re m e n t s h a l l be a n a l ys e d and
e va l u a t e d ?
9. 1 . g D o e s th e p ro ce s s d e te rm i n e wh o sh a l l a n a l ys e and
e va l u a t e th e s e re s u l ts ?
9. 1 . h D o e s th e o rg a n i z a t i o n re ta i n a p p ro p ri a te d o cu m e n te d
i n fo rm a ti o n a s e vi d e n ce o f th e m o n i to ri n g and m e a s u re m e n t
re s u l ts ?
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
9.1 .a
9.1 .b
9.1 .c
9.1 .d
9.1 .e
9.1 .f
9.1 .g
9.1 .h
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
9 Perform a n ce eva l u a ti on
9. 2 Internal audit
As p e ct YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
9.2.a
9.2.b
9.2.c
9.2.d
9.2.e
9.2.f
9.2.g
9.2.h
9.2.i
9.2.j
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
9 . Perfo rm a n ce e va l u a ti o n
9. 3 Management review
Q1 . Co n si d e r th e fo l l o wi n g a sp e cts re l a ti n g to to p m a n a g e m e n t re vi e w o f th e I S M S . Ti ck o n e b o x.
As p e ct YE S PARTI AL NO
9 . 3 . a I s th e re a p ro ce ss i n p l a ce a n d b e i n g u se d b y to p
m a n a g e m e n t to re vi ew th e o rg a n i za ti o n ’s i n fo rm a ti o n
se cu ri ty m a n a g e m en t system a t p l a n n e d i n te rva l s to e n su re i ts
9 . 3 . b D o e s th e re vi e w i n cl u d e co n si d e ra ti o n o f th e sta tu s o f
9 . 3 . c D o e s th e re vi e w i n cl u d e co n si d e ra ti o n o f ch a n g e s i n
e xtern a l a n d i n te rn a l i ssu e s th a t a re re l e va n t to th e
i n fo rm a ti o n se cu ri ty m a n a g e m e n t syste m ?
9 . 3 . d D o e s th e re vi e w i n cl u d e co n si d e ra ti o n o f fe e d b a ck o n
th e i n fo rm a ti o n se cu ri ty p e rfo rm a n ce , i n cl u d i n g tre n d s i n : 1 )
m e a su re m e n t re su l ts; 3 ) a u d i t re su l ts; a n d 4) fu l fi l m e n t o f
i n fo rm a ti o n se cu ri ty o b j e cti ve s?
9 . 3 . e D o e s th e re vi e w i n cl u d e co n si d e ra ti o n o f fe e d b a ck fro m
i n te re ste d p a rti e s?
9 . 3 . f D o e s th e re vi e w i n cl u d e co n si d e ra ti o n o f re su l ts o f ri sk
9 . 3 . g D o th e se re vi e ws i n cl u d e co n si d era ti o n o f o p p o rtu n i ti e s
fo r co n ti n u a l i m p ro ve m e n t?
9 . 3 . h D o th e o u tp u ts o f th e m a n a g e m e n t re vi e w i n cl u d e
d e ci si o n s re l a te d to co n ti n u a l i m p ro ve m e n t o p p o rtu n i ti e s a n d
a n y ch a n g e s n e e d e d to th e i n fo rm a ti o n se cu ri ty m a n a g e m e n t
syste m ?
9 . 3 . i D o e s th e o rg a n i za ti o n re ta i n d o cu m e n te d i n fo rm a ti o n a s
e vi d en ce o f th e re su l ts o f m a n a g e m e n t re vi e ws?
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
9.3.a
9.3.b
9.3.c
9.3.d
9.3.e
9.3.f
9.3.g
9.3.h
9.3.i
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
1 0 I m p ro vem e n t
As p e ct YE S PARTI AL NO
1 0. 1 . a I s th ere a p ro ce ss i n p l a ce a n d b e i n g u se d b y th e
o rg a n i za ti o n to re a ct to a n y n o n co n fo rm i ty, a n d a s
d e a l wi th th e co n se q u e n ce s?
1 0. 1 . b I s th e re a p ro ce ss i n p l a ce a n d b e i n g u se d b y th e
o rg a n i za ti o n to e va l u a te th e n e e d fo r a cti o n to e l i m i n a te th e
ca u se s o f a n y n o n co n fo rm i ty, i n o rd e r th a t i t d o e s n o t re cu r
d e te rm i n i n g th e ca u se s o f th e n o n co n fo rm i ty; a n d 3 )
d e te rm i n i n g i f si m i l a r n o n co n fo rm i ti e s e xi st, o r co u l d
p o te n ti a l l y o ccu r?
1 0. 1 . c I s th e re a p ro ce ss i n p l a ce a n d b e i n g u se d b y th e
o rg a n i za ti o n to i m p l e m e n t a n y a cti o n n e e d e d ?
1 0. 1 . d I s th e re a p ro ce ss i n p l a ce a n d b e i n g u se d b y th e
a cti o n ta ke n ?
1 0. 1 . e I s th ere a p ro ce ss i n p l a ce a n d b e i n g u se d b y th e
o rg a n i za ti o n to m a ke ch a n g e s to th e i n fo rm a ti o n se cu ri ty
1 0. 1 . f I s th e re a p ro ce ss i n p l a ce a n d b e i n g u se d b y th e
to th e e ffects o f th e n o n co n fo rm i ti e s e n co u n te re d ?
1 0. 1 . g D o e s th e o rg a n i za ti o n re ta i n d o cu m e n te d i n fo rm a ti o n
a s e vi d e n ce o f th e n a tu re o f th e n o n co n fo rm i ti e s a n d a n y
su b se q u e n t a cti o n s ta ke n ?
1 0. 1 . h D o e s th e o rg a n i za ti o n re ta i n d o cu m e n te d i n fo rm a ti o n
Q2 . If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
1 0.1 .a
1 0.1 .b
1 0.1 .c
1 0.1 .d
1 0.1 .e
1 0.1 .f
1 0.1 .g
1 0.1 .h
Enter a more detailed explanation of the reason(s) indicated above. Where aspects are
CO M M E N TS:
already addressed it may be helpful to provide details on actions taken.
1 0 Improvement
1 0. 2 Continual improvement
Q1 . Consider the following aspect relating to continual improvement. Tick one box.
Aspect YE S PARTI AL NO
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
1 0.2
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
aspects are already addressed it may be helpful to provide details on actions taken.
The following questionnaires should be addressed to determine the extent to which the control
requirements from Annex A of ISO/IEC 27001 :201 3 have been implemented within the ISMS. Guidance
on completing the questionnaires can be found in Section 3.2 of this guide
Please note that exclusions to the following controls can only be made if these exclusions do not affect
the organization’s ability, and/or responsibility, to provide information security that meets the security
requirements determined by risk assessment and applicable regulatory requirements. Any exclusions of
controls found to be necessary to satisfy the risk acceptance criteria need to be justified, and evidence
needs to be provided to show that the associated risks have been accepted by those with sufficient
management seniority within the organization who are accountable to the board, owner and
shareholders for corporate decisions.
BIP 0073 (and ISO/IEC 27002: 201 3) provides implementation guidance and further information
regarding the control questions given in the tables below e.g. the control question for A.1 6.1 .7 talks
about evidence, and BIP 0073 and ISO/IEC 27002 provides some examples of this evidence.
NOTE The control guidance given in ISO/IEC 27002 is not mandatory, it is purely helpful guidance and so does not
play any part in an ISO/IEC 27001 : 201 3 certification audit.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.5.1 .1
A.5.1 .2
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.6.1 .1
A.6.1 .2
A.6.1 .3
A.6.1 .4
A.6.1 .5
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.6.2.1
A.6.2.2
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.7.1 .1
A.7.1 .2
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.7.2.1
A.7.2.2
A.7.2.3
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.7.3.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.8.1 .1
A.8.1 .2
A.8.1 .3
A.8.1 .4
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.8.2.1
A.8.2.2
A.8.2.3
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.8.3.1
A.8.3.2
A.8.3.3
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.9.1 .1
A.9.1 .2
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.9.2.1
A.9.2.2
A.9.2.3
A.9.2.4
A.9.2.5
A.9.2.6
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.9.3.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.9.4.1
A.9.4.2
A.9.4.3
A.9.4.4
A.9.4.5
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
A.1 0 Cryptography
A.1 0.1 Cryptographic controls
Objective: To ensure proper and effective use of cryptography to protect the confidentiality,
authenticity and/or integrity of information.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 0.1 .1
A.1 0.1 .2
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 1 .1 .1 .
A.1 1 .1 .2.
A.1 1 .1 .3.
A.1 1 .1 .4.
A.1 1 .1 .5.
A.1 1 .1 .6.
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
A. 1 1 P h ys i ca l and e n vi ro n m e n ta l s e cu ri ty
A. 1 1 . 2 E q u i pm en t
Objective: To prevent loss, damage, theft or compromise of assets and interruption to the
organization’s operations.
Q 1 . I m p l e m e n ta ti o n s ta tu s . Ti ck o n e b o x fo r e a ch co n tro l re q u i re m e n t.
Co n tro l re q u i re m e n t YE S PARTI AL NO
A. 1 1 . 2 . 1 I s e q u i p m e n t si te d and p ro t e cte d to re d u ce th e ri s ks
fo r u n a u th o ri z e d a cce s s ?
and o th e r d i s ru p ti o n s ca u s e d b y fa i l u re s i n s u p p o rt i n g
u ti l i ti e s ?
A. 1 1 . 2 . 3 Are p o we r a n d te l e co m m u n i ca ti o n s ca b l i n g ca rryi n g
i n te rce p ti o n , i n te rfe re n ce or d a m a g e?
A. 1 1 . 2 . 4 I s e q u i p m e n t b e i n g co rre ctl y m a i n ta i n e d to e n s u re i ts
co n ti n u e d a va i l a b i l i ty a n d i n te g ri t y?
A. 1 1 . 2 . 5 I s e q u i p m e n t, i n fo rm a ti o n o r s o ftwa re n ot bei n g
t a ke n o ff- s i te wi th o u t p ri o r a u th o ri z a ti o n ?
A. 1 1 . 2 . 6 I s s e cu ri ty a p p l i e d to o ff- s i te a s s e ts , ta ki n g i n to
o rg a n i z a ti o n ’s p re m i s e s ?
A. 1 1 . 2 . 7 Are all i te m s o f e q u i p m e n t co n t a i n i n g s t o ra g e m ed i a
bei n g ve ri fi e d to e n s u re t h a t a n y s e n s i ti ve d a ta and l i ce n s e d
d i sp o sa l o r re - u s e ?
A. 1 1 . 2 . 8 D o u s e rs e n s u re th a t u n a tt e n d e d eq u i pm en t h a s
a p p ro p ri a te p ro t e cti o n ?
A. 1 1 . 2 . 9 Has a cl e a r d e s k p o l i c y fo r p a p e rs a n d re m o va b l e
s to ra g e m ed i a and a cl e a r s cre e n p o l i cy fo r i n fo rm a t i o n
p ro ce s s i n g fa ci l i ti e s b e e n a d o p te d ?
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 1 .2.1
A.1 1 .2.2
A.1 1 .2.3
A.1 1 .2.4
A.1 1 .2.5
A.1 1 .2.6
A.1 1 .2.7
A.1 1 .2.8
A.1 1 .2.9
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.1 .1
A.1 2.1 .2
A.1 2.1 .3
A.1 2.1 .4
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.2.1
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.3.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.4.1
A.1 2.4.2
A.1 2.4.3
A.1 2.4.4
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.5.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.6.1
A.1 2.6.2
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 2.7.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 3.1 .1
A.1 3.1 .2
A.1 3.1 .3
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 3.2.1
A.1 3.2.2
A.1 3.2.3
A.1 3.2.4
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 4.1 .1
A.1 4.1 .2
A.1 4.1 .3
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
A. 1 4 S ys te m a cq u i s i ti o n , d e ve l o p m e n t a n d m a i n te n a n ce
A. 1 4. 2 S e cu ri ty i n d e ve l o p m e n t a n d s u p p o rt p ro ce s s e s
Objective: To ensure that information security is designed and implemented within the
development life cycle of information systems.
Q 1 . I m p l e m e n ta ti o n s ta tu s . Ti ck o n e b o x fo r e a ch co n tro l re q u i re m e n t.
Co n tro l re q u i re m e n t YE S PARTI AL NO
s ys te m s e s ta b l i s h e d and a re th e y b e i n g a ppl i ed to
d e ve l o p m e n ts wi t h i n th e o rg a n i z a t i o n ?
A. 1 4. 2 . 2 Are ch a n g e s to s ys te m s wi th i n th e d e ve l o p m e n t l i fe
p ro ce d u re s ?
A. 1 4. 2 . 3 Wh e n o p e ra ti n g p l a tfo rm s a re ch a n g e d , a re b u si n e ss
cri ti ca l a p p l i ca ti o n s re vi e we d and te s te d to e n s u re th e re is no
a d ve rs e i m p a ct o n o rg a n i z a ti o n a l o p e ra ti o n s o r s e cu ri ty?
co n tro l l e d ?
A. 1 4. 2 . 5 Are p ri n ci p l e s fo r e n g i n e e ri n g s e cu re s ys te m s b e i n g
i n fo rm a ti o n s ys te m i m p l e m e n ta ti o n e ffo rts ?
A. 1 4. 2 . 6 D o e s th e o rg a n i z a t i o n e s ta b l i s h and a p p ro p ri a te l y
p ro te ct s e cu re d e ve l o p m e n t e n vi ro n m e n ts fo r s ys t e m
d e ve l o p m e n t a n d i n te g ra ti o n e ffo rts . Do th e s e s e cu re
d e ve l o p m e n t e n vi ro n m e n t s co ve r th e e n ti re s ys t e m
d e ve l o p m e n t l i fe cycl e ?
A. 1 4. 2 . 7 D o e s th e o rg a n i z a t i o n s u p e rvi s e and m o n i to r th e
a ct i vi t y o f o u ts o u rce d s ys te m d e ve l o p m e n t?
A. 1 4. 2 . 8 I s t e s ti n g o f s e cu ri ty fu n cti o n a l i ty b e i n g ca rri e d ou t
d u ri n g d e ve l o p m e n t?
A. 1 4. 2 . 9 Are a cc e p ta n ce te s ti n g p ro g ra m s a n d re l a te d cri te ri a
bei n g e s ta b l i s h e d fo r n e w i n fo rm a ti o n s ys te m s , u p g ra d e s a n d
n e w ve rs i o n s ?
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 4.2.1
A.1 4.2.2
A.1 4.2.3
A.1 4.2.4
A.1 4.2.5
A.1 4.2.6
A.1 4.2.7
A.1 4.2.8
A.1 4.2.9
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 4.3.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 5.1 .1
A.1 5.1 .2
A.1 5.1 .3
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 5.2.1
A.1 5.2.2
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
A. 1 6 I n fo rm a ti o n s e c u ri ty i n ci d e n t m a n a g e m e n t
A. 1 6 . 1 M a n a g e m e n t o f i n fo rm a t i o n s e cu ri ty i n ci d e n ts a n d i m p ro ve m e n ts
Q 1 . I m p l e m e n ta ti o n s ta tu s . Ti ck o n e b o x fo r e a ch co n tro l re q u i re m e n t .
Co n tro l re q u i re m e n t YE S PARTI AL NO
A. 1 6 . 1 . 1 H a ve m a n a g e m e n t re s p o n s i b i l i ti e s a n d p ro ce d u re s
re s p o n s e to i n fo rm a ti o n s e cu ri ty i n ci d e n ts ?
A. 1 6 . 1 . 2 Are i n fo rm a ti o n s e cu ri t y e ve n ts b e i n g re p o rte d
t h ro u g h a p p ro p ri a te m a n a g e m e n t ch a n n e l s a s q u i ckl y a s
p o ssi b l e ?
o rg a n i z a ti o n ’s i n fo rm a t i o n s ys te m s a n d s e rvi ce s re q u i re d to
s e cu ri ty we a kn e s s e s i n s ys te m s o r s e rvi ce s ?
i t bei n g d e ci d e d i f th e y a re to be cl a s s i fi e d a s i n fo rm a ti o n
s e cu ri ty i n ci d e n ts ?
A. 1 6 . 1 . 5 Are i n fo rm a ti o n s e cu ri t y i n ci d e n t s b e i n g re s p o n d e d
to in a cco rd a n ce wi th th e d o cu m e n te d p ro ce d u re s ?
A. 1 6 . 1 . 6 I s th e kn o wl e d g e g a i n ed fro m a n a l ys i n g and
re s o l vi n g i n fo rm a ti o n s e cu ri t y i n ci d e n ts b e i n g u se d to re d u ce
th e l i ke l i h o o d o r i m p a ct o f fu tu re i n ci d e n t s ?
A. 1 6 . 1 . 7 D o e s th e o rg a n i z a t i o n d e fi n e and a p p l y p ro ce d u re s
fo r th e i d e n ti fi ca ti o n , co l l e ct i o n , a cq u i s i ti o n and p re s e rva ti o n
o f i n fo rm a t i o n , wh i ch ca n s e rve a s e vi d e n ce ?
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 6.1 .1
A.1 6.1 .2
A.1 6.1 .3
A.1 6.1 .4
A.1 6.1 .5
A.1 6.1 .6
A.1 6.1 .7
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above. Where control
measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for details.
Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 7.1 .1
A.1 7.1 .2
A.1 7.1 .3
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 7.2.1
CO M M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
A.1 8 Compliance
A.1 8.1 Compliance with legal and contractual requirements
Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to
information security and of any security requirements.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 8.1 .1
A.1 8.1 .2
A.1 8.1 .3
A.1 8.1 .4
A.1 8.1 .5
COM M E N TS: Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.
A.1 8 Compliance
A.1 8.2 Information security reviews
Objective: To ensure that information security is implemented and operated in accordance with the
organizational policies and procedures.
Q2. If you have ticked either of the boxes marked PARTI AL or NO you should indicate the reasons and
justification in the following boxes.
A.1 8.2.1
A.1 8.2.2
A.1 8.2.3
CO M M E N TS:Enter a more detailed explanation of the reason(s) indicated above as appropriate. Where
control measures are in place it may be helpful to provide details on actions taken. See Section 3.2 for
details. Use additional sheets if necessary.