Technical Control For ISO27001:2022
Technical Control For ISO27001:2022
Technical Control For ISO27001:2022
Examples of
Control Tools/Technique Explanation
Controls
Category s
IAM solutions
provide
centralized
user identity
- Identity and management,
access access
management provisioning,
(IAM) solutions and single
(e.g., Microsoft sign-on
Azure AD, Okta, capabilities.
OneLogin)<br>- MFA adds an
Multi-factor extra layer of
- Access control authentication security by
policy<br>- User (MFA) tools (e.g., requiring users
Access Control access Duo Security, to provide
management<br>- Google multiple forms
User responsibilities Authenticator, of
RSA authentication
SecurID)<br>- (e.g., password
Privileged access and biometric).
management PAM tools
(PAM) software manage and
(e.g., CyberArk, monitor the
BeyondTrust, use of
Centrify) privileged
accounts,
which have
elevated
access rights.
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
Encryption
tools protect
the
confidentiality
of data by
converting it
into a coded
- Encryption tools format that
(e.g., BitLocker, can only be
FileVault, accessed with
VeraCrypt)<br>- the correct
Public Key decryption key.
Infrastructure PKI solutions
(PKI) solutions manage the
(e.g., Microsoft creation,
- Cryptographic
Cryptography Certificate distribution,
controls
Services, DigiCert, and revocation
GlobalSign)<br>- of digital
Hardware security certificates
modules (HSMs) used for
(e.g., Thales encryption and
nShield, digital
Securosys, signatures.
Utimaco) HSMs are
dedicated
hardware
devices that
securely
generate,
store, and
process
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
cryptographic
keys.
Access control
systems
restrict
physical entry
to facilities and
data centers
- Access control based on
systems (e.g., authentication
magnetic locks, factors like
biometric readers, cards,
RFID)<br>- biometrics, or
- Physical security
Surveillance proximity.
perimeter<br>-
systems (e.g., Surveillance
Physical and Physical entry
CCTV, motion systems detect
Environmental controls<br>-
detectors)<br>- and record
Security Protecting against
Environmental physical
environmental
monitoring and security
threats
control systems incidents.
(e.g., fire Environmental
suppression, monitoring
cooling, power and control
backup) systems
protect against
natural and
human-caused
disasters that
could impact
the availability
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
and integrity
of information
assets.
ITSM tools
help
- IT service organizations
management manage IT
(ITSM) tools (e.g., operations,
ServiceNow, including
Cherwell, change
Atlassian Jira management,
Service problem
Desk)<br> management,
- Anti-malware and incident
- Operational
solutions (e.g., response. Anti-
procedures and
Microsoft malware
Operations responsibilities<br>
Defender, solutions
Security - Protection from
Symantec detect,
malware<br>-
Endpoint prevent, and
Backups
Protection, Trend remove
Micro)<br>- malicious
Backup and software.
disaster recovery Backup and
software (e.g., disaster
Veeam, Veritas recovery
Backup Exec, software
Microsoft Azure ensures the
Backup) availability and
recoverability
of information
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
assets in the
event of a
system failure
or data loss.
Firewalls
control and
monitor the
flow of
network traffic,
protecting
- Firewalls (e.g.,
against
Palo Alto
unauthorized
Networks,
access and
Fortinet,
potential
Cisco)<br>-
threats. VPNs
Virtual private
establish
- Network security networks (VPNs)
Communication secure,
management<br>- (e.g., OpenVPN,
s Security encrypted
Information transfer ExpressVPN, Cisco
connections
AnyConnect)<br>
between
- Secure file
remote users
transfer solutions
and the
(e.g., SFTP, FTPS,
organization's
Secure email
network,
gateways)
enabling
secure remote
access. Secure
file transfer
solutions
ensure the
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
confidentiality
and integrity
of information
during
transmission.
SDLC tools
integrate
security
practices into
- Secure software
the software
development
development
lifecycle (SDLC)
process,
tools (e.g.,
helping to
SonarQube,
identify and
Veracode,
- Security mitigate
Fortify)<br>-
System requirements of vulnerabilities.
Configuration
Acquisition, information Configuration
management
Development systems<br>- management
tools (e.g.,
and Security in tools automate
Ansible, Puppet,
Maintenance development and the
Chef)<br>-
support processes deployment
Vulnerability
and
management
maintenance
solutions (e.g.,
of secure
Tenable Nessus,
configurations
Rapid7 InsightVM,
for information
Qualys)
systems.
Vulnerability
management
solutions
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
continuously
scan for and
report on
security
vulnerabilities,
enabling
timely
remediation.
Vendor risk
management
platforms
assess,
monitor, and
manage the
- Vendor risk
security risks
management
posed by
platforms (e.g.,
third-party
Aravo, Prevalent,
- Information suppliers and
Supplier BitSight)<br>-
security in supplier partners.
Relationships Contract
relationships Contract
management
management
software (e.g.,
software helps
Icertis, Ironclad,
organizations
ContractPodAI)
ensure that
security
requirements
are properly
defined and
contractually
Technical Examples of
Examples of
Control Tools/Technique Explanation
Controls
Category s
agreed upon
with suppliers.
SIEM tools
provide
centralized
security
monitoring,
- Security alerting, and
information and analytics to
event support the
management detection,
(SIEM) tools (e.g., investigation,
Splunk, IBM and response
Information - Management of QRadar, Sumo to security
Security information security Logic)<br>- incidents.
Incident incidents and Incident response Incident
Management improvements and management response and
platforms (e.g., management
Palo Alto platforms
Networks Cortex streamline the
XSOAR, IBM coordination,
Resilient, documentation
ServiceNow ITSM) , and reporting
of security
incidents and
the associated
corrective
actions.
information
systems.