ISO 27001:2022 Gap Assessment Jan 15, 2025 | Uncategorized | 0 comments ISO 27001:2022 Gap Assessment Test Questions. Enter email to receive results: 73Organisational Control73737373737373737373737373737373737373737373737373737373737373737373737374Physical Control7474747474747474747474747475People Control7575757575757576Technology Control767676767676767676767676767676767676767676767676767676767676767676Page 1 of 4Organisational Control 1. Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occurCompliantPartially CompliantNon-Compliant 2. Information security roles and responsibilities shall be defined and allocated according to the organization needs.CompliantPartially CompliantNon-Compliant 3. Conflicting duties and conflicting areas of responsibility shall be segregated.CompliantPartially CompliantNon-Compliant 4. Management shall require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization.CompliantPartially CompliantNon-Compliant 5. The organization shall establish and maintain contact with relevant authorities.CompliantPartially CompliantNon-Compliant 6. The organization shall establish and maintain contact with special interest groups or other specialist security forums and professional associations.CompliantPartially CompliantNon-Compliant 7. Information relating to information security threats shall be collected and analysed to produce threat intelligence.CompliantPartially CompliantNon-Compliant 8. Information security shall be integrated into project management.CompliantPartially CompliantNon-Compliant 9. An inventory of information and other associated assets, including owners, shall be developed and maintained.CompliantPartially CompliantNon-Compliant 10. Rules for the acceptable use and procedures for handling information and other associated assets shall be identified, documented and implemented.CompliantPartially CompliantNon-Compliant 11. Personnel and other interested parties as appropriate shall return all the organization’s assets in their possession upon change or termination of their employment, contract or agreement.CompliantPartially CompliantNon-Compliant 12. Information shall be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements.CompliantPartially CompliantNon-Compliant 13. An appropriate set of procedures for information labelling shall be developed and implemented in accordance with the information classification scheme adopted by the organization.CompliantPartially CompliantNon-Compliant 14. Information transfer rules, procedures, or agreements shall be in place for all types of transfer facilities within the organization and between the organization and other parties.CompliantPartially CompliantNon-Compliant 15. Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements.CompliantPartially CompliantNon-Compliant 16. The full life cycle of identities shall be managed.CompliantPartially CompliantNon-Compliant 17. Allocation and management of authentication information shall be controlled by a management process, including advising personnel on appropriate handling of authentication information.CompliantPartially CompliantNon-Compliant 18. Access rights to information and other associated assets shall be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy on and rules for access control.CompliantPartially CompliantNon-Compliant 19. Processes and procedures shall be defined and implemented to manage the information security risks associated with the use of supplier’s products or services.CompliantPartially CompliantNon-Compliant 20. Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.CompliantPartially CompliantNon-Compliant 21. Processes and procedures shall be defined and implemented to manage the information security risks associated with the ICT products and services supply chain.CompliantPartially CompliantNon-Compliant 22. The organization shall regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery.CompliantPartially CompliantNon-Compliant 23. Processes for acquisition, use, management and exit from cloud services shall be established in accordance with the organization’s information security requirements.CompliantPartially CompliantNon-Compliant 24. The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.CompliantPartially CompliantNon-Compliant 25. The organization shall assess information security events and decide if they are to be categorized as information security incidents.CompliantPartially CompliantNon-Compliant 26. Information security incidents shall be responded to in accordance with the documented procedures.CompliantPartially CompliantNon-Compliant 27. Knowledge gained from information security incidents shall be used to strengthen and improve the information security controls.CompliantPartially CompliantNon-Compliant 28. The organization shall establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events.CompliantPartially CompliantNon-Compliant 29. The organization shall plan how to maintain information security at an appropriate level during disruption.CompliantPartially CompliantNon-Compliant 30. ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.CompliantPartially CompliantNon-Compliant 31. Legal, statutory, regulatory and contractual requirements relevant to information security and the organization’s approach to meet these requirements shall be identified, documented and kept up to date.CompliantPartially CompliantNon-Compliant 32. The organization shall implement appropriate procedures to protect intellectual property rights.CompliantPartially CompliantNon-Compliant 33. Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release.CompliantPartially CompliantNon-Compliant 34. The organization shall identify and meet the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements.CompliantPartially CompliantNon-Compliant 35. The organization’s approach to managing information security and its implementation including people, processes and technologies shall be reviewed independently at planned intervals, or when significant changes occur.CompliantPartially CompliantNon-Compliant 36. Compliance with the organization’s information security policy, topic-specific policies, rules and standards shall be regularly reviewed.CompliantPartially CompliantNon-Compliant 37. Operating procedures for information processing facilities shall be documented and made available to personnel who need them.CompliantPartially CompliantNon-Compliant Page 2 of 4Physical Control 38. Security perimeters shall be defined and used to protect areas that contain information and other associated assets.CompliantPartially CompliantNon-Compliant 39. Secure areas shall be protected by appropriate entry controls and access points.CompliantPartially CompliantNon-Compliant 40. Physical security for offices, rooms and facilities shall be designed and implemented.CompliantPartially CompliantNon-Compliant 41. Premises shall be continuously monitored for unauthorized physical access.CompliantPartially CompliantNon-Compliant 42. Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure shall be designed and implemented.CompliantPartially CompliantNon-Compliant 43. Security measures for working in secure areas shall be designed and implemented.CompliantPartially CompliantNon-Compliant 44. Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities shall be defined and appropriately enforced.CompliantPartially CompliantNon-Compliant 45. Equipment shall be sited securely and protected.CompliantPartially CompliantNon-Compliant 46. Off-site assets shall be protected.CompliantPartially CompliantNon-Compliant 47. Storage media shall be managed through their life cycle of acquisition, use, transportation and disposal in accordance with the organization�s classification scheme and handling requirements.CompliantPartially CompliantNon-Compliant 48. Information processing facilities shall be protected from power failures and other disruptions caused by failures in supporting utilities.CompliantPartially CompliantNon-Compliant 49. Cables carrying power, data or supporting information services shall be protected from interception, interference or damage.CompliantPartially CompliantNon-Compliant 50. Equipment shall be maintained correctly to ensure availability, integrity and confidentiality of information.CompliantPartially CompliantNon-Compliant 51. Items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.CompliantPartially CompliantNon-Compliant Page 3 of 4People Control 52. Background verification checks on all candidates to become personnel shall be carried out prior to joining the organization and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.CompliantPartially CompliantNon-Compliant 53. The employment contractual agreements shall state the personnel�s and the organization�s responsibilities for information security.CompliantPartially CompliantNon-Compliant 54. Personnel of the organization and relevant interested parties shall receive appropriate information security awareness, education and training and regular updates of the organization's information security policy, topic-specific policies and procedures, as relevant for their job function.CompliantPartially CompliantNon-Compliant 55. A disciplinary process shall be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation.CompliantPartially CompliantNon-Compliant 56. Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, enforced and communicated to relevant personnel and other interested parties.CompliantPartially CompliantNon-Compliant 57. Confidentiality or non-disclosure agreements reflecting the organization�s needs for the protection of information shall be identified, documented, regularly reviewed and signed by personnel and other relevant interested parties.CompliantPartially CompliantNon-Compliant 58. Security measures shall be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization�s premises.CompliantPartially CompliantNon-Compliant 59. The organization shall provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.CompliantPartially CompliantNon-Compliant Page 4 of 4Technology Control 60. Information stored on, processed by or accessible via user endpoint devices shall be protected.CompliantPartially CompliantNon-Compliant 61. The allocation and use of privileged access rights shall be restricted and managed.CompliantPartially CompliantNon-Compliant 62. Access to information and other associated assets shall be restricted in accordance with the established topic-specific policy on access control.CompliantPartially CompliantNon-Compliant 63. Read and write access to source code, development tools and software libraries shall be appropriately managed.CompliantPartially CompliantNon-Compliant 64. Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.CompliantPartially CompliantNon-Compliant 65. The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.CompliantPartially CompliantNon-Compliant 66. Protection against malware shall be implemented and supported by appropriate user awareness.CompliantPartially CompliantNon-Compliant 67. Information about technical vulnerabilities of information systems in use shall be obtained, the organization�s exposure to such vulnerabilities shall be evaluated and appropriate measures shall be taken.CompliantPartially CompliantNon-Compliant 68. Configurations, including security configurations, of hardware, software, services and networks shall be established, documented, implemented, monitored and reviewed.CompliantPartially CompliantNon-Compliant 69. Information stored in information systems, devices or in any other storage media shall be deleted when no longer required.CompliantPartially CompliantNon-Compliant 70. Data masking shall be used in accordance with the organization�s topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.CompliantPartially CompliantNon-Compliant 71. Data leakage prevention measures shall be applied to systems, networks and any other devices that process, store or transmit sensitive information.CompliantPartially CompliantNon-Compliant 72. Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.CompliantPartially CompliantNon-Compliant 73. Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.CompliantPartially CompliantNon-Compliant 74. Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analysed.CompliantPartially CompliantNon-Compliant 75. Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.CompliantPartially CompliantNon-Compliant 76. The clocks of information processing systems used by the organization shall be synchronized to approved time sources.CompliantPartially CompliantNon-Compliant 77. The use of utility programs that can be capable of overriding system and application controls shall be restricted and tightly controlled.CompliantPartially CompliantNon-Compliant 78. Procedures and measures shall be implemented to securely manage software installation on operational systems.CompliantPartially CompliantNon-Compliant 79. Networks and network devices shall be secured, managed and controlled to protect information in systems and applications.CompliantPartially CompliantNon-Compliant 80. Security mechanisms, service levels and service requirements of network services shall be identified, implemented and monitored.CompliantPartially CompliantNon-Compliant 81. Groups of information services, users and information systems shall be segregated in the organization�s networks.CompliantPartially CompliantNon-Compliant 82. Access to external websites shall be managed to reduce exposure to malicious content.CompliantPartially CompliantNon-Compliant 83. Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.CompliantPartially CompliantNon-Compliant 84. Rules for the secure development of software and systems shall be established and applied.CompliantPartially CompliantNon-Compliant 85. Information security requirements shall be identified, specified and approved when developing or acquiring applications.CompliantPartially CompliantNon-Compliant 86. Principles for engineering secure systems shall be established, documented, maintained and applied to any information system development activities.CompliantPartially CompliantNon-Compliant 87. Secure coding principles shall be applied to software development.CompliantPartially CompliantNon-Compliant 88. Security testing processes shall be defined and implemented in the development life cycle.CompliantPartially CompliantNon-Compliant 89. The organization shall direct, monitor and review the activities related to outsourced system development.CompliantPartially CompliantNon-Compliant 90. Development, testing and production environments shall be separated and secured.CompliantPartially CompliantNon-Compliant 91. Changes to information processing facilities and information systems shall be subject to change management procedures.CompliantPartially CompliantNon-Compliant 92. Test information shall be appropriately selected, protected and managed.CompliantPartially CompliantNon-Compliant 93. Audit tests and other assurance activities involving assessment of operational systems shall be planned and agreed between the tester and appropriate management.CompliantPartially CompliantNon-Compliant Loading... Submit a Comment Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Δ