4.1 Standar International ISO IEC 27001-2022
4.1 Standar International ISO IEC 27001-2022
STANDARD 27001
Third edition
2022-10
LY
ON
SE
Information security, cybersecurity
and privacy protection — Information
security management systems —
O
Requirements
RP
Sécurité de l'information, cybersécurité et protection de la vie
privée — Systèmes de management de la sécurité de l'information —
Exigences
PU
GN
NI
AI
TR
R
FO
Reference number
ISO/IEC 27001:2022(E)
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
© ISO/IEC 2022
ISO/IEC 27001:2022(E)
LY
ON
O SE
RP
PU
N G
NI
AI
TR
R
ͶͲͳȈǤͺ
ǦͳʹͳͶǡ
ǣΪͶͳʹʹͶͻͲͳͳͳ
ǣ ̷Ǥ
Website: [Link]
Contents
Foreword........................................................................................................................................................................................................................................ iv
Introduction .................................................................................................................................................................................................................................v
LY
1 Scope ................................................................................................................................................................................................................................. 1
2 Normative references ..................................................................................................................................................................................... 1
͵ ϐ .................................................................................................................................................................................... 1
ON
4 Context of the organization ...................................................................................................................................................................... 1
ͶǤͳ
..................................................................................................... 1
ͶǤʹ
........................................................... 1
ͶǤ͵
....................................... 2
ͶǤͶ ................................................................................................................... 2
SE
5 Leadership .................................................................................................................................................................................................................. 2
ͷǤͳ ..................................................................................................................................................... 2
ͷǤʹ ............................................................................................................................................................................................................... ͵
O
ͷǤ͵ ǡ ....................................................................................... ͵
6 Planning ........................................................................................................................................................................................................................ 3
RP
Ǥͳ ................................................................................................................. ͵
ǤͳǤͳ ........................................................................................................................................................................................ ͵
ǤͳǤʹ ............................................................................................................ Ͷ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
8 Operation ..................................................................................................................................................................................................................... 7
ͺǤͳ
......................................................................................................................................... 7
ͺǤʹ ............................................................................................................................... ͺ
AI
ͻǤͳ ǡǡ............................................................................................. ͺ
ͻǤʹ ........................................................................................................................................................................................... ͺ
ͻǤʹǤͳ ........................................................................................................................................................................................ ͺ
ͻǤʹǤʹ ......................................................................................................................................... ͻ
ͻǤ͵ .......................................................................................................................................................................... ͻ
R
10 Improvement......................................................................................................................................................................................................... 10
ͳͲǤͳ
............................................................................................................................................................... 10
ͳͲǤʹ
............................................................................................................................. 10
Annex A ȋȌ Information security controls reference........................................................................................... 11
Bibliography............................................................................................................................................................................................................................. 19
Foreword
ȋ Ȍ ȋ
Ȍ Ǥ
LY
ϐ
Ǥ ϐǤ
ǡǦǡ ǡ
ON
Ǥ
Ȁ ǡ ͳǤ ǡ
Ǥ
Ȁ ǡ ʹ ȋ [Link]/directives or
SE
Ǥ Ǥ Ȁ̴Ȁ ).
Ǥ
Ǥ ϐ
O
Ȁ ȋǤǤȀ) or the IEC
ȋǣȀȀǤ Ǥ ).
Ǥ RP
ǡ ϐ
PU
ǡ ̵
ȋȌ ȋȌ
[Link]/iso/[Link]Ǥ ǡǤ Ǥ ȀǦ.
Ȁ ͳǡ Information Technologyǡ
G
ǣ
Ȅ
AI
Ǥ [Link]/[Link]
Ǥ Ǥ ȀǦ .
R
FO
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Introduction
0.1 General
ǡǡ
LY
Ǥ
Ǥ
ǯ ϐ
ǯ ǡ ǡ
ON
Ǥϐ Ǥ
ϐǡ
ϐ
Ǥ
SE
ǯ
ǡǡ Ǥ
Ǥ
O
̵
ǯ Ǥ
RP
ϐ
Ǥ
Ǥ
PU
Ȁ ʹͲͲͲ
ǡ ȋ
Ȁ ʹͲͲ͵[2]ǡ Ȁ ʹͲͲͶ[͵] Ȁ ʹͲͲͷ[Ͷ]ȌǡϐǤ
G
Ǥ
AI
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
LY
— Requirements
ON
1 Scope
ϐǡǡ
Ǥ
SE
Ǥ
ǡǡǤ
ϐͶ to 10
this document.
O
2 Normative references
RP
Ǥ ǡ Ǥ
ǡ ȋ ȌǤ
PU
Ȁ ʹͲͲͲǡ Information technology — Security techniques — Information security management
systems — Overview and vocabulary
͵ ϐ
G
ǣ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Ȅ ǣ[Link]
NI
LY
Ǥ
ǡ ǣ
ON
Ȍ ͶǤͳǢ
Ȍ ͶǤʹǢ
Ȍ ǡ
Ǥ
SE
Ǥ
O
ǡǡ
RP
ǡ ǡ
Ǥ
5 Leadership
PU
5.1 Leadership and commitment
ǣ
G
Ȍ
NI
ǯ Ǣ
Ȍ Ǣ
AI
Ǥ
Dzdz
ǯ Ǥ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
5.2 Policy
ǣ
Ȍ Ǣ
LY
Ȍ ȋ6.2Ȍ
Ǣ
Ȍ Ǣ
ON
Ȍ Ǥ
ǣ
Ȍ Ǣ
SE
Ȍ Ǣ
Ȍ ǡǤ
O
5.3 Organizational roles, responsibilities and authorities
RP
Ǥ
ǣ
PU
Ȍ
Ǣ
Ȍ Ǥ
G
Ǥ
N
6 Planning
NI
6.1.1 General
ǡ
TR
the issues referred to in ͶǤͳ ͶǤʹ
ǣ
Ȍ ȋȌǢ
Ȍ ǡ ǡ Ǣ
R
Ȍ Ǥ
FO
ǣ
Ȍ Ǣ
e) how to
ͳȌ
Ǣ
ʹȌ Ǥ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
LY
ͳȌ Ǣ
ʹȌ Ǣ
ON
Ȍ ǡ
Ǣ
Ȍ ϐ ǣ
ͳȌ
SE
ϐǡ
Ǣ
ʹȌ Ǣ
O
Ȍ ǣ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
ʹȌ Ǥ
N
process.
NI
Ȍ ǡ
Ǣ
TR
Ȍ
ȋȌ Ǣ
ͳ ǡ Ǥ
R
Ȍ ǤͳǤ͵ Ȍ
Ǣ
FO
NOTE 2 Ǥ
directed to Ǥ
LY
Ȍ Ǣ
Ȍ ǯ
Ǥ
ON
process.
Ͷ
͵ͳͲͲͲ[5].
SE
6.2 Information security objectives and planning to achieve them
Ǥ
O
ǣ
RP
Ȍ Ǣ
Ȍ ȋ ȌǢ
Ȍ ǡ
PU
Ǣ
Ȍ Ǣ
Ȍ Ǣ
G
Ȍ Ǣ
Ȍ Ǥ
N
Ȍ Ǣ
Ȍ Ǣ
Ȍ Ǥ
R
ǡ Ǥ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
7 Support
7.1 Resources
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
ǡ
LY
ǡ
Ǥ
ON
7.2 Competence
ǣ
Ȍ ȋȌ
Ǣ
SE
Ȍ ǡ ǡ
Ǣ
Ȍ ǡ ǡ
O
Ǣ
Ȍ Ǥ
RP
ǡǣǡǡǦ
Ǣ Ǥ
PU
7.3 Awareness
ǯ ǣ
Ȍ Ǣ
G
Ȍ
Ǥ
NI
7.4 Communication
AI
7.5.1 General
LY
ͳȌ ǡ ǡ Ǣ
ON
͵Ȍ Ǥ
SE
Ȍ ϐ ȋǤǤǡǡǡ ȌǢ
Ȍ ȋǤǤǡǡ ȌȋǤǤǡ ȌǢ
Ȍ Ǥ
O
7.5.3 Control of documented information
ǣ RP
Ȍ ǡǢ
PU
Ȍ ȋǤǤ ϐǡǡȌǤ
ǡ ǡ
ǣ
G
Ȍ ǡ ǡǢ
N
Ȍ Ǥ
ǡ
AI
ǡ ϐ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
ǡ Ǥ
TR
8 Operation
R
LY
8.2 Information security risk assessment
ON
ϐ ǡ 6.1.2ȌǤ
Ǥ
SE
Ǥ
O
Ǥ
9 Performance evaluation
Ǣ
N
Ȍ Ǣ
Ȍ Ǣ
NI
Ȍ Ǣ
Ȍ Ǥ
AI
Ǥ
TR
Ǥ
R
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
9.2.1 General
LY
ǡǡȋȌǡ
ǡǡǡǤ
ȋȌǡ
ON
Ǥ
ǣ
Ȍ ϐ Ǣ
SE
Ȍ Ǣ
Ȍ Ǣ
O
ȋȌ
Ǥ
9.3.1 General
RP
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
PU
̵
ǡ Ǥ
Ǣ
Ȍ
Ǣ
AI
Ǥ
Ǥ
10 Improvement
LY
10.1 Continual improvement
ǡ
Ǥ
ON
10.2 Nonconformity and corrective action
ǡǣ
Ȍ ǡ ǣ
SE
ͳȌ Ǣ
ʹȌ Ǣ
O
Ȍ ǡ
ǡǣ
ͳȌ Ǣ
ʹȌ Ǣ
RP
PU
͵Ȍ ǡ Ǣ
Ȍ Ǣ
Ȍ Ǣ
G
ǣ
NI
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Annex A
ȋȌ
LY
ON
Ǥͳ
listed in ISO/IEC 27002:2022[1]ǡͷͺǡ ǤͳǤ͵.
SE
5 Organizational controls
5.1 - Control
Ǧ ϐ -
ϐǡǡǡ
O
ǡ
ϐ Ǥ
Control
RP
5.2
responsibilities
ϐ
Ǥ
ͷǤ͵ Control
PU
ϐ ϐ -
Ǥ
ͷǤͶ Control
ǡ-
G
Ǥ
5.7 Control
TR
ǡǤ
5.10 Control
ϐǡ Ǥ
5.11 Control
ǯ
ǡ Ǥ
LY
Ǥ
ͷǤͳ͵ Control
-
ON
ϐ Ǥ
ͷǤͳͶ Control
ǡ ǡ
Ǥ
SE
5.15 Access control Control
-
Ǥ
O
5.16 Control
RP
Ǥ
5.17 Control
ǡ
PU
Ǥ
ͷǤͳͺ Access rights Control
ǡǡϐ
ǯ Ǧ ϐ Ǥ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
LY
5.26 Control
incidents
the documented procedures.
ON
5.27 - Control
Ǥ
ͷǤʹͺ Collection of evidence Control
-
SE
ϐ ǡ ǡ
Ǥ
ͷǤʹͻ Control
disruption
O
Ǥ
ͷǤ͵Ͳ - Control
ͷǤ͵ͳ
RP
ǡǡ
Ǥ
ǡǡ Control
PU
ǡǡ
ǯ
ϐǡ Ǥ
ͷǤ͵ʹ Control
G
Ǥ
ͷǤ͵͵ Control
N
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Ǥ
NI
LY
ǡ
ǡ ϐ
Ǥ
ON
6.2 - Control
ǯ
ǯ Ǥ
Ǥ͵ ǡ Control
SE
ǡ
̵ ǡ
Ǧ ϐ ǡ Ǥ
ǤͶ Control
O
6.5
RP
Ǥ
Control
ϐǡ
PU
Ǥ
6.6 ϐǦ Control
ϐǦ ϐ -
ǯ ϐǡ
ǡ
G
Ǥ
6.7 Control
N
ǡ
NI
ǯǤ
Ǥͺ - Control
porting
AI
Ǥ
TR
7 Physical controls
7.1 Control
ϐ
Ǥ
R
7.2 Control
Ǥ
FO
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
LY
Ǥ
7.6 Control
implemented.
ON
7.7 Control
ϐ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Ǥ
Ǥͺ Control
SE
Ǥ
Ǥͻ Ǧ Control
Ǧ Ǥ
O
7.10 Control
ǡ
ϐǤ
ǤͳͶ Ǧ Control
NI
ϐ-
ǦǤ
AI
8 Technological controls
ͺǤͳ User end point devices Control
TR
LY
Ǥ
ͺǤ Control
Ǥ
ON
ͺǤ Control
Ǥ
ͺǤͺ - Control
SE
ǡǯ
Ǥ
ͺǤͻ ϐ Control
O
ϐǡ ϐǡǡǡ
ǡ ǡǡ
RP
Ǥ
ͺǤͳͲ Control
ǡ
Ǥ
PU
ͺǤͳͳ Control
ǯ
Ǧ ϐ Ǧ ϐ
ǡǡ
Ǥ
G
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Ǥ
NI
Ǥ
ͺǤͳͶ - Control
TR
-
Ǥ
ͺǤͳ Control
Ǥ
LY
ͺǤͳͻ - Control
Ǥ
ON
ͺǤʹͲ Control
ǡ
Ǥ
ͺǤʹͳ Control
ǡ
SE
ϐǡǤ
ͺǤʹʹ Control
ǡ
ǯǤ
O
ͺǤʹ͵ ϐ Control
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
ǡ
PU
ǡϐǤ
ͺǤʹͷ Control
Ǥ
ͺǤʹ - Control
G
ments
ϐǡ ϐ
Ǥ
N
ǡ
Ǥ
ͺǤʹͺ
AI
ϐ
Ǥ
ͺǤ͵Ͳ Outsourced development Control
ǡ
R
Ǥ
ͺǤ͵ͳ ǡ Control
FO
ǡ
Ǥ
ͺǤ͵ʹ Control
Ǥ
ͺǤ͵͵ Control
ǡ Ǥ
LY
Ǥ
ON
SE
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
O
RP
PU
N G
NI
AI
TR
R
FO
Bibliography
ȏͳȐ Ȁ ʹͲͲʹǣʹͲʹʹǡ Information security, cybersecurity and privacy protection — Information
LY
security controls
ȏʹȐ Ȁ ʹͲͲ͵ǡInformation technology — Security techniques — Information security management
systems — Guidance
ON
ȏ͵Ȑ Ȁ ʹͲͲͶǡInformation technology — Security techniques — Information security management
— Monitoring, measurement, analysis and evaluation
ȏͶȐ Ȁ ʹͲͲͷǡ Information security, cybersecurity and privacy protection — Guidance on
managing information security risks
SE
ȏͷȐ ͵ͳͲͲͲǣʹͲͳͺǡRisk management — Guidelines
O
RP
PU
N G
NI
AI
TR
R
FO
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
LY
ON
OSE
RP
PU
G
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
N
NI
AI
TR
R
FO
౧Ͳ͵ǤͳͲͲǤͲǢ͵ͷǤͲ͵Ͳ
ͳͻ