Machine Translated by Google ISO/IEC 27002:2022 FEBRUARY 2022 This document is for the exclusive and non-collective use of AFNOR customers. Any networking, reproduction and redistribution, in any form whatsoever, even partial, is strictly prohibited. This document is intended for the exclusive and non collective use of AFNOR customers. All network exploitation, reproduction and re-dissemination, even partial, whatever the form (hardcopy or other media), is strictly prohibited. AFNOR Pour : JCLD CONSULTING Email: john.lacroix@jcld-consulting.com Identity: LACROIX John Client : 80150794 On: 01/26/2023 at 09:01 Machine Translated by Google AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING STANDARDS INTERNATIONAL ISO/ IEC 27002:20222022-02 ISO/IEC 27002 Third edition 2022-02 Information security, cybersecurity and privacy protection — Information security measures Information security, cybersecurity and privacy protection — Information security controls Reference number ISO/IEC 27002:2022(F) © ISO/IEC 2022 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) DOCUMENT PROTECTED BY COPYRIGHT © ISO/IEC 2022 All rights reserved. Unless otherwise specified or necessary in the context of its implementation, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, or broadcasting on the Internet or on an intranet, without prior written authorization. Permission may be requested from ISO at the address below or from the ISO member body in the applicant's country. ISO copyright office Case postale 401 • Ch. de Blandonnet 8 CH-1214 Vernier, Geneva Tel.: +41 22 749 01 11 Fax: +41 22 749 09 47 E-mail: copyright@iso.org Web: www.iso . org Published in Switzerland ii © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Summary Page Foreword ............................................... .................................................. .................................................. .................................................. ....................... vi Introduction.............................................................................................................................................................................................................................vii 1 Domaine d'application...................................................................................................................................................................................1 2 Normative references ................................................ .................................................. .................................................. ..............................1 3 Terms, definitions and abbreviations .............................................. .................................................. .................................................1 3.1 Terms and definitions .............................................. .................................................. .................................................. ...................... 1 3.2 Abbreviations......................... .................................................. .................................................. .................................................. ............... 6 4 Structure of this document.................................................... .................................................. .................................................. .........8 4.1 Articles........................................................................................................................................................................................................... 8 4.2 Themes and attributes............................................... .................................................. .................................................. ........................... 8 4.3 Structure of the security measures............... .................................................. .................................................. ................... 9 5 Organizational security measures .................................................. .................................................. ..................................10 5.1 Information security policies ............... .................................................. .................................................. ............... 10 5.2 Functions and responsibilities related to information security ............................... .....................................12 5.3 Segregation of duties............... .................................................. .................................................. .................................................. ..............13 5.4 Management Responsibilities .................................... .................................................. .................................................. ... 14 5.5 Contacts with the authorities .................................. .................................................. .................................................. ...........15 5.6 Contacts with specific interest groups .................................. .................................................. .................. 16 5.7 Threat Intelligence .................................. .................................................. .................................................. .............. 17 5.8 Information security in project management .................................. .................................................. ..............18 5.9 5.10 Proper use of information and other related Inventory of information and other associated assets............................................... ...........................................20 assets .............................. ..................................22 5.11 Return of Assets ........... .................................................. .................................................. .................................................. ..2 5.12 Classification of information.................................... .................................................. .................................................. ...24 5.13 Marking of information............................................... .................................................. .................................................. ..25 5.14 Transferring information .................................. .................................................. .................................................. .............27 5.15 Access control............................... .................................................. .................................................. ...............................................29 5.16 Managing identities .................................................. .................................................. .................................................. ..................31 5.17 Authentication information............................... .................................................. .................................................. .............33 5.18 Access rights............................... .................................................. .................................................. .................................................. ...35 5.19 Information security in relations with suppliers ..................................................... ..................36 5.20 Information security in agreements with suppliers .................................. ...............39 5.21 Information security management in the ICT supply chain .................................. 41 5.22 Service Provider Monitoring, Review and Change Management ...............................43 5.23 Information Security in the Use of cloud services .................................................. ...........44 5.24 Information Security Incident Management Planning and Preparedness.... 47 5.25 Information Security Event Assessment and Decision Making . ...........................49 5.26 Responding to Information Security Incidents .................. .................................................. ..................................49 5.27 Learning from information security incidents .................................. ..................................50 5.28 Collecting evidence .............. .................................................. .................................................. .................................................. .................. 51 5.29 Information security during a disruption .................................. .................................................. .........52 5.30 Preparing ICT for business continuity.......................................... .................................................. ................53 5.31 Legal, statutory, regulatory and contractual requirements ..................... ..................................54 5.32 Intellectual property rights .............. .................................................. .................................................. ..............................56 5.33 Protecting recordings............................... .................................................. .................................................. ..................57 5.34 Protection of privacy and personal data.............................. .................................................. .................................................. ..59 5.35 Independent review of information security ............................................... ..............................................60 5.36 Compliance with information security policies, rules and standards .................................................. 61 5.37 Procedures for documented operations ........................................... .................................................. ..................62 Safety measures applicable to people .................................. .................................................. ..................................63 Selection of candidates............... .................................................. .................................................. .................................................. .63 6.1 6.2 Terms and conditions of the employment contract............................... .................................................. .......................64 6 © ISO/IEC 2022 – All rights reserved iii AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Awareness, education and training in information security...............................................66 6.3 6.4 Disciplinary process............................................... .................................................. .................................................. ..............67 6.5 Responsibilities after termination or change of employment .................................................68 6.6 Confidentiality or non-disclosure agreements............................................... .................................................. ..69 6.7 Working remotely ............................................... .................................................. .................................................. ..................................70 6.8 Reporting of information security events .................. .................................................. ...................72 7 Physical security measures .................................................. .................................................. .................................................. ...........73 7.1 Physical security perimeters .................................... .................................................. .................................................. ...73 7.2 The physical inputs.............................................. .................................................. .................................................. ..................74 7.3 Securing offices, rooms and facilities ............................... .................................................. .............. 76 Physical security monitoring .................................. .................................................. ..............................................77 7.4 7.5 Protection against physical and environmental threats .................................................. .............78 Working in secure and areas .................................... .................................................. .................................................. ..79 7.6 7.7 Blank desktop blank screen .................................. .................................................. .................................................. ..................80 7.8 Location and protection of the equipment .................. .................................................. ...........................................81 7.9 Security of offpremises assets .................................................. .................................................. ..................................82 7.10 Storage media .............. .................................................. .................................................. .................................................. ..83 7.11 Support services ...................................... .................................................. .................................................. ..............................85 7.12 Wiring safety ............................... .................................................. .................................................. .................................................. .....86 7.13 Hardware maintenance .................................................. .................................................. .................................................. ................87 7.14 Safe Disposal or Recycling of Hardware............................................... .................................................. ......88 Technological security 8 measures ............................................... .................................................. .................................................. 89 8.1 End user terminals.................................................... .................................................. ..................................89 8.2 Privileged access rights .................. .................................................. .................................................. .................................................. ..91 Restrictions on access to information ............................................... .................................................. ..................................93 8.3 8.4 Access to source codes............... .................................................. .................................................. .................................................95 8.5 Secure authentication............................................... .................................................. .................................................. .....96 8.6 Dimensioning.............................................. .................................................. .................................................. ...............................97 8.7 Protection against malicious programs (malware).............. .................................................. .............99 8.8 Managing technical vulnerabilities .................................. .................................................. ..................................101 8.9 Configuration management .................. .................................................. .................................................. ..................................104 8.10 Deleting information .............. .................................................. .................................................. ..................................106 8.11 Data masking .................. .................................................. .................................................. .................................................108 8.12 Preventing Data Leakage ...................................................... .................................................. ..................................110 8.13 Backing up information .................. .................................................. .................................................. ..................................111 8.14 Redundancy of information processing facilities .................. .................................................. .....................113 8.15 Logging............................... .................................................. .................................................. .................................................. .... 114 8.16 Oversight activities ............................................ .................................................. .................................................. .............117 8.17 Synchronization of the clocks .................................. .................................................. .................................................. ..119 8.18 Using privileged utility programs .................................................. .................................................. ......120 8.19 Installing software on working systems............................................... ..................................121 8.20 Network security ..... .................................................. .................................................. .................................................. .........122 8.21 Security of network services .................................. .................................................. .................................................. .........123 8.22 Partitioning of networks.................................. .................................................. .................................................. ...........125 8.23 Web filtering .................................. .................................................. .................................................. .................................................. 126 8.24 Use of cryptography .................................................. .................................................. ...........................................127 8.25 Life cycle of secure development ................................................ .................................................. ..................129 8.26 Application security requirements .................................. .................................................. ...........................................130 8.27 Principles of engineering and architecture of secure systems .............................................. ...............132 8.28 Secure Coding ............................... .................................................. .................................................. ............................................134 8.29 Safety tests in development and acceptance .................................................. ..............................137 8.30 Outsourced development .............. .................................................. .................................................. ..................................138 8.31 Separation of development, test and operational environments .............. ..................139 8.32 Managing Changes.............................. .................................................. .................................................. .............. 141 8.33 Testing information ............................... .................................................. .................................................. ........................................142 8.34 Protection of information systems during audit testing .................................................. .........143 Annex A (informative) Use of attributes .................................. .................................................. ...........................................145 iv © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Annex B (informative) Correspondence of ISO/IEC 27002:2022 (this document) with ISO/IEC 27002:2013......................................... .................................................. .................................................. .....................156 Bibliography........................... .................................................. .................................................. .................................................. ...........................................164 © ISO/IEC 2022 – All rights reserved in AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Foreword ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) form the specialized system for global standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in areas of common interest. Other international organizations, governmental and nongovernmental, in liaison with ISO and IEC, also take part in the work. The procedures used to develop this document and those intended for its maintenance are described in the ISO/IEC Directives, Part 1. In particular, note should be taken of the different approval criteria required for the different types of ISO documents. . This document has been drafted in accordance with the editorial rules given in the ISO/IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/ refdocs). Attention is drawn to the fact that some of the elements of this document may be the subject of intellectual property rights or similar rights. ISO and IEC shall not be liable for failing to identify such proprietary rights and give notice of their existence. Details concerning references to intellectual property rights or other similar rights identified during the preparation of the document are indicated in the Introduction and/or in the list of patent declarations received by ISO (see www.iso.org /patents) or in the list of patent declarations received by the IEC (see https://patents.iec.ch). Any trade names mentioned in this document are given for information, for the convenience of users, and do not constitute an endorsement. For an explanation of the voluntary nature of standards, the meaning of specific ISO terms and expressions related to conformity assessment, or for information about ISO's adherence to ISO principles World Trade Organization (WTO) on Technical Barriers to Trade (TBT), see www.iso.org/iso/avant-propos. For the IEC, see www.iec.ch/understanding-standards. This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, Information security, cybersecurity and privacy protection. This third edition cancels and replaces the second edition (ISO/IEC 27002:2013), which has been technically revised. It also incorporates the Technical Corrigenda ISO/IEC 27002:2013/Cor. 1:2014 and ISO/IEC 27002:2013/Cor. 2:2015. The main changes are as follows: — the title has been changed; — the structure of the document has been modified, presenting the security measures with a taxonomy simple and associated attributes; — some security measures have been merged, others have been removed, and several new security measures have been added. The full correspondence can be found in Appendix B. This French version of ISO/IEC 27002:2022 corresponds to the English version published on 2022-02 and corrected on 2022-03. The user should direct any feedback or questions regarding this document to the national standards body in his country. A comprehensive list of such bodies can be found at www.iso.org/members.html and www.iec.ch/national-committees. we © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Introduction 0.1 History and context This document has been designed for organizations of all types and sizes. It is to be used as a reference document to determine and implement security measures for the treatment of information security risks in an information security management system (ISMS) based on ISO/ IEC 27001. It can also be used as a good practice guide for organizations determining and implementing commonly accepted information security measures. In addition, this document is intended to be used when developing information security management guidelines specific to organizations and industries, taking into account their specific environment(s). (s) information security risks. Organizational or environment-specific safety measures other than those listed in this document can, if necessary, be determined through the risk assessment. Organizations of all types and sizes (including public and private sector, for-profit and not-for-profit) create, collect, process, store, transmit and dispose of information in many forms, including electronic, physical and verbal (for example, conversations and presentations). The value of information goes beyond written words, numbers and images: knowledge, concepts, ideas and brands are examples of intangible forms of information. In an interconnected world, information and other related assets deserve or require protection against various sources of risk, whether natural, accidental or deliberate. Information security is achieved by implementing a set of appropriate security measures, including policies, rules, processes, procedures, organizational structures, and hardware and software functions. To achieve its business and security objectives, the organization should define, implement, monitor, review, and improve these security measures as necessary. An information security management system (ISMS) such as that specified in ISO/IEC 27001 captures the organization's information security risks from a global and coordinated view, in order to determine and implement a comprehensive set of information security measures within the overall framework of a coherent management system. Many information systems, including their management and operations, were not designed to be secure within the meaning of an information security management system as specified in ISO/IEC 27001 and this document. The level of security that can be achieved by technical measures alone is limited, and should be enhanced by appropriate organizational processes and management activities. Identifying the appropriate security measures to put in place requires careful planning and attention to detail when performing the risk treatment. A successful information security management system requires buy-in from everyone in the organization. It may also require the participation of other interested parties, such as shareholders or suppliers. Advice from subject matter experts may also be required. An appropriate, adequate and effective information security management system provides assurance to the organization's leaders and other interested parties that their information and other associated assets are sufficiently secure and protected against threats and damage, thereby enabling the organization to achieve the targeted business objectives. 0.2 Information security requirements It is essential for an organization to determine its information security requirements. There are three main sources of information security requirements: a) the organization's risk assessment, taking into account all of its business strategy and objectives. This can be facilitated or supported by an information security risk assessment. © ISO/IEC 2022 – All rights reserved vii AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) This should lead to the determination of the necessary security measures ensuring that the residual risks for the organization correspond to its risk acceptance criteria; b) the legal, statutory, regulatory and contractual requirements with which the organization and its interested parties (business partners, service providers, etc.) must comply as well as their socio-cultural environment; c) the set of principles, objectives and business requirements for all stages of the life cycle of information that the organization has developed to support its operation. 0.3 Security measures A security measure is defined as a measure that modifies or maintains a risk. Some of the security measures in this document are means that modify the risks, while others maintain the risks. An information security policy, for example, only maintains the risks, while compliance with the information security policy can modify the risks. Additionally, some security measures describe the same generic measure in different risk contexts. This document proposes a generic combination of organisational, people-related, physical and technological information security measures, derived from internationally recognized good practices. 0.4 Determination of security measures The determination of the security measures depends on the decisions of the organization following a risk assessment, with a clearly defined perimeter. Decisions about identified risks should be based on the risk acceptance criteria, risk treatment options and risk management approach applied by the organization. The determination of security measures should also take into account all relevant national and international laws and regulations. The determination of security measures also depends on how the security measures interact with each other to provide defense in depth. The organization can design security measures as needed, or identify them from any source. When specifying these security measures, the organization should consider the resources and investments required to implement and operate a security measure in relation to the business value realized. See ISO/IEC TR 27016 for guidance on ISMS investment decisions and the economic consequences of those decisions in the context of competing resource demands. There should be a balance between the resources deployed to implement the security measures and the possible business impact resulting from security incidents in the absence of these security measures. The results of the risk assessment should help guide and determine appropriate management actions, priorities for managing information security risks, and for implementing security measures identified as necessary to protect against these risks. Certain security measures in this document can be considered basic principles for information security management and are applicable to most organizations. More information on determining security measures and other risk treatment options can be found in ISO/IEC 27005. 0.5 Development of organization-specific guidelines This document can be considered as a starting point for developing organization-specific guidelines. All security measures and guidelines in this document may not be applicable to all organizations. Other security measures and guidelines not listed in this document may be required to address specific organizational needs and identified risks. When writing documents containing guidelines or additional safety precautions, it may be useful to add cross-references to sections of this document for future reference. viii © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) 0.6 Life cycle considerations Information has a life cycle, from its creation to its disposal. The value of the information and the associated risks may vary during this life cycle (for example, an unauthorized disclosure or theft of a company's financial accounts does not have a significant impact after the publication of these information, but integrity remains critical). Therefore, the importance of information security remains at all stages. Information systems and other assets relevant to information security have life cycles during which they are thought out, specified, designed, developed, tested, implemented, operated, maintained and eventually retired from service and upgraded. scum. Information security should be considered at every stage. Development projects for new systems and changes to existing systems provide an opportunity to improve security measures while taking into account the organization's risks and lessons learned from incidents. 0.7 Related International Standards While this document provides guidance covering a wide range of security measures that are commonly used in many different organizations, other documents in the ISO/IEC 27000 family provide additional guidance or requirements relating to other aspects. of the overall information security management process. Refer to ISO/IEC 27000 for a general introduction to both ISMS and the family of documents. ISO/IEC 27000 provides a glossary, defining most of the terms used in the ISO/IEC 27000 family of documents, and describes the scope and objectives of each member of the family. There are industry standards that include additional security measures to address specific areas (e.g. ISO/ IEC 27017 for cloud services, ISO/IEC 27701 for privacy protection, ISO/IEC 27019 for energy, ISO/IEC 27011 for telecommunications organizations and ISO 27799 for health). These standards are listed in the Bibliography and some of them are referenced in the recommendations and other information in Clauses 5 to 8. © ISO/IEC 2022 – All rights reserved ix AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING INTERNATIONAL STANDARD ISO/IEC 27002:2022(F) Information security, cybersecurity and privacy protection — Information security measures 1 Domaine d'application This document provides a reference set of generic information security controls, including implementation recommendations. This document is designed for use by organizations: a) in the context of an information security management system (ISMS) according to ISO/IEC 27001; b) for the implementation of information security measures based on best practices internationally recognized; c) for the development of information security management recommendations specific to an organization. 2 Normative references This document does not contain any normative references. 3Terms, definitions and abbreviations 3.1Terms and definitions For the purposes of this document, the following terms and definitions apply. ISO and IEC maintain terminology databases for use in standardization, which can be consulted at the following addresses: — ISO Online browsing platform: available at https://www.iso.org/obp — IEC Electropedia: available at https://www.electropedia.org/ 3.1.1 access control means to ensure that physical and logical access to assets (3.1.2) is authorized and limited according to information security and business requirements 3.1.2 active anything of value to the organization Note 1 to entry: In the context of information security, two types of assets can be distinguished: — essential assets: — information; — process (3.1.27) and business activities; — supporting assets (on which essential assets are based) of all types, for example: - material; - software; © ISO/IEC 2022 – All rights reserved 1 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) - network; — personnel (3.1.20); — site; — organizational structure. 3.1.3 attack unauthorized attempt, whether successful or not, to destroy, alter, disable, gain access to an asset (3.1.2) or any attempt to expose, steal or make unauthorized use of an asset (3.1.2) 3.1.4 authentication provision of assurance that a claimed characteristic of an entity (3.1.11) is correct 3.1.5 authenticity property that an entity (3.1.11) is what it claims to be 3.1.6 chain of custody demonstrable possession, movement, handling and location of material from time to time another Note 1 to entry: Material includes information and other related assets (3.1.2) in the context of ISO/IEC 27002. [SOURCE: ISO/IEC 27050ÿ1:2019, 3.1, modified — Added Note 1 to entry] 3.1.7 confidential information information that is not intended to be made available or disclosed to unauthorized persons, entities ( 3.1.11) or processes (3.1.27) 3.1.8 safety measure action that maintains and/or modifies a risk Note 1 to entry: A risk security measure includes, but is not limited to, any process (3.1.27), policy (3.1.24), device, practice or other conditions and/or actions that maintain and/or modify a risk. Note 2 to entry: A risk safety measure does not always necessarily result in the intended or assumed change. [SOURCE: ISO 31000:2018, 3.8, modified] 3.1.9 incidental disruption , anticipated or unanticipated, that results in an unplanned negative deviation from the delivery of products and the provision of services as planned according to an organization's objectives [SOURCE: ISO 22301:2019, 3.10] 3.1.10 end terminal information and communication technology (ICT) hardware terminal connected to the network Note 1 to entry: An end device can refer to desktops, laptops, smartphones, tablets, thin clients, printers or other specialized hardware including smart meters or Internet of Things terminals. (IoT). 2 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 3.1.11 entity something relevant for the purposes of the operation of a domain and which possesses a manifestly distinct existence Note 1 to entry: An entity can have physical or logical embodiment. EXAMPLE A person, organization, device, group of such items, human subscriber to a telecommunications service, SIM card, passport, network interface card, software application, service or website. [SOURCE: ISO/IEC 24760ÿ1:2019, 3.1.1] 3.1.12 information processing means any information processing system, service or infrastructure, or the premises housing them [SOURCE: ISO/IEC 27000:2018, 3.27, modified — “means” has been replaced by “means”.] 3.1.13 information security breach information security compromise that results in the unwanted destruction, loss, alteration, disclosure of, or access to, protected information transmitted, stored, or submitted to another treatment 3.1.14 information security event occurrence indicating a possible information security breach (3.1.13) or breach of security safeguards (3.1.8) [SOURCE: ISO/IEC 27035ÿ1:2016, 3.3, modified — “information security breach” has been replaced by “information security breach”.] 3.1.15 information security incident one or more information security events (3.1.14), which may harm the assets (3.1.2) of an organization or compromise its functioning [SOURCE: ISO/IEC 27035ÿ1:2016, 3.4, modified] 3.1.16 information security incident management exercising a consistent and effective approach to handling information security incidents (3.1.15) [SOURCE: ISO/IEC 27035ÿ1:2016, 3.5, modified] 3.1.17 information system set of applications, services, information assets (3.1.2) or other components for managing information [SOURCE: ISO/IEC 27000:2018, 3.35] 3.1.18 interested party stakeholder person or organization likely to affect, be affected or feel affected by a decision or activity [SOURCE: ISO/IEC 27000:2018, 3.37] © ISO/IEC 2022 – All rights reserved 3 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 3.1.19 non-repudiation ability to prove the occurrence of a claimed event or action and the entities (3.1.11) that caused it 3.1.20 personnel persons performing work under the control of the organization Note 1 to entry: The concept of personnel includes members of the organization, such as the governing body, management, employees, temporary staff, contractors and volunteers. 3.1.21 personal data DCP any information that (a) can be used to link the information to the natural person to whom such information relates, or that (b) is or can be directly or indirectly associated with a natural person Note 1 to entry: The “natural person” referred to in the definition is the data subject (3.1.22). In determining whether a data subject is identifiable, consideration should be given to all means that may reasonably be employed by the privacy stakeholder holding the data, or any other party, to establish the link between the set of personal data and the natural person. [SOURCE: ISO/IEC 29100:2011/Amd.1:2018, 2.9] 3.1.22 data subject natural person to whom the personal data (PCD) relates (3.1.21) Note 1 to entry: Depending on the jurisdiction and applicable data protection and privacy law, the term “data subject” may also be used instead of “data subject”. [SOURCE: ISO/IEC 29100:2011, 2.11] 3.1.23 DCP data processor privacy stakeholder who processes personal data (PDD) (3.1.21) on behalf of a DCP data controller and in accordance with its instructions [SOURCE: ISO/IEC 29100:2011, 2.12] 3.1.24 policy intentions and orientations of an organization as formalized by its management [SOURCE: ISO/IEC 27000:2018, 3.53] 3.1.25 privacy impact study PIA overall process (3.1.27) to identify, analyze, assess, consult, communicate and plan to address potential privacy impacts with respect to the processing of personal data (PCD) (3.1.21), within the broader framework of an organization's risk management system [SOURCE: ISO/IEC 29134:2017, 3.7, modified — “assessment” replaced by “study”. Note 1 to entry deleted] 4 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 3.1.26 procedure specified way of performing an activity or process (3.1.27) [SOURCE: ISO 30000:2009, 3.12] 3.1.27 process set of interrelated or interacting activities that uses inputs to produce a result [SOURCE: ISO 9000:2015, 3.4.1, modified — Notes to entry removed] 3.1.28 record information created, received and preserved as evidence and assets (3.1.2) by a natural or legal person in the exercise of its legal obligations or the conduct of operations related to its activity Note 1 to entry: In this context, legal obligations include all legal, statutory, regulatory and contractual requirements. [SOURCE: ISO 15489ÿ1:2016, 3.14, modified — Added note 1 to entry] 3.1.29 recovery point objective OPR time at which data is to be restored following a disturbance (3.1.9) [SOURCE: ISO/IEC 27031:2011, 3.12] 3.1.30 DR recovery delay period during which minimum levels of service and/or products, as well as supporting systems, applications or functions, must be restored following a disruption (3.1.9) [SOURCE: ISO/IEC 27031:2011, 3.13] 3.1.31 reliability property relating to consistency of behavior and intended results 3.1.32 rule accepted principle or instruction stating the organization's expectations of what is required to be done, what is allowed or what is not Note 1 to entry: Rules can be expressed formally in topic-specific policies (3.1.35) as well as in other types of documents. 3.1.33 sensitive information information that needs to be protected from unavailability, unauthorized access, modification, or public disclosure because of possible adverse effects on a person, organization, national security, or public safety 3.1.34 menace potential cause of an undesirable incident, which may harm a system or organization [SOURCE: ISO/IEC 27000:2018, 3.74] © ISO/IEC 2022 – All rights reserved 5 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 3.1.35 topic-specific policy intentions and direction on a specific topic or topic, as formally expressed by the appropriate level of management Note 1 to entry: Topic-specific policies can formally express organizational rules (3.1.32) or standards. Note 2 to entry: Some organizations use other terms to refer to topic-specific policies. Note 3 to entry: Topic-specific policies referred to in this document relate to information security. EXAMPLE Access control topic-specific policy (3.1.1), topic-specific policy of clean desktop and blank screen. 3.1.36 interested party user (3.1.18) with access to the organization's information systems (3.1.17) EXAMPLE Staff (3.1.20), customers, suppliers. 3.1.37 end user end terminal ( 3.1.10) used by users to access information processing services Note 1 to entry: An end-user device can refer to a desktop computer, laptop, smartphone, tablet, thin client, etc. 3.1.38 vulnerability flaw in an asset (3.1.2) or security measure (3.1.8) that can be exploited by one or more threats (3.1.34) [SOURCE: ISO/IEC 27000:2018, 3.77] 3.2 Abbreviations ABAC THERE ARE BYOD attribute-based access control business impact analysis bring your own communication equipment (WITH) [bring your own device] CAPTCHA public test of Turing completely automatic with the aim of differentiating between humains des ordinateurs [completely automated public Turing test to tell computers and humans Apart] CPU central processing unit DAC discretionary access control DNS domain name system DR recovery time GPS global positioning system IAM identity and access management 6 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) ID identifier GOES integrated development environment IDS intrusion detection system IoT Internet of Things [internet of things] IP internet protocol IPS intrusion prevention system IT technologies de l'information [information technology] LCA access control list MAC mandatory access control NTP network time protocol [network time protocol] OPR recovery point objective TOO privacy impact assessment PII information personnelle identifiable [personally identifiable information] PIN personal identification number PKI public key infrastructure PTP precision time protocol [precision time protocol] RBAC role-based access control SAST static application security testing SD secure digital SDN software-defined networking SD-WAN software -defined wide area network SIEM security information and event management SMS short message service SMS information security management system SQL structured query language SSO signature unique [single sign-on] SWID software identification [software identification] TIC Information and Communication Technologies UEBA user and entity behavior analysis [user and entity behavior analytics] © ISO/IEC 2022 – All rights reserved 7 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) UPS alimentation sans interruption [uninterruptible power supply] URL uniform resource locator USB universel serial bus [universal serial bus] VM machine virtual [virtual machine] VPN virtual private network Wi-Fi wireless Internet access [Wireless Fidelity] 4 Structure of this document 4.1 Articles This document is structured as follows: a) organizational security measures (Article 5); b) security measures applicable to persons (Article 6); c) physical security measures (Article 7); d) technological security measures (Article 8). It contains 2 informative annexes: — Annex A — Use of attributes; — Annex B — Correspondence with ISO/IEC 27002:2013. Annex A explains how an organization can use the attributes (see 4.2) to create its own views based on the security control attributes defined in this document or created by it. Annex B shows the correspondence between the security measures in this edition of ISO/IEC 27002 and the previous edition from 2013. 4.2 Themes and attributes The categories of security measures proposed in Clauses 5 to 8 are called themes. Security measures are categorized as follows: (a) applicable to persons, if they relate to individuals; (b) physical, if they relate to physical objects; (c) technological, if they relate to technology; d) organizational for the rest of the security measures. The organization can use attributes to create different views representing different categorizations of security controls, providing a different point of view of topics. Attributes can be used to filter, sort, or present security measures in different views for different audiences. Appendix A explains how attributes can be used and provides an example view. 8 © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) By way of example, each security measure in this document has been associated with five attributes with the corresponding attribute values (preceded by the sign "#" to facilitate finding them), as following: a) The type of security measure The type of security measure is an attribute that allows security measures to be considered in terms of when and how this security measure modifies the risk in the event of the occurrence of an information security incident. The values of this attribute are: Preventive (the purpose of the security measure is to prevent the occurrence of an information security incident), Detective (the security measure acts when an information security incident occurs) and Corrective (the security measure acts after the occurrence of an information security incident). b) Information security properties Information security properties are an attribute that allows security measures to be viewed from the perspective of the characteristics of the information that the security measure will help preserve. The values of this attribute are: Confidentiality, Integrity and Availability. c) Cybersecurity concepts Cybersecurity concepts is an attribute that allows security measures to be considered from the point of view of their association with cybersecurity concepts as defined in the cybersecurity framework described in ISO/IEC TS 27110. The values of this attribute are : Identify, Protect, Detect, Respond and Restore. d) Operational capacities Operational capabilities are an attribute that allows security measures to be considered from the point of view of practitioners in relation to information security skills. The values of this attribute are: Governance, Asset_Management, Information_Protection, Human_Resource_Security, Physical_Security, System_and_Network_Security, Application_Security, Secure_Configuration, Identity_and_Access_Management, Threat_and_Vulnerability_Management, Continuity, Supplier_Relationship_Security, Regulatory_and_Compliance, Security_Event_Management and Information_Security_Assurance. e) Security domains Security Domains is an attribute that allows security controls to be considered from the perspective of the four information security domains: “Governance & Ecosystem” includes “Governance of Information Systems Security and Management of Risks” and “Ecosystem Cybersecurity Management” (including internal and external stakeholders); “Protection” includes “IT Security Architecture”, “IT Security Administration”, “Identity and Access Management”, “IT Security Maintenance” and “Environmental and Physical Security” ; “Defence” includes “Detection” and “Computer Security Incident Management” ; “Resilience” includes “Continuity of Operations” and “Crisis Management”. The values of this attribute are: Governance_and_Ecosystem, Protection, Defense and Resilience. The attributes proposed in this document are selected because they are considered generic enough to be used by different types of organizations. Organizations may choose to ignore one or more of the attributes in this document. They can also create their own attributes (with corresponding attribute values) to create their own organizational views. Clause A.2 includes examples of such attributes. 4.3 Structure of security measures The structure of each security measure contains the following: — Security measure title: short name of the security measure; © ISO/IEC 2022 – All rights reserved 9 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) — Attribute table: table showing the value(s) of each attribute for a measure of given security; — Security measure: description of the security measure; — Purpose: the reasons why the security measure should be implemented; — Recommendations: how the security measure should be implemented; — Other information: explanatory text or references to other related documents. Subtitles are used in the text of the recommendations of certain security measures for the sake of readability when the text of the recommendations is long and covers several subjects. These titles are not necessarily used in the text of all recommendations. Subtitles are underlined. 5 Organizational security measures 5.1 Information Security Policies Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Identifier Operational capabilities #Governance #Integrity #Availablity Security domains #Governance_and_Ecosys theme #Resilience Security measure An information security policy and topic-specific policies should be established, approved by senior management, published, communicated and confirmed to relevant staff and interested parties, as well as to revise them at planned intervals and if significant changes take place. Objective Continuously ensure the relevance, adequacy and effectiveness of management's orientations and its support for information security according to business, legal, statutory, regulatory and contractual requirements. Recommendations The organization should define, at its highest level, an “information security policy”, which is approved by management and which sets out the organisation's approach to managing the security of its information. The information security policy should take into account the requirements derived from the following: a) strategy and business requirements; (b) regulations, legislation and contracts; c) current and foreseeable information security risks and threats. This information security policy should include information about: a) the definition of information security; b) the information security objectives or the framework for establishing these objectives; 10 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) the principles to guide all activities related to information security; d) commitment to meet applicable information security requirements; e) the commitment to ensure the continuous improvement of the safety management system of l'information; f) assignment of responsibilities for information security management to functions defined; (g) procedures for managing waivers and exceptions. Management should approve any changes to the information security policy. At a lower level, information security policy should be reinforced with topic-specific policies to additionally mandate the implementation of information security measures. Topic-specific policies are generally structured to meet the needs of certain target groups of an organization or to cover certain areas of security. Topic-specific policies should be aligned with and complementary to the organization's information security policy. Examples of these themes are: a) access control; (b) physical and environmental security; (c) asset management; (d) transfer of information; e) secure configuration and management of end user terminals; (f) network security; g) information security incident management; (h) backup; i) cryptography and key management; (j) classification and information management; k) the management of technical vulnerabilities; l) secure development. Responsibility for developing, reviewing and approving topic-specific policies should be assigned to appropriate staff based on their level of authority and technical competence. The review should include assessing opportunities for improving the organization's information security policy and topic-specific policies, as well as managing information security to respond to changes. In: a) the business strategy of the organization; b) the technical environment of the organization; (c) regulations, statutes, legislation and contracts; d) information security risks; (e) the current and foreseeable information security threat environment; © ISO/IEC 2022 – All rights reserved 11 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) f) lessons learned from information security events and incidents. The review of the information security policy and topic-specific policies should take into account the results of management reviews and audits. The review and update of other related policies should be taken into account when a policy is changed to ensure consistency. The information security policy and topic-specific policies should be communicated to relevant personnel and interested parties in a form that is relevant, accessible and understandable to recipients. Recipients of policies should be required to confirm their understanding of these policies and agree to abide by them where applicable. The organization can determine the formats and names of these policy documents according to its needs. In some organizations, the information security policy and topicspecific policies may be in a single document. The organization may refer to these topic-specific policies as standards, guidelines, policies, or others. If the information security policy or any topic-specific policy is disseminated outside the organization, care should be taken not to indiscriminately disclose confidential information. Table 1 illustrates the differences between an information security policy and a topic-specific policy. Table 1 — Differences between information security policy and topic-specific policy Information Security Policy Level of detail Theme-specific policy General or high level Specific and detailed Documented and formally The appropriate level of management The general direction approved by Additional Information Topic-specific policies may differ from organization to organization. 5.2 Information Security Duties and Responsibilities Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identifier Operational capabilities #Governance Security domains #Governance_and_Ecosystem #Protection #Resilience Security measure Information security functions and responsibilities should be defined and assigned according to the needs of the organization. Objective Establish a defined, approved and understood structure for the implementation, operation and management of information security within the organization. 12 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations Information security functions and responsibilities should be assigned in accordance with the information security policy and topic-specific policies (see 5.1). The organization should define and manage responsibilities for: (a) protection of information and other associated assets; b) the application of specific information security related processes; c) information security risk management activities and, in particular, the acceptance of residual risks (for example, vis-à-vis risk owners); d) all personnel using the organization's information and other associated assets. These responsibilities should be supplemented, if necessary, with additional detailed recommendations for certain sites and means of processing information. People with information security responsibilities can assign security tasks to other people. However, they remain responsible and should ensure the proper execution of any delegated task. Each security domain for which individuals are responsible should be defined, documented, and communicated. The different authorization levels should be defined and documented. Persons in an information security function should possess the knowledge and skills required for the function and they should receive the necessary support to keep abreast of developments relating to the function and which are necessary to fulfill the responsibilities of this function. Additional Information Many organizations appoint an information security officer to take full responsibility for the development and implementation of information security and to support the identification of risks and mitigation measures. However, the responsibility for allocating resources and implementing security measures often remains assigned to other managers. A common practice is to designate an owner for each asset who then becomes responsible for the day-to-day protection of that asset. Depending on the size of the organization and the resources at its disposal, information security can be ensured by dedicated functions or by the assignment of tasks to be carried out in addition to existing functions. 5.3 Segregation of duties Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities #Governance Security domains #Governance_and_Ecosystem #Management_of_identities_and_access Security measure Incompatible tasks and areas of responsibility should be separated. Objective Reduce the risk of fraud, error and circumvention of information security measures. © ISO/IEC 2022 – All rights reserved 13 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Recommendations The separation of tasks and areas of responsibility aims to separate incompatible tasks between several people in order to avoid that one person can carry out potentially incompatible tasks alone. The organization should determine which tasks and areas of responsibility need to be separated. These examples of the following activities may require separation: a) initiation, approval and execution of a change; b) request, approval and implementation of access rights; c) design, implementation and code review; d) software development and administration of production systems; (e) use and administration of the applications; f) use of applications and administration of databases; g) design, audit and implementation of information security measures. Consideration should be given to the possibility of collusion when designing the means of separation. Smaller organizations may find it difficult to achieve segregation of duties, but this principle should be applied wherever possible. When segregation of duties is difficult to achieve, consider other security measures such as activity monitoring, audit logs, and management oversight. Care should be taken not to assign incompatible functions to individuals when using role-based access control systems. When there are a large number of functions, the organization should consider the use of automated tools to identify conflicts and facilitate their elimination. Roles should be defined and assigned carefully to minimize access issues if a function is removed or reassigned. Additional Information No additional information. 5.4 Management Responsibilities Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identifier Operational capabilities #Governance Security domains #Governance_and_Ecosys theme Security measure Management should require all personnel to apply information security measures in accordance with the organization's information security policy, topic-specific policies and established procedures. Objective Ensure that management understands their role in information security and takes actions to ensure that all staff are aware of and carry out their information security responsibilities Oh good. 14 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations Management should demonstrate support for the information security policy, topic-specific policies, procedures and information security measures. Management responsibilities should include ensuring that staff: a) is properly briefed on its information security duties and responsibilities before being granted access to the organization's information and other associated assets; b) has received guidelines specifying information security expectations related to their functions within the organization; c) is mandated to apply the information security policy and the policies specific to a theme of the organization; d) achieves a level of information security awareness commensurate with their duties and responsibilities within the organization (see 6.3); e) comply with the terms and conditions of their employment, employment contract or agreement, including the organization's information security policy and appropriate working practices; f) continue to have the appropriate information security skills and qualifications through continuing professional development; (g) where possible, has a confidential channel for reporting violations of the Information Security Policy, topic-specific policies or information security procedures (“whistleblower”). This may allow anonymous reports to be made or arrangements to be made to ensure that the identity of the person reporting the violation is known only to those who deal with these types of reports; h) has adequate resources and project planning time necessary for the implementation of implementation of the organization's security processes and measures. Additional Information No additional information. 5.5 Contacts with authorities Type of measurement Information Security Security Properties #Preventive #Corrective Cybersecurity concepts #Privacy #Identifier #Integrity #Availablity #Protect #Respond Operational capabilities #Governance Security domains #Defense #Resilience #To re-establish Security measure The organization should establish and maintain contact with the appropriate authorities. Objective Ensure the proper flow of information security information between the organization and the relevant legal, regulatory and supervisory authorities. © ISO/IEC 2022 – All rights reserved 15 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Recommendations The organization should specify when and which authority (e.g. law enforcement, regulatory bodies, supervisory authorities) to contact and how information security incidents should be reported as soon as possible. time limit. Contacts with authorities should also be used to facilitate understanding of current and future expectations of those authorities (eg applicable information security regulations). Additional Information Organizations under attack can ask the authorities to take action against the source of the attack. Maintaining these contacts may be a requirement to support information security incident management (see 5.24 to 5.28) or contingency planning and business continuity processes (see 5.29 and 5.30). Contacts with regulatory authorities are also useful for anticipating and preparing for future changes in relevant laws or regulations that impact the organization. Contacts with other authorities include utilities, emergency services, electricity suppliers, health and safety [e.g. fire brigade (related to business continuity), telecommunications operators (related to routing and availability) and water suppliers (related to hardware cooling)]. 5.6 Contacts with specific interest groups Information Security Properties Type of security measure #Preventive #Corrective #Privacy #Integrity #Availablity Cybersecurity concepts #Protect #Respond Security domains Operational capabilities #Governance #Defense #To re-establish Security measure The organization should establish and maintain contacts with specific interest groups or other specialized security forums and professional associations. Objective Ensure the proper flow of information regarding information security. Recommendations Membership in specific interest groups or specialized forums should be considered as a means of: a) improve knowledge of best practices and keep up to date with safety information important; b) ensure that the understanding of the information security environment is up to date; c) Receive early warnings, warnings, and patches regarding attacks and vulnerabilities; d) have access to advice from information security specialists; (e) share and exchange information about new technologies, products, services, threats or vulnerabilities; f) have relevant points of contact in case of information security incident management (see 5.24 to 5.28). 16 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Additional Information No additional information. 5.7 Threat Intelligence Type of security measure #Preventive #Detective #Corrective Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identification #Detect #Respond Operational capabilities Security domains #Defense #Resilience #Management_of_threats_and_vulnera bilities Security measure Information security threat information should be collected and analyzed to produce threat intelligence. Objective Bring knowledge of the organization's threat environment so that appropriate mitigating actions can be taken. Recommendations Information on existing and emerging threats is collected and analyzed in order to: a) promote informed actions to prevent threats from harming the organization; b) reduce the impact of these threats. Threat intelligence can be divided into three layers, all of which should be considered: a) strategic threat intelligence: exchange of high-level information on the evolution the threat landscape (eg, types of attackers or types of attacks); b) tactical threat intelligence: information on attacker methodologies, tools and technologies involved; c) operational threat intelligence: details of specific attacks, including technical indicators. Threat intelligence should be: a) relevant (i.e. related to the protection of the organization); b) sharp (i.e. they provide the organization with a correct and detailed understanding of the threat landscape); c) contextual, to provide situational awareness (i.e. adding context to information based on the time of events, where they occur, previous experiences and prevalence in organizations similar); d) actionable (ie, the organization can act quickly and effectively on the information). Activities associated with threat intelligence should include: a) establishment of objectives for the generation of threat intelligence; b) identification, verification and selection of internal and external information sources that are necessary and appropriate to provide the information required for the generation of threat intelligence; © ISO/IEC 2022 – All rights reserved 17 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) collection of information from selected sources, which may be internal and external; d) processing the collected information to prepare it for analysis (for example, by translating, formatting or corroborating the information); e) analysis of information to understand its connection and importance to the organization; f) communication and sharing of information to the appropriate persons in a form understandable. Threat intelligence should be analyzed and then used: a) implementing processes to integrate information collected from threat intelligence sources into the organization's information security risk management processes; b) as additional input data for technical preventive and detective security measures such as firewalls, intrusion detection system or malware protection solutions (anti-malware solutions); c) as input to information security testing techniques and processes. The organization should mutually share threat intelligence with other organizations on a mutual basis to improve threat intelligence overall. Additional Information Organizations can use threat intelligence to prevent, detect, or respond to threats. Organizations may produce threat intelligence, but typically they receive and use threat intelligence produced by others sources. Threat intelligence is often offered by independent vendors or advisors, government agencies, or collaborative threat intelligence groups. The effectiveness of security measures such as 5.25, 8.7, 8.16 or 8.23 depends on the quality of threat intelligence available. 5.8 Information security in project management Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identifier #Protect Operational capabilities #Governance Security domains #Governance_and_Ecosystem #Protection Security measure Information security should be integrated into project management. Objective Ensure that information security risks relating to projects and deliverables are effectively addressed in project management, throughout the project life cycle. Recommendations Information security should be integrated into project management to ensure that information security risks are addressed as part of project management. This recommendation can be applied to any type of project, regardless of its complexity, size, duration, discipline 18 © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) or its scope (for example, a project on a core business process, on information technology (ICT), on facilities management or on other supporting processes). Current project management should require that: a) information security risks are assessed and addressed early on and periodically thereafter as project risks, throughout the project life cycle; b) information security requirements [eg, application security requirements (8.26), intellectual property rights compliance requirements (5.32), etc.] are addressed at the outset of projects; (c) information security risks associated with the execution of projects, such as the security of aspects relating to internal and external communication, are taken into account and addressed throughout the life cycle of the project; d) the progress of the treatment of information security risks is monitored and the effectiveness of the treatment is evaluated and tested. The adequacy of information security considerations and activities should be monitored, at predefined stages, by appropriate individuals or governance bodies, such as the project board. Information security responsibilities and authorities appropriate to the project should be defined and assigned to specific functions. The information security requirements for the products or services to be delivered by the project should be determined using different methods, including determining the compliance requirements from the information security policy, policies specific to a theme and regulations. Additional information security requirements can be derived from activities such as threat modeling, incident analysis, use of vulnerability thresholds, or contingency planning, thereby ensuring that the architecture and design of information systems are protected against known threats in the operational environment. Information security requirements should be determined for all types of projects, not just ICT development projects. The following should also be considered when determining these requirements: a) what information is affected (information determination), what are the associated information security needs (classification; see 5.12) and the potential negative business impact that may result from the lack of adequate security; b) the required protection needs of the relevant information and other related assets, in particular in terms of confidentiality, integrity and availability; c) the level of confidence or assurance required in the claimed identity of the entities, in order to derive authentication requirements; d) processes for authorizing and assigning access for customers and other potential business users as well as technical or privileged users, such as relevant members of the project team, prospective operating or external vendors; e) informing users of their duties and responsibilities; f) requirements deriving from business processes, such as transaction logging and monitoring, nonrepudiation requirements; g) requirements imposed by other information security measures (eg interfaces for logging and monitoring or data leak detection systems); © ISO/IEC 2022 – All rights reserved 19 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) h) compliance with the legal, statutory, regulatory and contractual environment in which the organization operates; i) the level of confidence or assurance required for third parties to comply with the organization's information security policy and topic-specific policies, including appropriate security clauses in any agreement or CONTRACT. Additional Information The project development approach, such as the waterfall life cycle or the agile life cycle, should promote information security in a structured way that can be adapted to align with the assessed severity of information security risks, depending on the character of the project. Consideration of the information security requirements for the product or service from the outset (for example, from the planning and design phases) can lead to more efficient and cost-effective solutions from a information quality and security. ISO 21500 and ISO 21502 provide guidance on project management concepts and processes that are important to project performance. ISO/IEC 27005 provides guidance on using risk management processes to identify security measures to meet information security requirements. 5.9 Inventory of information and other related assets Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Identifier Operational capabilities #Asset_management Security domains #Governance_ and_Ecosystem #Protection #Integrity #Availablity Security measure An inventory of information and other associated assets, including their owners, should be developed and maintained. Objective Identify the organization's information and other associated assets to maintain their security and assign ownership appropriately. Recommendations Inventory The organization should identify its information and other associated assets and determine their importance to information security. The documentation should be kept up to date in dedicated inventories or already in place as the case may be. The inventory of information and other related assets should be correct, current, consistent and aligned with other inventories. Possibilities for ensuring the accuracy of an inventory of information and other associated assets include: a) conduct regular audits of information and other related assets identified against inventory of assets; b) automatically apply an inventory update when installing, changing or withdrawal of an asset. The location of each asset should be noted in the inventory as required. The inventory does not need to be a single list of related information and other assets. Considering that the inventory should be maintained by the appropriate functions, 20 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) it can be thought of as a set of dynamic inventories, such as inventories of information assets, hardware, software, virtual machines (VMs), facilities, personnel, skills, capabilities, and records . Each asset should be classified according to the information classification (see 5.12) associated with it. The granularity of the inventory of information and other related assets should be at a level appropriate to the needs of the organization. Sometimes it is not possible to document specific instances of assets in the information lifecycle due to the nature of the asset. An example of an ephemeral asset is a VM instance that may have a short life cycle. Property For identified information and other associated assets, ownership of the asset should be assigned to a person or group, and the classification should be identified (see 5.12 , 5.13). A process should be implemented to ensure the rapid assignment of an owner to the asset. Assets should be assigned an owner when they are created or when they are transferred to the organization. Ownership of the asset should be reallocated as needed when the current owner leaves the organization or changes roles. Obligations of the owner The asset owner should be responsible for the proper management of that asset throughout its life cycle, ensuring that: (a) the information and other associated assets are inventoried; (b) information and other associated assets are classified and protected appropriately; (c) the classification is reviewed periodically; (d) the components that make up the technology assets are listed and their relationships established, such as software, database, and storage components and subcomponents; e) requirements for the correct use of information and other associated assets (see 5.10) are defined; f) the access restrictions correspond to the classification, that they are effective and that they are periodically revised; (g) information and other associated assets that are deleted or disposed of are securely handled and removed from inventory; h) it participates in the identification and management of the risks associated with its asset(s); i) it supports staff who have the functions and responsibilities of managing its information. Additional Information Inventories of information and other associated assets are often necessary to ensure effective protection of information and may also be necessary for other purposes, such as health and safety, insurance or financial reasons. In addition, inventories of information and other related assets also support risk management, audit activities, vulnerability management, incident response and recovery planning. Tasks and responsibilities can be delegated (for example, to someone who monitors assets on a daily basis), but the person or group who delegated them remains accountable. It may be useful to designate groups of information and other related assets that act together to provide a particular service. In this case, the owner of this service is responsible for the delivery of the service, including the operation of its assets. © ISO/IEC 2022 – All rights reserved 21 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) See ISO/IEC 19770-1 for additional information on IT asset management. See ISO 55001 for additional information on asset management. 5.10 Proper Use of Information and Other Related Assets Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Asset_management #Protection_of_information Security domains #Governance_ and_Ecosystem #Protection Security measure Rules for the correct use and procedures for handling information and other associated assets should be identified, documented and implemented. Objective Ensure that information and other associated assets are protected, used and handled appropriately. Recommendations Staff and external users who use or have access to the organization's information and other related assets should be made aware of the information security requirements for the protection and handling of the organization's information and other related assets. . They should be responsible for their use of any means of processing information. The organization should establish a topic-specific policy for the correct use of information and other related assets and communicate it to anyone who uses or processes the information and other related assets. The correct use topic-specific policy should clearly state how individuals are expected to use the information and other related assets. The specific policy for this theme should indicate: a) the expected and unacceptable behaviors of people from the point of view of the safety of l'information; (b) permitted and prohibited use of information and other associated assets; c) the surveillance activities carried out by the organization. Procedures for the correct use should be established for the full life cycle of the information, based on its classification (see 5.12) and the identified risks. It should be taken into consider the following: a) access restrictions supporting the protection requirements at each level of classification; b) maintaining an up-to-date record of authorized users of information and other assets associates; c) the protection of temporary or permanent copies of the information at a level appropriate with the level of protection of the original information; d) storage of information assets in accordance with manufacturer specifications (see 7.8); e) clear marking of all copies of storage media (electronic or physical) for authorized users (see 7.10); f) authorization to dispose of information and other associated assets and method(s) used (see 8.10). 22 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information Sometimes the assets involved do not directly belong to the organization, such as public cloud services. The use of such third-party assets and the organization's assets associated with such external assets (e.g., information, software) should be identified as applicable and controlled, for example through agreements with vendors of cloud services. Care should also be taken when a collaborative work environment is used. 5.11 Return of Assets Information Security Properties Type of security measure #Preventive #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Asset_Management #Protection #Integrity #Availablity Security measure Staff and other interested parties, as appropriate, should return all assets of the organization that are in their possession at the time of change or termination of their employment, contract or agreement. Objective Protect the organization's assets in the process of changing or ending their employment, contract or agreement. Recommendations The change or termination process should be formalized to include the return of all previously provided physical and electronic assets that belong to or have been entrusted to the organization. Where staff and other interested parties purchase equipment from the organization or use their own equipment, procedures should be followed to ensure that all relevant information is tracked and transferred to the organization, and securely removed from hardware (see 7.14). In cases where personnel and other interested parties have knowledge that is important to ongoing activities, this information should be documented and passed on to the organization. During the notice period and thereafter, the organization should prevent unauthorized copying of material information (eg subject to intellectual property) by personnel notified of the notice. The organization should clearly identify and document all information and other associated assets to be returned, which may include: (a) end user terminals; (b) portable storage media; (c) specialized equipment; d) Authentication materials (e.g. mechanical keys, physical tokens and smart cards) chip) for information systems, sites and physical archives; e) physical copies of information. © ISO/IEC 2022 – All rights reserved 23 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information It can be difficult to return information held in non-organizational assets. In such cases, it is necessary to restrict the use of information using other information security measures such as access rights management ( 5.18) or the use of cryptography (8.24 ). 5.12 Classification of information Information Security Properties Type of security measure #Preventive #Privacy Cybersecurity concepts #Identifier Operational capabilities #Protection_of_information #Integrity #Availablity Security domains #Protection #Defense Security measure Information should be classified in accordance with the information security needs of the organization, based on the requirements of confidentiality, integrity, availability and important requirements of interested parties. Objective Ensure the identification and understanding of information protection needs based on its importance to the organization. Recommendations The organization should establish a policy specific to the topic of information classification and communicate it to the appropriate interested parties. The organization should consider confidentiality, integrity and availability requirements in the classification scheme. The classification of information and the associated means of protection should take into account business needs for sharing or restricting information, for protecting information integrity and for ensuring availability, as well as the requirements legal requirements regarding the confidentiality, integrity or availability of the information. Assets other than information may also be classified according to the classification of the information they store, process or otherwise handle or protect. The owners of the information should be responsible for its classification. The classification scheme should include conventions for the classification and criteria for the revision of this classification over time. Classification results should be updated as the value, sensitivity and level of criticality of information changes throughout its life cycle. The diagram should be aligned with the policy specific to the theme of access control (see 5.1) and should meet the specific business needs of the organization. Classification can be determined based on the level of impact the information compromise would have on the organization. Each level defined in the scheme should be given a name that makes sense in the context of the application of the classification scheme. The schema should be consistent across the organization and included in its procedures, so that everyone classifies information and other related assets in the same way. In this way, everyone has the same understanding of the protection requirements and applies appropriate protection. 24 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) The classification scheme used in the organization may differ from schemes used by other organizations, even if the names assigned to the levels are similar. In addition, information flowing between organizations may have a classification that varies depending on its context in each organization, even if their classification schemes are identical. Thus, agreements with other organizations involving the sharing of information should include procedures for identifying the classification of that information and for interpreting the classification levels of other organizations. The correspondence between different schemes can be determined by looking for equivalence in the associated protection and treatment methods. Additional Information Classification gives people handling information a concise indication of how to handle and protect it. Creating groups of information with similar protection needs and specifying the information security procedures that apply to all information in each group helps to facilitate classification. This approach reduces the need for case-by-case risk assessment and customization of security measures. Information may cease to be sensitive or critical after a certain period. For example, once made public, the information no longer has confidentiality requirements, but it may still require the protection of its integrity and availability. These aspects should be taken into account, as an overclassification may lead to the implementation of unnecessary security measures resulting in additional expense, or conversely, an underclassification may result in insufficient security measures to protect information of any compromise. As an example, an information privacy classification scheme may be based on four levels, namely: (a) the disclosure does not cause any harm; (b) the disclosure results in minor reputational harm or minor impact on the functioning; (c) the disclosure has a significant short-term impact on business activities or objectives; d) the disclosure has a serious impact on the long-term business objectives or jeopardizes the survival of l'organisation. 5.13 Marking information Information Security Properties Type of security measure #Preventive #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities #Protection_of_information Security domains #Defense #Protection Security measure An appropriate set of procedures for marking information should be developed and implemented, in accordance with the information classification scheme adopted by the organization. Objective Facilitate communication of information classification and support management automation and information processing. Recommendations Information tagging procedures should include information and other associated assets in all formats. The marking should reflect the classification scheme defined in 5.12. Marks should be easily recognizable. Procedures should © ISO/IEC 2022 – All rights reserved 25 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) give recommendations on where and how marks are attached, considering how to access information or how to handle assets, depending on the types of storage media. Procedures can define: (a) cases where marking is not essential (e.g. marking of non-confidential information to reduce workload); b) how to mark information sent by or stored on physical means or electronic, or any other format; c) how to deal with cases where tagging is not possible (e.g. due to limitations techniques). Below are examples of marking techniques: (a) physical marks; b) headers and footers; c) metadata; d) watermark; e) rubber buffers. Digital information should use metadata to identify, manage and control information, particularly in terms of confidentiality. Metadata should also allow efficient and correct retrieval of information. Metadata should allow systems to interact and make decisions based on associated classification marks. Procedures should describe how to attach metadata to information, what tokens to use, and how data should be handled in accordance with the organization's information model and its ICT architecture. Appropriate additional metadata should be added by systems when processing information, depending on their information security properties. Staff and other interested parties should be made aware of marking procedures. All staff should receive adequate training to ensure that information is correctly marked and handled accordingly. Output data from systems containing information classified as sensitive or critical should bear the appropriate classification markings. Additional Information Marking of classified information is a key requirement for information sharing. Other useful metadata that can be attached to information is the indication of the organizational process that created the information and the corresponding date/time. Tagging information and other related assets can sometimes have negative effects. Classified assets can be more easily identified by attackers for possible misuse. Some systems do not mark individual files or database records with their classification, but protect all information according to the highest classification level of all information they contain or may contain. It is common in these types of systems to determine and then mark the information when it is exported. 26 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 5.14 Transfer of information Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Asset_management Security domains #Protection #Protection_of_information Security measure Information transfer rules, procedures or agreements should be in place for all types of means of transfer within the organization, and between the organization and third parties. Objective Maintain the security of information transferred within the organization and to any external interested party. Recommendations General The organization should establish a policy specific to the topic of information transfer and communicate it to all interested parties. Rules, procedures and agreements to protect information in transit should take into account the classification of the information involved. When information is transferred between the organization and third parties, transfer agreements (including recipient authentication) should be established and maintained to protect the information in all forms during transfer (see 5.10 ) . The transfer of information can be done through electronic transfer, transfer on physical storage medium and verbal transfer. For all types of information transfers, the rules, procedures and agreements should include: a) security measures designed to protect the transferred information against interception, unauthorized access, copying, modification, misdirection, destruction and denial of service, including levels of control access corresponding to the classification of the information involved and any special security measures necessary to protect the sensitive information, such as the use of cryptographic techniques (see 8.24); b) security measures to ensure traceability and non-repudiation, including maintaining a chain of custody for information in transit; c) identification of appropriate contacts in connection with the transfer, including information owners, risk owners, security officers and persons monitoring the information, if applicable; d) obligations and liabilities in the event of an information security incident, such as the loss physical or data storage media; e) the use of an agreed marking system for sensitive or critical information, to ensure that the meaning of the markings is immediately understood and that the information is appropriately protected (see 5.13) ; f) the reliability and availability of the transfer service; g) the theme-specific policy for the correct use of the transfer functions of information or guidelines on this subject (see 5.10); © ISO/IEC 2022 – All rights reserved 27 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) h) guidelines for retention and disposal of all records professionals, including messages; NOTE Local laws and regulations may exist regarding the retention and disposal of professional recordings. i) consideration of any other significant legal, statutory, regulatory and contractual requirements (see 5.31, 5.32, 5.33, 5.34) relating to the transfer of information (eg requirements on electronic signatures). Electronic transfer The rules, procedures and agreements should also take into account the following elements in the context of the use of electronic means of communication for the transfer of information: a) detection and protection against malicious programs that can be transmitted via the use of electronic communications (see 8.7); (b) protection of sensitive electronic information communicated as attachments; c) prevention against sending documents and messages in communications to the wrong address or number; d) obtaining approval before using external public services such as instant messaging, social networks, file sharing or cloud storage; e) enhanced levels of authentication when transferring information over accessible networks to the public; f) restrictions associated with means of electronic communication (eg prevention against automatic forwarding of e-mails to external e-mail addresses); g) Recommendation to staff and other interested parties not to use short messaging services (SMS) or instant messages containing critical information as this can be read in public places (and therefore by people unauthorized) or stored in devices without adequate protection; h) informing staff and other interested parties about problems related to the use of fax machines or fax services, namely: 1) unauthorized access to embedded message stores to retrieve messages; 2) the deliberate or accidental programming of machines to send messages to specific numbers. Transfer of physical storage media When transferring physical storage media (including paper), the rules, procedures and agreements should also include: (a) responsibilities for control and notification of transmission, sending and receipt; b) assurance of correct addressing and transport of the message; c) packaging that protects the contents from physical damage that may occur in transit and in accordance with the manufacturer's specifications, e.g. protection against any environmental factors that may reduce the effectiveness of restoring the storage medium, such as exposure to heat, humidity or electromagnetic fields; use of minimum technical standards for packaging and transmission (eg use of opaque envelopes); d) a list of Authorized Reliable Carriers, approved by management; 28 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) (e) carrier identification standards; f) depending on the level of classification of the information contained on the storage medium to be transported, the use of inviolable or burglar-proof means (for example, bags, containers); (g) procedures for verifying the identity of carriers; h) an approved list of third parties providing transportation or courier services according to classification of information; i) the keeping of logs for the identification of the contents of the storage media, the protection applied, as well as the recording of the list of authorized recipients, the dates and times of delivery to those responsible for transport and of receipt by the recipient. Verbal transfer To protect the verbal transfer of information, staff and other interested parties should be reminded that it is recommended to: a) not to hold confidential conversations in public places or via unsecured communication channels insofar as these can be overheard by unauthorized persons; b) not to leave messages containing confidential information on answering machines or in the form of voice messages insofar as these can be replayed by unauthorized persons, stored on systems for collective use or incorrectly stored as a result of a dialing error; c) be selected at the appropriate level to listen to the conversation; d) ensure that appropriate security measures are implemented in the room (eg soundproofing, door closed); e) begin any sensitive conversation with a warning, so that those present know the classification level and handling requirements of the information they are about to hear. Additional Information No additional information. 5.15 Access control Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities #Identi ty_and_access_management Security domains #Protection Security measure Rules should be defined and implemented to control physical and logical access to information and other related assets based on business and information security requirements. Objective Ensure authorized access and prevent unauthorized access to information and other associated assets. © ISO/IEC 2022 – All rights reserved 29 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations Owners of information and other related assets should determine business and information security requirements for access control. A policy specific to the topic of access control that takes these requirements into account should be defined and communicated to all appropriate interested parties. These requirements and the specific policy on this topic should take into account the following points: a) determining which entities require a defined type of access to information and other assets associates; b) application security (see 8.26); c) physical access which must be supported by adequate means of physical access (see 7.2, 7.3, 7.4); d) information dissemination and authorizations (eg need-to-know principle), information security levels and information classification (see 5.10, 5.12, 5.13); e) privileged access restrictions (see 8.2); f) segregation of duties (see 5.3); g) material laws, regulations and contractual obligations relating to the limitation of access to data or services (see 5.31, 5.32, 5.33, 5.34, 8.3); h) separation of access control functions (eg access request, access authorization and access administration); i) formal authorization of access requests (see 5.16 and 5.18); j) management of access rights (see 5.18); k) logging (see 8.15). Access control rules should be implemented by defining and assigning access rights and appropriate restrictions to the entities concerned (see 5.16). An entity can correspond to a human user as well as to a technical or logical element (for example, a machine, a terminal or a service). To simplify access control management, specific functions can be assigned to groups of entities. The following points should be considered when defining and implementing access control rules: (a) consistency between access rights and classification of information; b) Consistency between access rights and physical perimeter security needs and requirements; c) accounting for all types of connections available in distributed environments, so entities are granted access only to information and other associated assets, including networks and network services, that they have permission to to use; d) consideration of how elements or factors relevant to dynamic access control may be taken into account. 30 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information There are often fundamental principles used in the context of access control. Two examples of the most commonly used principles are: a) need-to-know: an entity is granted access only to the information it needs to perform its tasks (different tasks or functions imply different needs-to-know and therefore different access profiles); b) the need to use: an entity is granted access to the technology infrastructure of information only when there is an existing need. Care should be taken when specifying which access control rules to consider: a) setting rules based on the principle of least privilege, "Everything is generally forbidden unless explicitly allowed", rather than the weaker rule, "Everything is generally allowed unless explicitly forbidden"; b) changes in the marking of information which are operated automatically (see 5.13) by the information processing means, and those which are operated by the user; c) modifications of the user's authorizations which are operated automatically by the information system, and those which are operated by an administrator; d) when to define and periodically review approval. Access control rules should be supported by documented procedures (see 5.16, 5.17, 5.18, 8.2, 8.3, 8.4, 8.5, 8.18) and defined responsibilities (see 5.2, 5.17). There are several ways to implement access control, such as MAC (Mandatory Access Control), DAC (Discretionary Access), RBAC (Role-Based Access Control), and ABAC (Attribute-Based Access Control). Access control rules can also contain dynamic elements (for example, a function that evaluates past access or environment-specific values). Access control rules can be implemented with different granularities, ranging from coverage of entire networks or systems to specific data fields, and can also take into consideration properties such as the location of the user or type of network connection that is used for access. These principles and the level of granularity in defining access control can have a significant impact on costs. Stronger rules and higher granularity generally entail higher costs. Business requirements and risk considerations should be used to define which access control rules to apply and what level of granularity is needed. 5.16 Identity Management Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Identi ty_and_access_management Security domains #Protection Security measure The full lifecycle of identities should be managed. © ISO/IEC 2022 – All rights reserved 31 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective To enable the unique identification of people and systems that access the organization's information and other associated assets, and to enable the appropriate assignment of access rights. Recommendations Processes used in the context of identity management should ensure that: (a) for identities assigned to persons, a given identity is only linked to a person, which makes it possible to hold the person responsible for acts performed under that specific identity; b) identities assigned to more than one person (eg shared identities) are only permitted when necessary for business or operational reasons and are subject to dedicated approval and documentation; c) identities assigned to non-human entities are subject to separate approval appropriate and ongoing independent monitoring; d) identities are promptly deactivated or deleted if they are no longer needed (for example, if associated entities are deleted or no longer used, or if the person linked to an identity has left the organization or changed roles) ; e) in a specific domain, a given identity is associated with one and only one entity [ie the association of several identities with the same entity in the same context (duplicate identities) is avoided]; f) records of all significant events relating to the use and management of User identities and authentication information are retained. The organization should have a support process in place to manage changes to user identity information. These processes may include re-verification of trust documents linked to a person. When using identities provided or created by third parties (e.g. social media IDs), the organization should ensure that the third party identities provide the required level of trust and that any risk associated is identified and sufficiently addressed. This may include security measures relating to third parties (see 5.19) as well as security measures relating to associated authentication information (see 5.17). Additional Information Granting or removing access to information and other related assets is generally a multi-step process: a) confirm the business requirements for an identity to be implemented; b) verify the identity of an entity before assigning it a logical identity; c) establish an identity; d) configure and activate the identity. This also includes the configuration and initial setup of associated authentication services; e) grant or revoke identity-specific access rights, based on the decisions appropriate authorization or clearance (see 5.18). 32 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 5.17 Authentication Information Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Identi ty_and_access_management Security domains #Protection Security measure The allocation and management of authentication information should be controlled by a management process, including guidance to personnel on the appropriate use of authentication information. Objective Ensure correct entity authentication and avoid authentication process failures. Recommendations Assigning Credentials The management and allocation process should ensure that: a) personal passwords or personal identification numbers (PINs) automatically generated during registration processes as temporary secret authentication credentials are unguessable and unique to each person, and that users must modify them after the first use; b) procedures are in place to verify the identity of a user before assigning new, replacement or temporary authentication information; c) authentication information, including temporary ones, is transmitted to users in a secure manner (for example, through an authenticated and protected channel), and that the use of unprotected (plain text) e-mail for this purpose is avoided; d) users acknowledge receipt of authentication information; e) default authentication credentials as predefined or provided by vendors are changed immediately after installation of the systems or software; f) records of significant events relating to the assignment and management of authentication information are kept and their confidentiality ensured, and that the method of keeping the records is approved (for example, using an approved vault tool for Passwords). User responsibilities Anyone accessing or using authentication information should be notified to ensure that: a) secret authentication information, such as passwords, is kept confidential. Personal secret authentication information should not be shared with anyone. Secret authentication information used in the context of identities associated with multiple users or associated with non-human entities is only shared with authorized individuals; b) the impacted or compromised authentication information is immediately changed following notification, or other indication, of a compromise; © ISO/IEC 2022 – All rights reserved 33 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) when passwords are used as authentication credentials, strong passwords are chosen according to best practice recommendations, for example: 1) passwords are not based on information that someone can easily guess or obtain using information about the person (eg, names, phone numbers, and dates of birth); 2) passwords are not based on dictionary words or combinations of these latter; 3) the use of easily remembered passphrases trying to include characters in them alphanumeric and special; 4) passwords have a minimum length; (d) the same passwords are not used in separate services and systems; e) the obligation to follow these rules is also included in the terms and conditions of employment (see 6.2). Password management system When passwords are used as authentication credentials, the password management system should: a) allows users to choose and change their passwords, and includes a confirmation procedure to deal with input errors; b) enforces strong passwords in accordance with best practice recommendations [see c) under “User Responsibility”]; (c) require users to change their password on first login; d) enforces password changes as necessary, for example after a security incident, or upon termination or change of employment, when a user knows passwords for identities that remain active ( for example, shared identities); e) prevents the reuse of old passwords; f) prevents the use of commonly used passwords and compromised credentials, password combinations from hacked systems; g) does not display passwords on screen as they are entered; h) stores and transmits passwords in a protected form. Encryption and hashing of passwords should be done in accordance with approved cryptographic techniques for passwords (see 8.24). Additional Information Passwords or passphrases are a commonly used type of authentication information and are a common way to verify a user's identity. Other types of authentication information are cryptographic keys, data stored on physical tokens (eg, smart cards) that produce authentication codes, and biometric data such as iris scans or fingerprints. Additional information is available in the ISO/IEC 24760 series. Requiring passwords to be changed frequently can be problematic, as users may become annoyed by frequent changes, may forget new passwords, write them down in insecure places, or choose insecure passwords. The provision of Single Sign On (SSO) or other authentication management tools (e.g. password vault) limits the amount of authentication information users 34 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) must protect and can thus improve the effectiveness of this security measure. However, these tools can also increase the impact of leaking credentials. Some applications require user passwords to be assigned by an independent authority. In these cases, points a), c) and d) of “Password Management System” do not apply. 5.18 Access Rights Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Identi ty_and_access_management Security domains #Protection Security measure Access rights to information and other related assets should be provided, reviewed, modified, and terminated in accordance with the topic-specific access control policy and the organization's access control rules. Objective Ensure that access to information and other related assets is defined and authorized in accordance with business requirements. Recommendations Provision and revocation of access rights The process for provisioning or revoking the physical and logical access rights granted to an entity's authenticated identity should include: a) obtaining permission from the owner of the information and other associated assets for the use of that information and other associated assets (see 5.9). Separate approval of access rights by management may also be appropriate; b) taking into account the business requirements as well as the policy specific to the theme of the access control and rules on the access control of the organization; (c) consideration of segregation of duties, including the separation of approval and enforcement functions and the separation of incompatible functions; d) ensuring that access rights are removed when an individual does not need to access information and other associated assets, in particular ensuring that the access rights of users who have left the organization are deleted quickly; (e) taking into account the granting of temporary access rights for a limited period and their revocation on the expiry date, in particular for temporary staff or for temporary access necessary for staff; f) verifying that the level of access granted is aligned with topic-specific access control policies (see 5.15) and is consistent with other information security requirements such as segregation tasks (see 5.3); g) ensuring that access rights are not activated (e.g. by service providers) that once the authorization procedures are successfully completed; h) maintaining a centralized record of all access rights granted to a user identifier (ID, logical or physical) to access information and other associated assets; i) modification of the access rights of users who have changed role or position; © ISO/IEC 2022 – All rights reserved 35 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) (j) removing or adjusting physical and logical access rights, which may be accomplished by removing, revoking or replacing keys, authentication information, identification cards or subscriptions; k) maintaining an up-to-date record of changes to physical access rights and user logic. Review of access rights Regular reviews of physical and logical access rights should consider the following: a) user access rights following any change within the same organization (e.g. change of position, promotion, demotion) or termination of employment (see 6.1 to 6.5 ) ; b) permissions for privileged access rights. Things to consider before changing or ending a job A user's access rights to information and other related assets should be reviewed and adjusted or removed prior to any change or termination of employment based on the assessment of risk factors such as: a) if the termination or change of employment occurred at the initiative of the user or the management, and the reason for termination; b) current user responsibilities; (c) the value of currently accessible assets. Additional Information Consideration should be given to establishing user access roles based on business requirements, which group a set of access rights into typical user access profiles. Access requests and access rights reviews are easier to manage at the level of these roles than at the level of individual access rights. Consideration should be given to including clauses in staff contracts and service contracts which stipulate the penalties for attempted unauthorized access by staff (see 5.20, 6.2, 6.4, 6.6). When management initiates the termination of the employment contract, disgruntled external party staff or users may deliberately alter information or sabotage information processing facilities. In cases where people resign or are fired, they may be tempted to collect information for later use. Cloning is an effective way for organizations to assign access to users. However, it should be done carefully based on the different functions identified by the organization rather than just cloning an identity with all the associated access rights. Cloning carries the inherent risk of creating excessive access rights to information and other associated assets. 5.19 Information security in relations with suppliers Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity 36 Cybersecurity concepts #Identifier Operational capabilities Security domains #Governance_ #Security_of_relationships_suppliers and_Ecosystem #Protection © ISO/IEC 2022 – All rights reserved AFNOR Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Security measure Processes and procedures should be defined and implemented to manage the information security risks that are associated with the use of the supplier's products or services. Objective Maintain the agreed level of information security in supplier relationships. Recommendations The organization should establish and communicate to all interested parties a policy specific to the topic of relations with suppliers. The organization should identify and implement processes and procedures to address security risks associated with the use of supplier products and services. This recommendation should also be applied to the organization's use of cloud service provider resources. These processes and procedures should include those to be implemented by the organization, as well as those that the organization requires the supplier to implement at the start or end of the use of the supplier's products or services. of which: a) identification and documentation of the types of providers (e.g. ICT services, logistics services, support services, financial services, ICT infrastructure components) that may affect the confidentiality, integrity and availability of organization; b) Establishing how to evaluate and select suppliers based on sensitivity of information, products and services (for example, using market analysis, customer references, review documents, on-site assessments, certifications); c) the evaluation and selection of products or services from suppliers that implement adequate information security measures and their review; in particular, the accuracy and completeness of the security measures implemented by the supplier to ensure the integrity of the supplier's information and information processing, and consequently the information security of the organization; d) the definition of the information, ICT services and physical infrastructure of the organization which the suppliers can access and which they can supervise, control or use; e) definition of the types of components and services of the suppliers' ICT infrastructure, which may affect the confidentiality, integrity and availability of the organization's information; f) the assessment and management of information security risks associated with: 1) the vendors' use of the organization's information and other related assets, including risks from potentially malicious vendor personnel; 2) the malfunction or vulnerabilities of the products (including the software components and sub-components used in these products) or the services of the suppliers; (g) monitoring compliance with information security requirements established for each type of provider and each type of access, including third party product review and validation; h) mitigation of a supplier's non-compliance, whether detected through the surveillance or other means; i) the handling of incidents and contingencies associated with the products and services of the suppliers, including including the responsibilities of the organization and those of the suppliers; j) the resiliency and, if necessary, recovery and contingency measures to ensure the availability of the supplier's information and the information processing carried out by the supplier and consequently the availability of the organization's information; © ISO/IEC 2022 – All rights reserved 37 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) k) sensitization and training of organization personnel interacting with supplier personnel, on appropriate rules of engagement, topic-specific policies, processes and procedures, and behavior depending on the type of supplier and the supplier's level of access to the organization's systems and information; l) managing the necessary transfer of information and other associated assets and anything that needs to be changed, and ensuring that the security of the information is maintained for the duration of the transfer; m) requirements to ensure secure termination of the relationship with the supplier, including: 1) removal of assigned access rights; 2) manipulation of information; 3) determination of ownership of intellectual property created during the contract; 4) the portability of information in the event of a change of supplier or insourcing; 6) records management; 7) return of assets; 8) secure disposal of information and other associated assets; 9) current confidentiality requirements; n) the level of personnel security and physical security provided for personnel and supplier facilities. Consideration should be given to procedures for the continuity of information processing in the event that the supplier is no longer able to provide its products or services (for example, due to an incident, cessation of activity of the supplier or the cessation of production of certain components due to technological advances) in order to avoid any delay in setting up replacement products or services (for example, identifying an alternative supplier in advance or always use substitute suppliers). Additional Information In cases where an organization would not be able to impose requirements on a supplier, the organization should: (a) take into account the recommendations given in this security measure when making decisions regarding the choice of a supplier and its product or service; b) implement compensatory means, as far as necessary, based on a risk assessment. Information may be exposed to risk by providers in the event of inadequate information security management. Security measures should be determined and applied to manage vendor access to information and other related assets. For example, if there is a particular need for confidentiality of information, non-disclosure agreements or cryptographic techniques can be used. Another example concerns the risks related to the protection of personal data when the agreement concluded with the supplier includes the transfer or access to information across borders. It is necessary for the organization to be aware that the legal or contractual responsibility for protecting information rests with it. Risks can also be caused by inappropriate security measures of providers' ICT infrastructure services and components. Faulty or vulnerable services or components may cause information security breaches in the organization or in another entity (for example, they may cause malware infection, attacks or other damages on entities other than the organization). 38 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) See ISO/IEC 27036-2 for more information. 5.20 Information Security in Supplier Agreements Information Security Properties Type of security measure #Preventive #Privacy Cybersecurity concepts #Identifier #Integrity #Availablity Operational capabilities Security domains #Governance_ #Security_of_relationships_suppliers and_Ecosystem #Protection Security measure Appropriate information security requirements should be established and agreed with each supplier, depending on the type of relationship with the supplier. Objective Maintain the agreed level of information security in supplier relationships. Recommendations Agreements with suppliers should be established and documented to ensure that both the organization and the supplier understand each other's obligations to meet applicable information security requirements. To meet the identified information security requirements, it may be considered to include the following conditions in the agreements: a) description of the information to be provided or accessed and the methods for providing or accessing such information information; b) classification of information according to the organization's classification scheme (see 5.10, 5.12, 5.13); c) mapping of the organization's own classification scheme to the provider's classification scheme; d) legal, statutory, regulatory and contractual requirements, including data protection, processing of personal data (DCP), intellectual property rights and copyrights and description of how to ensure that these requirements are met; e) obligation for each contracted party to implement an agreed set of security measures, including access control, performance analysis, monitoring, reporting and auditing, and obligations for the supplier to comply with the organization's information security requirements; f) rules of acceptable use of the information and other associated assets, including, if necessary, this that falls under unacceptable use; g) procedures or conditions for granting or removing permissions for the use of the organization's information and other related assets by Supplier personnel (for example, through an explicit list of Supplier personnel). provider authorized to use information and other associated assets of the organization); h) information security requirements relating to the supplier's ICT infrastructure; in particular, the minimum information security requirements for each type of information and type of access to be used as the basis of agreements with each supplier, based on the organization's business needs and its risk criteria ; i) indemnities and corrective actions in the event of the contractor's failure to comply with the requirements; © ISO/IEC 2022 – All rights reserved 39 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) j) incident management procedures and requirements (particularly notification and cooperation in corrective action); k) training and awareness requirements for specific information security procedures and requirements (eg incident response and authorization procedures); l) necessary arrangements for subcontracting, including the necessary security measures to be implemented, such as an agreement on the use of subcontractors (for example, which requires that they be subject to the same obligations as the supplier, which requires having a list of subcontractors and prior notification of any change); m) necessary contacts, including a contact for information security issues; n) any requirements for screening, where permitted by law, of Supplier personnel, including responsibilities for carrying out the screening and procedures for notification if the screening is unsuccessful or the results are objectionable. worry or doubt; o) Proof and assurance mechanisms of third party attestations of significant information security requirements relating to Supplier's processes and independent reporting on the effectiveness of security measures; p) right to audit the supplier's security processes and measures in relation to the contract; q) obligation for the supplier to periodically provide a report on the effectiveness of the security measures and its agreement to the prompt correction of the significant problems indicated in the report; r) process for correcting defects and resolving disputes; s) provision of backups in line with the needs of the organization (in terms of frequency, and type and location of storage); t) assurance of the availability of an alternative facility (i.e. disaster recovery site) that is not subject to the same threats as the primary facility and consideration of fallback means (alternative security measures ) if primary security measures fail; u) have a change management process that ensures prior notification to the organization and the possibility for the organization not to accept the changes; (v) physical security measures appropriate to the classification of the information; (w) information transfer security measures designed to protect information during physical transfer or logical transmission; (x) termination clauses upon entering into the contract, including records management, return of assets, secure disposal of information and other associated assets, and any ongoing confidentiality obligations; y) providing a method of securely destroying organization information stored by the supplier as soon as they are no longer useful; z) at the end of the contract, provide assistance for handover to another supplier or to the organization herself. The organization should establish and maintain a record of agreements with external parties (eg contracts, memorandums of understanding, information sharing agreements) to keep track of where their information is going. The organization should also regularly review, validate and update its agreements with external parties to ensure that these agreements are still necessary and are adapted to the relevant information security clauses. 40 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information Agreements can differ significantly from organization to organization and between types of vendors. Care should therefore be taken to include all important requirements to address information security risks. For details on vendor agreements, see the ISO/IEC 27036 series. For cloud service agreements, see the ISO/IEC 19086 series. 5.21 Information Security Management in the ICT Supply Chain Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Identifier #Integrity #Availablity Operational capabilities Security domains #Governance_ #Security_of_relationships_suppliers and_Ecosystem #Protection Security measure Processes and procedures should be defined and implemented to manage information security risks associated with the supply chain of ICT products and services. Objective Maintain the agreed level of information security in supplier relationships. Recommendations The following points should be considered when addressing information security in the context of ICT supply chain security, in addition to general information security requirements for supplier relationships: a) define the information security requirements to be applied to the acquisition of products or services TIC; b) require ICT service providers to propagate the application of the organisation's security requirements throughout the supply chain if they outsource parts of the ICT service provided to the organisation; c) require suppliers of ICT products to propagate the application of appropriate security practices throughout the entire supply chain if these products contain components purchased or obtained from other suppliers or other entities (for example, under -contractors in software development and suppliers of hardware components); d) require suppliers of ICT products to provide information describing the components software used in the products; e) require suppliers of ICT products to provide information describing the security features implemented for their product and the configuration required for it to operate securely; f) implement a monitoring process and acceptable methods to validate compliance of delivered ICT products and services with specified security requirements. Examples of these vendor control methods may include penetration testing and proof or validation of third party certifications of vendor information security operations; g) implement a process for the identification and documentation of components of a product or service that are critical to continued operation and therefore require additional attention, monitoring and additional follow-up required when they are © ISO/IEC 2022 – All rights reserved 41 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) performed outside the organization, particularly if the supplier subcontracts certain aspects of the components of the product or service to other suppliers; h) Obtain assurance that critical components and their origin can be traced throughout the supply chain; i) Obtain assurance that the delivered ICT products perform as intended without any aspect unexpected or unwanted; j) implement processes to ensure that components from suppliers are authentic and unchanged from their specifications. Examples of measures are tamper-evident markings, verification of cryptographic fingerprints or digital signatures. Monitoring of out-of-specification performance may provide an indication of tampering or counterfeiting. Tamper prevention and detection should be implemented in multiple stages of the system development life cycle, including design, development, integration, operation and maintenance; k) obtain assurance that ICT products meet the required levels of security, for example, through formal certification or an evaluation scheme such as the Common Criteria Mutual Recognition Arrangement; l) define rules for sharing information regarding the supply chain and any possible issues and trade-offs between the organization and suppliers; m) implement specific processes for managing the life cycle of ICT components and their availability, as well as the associated security risks. This includes managing the risk that components may no longer be available due to suppliers going out of business or production of those components stopping due to technological advances. Consideration should be given to identifying an alternate vendor and the process of transferring software and skills to the alternate vendor. Additional Information Specific ICT supply chain risk management practices build on, but do not replace general information security, quality, project management and systems engineering practices. Organizations are advised to work with suppliers to understand the ICT supply chain and all aspects that have a significant impact on the products and services to be provided. The organization can influence the information security practices applied in the ICT supply chain, by clearly stipulating in the agreements concluded with their suppliers the points that other suppliers in the ICT supply chain should treat. ICT products should be acquired from reputable sources. The reliability of software and hardware is a matter of quality control. Although an organization typically does not have the ability to inspect its suppliers' quality control systems, it can make reliable judgments based on the supplier's reputation. The ICT supply chain as discussed here includes cloud services. Examples of ICT supply chains are: (a) provision of cloud services, where the cloud service provider relies on software developers, telecommunications service providers and hardware providers; b) Internet of Things (IoT), where the service involves device manufacturers, cloud service providers (e.g. IoT platform operators), web and mobile application developers and library provider software; 42 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) c) hosting services, where the supplier relies on external service centers including the first, second and third level supports. See ISO/IEC 27036-3 for further details and guidance on risk assessment. Software Identification (SWID) tags can also help improve information security in the supply chain by providing information about where software comes from. See ISO/IEC 19770-2 for details. 5.22 Service Provider Monitoring, Review and Change Management Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Identifier #Integrity #Availablity Operational capabilities Security domains #Governance_and_Ecosys theme #Protection #Security_of_relationships_suppliers #Defense #Information_Security_Assurance Security measure The organization should regularly monitor, review, evaluate and manage changes to vendor and service delivery information security practices. Objective Maintain an agreed level of information security and service delivery, in accordance with agreements with suppliers. Recommendations Monitoring, reviewing and change management of supplier services should ensure that information security terms and conditions described in agreements are adhered to, information security issues and incidents are properly managed and that changes in the services providers or the situation of the company do not affect the provision of the services. This should include a process for managing the relationship between the organization and the supplier in order to: a) monitor service performance levels to verify compliance with agreements; b) control changes made by suppliers, including: 1) enhancements to existing provided services; 2) development of new applications and systems; 3) changes or updates to Supplier's policies and procedures; 4) new or modified security measures to resolve information security incidents and to improve information security; c) monitor changes in the services of providers, including: 1) network changes and enhancements; 2) the use of new technologies; 3) the adoption of new products or more recent versions; © ISO/IEC 2022 – All rights reserved 43 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 4) new development tools and environments; 5) changes to the physical location of the Services' facilities; 6) changes of subcontractors; 7) subcontracting to another supplier; d) review service reports produced by the supplier and organize progress meetings regular as required by the agreements; e) conduct audits of suppliers and subcontractors in conjunction with the review of independent auditors' reports, if any, and follow up on identified issues; f) provide information relating to information security incidents and review such information as required by the agreements and by all supporting guidelines and procedures; g) review the Supplier's audit logs and records regarding information security events, operational issues, traceability of malfunctions and interruptions relating to the service provided; h) manage and respond to all identified information security events or incidents; i) identify and manage information security vulnerabilities; j) examine aspects related to information security in the supplier's relations with its own suppliers; k) ensure that the provider maintains sufficient service capacity and enforceable plans designed to ensure that agreed service continuity levels are maintained following a major service failure or disaster (see 5.29, 5.30 , 5.35 , 5.36, 8.14); l) ensure that suppliers designate persons responsible for monitoring compliance and the application of the requirements stipulated in the agreements; m) regularly assess suppliers' maintenance of adequate levels of security of l'information. Responsibility for supplier relationship management should be assigned to a designated person or team. Sufficient resources and technical skills should be made available to monitor that contract requirements, in particular information security requirements, are met. Appropriate measures should be taken when shortcomings in the provision of the service are observed. Additional Information See ISO/IEC 27036-3 for details. 5.23 Information security in the use of cloud services Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities Security domains #Governance_ #Security_of_relationships_suppliers and_Ecosystem #Protection Security measure Processes for acquiring, using, managing, and terminating cloud services should be established in accordance with the organization's information security requirements. 44 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective Specify and manage information security when using cloud services. Recommendations The organization should establish and communicate to all significant interested parties a policy specific to the subject of the use of cloud services. The organization should define and communicate how it plans to manage the information security risks associated with the use of cloud services. This may be an extension or part of the existing approach to how the organization manages services provided by external parties (see 5.21 and 5.22). The use of cloud services may include shared responsibility for information security and a collaborative effort between the cloud service provider and the organization that has the role of cloud service customer. It is essential that the responsibilities of the cloud service provider and the organization as a customer of the cloud services are defined and implemented appropriately. The organization should define: a) all significant information security requirements associated with the use of the Services in cloud; (b) the criteria for selecting cloud services and the scope of use of cloud services; (c) duties and responsibilities relating to the use and management of cloud services; d) the information security measures that are managed by the cloud service provider and those managed by the organization as a customer of the cloud service; e) how to obtain and use the information security means made available by the cloud service provider; f) how to obtain a guarantee on the information security measures implemented by the cloud service provider; g) how to manage information security measures, interfaces and changes in services when an organization uses multiple cloud services, particularly if they are provided by different cloud service providers; h) procedures for managing information security incidents that occur in connection with use of cloud services; i) its approach to monitoring, reviewing and evaluating cloud services in use to manage information security risks; j) how to change or discontinue use of cloud services, including cloud service exit strategies. Cloud service agreements are often predefined and not open to negotiation. For all cloud services, the organization should review the cloud service agreements with the cloud service provider(s). A cloud service contract should address the organization's requirements for confidentiality, integrity, availability and management of information, with appropriate cloud service level objectives and appropriate quality objectives of the cloud service. The organization should perform appropriate risk assessments to identify the risks associated with the use of the cloud service. Any residual risks associated with the use of the cloud service should be clearly identified and accepted by the appropriate level of management in the organization. © ISO/IEC 2022 – All rights reserved 45 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) A contract between the cloud service provider and the organization, having the role of customer of the cloud service, should include the following provisions to protect the organization's data and ensure the availability of the services: a) provide solutions based on accepted industry standards regarding architecture and l'infrastructure; b) manage cloud service access controls to meet organizational requirements; (c) implement monitoring and malware protection solutions; (d) process and store the organization's sensitive information in locations that are approved (eg, a specific country or region) or subject to/under the jurisdiction of a specific jurisdiction; e) make dedicated support available in the event of an information security incident in the cloud service environment; f) ensure that the organization's information security requirements are met in the event that cloud services are themselves outsourced to an external provider (or prohibition on outsourcing cloud services); g) support the organization in gathering digital evidence, taking into account digital evidence laws and regulations in different jurisdictions; h) make available the appropriate support and availability of the Services for the appropriate period when the Organization wishes to discontinue the use of the Cloud Services; (i) provide necessary data backups and configuration information and securely manage backups as appropriate, based on the cloud service provider means used by the organization having the role of cloud service customer; j) provide and return information, such as configuration files, source codes and data that belong to the organization, in its capacity as a customer of the cloud service, on request during the provision of the service or during termination of service. The organization, as the customer of the cloud service, should consider whether it is appropriate for the agreement to require cloud service providers to provide prior notification prior to any change that has a significant impact on the customer. , change that relates to the way the service is provided to the organization, including: a) changes to technical infrastructure (e.g., relocation, reconfiguration, or changes to hardware or software) that affect or modify the cloud service offering; (b) processing or storing the information under a new geographic or legal jurisdiction; (c) use of other cloud service providers or sub-processors (including changing existing providers and sub-processors or using new existing providers and sub-processors). The organization using cloud services should maintain close contact with its cloud service providers. These contacts enable a mutual exchange of information security information relating to the use of cloud services, with a mechanism available to the cloud service provider and the organization acting as the customer of the service in cloud, allowing them to monitor every feature of the service and report any failures against the commitments contained in the agreements. Additional Information This security measure addresses cloud security from the perspective of the cloud service customer. 46 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Further information on cloud services is available in ISO/IEC 17788, ISO/IEC 17789 and ISO/IEC 22123-1. Specifics related to portability of cloud computing in support of exit strategies are available in ISO/IEC 19941. Specifics related to information security and public cloud services are described in ISO / IEC 27017. The specifics related to the protection of personal data in public cloud computing acting as personal data processor are described in ISO/IEC 27018. Relationships with suppliers in the context of cloud services are dealt with in ISO/IEC 27036-4 and agreements relating to cloud services and their content are addressed in the ISO/IEC 19086 series, with security and privacy being addressed specifically in ISO/ IEC 19086-4. 5.24 Information security incident management planning and preparation Type of security measure #Corrective Information Security Properties Cybersecurity concepts #Privacy #Respond #Integrity #Availablity #To re-establish Operational capabilities #Governance Security domains #Defense #Management_of_information_security_events_ Security measure The organization should plan and prepare for information security incident management by defining, establishing and communicating the organization's security incident management processes, roles and responsibilities. information. Objective Ensure a prompt, effective, consistent and orderly response to information security incidents, including communication on information security events. Recommendations Duties and Responsibilities The organization should establish appropriate information security incident management processes. Duties and responsibilities for carrying out incident management procedures should be determined and effectively communicated to relevant internal and external interested parties. Consideration should be given to the following: a) establish a common method for reporting information security events, including a point of contact (see 6.8); b) establish an incident management process to empower the organization to manage information security incidents, including administration, documentation, detection, triage, prioritization, analysis, communication and coordination of interested parties; c) establish an incident response process to provide the organization with the ability to assess, respond to and learn from information security incidents; d) allow only competent personnel to handle information security incident issues within the organization. These personnel should have documentation of the procedures and receive regular training; e) establish a process to identify training, certification and professional development required for incident response personnel. © ISO/IEC 2022 – All rights reserved 47 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Incident management procedures The objectives of information security incident management should be agreed with management and it should be ensured that those responsible for information security incident management understand the priorities of the organization for handling information security incidents, including resolution times based on potential consequences and severity. Incident management procedures should be implemented to meet these objectives and priorities. Management should ensure that an information security incident management plan is created taking into consideration different scenarios and that procedures are developed and implemented for the following activities: a) evaluation of information security events according to the criteria that determine what constitutes an information security incident; b) monitoring (see 8.15 and 8.16), detection (see 8.16), classification (see 5.25), analysis and reporting (see 6.8) of information security events and incidents (by human or automatic means); c) management of information security incidents until their conclusion, including response and escalation (see 5.26), depending on the type and category of the incident, the possible activation of an crisis and business continuity plans, controlled incident recovery and communication to internal and external interested parties; d) coordination with internal and external interested parties, such as authorities, groups external interests and forums, suppliers and customers (see 5.5 and 5.6); e) logging of incident management activities; f) evidence management (see 5.28); g) root cause analysis or post incident analysis procedures; h) identification of lessons learned and any improvements to be made to the incident management procedures or more generally to the information security measures required. Declaration procedures Reporting procedures should include: a) the actions to be taken in the event of an information security event (for example, immediately noting all relevant details, such as malfunctions that occur and messages that appear on the screen, immediately informing the point of contact and perform only coordinated actions); b) the use of incident forms to help staff take all necessary actions when declaring information security incidents; c) adequate feedback processes to ensure that persons reporting information security events are notified, where possible, of the results after the issue has been addressed and closed; d) creation of incident reports. Consideration should be given to any external requirements on reporting incidents to relevant interested parties within the defined time frame (e.g. requirements to report breaches to regulators) when implementing incident management procedures. 48 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information Information security incidents can transcend organizational and national boundaries. To respond to such incidents, it is helpful to coordinate the response and share information about these incidents with external organizations as necessary. Detailed guidance on information security incident management is provided in the ISO/IEC 27035 series. 5.25 Information security event assessment and decision making Type of security measure #Detective Information Security Properties #Privacy Cybersecurity concepts Operational capabilities #Detect #Respond Security domains #Defense #Management_of_information_security_events_ #Integrity #Availablity Security measure The organization should evaluate information security events and decide whether they should be categorized as information security incidents. Objective Ensure effective categorization and prioritization of information security events. Recommendations An information security incident categorization and prioritization scheme should be agreed upon for the identification of the consequences and priority of an incident. The diagram should include criteria for categorizing events as information security incidents. The point of contact should assess each information security event using the agreed scheme. Information security incident response and coordination personnel should assess and decide on information security events. The results of the assessment and the decision should be recorded in detail for later verification or reference purposes. Additional Information The ISO/IEC 27035 series provides additional guidance on incident management. 5.26 Information Security Incident Response Type of security measure #Corrective Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts Operational capabilities Security domains #Defense #Respond #Restore #Management_of_information_security_events_ Security measure Information security incidents should be responded to in accordance with documented procedures. Objective Ensure an efficient and effective response to information security incidents. © ISO/IEC 2022 – All rights reserved 49 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations The organization should establish information security incident response procedures and communicate them to all appropriate interested parties. Response to information security incidents should be provided by a designated team with the required skills (see 5.24). The response should include: a) the isolation, if the consequences of the incident can propagate, of the systems affected by l'incident; b) collecting evidence (see 5.28) as soon as possible after the occurrence of the incident; c) an escalation, if necessary, including crisis management activities and possibly the use of business continuity plans (see 5.29 and 5.30); d) ensuring that all response activities undertaken are properly logged for further analysis; (e) communicating the existence of an Information Security Incident or any relevant details relating thereto to all relevant internal and external interested parties on a need-to-know basis; f) coordination with internal and external parties, such as authorities, external interest groups and forums, suppliers and customers, to improve the effectiveness of responses and help minimize consequences for other organisations; g) once the incident has been successfully addressed, recording the incident and closing it in a manner formal; h) scientific analysis of information security, if required (see 5.28); i) a post-incident analysis to identify the root cause. Make sure it is documented and communicated according to defined procedures (see 5.27); j) identification and management of information security vulnerabilities and weaknesses, including those related to the security measures that caused, contributed to, or failed to prevent the incident. Additional Information The ISO/IEC 27035 series provides additional guidance on incident management. 5.27 Learning from information security incidents Type of security measure #Preventive Information Security Properties Cybersecurity concepts #Privacy #Identify #Proté #Integrity #Availablity gives Operational capabilities Security domains #Defense #Management_of_information_security_events_ Security measure Knowledge gained from information security incidents should be used to strengthen and improve information security measures. Objective Reduce the likelihood or consequences of future incidents. 50 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations The organization should establish procedures to quantify and monitor the types, volume and cost of information security incidents. The information collected during the assessment of information security incidents should be used to: a) improve the incident management plan, including incident scenarios and procedures (see 5.24); b) identify recurring or serious incidents and their causes to update the organization's information security risk assessment and to determine and implement additional security measures necessary to reduce the likelihood or consequences of future similar incidents. Mechanisms to enable this include collecting, quantifying and monitoring information on incident types, volumes and costs; c) improve training and awareness and training of users (see 6.3) by providing examples of what can happen, how to respond to such incidents and how to prevent them in the future. Additional Information The ISO/IEC 27035 series provides additional guidance. 5.28 Collection of evidence Information Security Properties Type of security measure #Corrective #Privacy #Integrity #Availablity Cybersecurity concepts Operational capabilities #Detect #Respond Security domains #Defense #Management_of_information_security_events_ Security measure The organization should establish and implement procedures for the identification, collection, acquisition and preservation of evidence relating to information security events. Objective Ensure consistent and effective management of evidence relating to information security incidents for the purposes of legal or disciplinary action. Recommendations Internal procedures should be defined and followed for handling evidence of information security events for legal or disciplinary action. Consideration should be given to the requirements of the various jurisdictions in order to maximize the chances of recognition across the jurisdictions concerned. In general, these evidence management procedures should provide instructions for the identification, collection, acquisition and preservation of evidence according to different types of storage media, terminals and terminal states (i.e. i.e. on or off). Evidence generally needs to be collected in a manner admissible by the appropriate national courts or other disciplinary body. It should be possible to show that: a) the recordings are complete and have not been altered in any way; (b) the copies of the digital evidence are likely identical to the originals; (c) any information system from which the evidence was collected was functioning properly at the time the evidence was recorded. © ISO/IEC 2022 – All rights reserved 51 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Certifications and other means of qualification of personnel and tools should be used, when these means are available, in order to reinforce the value of the preserved evidence. Digital evidence can cross jurisdictional or organizational boundaries. In these cases, it should be ensured that the organization is entitled to collect the information required as digital evidence. Additional Information When an information security event is first detected, it is not always clear whether the event will be subject to legal action. Therefore, there is a risk that the necessary evidence may be destroyed, intentionally or accidentally, before the seriousness of the incident is established. It is advisable to seek legal advice or the police if legal action is contemplated, and seek advice on the evidence required. ISO/IEC 27037 provides definitions and guidelines on the identification, collection, acquisition and preservation of digital evidence. The ISO/IEC 27050 series deals with electronic discovery, which includes the treatment of electronically stored information as evidence. 5.29 Information security during a disruption Type of security measure #Preventive #Cor rective Information Security Properties #Privacy Cybersecurity concepts #Protect #Respond Operational capabilities #Continuity Security domains #Protection #Resilience #Integrity #Availablity Security measure The organization should plan how to maintain information security at the appropriate level during a disruption. Objective Protect information and other associated assets during a disruption. Recommendations The organization should determine its requirements for adapting information security measures during a disruption. Information security requirements should be included in business continuity management processes. Plans should be developed, implemented, tested, reviewed and evaluated to maintain or restore the information security of critical business processes following an interruption or failure. Information security should be restored to the required level and within the required time frame. The organization should implement and maintain: a) information security measures, and supporting systems and tools in business continuity and ICT continuity plans; b) the processes that maintain the operation of the information security measures existing during a disturbance; c) Compensating security measures for information security measures that do not can no longer function during a disturbance. 52 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Additional Information In the context of business continuity and ICT continuity planning, it may be necessary to tailor information security requirements depending on the type of disruption, compared to normal operating conditions. As part of the business impact analysis and risk assessment carried out in business continuity management, the consequences of the loss of confidentiality and integrity of information should be considered. considered and prioritized, in addition to the need to maintain availability. Information on business continuity management systems is available in ISO 22301 and ISO 22313. Additional guidance on business impact analysis (BIA) is available in ISO /TS 22317. 5.30 ICT readiness for business continuity Type of security measure #Corrective Information Security Properties #Availablity Cybersecurity concepts #Respond Operational capabilities #Continuity Security domains #Resilience Security measure ICT readiness should be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements. Objective Ensure the availability of information and other associated assets of the organization during a disruption. Recommendations ICT readiness for business continuity is an important component of business continuity management and information security management to ensure that the organization's objectives can continue to be achieved during a disturbance. ICT continuity requirements result from the Business Impact Analysis (BIA). The AIA process should use impact types and criteria to assess the impacts over time caused by the disruption of activities that provide products and services. The magnitude and duration of the impacts caused should be used to identify the activities to be prioritized, to which a recovery time (DR) should be assigned. The AIA should then determine the resources that are needed to support the prioritized activities. A DR should also be specified for these resources. A subset of these resources should include ICT services. Business impact analysis involving ICT services can be extended to define performance and capacity requirements of ICT systems, as well as recovery point objectives (RPOs) of the information needed to carry out activities during a disturbance. Based on the results of the business impact analysis and risk assessment involving ICT services, the organization should identify and choose ICT continuity strategies that take into account options for the periods before, during and after a disturbance. Business continuity strategies can consist of one or more solutions. Based on the strategies, plans should be developed, implemented and tested to meet the required level of availability of ICT services within the required timeframe following the interruption or failure of critical processes. The organization should ensure that: a) an adequate organizational structure is in place to prepare for, mitigate and respond to a disruption handled by personnel with the necessary responsibility, authority and competence; © ISO/IEC 2022 – All rights reserved 53 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) b) ICT continuity plans, including response and recovery procedures detailing how the organization plans to handle a disruption of ICT services, are: 1) regularly assessed through exercises and tests; 2) approved by management; c) ICT continuity plans include the following ICT continuity information: 1) performance and capacity specifications to meet business continuity requirements and objectives as specified in the business impact analysis (BIA); 2) the recovery time (DR) of each prioritized ICT service and the procedures for restoring these components; 3) the recovery point objectives (RPOs) of the prioritized ICT resources defined as that information and information restoration procedures. Additional Information ICT continuity management forms an essential part of business continuity requirements on availability, to be able to: a) provide response and recovery after disruption of ICT services, whatever the cause; b) ensure that the continuity of prioritized activities is supported by ICT services required; c) respond before a disruption of ICT services occurs, upon detection of at least least one incident that may cause disruption of ICT services. Additional guidance on preparing ICT for business continuity is available in ISO/IEC 27031. Additional guidance on business continuity management systems is available in ISO 22301 and ISO 22313. Additional guidance on business impact analysis (BIA) is available in ISO/TS 22317. 5.31 Legal, statutory, regulatory and contractual requirements Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identifier Operational capabilities #Regulations_and_compliance Security domains #Governance_ and_Ecosystem #Protection Security measure Relevant legal, statutory, regulatory and contractual requirements for information security, as well as the organization's approach to meeting those requirements, should be identified, documented and kept up to date. Objective Ensure compliance with legal, statutory, regulatory and contractual requirements relating to information security. 54 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations General External requirements, including legal, statutory, regulatory or contractual requirements, should be considered when: a) developing information security policies and procedures; b) the design, implementation or change of information security measures; c) the classification of information and other related assets as part of the process of establishing information security requirements for internal purposes or for agreements with suppliers; d) performing information security risk assessments and determining information security risk treatment activities; e) the determination of the processes and the functions and responsibilities relating to the security of associated information; f) determination of supplier contractual requirements relevant to the organization and the scope of supply of products and services. Legislation and regulations The organization should: a) identify all laws and regulations relevant to the organization's information security in order to become aware of the requirements concerning its type of activity; b) consider compliance in all relevant countries, if the organization: — conducts business in other countries; — uses products and services from other countries where the laws and regulations can impact the organization; — transfers information across jurisdictional boundaries where laws and regulations can impact the organization; c) regularly reviews identified laws and regulations to keep abreast of changes and identify new legislation; d) defines and documents specific processes and individual responsibilities to meet these requirements. Cryptography Cryptography is an area that often has specific legal requirements. Consideration should be given to compliance with applicable agreements, laws and regulations relating to the following: a) restrictions on the import or export of computer hardware and software for performing cryptographic functions; (b) restrictions on the import or export of computer hardware and software designed to incorporate cryptographic functions; c) restrictions on the use of cryptography; d) the methods of access to encrypted information, mandatory or optional, available to the country authorities; © ISO/IEC 2022 – All rights reserved 55 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) e) the validity of digital signatures, seals and certificates. It is recommended that you seek legal advice when establishing compliance with applicable laws and regulations, particularly when encrypted information or cryptographic tools are transferred across jurisdictional boundaries. Contracts Contractual information security requirements should include those set out in: (a) contracts with customers; b) contracts with suppliers (see 5.20); (c) insurance contracts. Additional Information No additional information. 5.32 Intellectual property rights Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Identifier Security domains Operational capabilities #Regulations_and_compliance #Governance_ and_Ecosystem #Integrity #Availablity Security measure The organization should implement appropriate procedures to protect intellectual property rights. Objective Ensure compliance with legal, statutory, regulatory and contractual requirements relating to intellectual property rights and the use of proprietary products. Recommendations Consideration should be given to the following guidelines to protect any material that may be subject to intellectual property rights: a) define and communicate a policy specific to the theme of the protection of human rights; intellectual property; (b) publish procedures for ensuring compliance with intellectual property rights that define the intended use of software and information products; c) acquire software only through known and reputable sources to ensure that there is no has not infringed copyright; (d) maintain appropriate records of assets and identify all assets subject to intellectual property rights protection requirements; e) retain evidence and evidence of ownership of licenses, manuals, etc.; f) ensure that the maximum number of users or resources (eg central processing units [CPUs]) permitted by the license is not exceeded; 56 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) g) carry out checks to ensure that only authorized software and licensed products are installed; h) provide procedures for maintaining appropriate license conditions; i) provide procedures for the removal of software or for its transfer to third parties; j) comply with the terms and conditions of software and information obtained from public networks and external sources; k) not duplicate, convert to another format or extract commercial recordings (video, audio) except as permitted by applicable copyright laws or licenses; l) not to copy, in whole or in part, standards (e.g. ISO/IEC International Standards), books, articles, reports or other documents, except as permitted by copyright law or applicable licenses. Additional Information Intellectual property rights include software and document copyrights, design rights, trademarks, patents and source code licenses. Proprietary software products are generally provided under a license agreement specifying the general conditions of the license, for example limiting the use of the products to specific machines or limiting the copying to the creation of backup copies only. See the ISO/IEC 19770 series for more details on IT asset management. Data may be obtained from external sources. Typically, this type of data is obtained under the terms of a data sharing agreement or similar legal instrument. Such data sharing agreements should specify the nature of the authorized processing for the acquired data. It is also recommended that the provenance of the data be clearly indicated. See ISO/IEC 23751 for more details on data sharing agreements. Legal, statutory, regulatory and contractual requirements may include restrictions on copying proprietary material. In particular, they may require that only material developed by the organization, or which is licensed, or provided by a developer to the organization, may be used. Copyright infringement may result in legal action which may involve fines and criminal prosecution. Apart from the need for the organization to comply with its obligations to the intellectual property rights of third parties, the risks associated with personnel or third parties who do not respect the organization's own intellectual property rights should be managed. 5.33 Protection of recordings Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identify #Protect Operational capabilities #Regulations_and_compliance Security domains #Defense #Asset_management #Protection_of_information Security measure Records should be protected from loss, destruction, tampering, unauthorized access and unauthorized dissemination. © ISO/IEC 2022 – All rights reserved 57 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective Ensure compliance with legal, statutory, regulatory and contractual requirements, as well as company or community expectations relating to the protection and availability of records. Recommendations The organization should take the following steps to protect the authenticity, reliability, integrity and usability of records, knowing that their operational context and the requirements for their management change over time: a) issue guidelines on the storage, management of the chain of custody and disposal of records, which include the prevention of manipulation of records. These guidelines should align with the topicspecific records management policy and other records requirements of the organization; b) establish a retention schedule defining the recordings and their retention period. The storage and management system should ensure the identification of records and their retention period taking into account national or regional laws or regulations, as well as societal or community expectations, if necessary. This system should allow for the appropriate destruction of records at the end of this period if the organization no longer needs them. When deciding on the protection of specific organization records, consideration should be given to their information security classification, which is based on the organization's classification scheme. Records should be categorized into types (e.g. accounting records, business transaction records, personnel records, legal records); with for each type of recording details on the retention periods and the type of storage medium authorized, which can be physical or electronic. Storage systems should be chosen such that they allow the retrieval of the required records in a time and in a format acceptable to the requirements to be met. When electronic storage media are chosen, procedures to ensure the accessibility of the records (access to the storage medium and readability of the format) throughout the retention period should be established in order to protect against loss due to changes in future technologies. All cryptographic keys and programs associated with encrypted records or electronic signatures should also be retained to allow decryption of records during their retention period (see 8.24) . Storage and use procedures should be implemented in accordance with recommendations provided by storage media manufacturers. Consideration should be given to the possibility of degradation of the medium used for storing the recordings. Additional Information Records document particular events or transactions, or may be aggregations designed to document business processes, activities, or functions. They are both evidence of business activity and information assets. Any set of information, regardless of its structure and form, can be managed as a record. This includes information in the form of a document, collection of data or other types of digital or analog information that is created, captured and managed in the course of a professional activity. In records management, metadata is the data describing the context, content, and structure of records, as well as their management over time. Metadata is an essential component of any record. 58 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) It may be necessary to retain certain records securely to comply with legal, statutory, regulatory, or contractual requirements and to support the essential business activities of the organization. National regulation or law may determine the period and content of the data for the retention of information, as well as its content. Additional information on records management is available in ISO 15489. 5.34 Protection of privacy and personal data Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identify #Protect Operational capabilities #Protection_of_information Security domains #Protection #Regulations_and_compliance Security measure The organization should identify and comply with privacy and personal data protection requirements in accordance with applicable laws, regulations and contractual requirements. Objective Ensure compliance with legal, statutory, regulatory and contractual requirements relating to aspects of information security relating to the protection of personal data. Recommendations The organization should establish and communicate to all relevant interested parties a policy specific to the subject of privacy protection and personal data. The organization should develop and implement procedures for the protection of privacy and personal data. These procedures should be communicated to all relevant interested parties involved in the processing of personal data. Compliance with these procedures and all relevant privacy and personal data protection laws and regulations requires appropriate duties, responsibilities and safeguards. Often the best way to achieve this is to appoint a manager, such as a data protection officer (DPO) and this manager should provide guidance to staff, service providers and other interested parties. on their individual responsibilities and the specific procedures to be followed. Accountability for the processing of personal data should be ensured taking into account relevant laws and regulations. Appropriate technical and organizational measures should be implemented to protect the DCPs. Additional Information Some countries have introduced legislation imposing security measures for the collection, processing, transmission and disposal of personal data. Depending on the relevant national legislation, these security measures may impose obligations on those who collect, process and distribute personal data and may also restrict the right to transfer personal data to other countries. ISO/IEC 29100 provides a high level framework for the protection of personal data in ICT systems. Additional information on privacy management systems can be found in ISO/IEC 27701. Specific information on privacy management in public cloud computing acting as a processor DCPs are available in ISO/IEC 27018. © ISO/IEC 2022 – All rights reserved 59 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) ISO/IEC 29134 provides guidance on the Privacy Impact Assessment (PIA) and gives an example of the structure and content of a PIA report. Compared to ISO/IEC 27005, this is focused on the processing of personal data and is relevant for organizations dealing with personal data. It can help identify privacyrelated risks and possible mitigations to reduce those risks to acceptable levels. 5.35 Independent Information Security Review Type of security measure #Preventive #Cor rective Information Security Properties Cybersecurity concepts #Privacy #Identify #Proté #Integrity #Availablity gives Operational capabilities Security domains #Governance_ #Information_Security_Assuranceand_Ecosystem Security measure The organization's approach to managing information security and its implementation, including people, processes and technology, should be independently reviewed at planned intervals, or when significant changes occur. produce. Objective Ensure that the organization's approach to managing information security is continuously appropriate, adequate and effective. Recommendations The organization should have processes for conducting independent reviews. Management should plan and initiate periodic independent reviews. Reviews should include the assessment of opportunities for improvement and the need for changes to the information security approach, including the information security policy, topic-specific policies and other security measures. Such reviews should be performed by persons independent of the area being reviewed (e.g., internal audit function, independent manager, or external third-party organization specializing in such reviews). . The people performing these reviews should have the appropriate skills. The person conducting the reviews should be independent of the line structure to ensure that they have the necessary independence to carry out an assessment. The results of independent reviews should be reported to the management that initiated the reviews, if necessary, to senior management. These records should be retained. If independent reviews identify that the organization's approach and implementation to information security management is inadequate [for example, documented objectives and requirements are not being met or are not compliant information security guidance given in the information security policy and topic-specific policies (see 5.1)], management should take corrective action. In addition to periodic independent reviews, the organization should consider conducting independent reviews when: (a) the laws and regulations affecting it change; (b) significant incidents occur; c) the organization begins a new activity or makes changes to an existing activity; 60 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) d) the organization begins to use a new product or service, or makes changes to the use of an existing product or service; e) the organization makes significant changes to the security measures and procedures of information security. Additional Information ISO/IEC 27007 and ISO/IEC TS 27008 provide guidance on performing independent reviews. 5.36 Compliance with information security policies, rules and standards Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Identify #Protect #Integrity #Availablity Operational Capabilities #Regulations_and_compliance Security domains #Governance_ and_Ecosystem #Information_Security_Assurance Security measure Compliance with the information security policy, topic-specific policies, rules and standards of the organization should be checked regularly. Objective Ensure that information security is implemented and operating in accordance with the information security policy, topic specific policies, rules and standards of the organization. Recommendations Managers and owners of products, services or information should identify how to verify that the information security requirements defined in the information security policy, topic-specific policies, applicable rules, standards and other regulations are complied with. Automated measurement and reporting tools should be considered to perform effective regular reviews. If a nonconformity is detected as a result of the review, those responsible should: a) identify the causes of non-compliance; b) assess the need for corrective actions to establish compliance; c) implement appropriate corrective actions; d) analyze the corrective actions chosen to verify their effectiveness and identify any shortcomings or weaknesses. The results of reviews and corrective actions performed by managers and owners of products, services or information should be recorded and these records kept up to date. Managers should communicate the results to persons performing independent reviews (see 5.35) when an independent review is conducted in their area of responsibility. Corrective actions should be completed as soon as possible according to the risks. If they are not completed before the next scheduled review, they should at least be addressed progress during this review. © ISO/IEC 2022 – All rights reserved 61 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information Operational monitoring of system usage is covered in 8.15, 8.16, 8.17. 5.37 Documented operating procedures Type of security measure #Preventive #Corrective Information Security Properties Cybersecurity concepts Operational capabilities #Privacy #Protect #Asset_management #Integrity #Availablity #To re-establish #Physical_Security #System_and_network_security #Application_Security #Secure_Configuration #Identity_and_access_management #Management_of_threats_and_vulnerabilities Security domains #Governance_and_Ecosystem #Protection #Defense #Continuity #Management_of_information_security_events Security measure The procedures for operating the information processing facilities should be documented and made available to personnel who require them. Objective Ensure the correct and secure operation of the means of processing information. Recommendations Documented procedures should be developed for the operational activities of the organization associated with information security, for example: a) when the activity requires to be carried out in the same way by several people; b) when the activity is rarely performed, so that the procedure may have been forgotten during the next execution; c) when it is a new activity which presents a risk if it is not carried out correctly; d) before handing the activity over to new personnel. Operating procedures should specify: (a) responsible persons; b) secure installation and configuration of systems; (c) information processing and manipulation, whether automated or manual; d) backup (see 8.13) and resilience; e) planning requirements, including interdependencies with other systems; f) instructions for handling errors or other exceptional conditions [eg, restrictions on the use of utility programs (see 8.18)] that may occur during execution of the task; (g) relations with the helpdesk and management, including relations with the external helpdesk, in the event of unexpected technical or operational difficulties; 62 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine by Google LACROIX Translated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) h) instructions for handling storage media (see 7.10 and 7.14); i) the system restart and recovery procedures to be applied in the event of a failure of the system; j) management of the traceability system and system log information (see 8.15 and 8.17) and video surveillance systems (see 7.4); k) monitoring procedures, such as capacity, performance and security (see 8.6 and 8.16); l) maintenance instructions. Operating procedures should be documented and updated as necessary. Changes to documented operating procedures should be authorized. Where technically feasible, information systems should be managed consistently using the same procedures, tools and utilities. Additional Information No additional information. 6 Safety measures applicable to people 6.1 Selection of candidates Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities Security domains #Governance_ #Security_of_human_resourcesand_Ecosystem Security measure Reference checks should be performed on all job applicants before they join the organization and on an ongoing basis taking into account applicable laws, regulations and ethics, and 'they are proportional to the business requirements, to the classification of the information to which they will have access and to the identified risks. Objective Ensure that all staff members are eligible and suitable to perform the functions for which they are nominated, and that they remain so throughout their employment. Recommendations A selection process should be carried out for all staff, including full-time, part-time and temporary staff. Where these individuals are hired through service providers, the selection requirements should be specified in the contractual agreements between the organization and the providers. Information on all candidates considered for positions within the organization should be collected and managed taking into account all relevant laws in force in the relevant jurisdiction. In some jurisdictions, the organization may be required by law to notify candidates in advance of screening activities. © ISO/IEC 2022 – All rights reserved 63 ISO/ IEC 27002:20222022-02 AFNOR Machine by Google LACROIX Translated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Checks should take into account employment, privacy and personal data protection laws, and checks should include, where permitted, the following: a) the availability of satisfactory references (for example, professional references and personal); b) verification (for completeness and accuracy) of the candidate's curriculum vitae; c) confirmation of declared academic and professional qualifications; d) independent verification of identity (e.g. passport or other recognized document issued by competent authorities); (e) a more detailed check, such as a credit or criminal record check if the candidate is applying for a critical function. When a person is hired for a specific function related to information security, the organization should ensure that the candidate: (a) possesses the skills necessary to perform the safety function; b) is trustworthy to perform that function, particularly if the function is critical to l'organisation. Whether it is a first hiring or a promotion, when a position involves access to means of processing information and, in particular, if these means involve the processing of confidential information (for financial, personal or health-related information), the organization should consider carrying out additional, more detailed checks. Procedures should define the criteria and limits for carrying out checks (for example, that they determine who is entitled to select candidates, how, when and for what reasons checks are carried out). In cases where checks cannot be completed in time, mitigation measures should be implemented until the check is completed, for example: a) delayed integration; (b) deferred allocation of corporate assets; c) integration with restricted access; d) termination of the hiring process. The verifications should be repeated periodically to confirm that the aptitude of the personnel is still adequate in relation to the level of criticality of the function occupied. Additional Information No additional information. 6.2 Terms and conditions of the employment contract Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity 64 Cybersecurity concepts #Protect Operational capabilities Security domains #Governance_ #Security_of_human_resourcesand_Ecosystem © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Security measure Employment contracts should outline staff and organizational responsibilities for information security. Objective Ensure that staff understand their responsibilities in terms of information security within the framework of the functions that the organization intends to entrust to them. Recommendations Staff contractual obligations should take into account the organization's information security policy and relevant topic-specific policies. In addition, the following aspects can be clarified and specified: a) confidentiality or non-disclosure agreements that personnel with access to confidential information should sign before being granted access to the information and other associated assets (see 6.6); (b) legal rights and responsibilities [for example, relating to copyright laws or data protection legislation (see 5.32 and 5.34)]; c) responsibilities for information classification and management of information and other related assets of the organization, information processing facilities and information services used by personnel (see 5.9 to 5.13 ) ; d) responsibilities for handling information received from parties interested; e) action to be taken if personnel disregard the organization's security requirements (see 6.4). Information security responsibilities and functions should be communicated to candidates during the preemployment process. The organization should ensure that staff accept the information security terms and conditions. These terms and conditions should be appropriate to the nature and extent of access he will have to the organization's assets associated with the services and information systems. Information security terms and conditions should be reviewed when laws, regulations, information security policy, or topic-specific policies change. If necessary, the responsibilities indicated in the terms and conditions of the employment contract should continue to apply for a defined period after the end of employment (see 6.5). Additional Information A code of conduct can be used to outline personnel information security responsibilities regarding confidentiality, protection of personal data, ethics, appropriate use of information and other associated organizational assets, and best practices expected by the organization. An external party, involving supplier personnel, may need to be included in contractual agreements on behalf of the contracted person. If the organization is not a legal entity and does not employ any employees, the equivalent of the contractual agreement and terms and conditions may be considered as recommended in this security measure. © ISO/IEC 2022 – All rights reserved 65 ISO/ IEC 27002:20222022-02 AFNOR Machine by Google LACROIX Translated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 6.3 Awareness, education and training in information security Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities Security domains #Governance_ #Security_of_human_resourcesand_Ecosystem Security measure The organization's personnel and relevant interested parties should receive appropriate information security awareness, education and training, as well as regular updates of the information security policy, policies specific to a theme and organizational procedures that are relevant to their function. Objective Ensure that staff and relevant interested parties are aware of and fulfill their information security responsibilities. Recommendations General An information security awareness, education and training program should be established consistent with the information security policy, thematic-specific policies and the organization's procedures for information security, taking into account the organization's information to be protected and the information security measures that have been implemented to protect information. Information security awareness, education and training should take place periodically. The first awareness, education and training sessions can apply to new staff or people assigned to new positions or functions with very different information security requirements. Staff understanding should be assessed following an awareness, education or training activity in order to test the transfer of knowledge and the effectiveness of the awareness, education and training programme. Sensitization An information security awareness program should aim to make staff aware of their information security responsibilities and the means at their disposal to fulfill those responsibilities. The awareness program should be planned taking into account staff functions within the organization, whether internal or external staff (eg external consultants or supplier staff). Outreach program activities should be scheduled over time, preferably at regular intervals, so that they are repeated and include new staff. The awareness program should also be based on lessons learned from information security incidents. The awareness-raising program should include a number of awareness-raising activities through appropriate physical or virtual channels, such as campaigns, booklets, posters, newsletters, websites, information sessions, briefing sessions, e-learning modules and emails. Information security awareness should cover general aspects such as: a) management's commitment to information security throughout the organization; 66 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) b) knowledge of information security rules and obligations, and the need to comply with them, taking into account the information security policy and topic-specific policies, standards, laws, statutes, regulations, contracts and agreements; c) individual responsibilities for their actions and inactions, and general responsibilities with respect to securing or protecting information belonging to the organization and interested parties; d) basic information security procedures [e.g. information security event reporting (6.8)] and basic security measures [e.g. password security (5.17) ]; e) points of contact and resources for additional information and guidance on information security topics, including additional information security awareness materials. Learning and training The organization should identify, prepare and implement a training plan for technical teams whose functions require a specific skill set and expertise. Technical teams should have the skills to configure and maintain the required level of security for endpoints, systems, applications and services. If skills are lacking, the organization should take action and acquire them. The education and training program should consider several forms [e.g. lectures or self-study sessions, which are supervised by experts or consultants (work-based training), rotation of staff to monitor different activities, the recruitment of already qualified people and the hiring of consultants]. This program can use different means of transmission, for example classrooms, distance education, online learning, selfstudy, among others. Technical personnel should keep their knowledge up to date by subscribing to newsletters and magazines or by attending conferences and events for technical and professional development. Additional Information When developing an awareness program, it is important not to focus only on the questions “what?” and "how?", but also on the question "why?", as far as possible. It is important that staff understand the objectives of information security and the potential effects, positive and negative, of their behavior on the organization. Awareness, education and training in information security can be part of or be carried out with other activities, for example training on information management in general, ICT, security, protection of privacy or security. 6.4 Disciplinary Process Type of security measure #Preventive #Cor rective Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts Operational capabilities Security domains #Governance_ #Protect #Respond #Security_of_human_resources and_Ecosystem Security measure A disciplinary process should be formalized and communicated to take action against personnel and other interested parties who have committed a violation of the information security policy. © ISO/IEC 2022 – All rights reserved 67 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective Ensure that personnel and other relevant interested parties understand the consequences of violations of the information security policy, prevent such violations, and deal appropriately with personnel and other interested parties who have committed violations . Recommendations The disciplinary process should not be initiated until it has been verified that a violation of the information security policy has occurred (see 5.28). The formal disciplinary process should provide a graduated response that takes into account factors such as: a) the nature (who, what, when, how) and seriousness of the violation and its consequences; b) whether the breach was intentional (malicious) or unintentional (accidental); c) whether it is a first offense or a repeat offence; d) whether the offender has received adequate training. The response should consider applicable legal, statutory, regulatory, contractual and business requirements, as well as other factors as necessary. The disciplinary process should also act as a deterrent to prevent staff and other relevant interested parties from violating the information security policy, topic-specific policies and procedures relating to the security of the organization. information. Deliberate violations of information security policy may require immediate action. Additional Information Where possible, the identity of persons subject to disciplinary action should be protected in accordance with applicable requirements. When people demonstrate excellent behavior towards information security, they can be rewarded to promote information security and encourage good behavior. 6.5 Responsibilities after employment ends or changes Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts Operational capabilities Security domains #Governance_ #Protect #Security_of_human_resources and_Ecosystem #Asset_management Security measure Responsibilities and obligations relating to information security that remain in effect after termination or change of employment should be defined, enforced and communicated to relevant staff and other interested parties. Objective Protect the interests of the organization in the process of changing or terminating a job or contract. Recommendations The process for managing the end or change of employment should define what information security responsibilities and obligations should be maintained after 68 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) termination or change of employment. This may include confidentiality of information, intellectual property and other acquired knowledge, as well as responsibilities contained in any other confidentiality agreement (see 6.6). Responsibilities and obligations that continue after the end of the employment or contract should be set out in the terms and conditions of employment (see 6.2), the person's contract or agreement. Other contracts or agreements that continue for a defined period after a person's employment has ended may also contain information security responsibilities. Changes in responsibilities or jobs should be managed as the end of a current job or responsibilities, combined with the introduction of new responsibilities or a new job. The information security functions and responsibilities held by any person who leaves or changes position should be identified and transferred to another person. A process should be established for communicating changes and operational procedures to staff, other interested parties and relevant contacts (eg, customers and suppliers). The process of termination or change of employment should also be applied to external personnel (i.e. suppliers) when an end of employment, contract or position occurs in the organization, or when there is a change of position within the organization. Additional Information In many organizations, the human resources function is typically responsible for the entire termination process and works with the transitioning person's line manager to manage the information security aspects of the procedures involved. In the case of personnel made available by an external party (for example, by a supplier), this termination process is carried out by the external party in accordance with the contract between the organization and the external party. 6.6 Confidentiality or non-disclosure agreements Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Security_of_human_resources Security domains #Governance_ and_Ecosystem #Protection_of_information #Supplier_relations Security measure Confidentiality or non-disclosure agreements representing the organization's information protection needs should be identified, documented, regularly reviewed and signed by staff and other relevant interested parties. Objective Ensure the confidentiality of information accessed by staff or external parties. Recommendations Confidentiality or non-disclosure agreements should address the requirement to protect confidential information using legally enforceable terms. Confidentiality or non-disclosure agreements are applicable to interested parties and staff of the organization. Depending on the information security requirements of the organization, the terms of the agreements should be determined taking into account the type of information that will be processed, its classification level, its use and the authorized access. by the other party. To identify the © ISO/IEC 2022 – All rights reserved 69 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) confidentiality and non-disclosure requirements, consideration should be given to the elements following: a) a definition of the information to be protected (eg confidential information); b) the duration of an agreement, including where it may be necessary to maintain confidentiality indefinitely or until the information becomes public; (c) actions required when an agreement expires; d) responsibilities and actions of signatories to prevent unauthorized disclosure of information; (e) ownership of information, trade secrets and intellectual property, as well as its relationship to the protection of confidential information; (f) the authorized use of the confidential information and the rights of the signatory to use the information; g) the right to audit and monitor activities involving confidential information in the event of highly sensitive circumstances; h) the process for notifying and reporting unauthorized disclosure or leaked information confidential; (i) the arrangements for the return or destruction of the information upon expiry of the agreement; (j) the measures to be taken in the event of non-compliance with the agreement. The organization should consider compliance with confidentiality and nondisclosure agreements according to the jurisdiction in which they apply (see 5.31, 5.32, 5.33, 5.34). Confidentiality and non-disclosure agreements should be reviewed periodically and as changes affecting these requirements occur. Additional Information Confidentiality and nondisclosure agreements protect organization information and inform signatories of their responsibility to safeguard, use, and disclose information in a responsible and authorized manner. 6.7 Remote work Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Asset_management #Protection_of_information Security domains #Protection #Physical_Security #System_and_network_security Security measure Security measures should be implemented when staff work remotely, to protect information accessed, processed or stored outside the organization's premises. Objective Ensure information security when staff work remotely. 70 © ISO/IEC 2022 – All rights reserved AFNOR Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Recommendations Remote work takes place when the personnel of the organization work from a location outside the premises of the organization, accessing information, whether it is on paper or available electronically via ICT equipment. Remote work environments include those labeled as “telecommuting”, “flexible workplace”, “virtual work environments” and “remote maintenance”. NOTE It is possible that not all recommendations of this safety measure can be applied due to local laws and regulations in different jurisdictions. Organizations authorizing remote work activities should issue a policy specific to the topic of remote work that sets out the appropriate conditions and restrictions. Consideration should be given to the following aspects if deemed applicable: (a) the existing or proposed level of physical security at the remote work site, taking into account the level of physical security of the location and its immediate environment, including the different jurisdictions in which the staff is present; b) rules and security mechanisms for the remote physical environment, such as lockable storage cabinets, secure transportation from location to location, and rules for remote access, clean desk, printing and disposal of information and other associated assets, and reporting of information security events (see 6.8); c) planned physical remote work environments; d) communications security requirements, taking into account the need for remote access to the organization's systems, the sensitivity of the information consulted or transmitted on the communication medium and the sensitivity of the systems and applications; e) the use of remote access, such as access to a virtual office that allows processing and storing information on personal equipment; (f) the threat of unauthorized access to information or resources by others at the remote work site (for example, family members and friends); g) the threat of unauthorized access to information or resources by others in public places; h) use of home networks and public networks, and any requirements or restrictions relating to the configuration of wireless network services; i) the use of security measures, such as firewalls and program protection malicious; j) secure mechanisms for remote system deployment and initialization; k) secure authentication mechanisms and means allowing privileged access rights taking into account the vulnerability of single-factor authentication mechanisms when remote access to the organization's network is authorized. Guidelines and measures to consider should include: a) the provision of equipment and storage furniture suitable for remote work activities, when the use of personal equipment not subject to the control of the organization is not authorized; b) the definition of authorized work, the classification of information that may be held, and the internal systems and services to which the remote worker is authorized to access; © ISO/IEC 2022 – All rights reserved 71 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) (c) the provision of training for those who work remotely and those who provide support to them. This training should cover, among other things, how to work securely while working remotely; (d) the provision of adequate communication facilities, including methods for securing remote access, such as requirements for terminal screen locking and inactivity timers; the activation of the geolocation of the terminal; installation of remote wipe functions; (e) physical security; f) rules and recommendations regarding family and visitor access to equipment and information; (g) the provision of support and maintenance services for hardware and software; (h) provision of insurance; (i) backup and business continuity procedures; (j) security auditing and monitoring; k) the revocation of authorizations and access rights, and the return of equipment when the remote work activities are completed. Additional Information No additional information. 6.8 Information Security Event Reporting Type of security measure #Detective Information Security Properties #Privacy Cybersecurity concepts Operational capabilities #Detect #Integrity #Availablity Security domains #Defense #Management_of_information_security_events_ Security measure The organization should provide a mechanism for personnel to promptly report observed or suspected information security events through appropriate channels. Objective Enable the reporting of information security events that can be identified by personnel, in a timely, consistent and efficient manner. Recommendations All personnel and users should be made aware of their responsibility to report information security events as quickly as possible in order to prevent or minimize the consequences of information security incidents. They should also be informed of the procedure for reporting information security events and the point of contact to which events should be reported. The reporting mechanism should be as simple, accessible and available as possible. Information security events include incidents, breaches, and vulnerabilities. Situations to consider for information security event reporting include: (a) ineffective information security measures; 72 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) b) a breach of the expected level of confidentiality, integrity or availability of information; (c) human error; d) a non-compliance with the information security policy, policies specific to a theme or applicable standards; (e) breach of physical security measures; (f) system changes that have not gone through the change management process; g) malfunctions or other abnormal behavior of the system caused by software or material; h) access violations; (i) vulnerabilities; j) suspected malware infection. Staff and users should be warned not to attempt to prove the existence of suspected information security vulnerabilities. Testing for vulnerabilities may be construed as potential misuse of the system, may also damage the information system or service, and may alter or obscure digital evidence. Finally, it may engage the legal liability of the person carrying out the tests. Additional Information See the ISO/IEC 27035 series for additional information. 7 Physical security measures 7.1 Physical security perimeters Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Physical_Security #Protection #Integrity #Availablity Security measure Security perimeters should be defined and used to protect areas that contain information and other associated assets. Objective Prevent unauthorized physical access, damage, or interference to information and other associated assets of the organization. Recommendations The following guidelines should be considered and implemented for physical security perimeters, where deemed appropriate: a) define the security perimeters and the location and strength of each of the perimeters according to the information security requirements for the assets located within the perimeter; b) have physically sound perimeters for a building or site containing information processing facilities (i.e. the perimeter or areas should not present © ISO/IEC 2022 – All rights reserved 73 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) no flaws likely to facilitate a break-in). External roofs, walls, ceilings and floor of the site should be of solid construction and all external doors should be adequately protected against unauthorized access with control mechanisms (e.g. bars, alarms , locks). Doors and windows should be locked when the premises are unattended, and consideration should be given to external protection for windows, particularly on the ground floor; ventilation points should also be considered; c) alarm, monitor and test all fire doors within a security perimeter together with the walls, to establish the level of resistance required in accordance with the appropriate standards. They should work flawlessly. Additional Information Physical protection can be achieved by creating one or more physical barriers around the organization's premises and information processing facilities. A secure area can be a lockable office or several rooms surrounded by a continuous internal physical security barrier. Additional barriers and perimeters to control physical access may be required between areas with different security requirements within a security perimeter. The organization should consider having physical security measures that can be enhanced during heightened threat situations. 7.2 Physical inputs Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities Security domains #Protection #Physical_Security #Identity_and_access_management Security measure Secured areas should be protected with appropriate access point and access security measures. Objective Ensure that only authorized physical access to information and other associated assets of the organization is possible. Recommendations General Access points such as delivery and loading areas and other points through which unauthorized persons may enter the premises should be monitored and, if possible, isolated from information processing facilities, to prevent unauthorized access. The following guidelines should be considered: a) Restrict access to sites and buildings to authorized personnel only. The process for managing access rights to physical areas should include providing, periodically reviewing, updating and revoking permissions (see 5.18); b) securely maintain and regularly monitor a physical log or electronic audit log of all access, and protect all logs (see 5.33) and sensitive authentication information; 74 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) establish and implement a process and technical mechanisms for managing access to areas where information is processed or stored. Authentication mechanisms include the use of access cards, biometrics, or two-factor authentication, such as an access card and secret PIN. Consideration should be given to the use of security airlocks for access to sensitive areas; d) provide a staffed reception area, or other means to control physical access to the site or building; e) inspect and examine personal effects of staff and interested parties upon entry and exit exit; NOTE Local laws and regulations may exist regarding the ability to inspect personal effects. f) require all staff and interested parties to wear visible identification, and notify security personnel immediately if they encounter unaccompanied visitors or anyone without visible identification. Consideration should be given to wearing easily distinguishable badges to better identify permanent employees, suppliers and visitors; g) Grant Supplier personnel limited access to secure areas or information processing facilities only as necessary. Such access should be authorized and monitored; h) pay particular attention to the security of physical access in the case of buildings containing the assets of several organizations; i) design physical security measures in such a way that they can be strengthened when the likelihood of physical incidents increases; j) secure other entry points, such as emergency exits, from unauthorized access; k) implement a key management process to ensure the management of physical keys or authentication information (e.g. lock codes, combination locks of offices, rooms and equipment such as lockable cabinets) and to ensure an annual key log or audit is maintained and that access to physical keys or authentication information is controlled (see 5.17 for additional recommendations on authentication information). Visitors The following guidelines should be considered: (a) authenticate the identity of visitors by an appropriate means; (b) record the date and time of arrival and departure of visitors; c) assign access to visitors only for specific authorized purposes, together with instructions on area security requirements and emergency procedures; d) monitor all visitors, unless an explicit exception has been granted. Delivery and loading areas and receipt of material The following guidelines should be considered: a) limit access to delivery and loading areas from outside the building to personnel identified and authorized; © ISO/IEC 2022 – All rights reserved 75 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) (b) design delivery and loading areas so that deliveries can be loaded and unloaded without the delivery staff having unauthorized access to other parts of the building; c) secure the exterior doors of the delivery and loading areas when the doors leading to restricted areas are open; (d) inspect and examine incoming deliveries for the presence of explosives, chemicals or other hazardous substances, before they leave the delivery and loading areas; e) record incoming deliveries in accordance with asset management procedures (see 5.9 and 7.10) upon arrival at the site; f) physically separate incoming and outgoing shipments, if possible; g) inspect incoming shipments for any tampering that occurred during transit. If tampering is identified, it should be reported immediately to security personnel. Additional Information No additional information. 7.3 Securing offices, rooms and facilities Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Physical_Security #Asset_management Security domains #Protection Security measure Physical security measures should be designed and implemented for offices, rooms and facilities. Objective Prevent unauthorized physical access, damage and interference impacting information and other associated assets of the organization in offices, rooms and facilities. Recommendations Consideration should be given to the following guidelines for securing offices, rooms and facilities: (a) locate critical facilities in such a way as to avoid public access; b) as far as possible, ensure that the buildings are discreet and give the minimum indication of their purpose, without any obvious sign, outside or inside the building, which would allow the presence to be identified information processing activities; c) configure the facilities to prevent confidential information or activities from being visible and audible from the outside. If necessary, consideration should be given to the provision of electromagnetic shielding; d) not make directories, internal telephone directories and maps available online identifying the location of the means of processing confidential information easily accessible to any unauthorized person. 76 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) Additional Information No additional information. 7.4 Physical Security Monitoring Type of security measure #Preventive #Detective Information Security Properties #Privacy concepts of cybersecurity capabilities Operational Security domains #Protect #Detect #Physical_Security #Protection #Integrity #Availablity #Defense Security measure The premises should be continuously monitored to prevent unauthorized physical access. Objective Detect and deter unauthorized physical access. Recommendations Physical premises should be monitored using surveillance systems, which may include security guards, intruder alarms or CCTV systems such as CCTVs and physical security information management software that are managed internally or by a monitoring service provider. Access to buildings that house critical systems should be continuously monitored to detect unauthorized access or suspicious behavior by means of: (a) installation of CCTV systems such as closed circuit televisions to view and record access to sensitive areas inside and outside the organisation's premises; b) the installation, in accordance with the relevant applicable standards, and periodic testing of contact, sound or motion detectors capable of triggering an intruder alarm, for example: 1) the installation of contact detectors which trigger an alarm when a contact is made or broken at any place where a contact can be made or broken (such as windows, doors and under objects) in order to serve as a panic alarm; 2) motion detectors based on infrared technology that trigger an alarm when an object passes through their field of vision; 3) installation of sensors sensitive to the sound of breaking glass that can be used to trigger an alarm to alert security personnel; c) the use of these alarms to cover all exterior doors and accessible windows. Unoccupied areas should be equipped with permanently activated alarms. Other areas should also be covered (eg computer or telecommunications rooms). The design of surveillance systems should be kept confidential as disclosure may facilitate undetected break-ins. Surveillance systems should be protected from unauthorized access to prevent unauthorized persons gaining access to surveillance information, such as video recordings, or the systems being disabled remotely. The alarm system control panel should be located in an area equipped with an alarm and, in the case of security alarms, in a location providing an easy egress for the © ISO/IEC 2022 – All rights reserved 77 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) person who activates the alarm. The control panel and detectors should be equipped with tamper-proof mechanisms. The system should be tested regularly to ensure that it operates as expected, particularly if its components are battery powered. Any monitoring and recording system should be used taking into account local laws and regulations, including data protection and personal data protection legislation, in particular with regard to the monitoring of personnel and the durations of preservation of video recordings. Additional Information No additional information. 7.5 Protection against physical and environmental threats Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Physical_Security #Protection #Integrity #Availablity Security measure Protection against physical and environmental threats such as natural disasters and other intentional or unintentional physical threats to infrastructure should be designed and implemented. Objective Prevent or reduce the consequences of events resulting from physical or environmental threats. Recommendations Risk assessments should be carried out to identify the potential consequences of physical and environmental threats before commencing critical operations at a physical site, at regular intervals. Implement the necessary protections and monitor changes in threats. Specialist advice should be sought on how to manage risks from physical and environmental threats, such as fires, floods, earthquakes, explosions, social unrest, toxic waste, polluting emissions and other forms of natural or man-made disasters. The location and construction of physical premises should take into account: a) local topography, such as appropriate elevation, water bodies and tectonic faults; b) urban threats, such as locations with a high probability of attracting political unrest, criminal activities or terrorist attacks. Based on the results of risk assessments, relevant physical and environmental threats should be identified and appropriate security measures should be considered, for example in the following contexts: a) fire: install and configure systems capable of detecting fires at their very beginning to send alarms or trigger fire extinguishing systems in order to prevent fire damage to storage media and processing systems associated information. The fire should be extinguished with the most appropriate substance in relation to the surrounding environment (eg gas in confined spaces); 78 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) b) flooding: install systems capable of detecting flooding at its very beginning, under the ground of areas containing storage media or information processing systems. Water pumps or equivalent means should be readily available in the event of flooding; c) electrical overvoltages: adopt systems capable of protecting both client and server information systems against electrical overvoltages or similar events in order to minimize the consequences of such events; d) Explosives and Weapons: Carry out random inspections to ensure the absence of explosives or weapons on personnel, in vehicles or in goods entering sensitive information handling facilities. Additional Information Safes or other forms of secure storage can protect the information stored therein from disasters such as fires, earthquakes, floods or explosions. Organizations can consider crime prevention concepts through environmental design when designing security measures to secure their environment and reduce urban threats. For example, instead of using bollards, statues or water features can serve as both landscaping and a physical barrier. 7.6 Working in secure areas Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Physical_Security #Protection #Integrity #Availablity Security measure Safety measures for working in secure areas should be designed and implemented. implemented. Objective Protect information and other associated assets in secure areas from damage and unauthorized interference by personnel working in those areas. Recommendations Security measures for working in secure areas should apply to all personnel and cover all activities taking place in the secure area. The following guidelines should be considered: (a) inform personnel of the existence of secure areas or of the activities taking place there, only on a need-to-know basis; b) avoid unsupervised/supervised work in secure areas, both for security reasons and to reduce the possibility of malicious activity; c) physically lock and periodically inspect unoccupied secure areas; (d) prohibit photographic, video, audio, or other recording materials, such as cameras embedded in end-user terminals, unless permitted; © ISO/IEC 2022 – All rights reserved 79 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) e) appropriately supervise the transport and use of end-user terminals in secure areas; (f) post emergency procedures so that they are easily visible or accessible. Additional Information No additional information. 7.7 Blank desktop and blank screen Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Physical_Security #Protection Security measure Clear desk rules, clear of paper documents and removable storage media, and clear screen rules for information processing facilities should be defined and enforced as appropriate. Objective Reduce the risk of unauthorized access, loss, and damage to information on desks, screens, and other accessible locations during and outside normal working hours. Recommendations The organization should establish and communicate to all relevant interested parties a policy specific to the topic of empty desks and blank screens. The following guidelines should be considered: a) lock up sensitive or critical business information (for example, in paper format or on electronic storage media) (preferably in a safe, cabinet or other form of secure furniture) when not are not used, especially when the premises are empty; (b) protect end-user terminals with key locks or other security means when not in use or left unattended; c) disconnect end devices from users or protect them with a screen and keyboard lock controlled by a user authentication mechanism when left unattended. All computers and systems should be configured with a timeout or automatic logoff feature; d) cause the initiator to retrieve output from printers or multifunction terminals immediately. The use of printers with an authentication function, so that only initiators can retrieve their prints, and only when they are in front of the printer; (e) securely store documents and removable storage media containing sensitive information and, when no longer required, dispose of them using secure destruction mechanisms; f) establish and communicate rules and recommendations for configuring pop-ups on screens (e.g., disable new email notification and messaging pop-ups, if possible, during presentations, screen sharing or in a public place); 80 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) g) erase sensitive or critical information on whiteboards and other types of displays when they are no longer needed. The organization should have procedures in place when staff leave the premises, including carrying out a final inspection before leaving to ensure that no organizational assets (e.g. documents fallen behind drawers or furniture). Additional Information No additional information. 7.8 Location and protection of equipment Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Security domains Operational capabilities #Physical_Security #Asset_management #Protection Security measure A secure location for the equipment should be chosen and protected. Objective Reduce risk from physical and environmental threats, and unauthorized access and damage. Recommendations Consideration should be given to the following guidelines for protecting equipment: a) select a location for the equipment to minimize unnecessary access to work areas and prevent unauthorized access; (b) carefully position the means of processing information handling sensitive data, in order to reduce the risk that this information is seen by unauthorized persons during its use; c) adopt security measures to minimize the risk of potential physical and environmental threats [e.g. theft, fire, explosions, smoke, water leaks (or water supply failure), dust, vibration, chemical effects , power supply interference, communications interference, electromagnetic radiation and vandalism]; d) set guidelines on eating, drinking and smoking near information processing facilities; (e) monitoring environmental conditions, such as temperature and humidity, to detect conditions that may adversely affect the operation of the information processing means; (f) equip all buildings with a lightning rod and equip all incoming electrical and telecommunication lines with lightning arresters; g) consider the use of specific protection methods, such as membrane keypads, for equipment in industrial environments; h) protect equipment handling confidential information to minimize the risk of leakage information due to electromagnetic radiation; © ISO/IEC 2022 – All rights reserved 81 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) (i) physically separate the information processing facilities operated by the organization from those that she does not manage. Additional Information No additional information. 7.9 Security of off-premises assets Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Physical_Security #Asset_management Security domains #Protection Security measure Off-site assets should be protected. Objective Prevent loss, damage, theft, or compromise of offsite devices and business disruption. Recommendations Any device used outside the organization's premises that stores or processes information (e.g. mobile device), including organization-owned devices or private devices used on behalf of the organization [Bring your own device (BYOB)], needs protection. Use of these terminals should be authorized by management. Consideration should be given to the following guidelines for the protection of endpoints that store or process information outside of the organization's premises: a) not to leave equipment and storage media taken out of the premises unattended in public and unsecured places; b) follow the manufacturer's instructions for protecting the equipment at all times (eg protection against exposure to strong electromagnetic fields, water, heat, humidity, dust); c) when material circulates off the premises of the organization between different persons or interested parties, maintain a log that describes the chain of custody of the material and includes at least the names and organizations of the persons responsible for the material. Information that does not need to be transferred with the asset should be securely deleted prior to transfer; d) where necessary and possible, request authorization for equipment and media to be removed from the organization's premises and keep a record of such removals in order to maintain a system of traceability (see 5.14) ; (e) protect against viewing information on a terminal (eg mobile or laptop) on public transport, and against the risks associated with 'over-the-shoulder reading'; f) implement geo-fencing and remote data wipe function of terminals. Installation of equipment outside the organization's premises [such as antennas and automatic teller machines (ATMs)] may be subject to a higher risk of damage, theft 82 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) or intercept. These risks can vary considerably from place to place and should be taken into account when determining the most appropriate measures. Consideration should be given to the following guidelines when installing such equipment outside the organization's premises: a) physical security monitoring (see 7.4); b) protection against physical and environmental threats (see 7.5); c) security measures for physical access and inviolability; d) logical access controls. Additional Information More information on other aspects of protecting information storage and processing equipment and user end devices is available in 8.1 and 6.7. 7.10 Storage media Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities #Physical_Security #Asset_management Security domains #Protection Security measure Storage media should be managed throughout their lifecycle of acquisition, use, transportation, and disposal in accordance with the organization's classification scheme and processing requirements. Objective Ensure that only authorized disclosure, modification, removal, or destruction of organization information on storage media is performed. Recommendations Removable storage media Consideration should be given to the following guidelines for managing removable storage media: (a) establish a topic-specific policy for the management of removable storage media and communicate the topic-specific policy to anyone who uses or handles removable storage media; b) where necessary and possible, request authorization for storage media to be removed from the organization and keep a record of such removals in order to maintain a system of traceability; c) store all storage media in a safe and secure environment according to their information classification, and protect them from environmental threats (such as heat, humidity, electromagnetic fields or aging) in accordance with the manufacturer's specifications; d) if confidentiality or integrity of information is important, use cryptographic techniques to protect information in removable storage media; © ISO/IEC 2022 – All rights reserved 83 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) (e) to mitigate the risks of degradation of the storage media when the stored information is still in use, transfer this information to a new storage medium, before it becomes unreadable; f) store multiple copies of important information on separate storage media to further reduce the risk of accidental damage or loss of information; g) consider keeping a record of removable storage media to limit the risk of loss information; h) enable removable storage media ports (e.g. SD card slots or USB bus ports) only if the organization has a reason to use them; i) when there is a need to use removable storage media, control the transfer of information to such storage media; j) the information may be vulnerable to unauthorized access, fraudulent use or alteration during physical transport, for example when sending storage media by post or carrier. This “Storage Media” security measure includes paper documents. When transferring physical storage media, apply the security measures of 5.14. Safe reuse or disposal Procedures for the safe reuse or disposal of storage media should be defined to minimize the risk of leakage of confidential information to unauthorized persons. Procedures for the safe reuse or disposal of storage media containing confidential information should be commensurate with the sensitivity of that information. Consideration should be given to the following: a) if there is a need in the organization to reuse storage media containing confidential information, securely erase the data or format the storage media before reuse (see 8.10) ; (b) dispose of storage media containing confidential information in a secure manner when they are no longer needed (for example, by secure destruction, shredding or deletion of the contents); c) have procedures in place to identify items that may require disposal secure; d) several organizations offer collection and disposal services for storage media. Care should be taken to select the appropriate external third-party provider with adequate security measures and experience; e) log the disposal of sensitive items to maintain a traceability system; f) when storage media are accumulated for disposal, consider the aggregation effect which can cause a large amount of non-sensitive information to become sensitive. A risk assessment should be performed on damaged terminals containing sensitive data to determine whether the items should be physically destroyed rather than sent for repair or discarded (see 7.14 ). Additional Information Where storage media contain unencrypted confidential information, additional physical protection of the storage media should be considered. 84 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 7.11 Services supports Information Security Properties Type of security measure #Preventive #Detective #Integrity #Availablity Cybersecurity concepts Operational capabilities Security domains #Protect #Detect #Physical_Security #Protection Security measure The information processing facilities should be protected against power cuts and other disturbances caused by failures of bearer services. Objective Prevent loss, damage, or compromise of information and other related assets, or disruption of business operations, caused by support service failures and disruptions. Recommendations Organizations depend on support services (for example, electricity, telecommunications, water supply, gas, sanitation, ventilation and air conditioning) to enable the operation of their means of processing information. Therefore, the organization should: a) ensures that the service support equipment is configured, operated and maintained in accordance with the relevant manufacturer's specifications; b) ensure that support services are assessed regularly with regard to their ability to respond to the increase in the activities of the organization and interactions with other support services; c) ensure that service support equipment is inspected and tested regularly to ensure their proper functioning; d) if necessary, raises alarms to detect malfunctions of bearer services; e) if necessary, ensure that the support services have multiple power supplies on different physical delivery routes; f) ensure that the service support equipment is connected to a separate network from that of the information processing means, if connected to a network; g) ensures that the supporting equipment of the services is connected to the Internet only when necessary and only in a secure manner. Emergency lighting and communication systems should be available. Emergency switches and valves for shutting off power, water, gas or other services should be located near emergency exits or rooms containing equipment. Emergency contact details should be recorded and made available to personnel in the event of a breakdown. Additional Information Additional network connectivity redundancy can be provided by using multiple routing routes from multiple service providers. © ISO/IEC 2022 – All rights reserved 85 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 7.12 Wiring Safety Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Physical_Security #Protection #Availablity Security measure Electrical cables carrying data or supporting information services should be protected against interception, interference or damage. Objective Prevent the loss, damage, theft, or compromise of information and other associated assets and the disruption of business operations related to electrical and communications wiring. Recommendations The following wiring safety guidelines should be considered: a) bury power lines and telecommunication lines connected to data processing facilities where possible, or submit them to an adequate alternative means of protection, such as ground cable protectors and utility poles; if the cables are buried, protect them from accidental cuts (for example, by using shielded conduits or presence signals); b) separate electrical cables from communications cables to avoid interference; c) for sensitive or critical systems, additional security measures to consider include: 1) Installation of shielded cable conduit and locked rooms or cabinets and alarms at inspection and termination points; 2) the use of electromagnetic shielding to protect the cables; 3) periodic technical scans and physical inspections to detect terminals unauthorized connected to cables; 4) controlled access to patch panels and cable rooms (e.g. with mechanical keys or PIN codes); 5) the use of fiber optic cables; d) labeling of cables at each end with sufficient detail of source and destination to allow physical identification and inspection of the cable. Specialist advice should be sought on how to manage risks arising from wiring incidents or malfunctions. Additional Information Sometimes electrical and telecommunications cabling are resources shared by several organizations occupying the same premises. 86 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 7.13 Hardware Maintenance Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Physical_Security #Asset_management Security domains #Protection #Resilience Security measure Equipment should be properly maintained to ensure the availability, integrity and confidentiality of information. Objective Prevent loss, damage, theft or compromise of information and other associated assets and disruption of business operations caused by lack of maintenance. Recommendations The following hardware maintenance guidelines should be considered: a) maintain the equipment according to the specifications and the periodicity recommended by the supplier; b) implement a maintenance program and ensure its supervision by the organization; c) have repairs and maintenance of the equipment carried out only by authorized maintenance personnel; d) record all suspected or proven failures and all preventive or corrective maintenance tasks; e) implement appropriate security measures when maintenance of equipment is scheduled, taking into account whether this maintenance is carried out by personnel on site or external to the organization; subject maintenance personnel to an appropriate confidentiality agreement; f) supervising maintenance personnel when performing on-site maintenance; g) authorize and control access for remote maintenance; h) apply off-premises asset security measures (see 7.9) if equipment containing information is removed from the premises for maintenance; i) Comply with all insurance maintenance requirements; j) before returning the equipment to service after maintenance, inspect it to ensure that it has not been tampered with and is functioning correctly; k) apply the measures relating to the safe disposal or recycling of the material (see 7.14) if it is decided that this material must be disposed of. Additional Information Hardware includes technical components of information processing facilities, uninterruptible power supplies (UPS) and batteries, generators, alternators and power converters, physical intrusion detection systems and alarms, smoke detectors, fire extinguishers, air conditioning and elevators. © ISO/IEC 2022 – All rights reserved 87 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 7.14 Safe disposal or recycling of material Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Physical_Security #Asset_management Security domains #Protection Security measure Items of hardware containing storage media should be checked to ensure that sensitive data and licensed software have been securely deleted or overwritten before disposal or reuse. Objective Avoid leakage of information from material to be disposed of or reused. Recommendations Equipment should be checked to ensure whether or not it contains storage media before disposal or reuse. Storage media containing confidential or copyright information should be physically destroyed, or the information should be destroyed, deleted or overwritten using techniques that render the original information unrecoverable rather than using the standard delete function. See 7.10 for detailed recommendations on the safe disposal of storage media and 8.10 for deletion recommendations informations. Labels and markings identifying organization or indicating classification, owner, system or network should be removed prior to disposal, including when resold or donated to charity. The organization should consider removing security measures such as access controls or surveillance equipment at the end of the lease or when it moves. It depends on factors such as: a) its rental contract stipulating the restoration of the installation to its original state; b) minimizing the risk of leaving systems containing sensitive information in the hands of the next tenant (eg user access lists, video files or image files); c) the possibility of reusing the security measures in the next installation. Additional Information Damaged hardware containing storage media may require a risk assessment to determine whether to physically destroy the items rather than have them repaired or disposed of. Information may be compromised through careless disposal or reuse of material. In addition to securing disk erasure, full disk encryption reduces the risk of disclosure of confidential information when hardware is discarded or reused, provided that: a) the encryption process is strong enough and covers the entire disk (including free space and swap files); b) cryptographic keys are long enough to resist brute force attacks; c) the cryptographic keys are themselves kept confidential (for example, they are not never stored on the same disk). 88 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) For additional guidance on cryptography, see 8.24. Storage media secure overwrite techniques differ depending on the storage media technology and the classification level of the information on the storage media. Overwrite tools should be reviewed to ensure that they are appropriate for the storage media technology. See ISO/IEC 27040 for more information on cleaning methods for storage media. 8 Technological security measures 8.1 End user terminals Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Asset_management Security domains #Protection #Protection_of_information Security measure It is necessary to protect the information stored, processed or accessible via end terminals of the users. Objective Protect information against the risks associated with the use of user end devices. Recommendations General The organization should establish a topic-specific policy for the secure configuration and handling of user end devices. The specific policy on this issue should be communicated to all relevant personnel and the following should be taken into consideration: (a) the type of information and the level of classification that end user terminals may hold, process, store or support; b) registration of end-user terminals; c) requirements for physical protection; d) restriction of software installation (e.g. controlled remotely by administrators system); e) requirements for end user end device software (including software versions) and application of updates (eg automatic updates enabled); f) rules for connection to information services, public networks or any other network in outside the premises (for example, requiring the use of a personal firewall); g) access controls; h) encryption of storage terminals; (i) malware protection; (j) remote deactivation, data wipe or lockout; © ISO/IEC 2022 – All rights reserved 89 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) k) backups; l) use of web services and web applications; m) end-user behavior analysis (see 8.16); n) use of removable terminals, including removable memory devices, and ability to disable physical ports (eg, USB ports); o) use of partitioning features, if supported by the user's end device, that can securely separate information and other related organizational assets (e.g. software) from other information and other associated assets present on the terminal. Consideration should be given to cases where the information is so sensitive that it can only be accessed through users' end devices, but not stored on those devices. In such cases, additional technical protection systems may be required on the terminal. For example, ensuring that file downloading for offline work is disabled and local storage, such as on the SD card, is disabled. Where possible, the recommendations of this security measure should be implemented through configuration management (see 8.9) or automated tools. User Responsibilities All users should be made aware of the security requirements and procedures for protecting users' end devices, as well as their responsibilities for implementing these security measures. Users should be advised to: a) disconnect from active sessions and stop Services when no longer needed; b) protect user end devices against unauthorized use using a physical security measure (e.g. key lock or special locks) and a logical security measure (e.g. password access password) when not in use; not leave endpoints containing important, sensitive or critical business information unattended; c) use terminals with special care in public places, open offices, meeting places and other unprotected areas (for example, avoid reading confidential information if people can read behind the user, use filters privacy screens); d) physically protect end users' terminals against theft (eg in cars or other means of transport, hotel rooms, conference centers or meeting rooms). A specific procedure taking into account the legal, statutory, regulatory, contractual (including insurance requirements) and other security requirements of the organization should be established, for the cases of theft or loss of terminals end users. Use of personal terminals When the organization authorizes the use of personal terminals [sometimes referred to by the acronym BYOD (bring your own device)], in addition to the recommendations given in this security measure, the following should be considered: a) separation between the personal use and the professional use of the terminals, in particular with the use of a software allowing this separation and the protection of the professional data on a private device; b) allow access to business information only when users have acknowledged their obligations (physical protection, software updates, etc.), waive ownership of the data 90 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) and allow the organization to erase data remotely in the event of theft or loss of the terminal, or when use of the service is no longer authorized. In these cases, the legislation on the protection of personal data should be taken into account; c) topic-specific policies and procedures to prevent disputes relating to intellectual property rights developed on private equipment; d) access to private equipment (to verify the security level of the device or during an investigation), which may be prohibited by law; e) Software licensing agreements that make organizations responsible for licensing client software on user end devices that are owned by staff and users of external parties. Wireless connections The organization should establish procedures for: a) the configuration of the wireless connections on the terminals (for example, deactivation of the vulnerable protocols); b) use of wired or wireless connections with appropriate bandwidth in accordance with relevant topicspecific policies (eg, if backups or software updates are required). Additional Information Security measures to protect user end device information vary depending on whether the user end device is used only within the organization's secure premises and network connections, or if it is exposed to an increase in physical and network threats outside the organization. Wireless connections for user end devices are similar to other types of network connections, but have important differences that should be considered when identifying security measures. In particular, the backup of information stored on end user terminals may sometimes fail due to limited bandwidth or because user end terminals are not connected when backups are scheduled. For some USB ports, such as USB-C, disabling the USB port is not possible because it is used for other purposes (eg power supply and display output). 8.2 Privileged access rights Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Identity_and_access_management #Protection #Integrity #Availablity Security measure The assignment and use of privileged access rights should be limited and managed. Objective Ensure that only authorized users, software components, and services are granted privileged access rights. © ISO/IEC 2022 – All rights reserved 91 AFNOR Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) Recommendations The assignment of privileged access rights should be controlled through an authorization process in accordance with the applicable access control topic-specific policy (see 5.15). The following should be considered: a) identify the users who need privileged access rights for each system or process (for example, operating systems, database management systems and applications); b) assign privileged access rights to users as needed and on a case-by-case basis, in accordance with the topic-specific access control policy (see 5.15) (i.e. only to persons with skills necessary to carry out activities requiring privileged access and on the basis of the minimum required for their operational functions); c) maintaining an authorization process (i.e. determining who can authorize privileged access rights, or not granting privileged access rights until the authorization process is not completed) and a record of all assigned privileges; d) define and implement requirements related to the expiration of privileged access rights; e) take steps to ensure that users are aware of their privileged access rights and know when they are in privileged access mode. Possible measures include using specific user identities, user interface settings, or even specific hardware; f) Authentication requirements for privileged access rights may be higher than requirements for normal access rights. Re-authentication or strong authentication may be required before performing work with privileged access rights; g) regularly and after any organizational change, review the users working with privileged access rights in order to verify whether their obligations, functions, responsibilities and skills still justify that they work with privileged access rights (see 5.18 ); h) establish specific rules in order to avoid the use of generic administrative user identifiers (such as "root"), depending on the configuration possibilities of the systems. Manage and protect the authentication information of these identities (see 5.17); i) grant temporary privileged access rights only for the duration necessary to implement the approved changes or activities (for example, for maintenance activities or certain critical changes), rather than granting access rights permanently privileged. This approach is often referred to as the “glassbreaking procedure” and it is often automated by privileged access management technologies; j) log all privileged access to systems for auditing purposes; k) not to share or link identities with privileged access rights between several people, assign each person a separate identity that allows the assignment of specific privileged access rights. Identities can be grouped (for example, by defining a group of administrators) in order to simplify the management of privileged access rights; l) use identities with privileged access rights only to carry out administrative tasks and not for general day-to-day tasks [i.e. checking email or accessing the Internet (users should users have a separate normal network identity for these activities)]. Additional Information Privileged access rights are access rights granted to an identity, function or process, which allow the performance of activities that normal users or processes cannot perform. System administrator functions generally require privileged access rights. 92 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) Improper use of system administrator privileges (any feature or infrastructure of an information system that allows the user to circumvent the security measures of a system or application) is a major contributing factor to failures or system breaches. More information on access management and secure management of access to information and communication technology resources can be found in ISO/IEC 29146. 8.3 Information Access Restrictions Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Identity_and_access_management Security domains #Protection #Integrity #Availablity Security measure Access to information and other related assets should be restricted in accordance with the subject-specific access control policy that has been established. Objective Ensure authorized access only and prevent unauthorized access to information and other associated assets. Recommendations Access to information and other related assets should be restricted in accordance with established topicspecific policies. The following should be considered to support the access restriction requirements: a) not allow access to sensitive information to unknown user identities or anonymously. Public or anonymous access should only be granted to storage locations that do not contain sensitive information; b) provide configuration mechanisms to control access to information in systems, applications et services; c) control what data can be accessed by a given user; d) controlling which identities or group of identities are granted a given type of access, as in read, write, delete and execute; e) provide physical or logical access controls allowing isolation of applications, data sensitive applications or systems. In addition, dynamic access management techniques and processes to protect sensitive information that has significant value to the organization should be considered when the organization: a) needs granular control over who can access this information, for how long, and in what way; b) wants to share this information with people outside the organization and keep control over who can access it; (c) wants to dynamically manage, in real time, the use and distribution of this information; d) wants to protect this information against unauthorized modification, reproduction and dissemination (including printing); © ISO/IEC 2022 – All rights reserved 93 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) e) wants to monitor the use of the information; f) wants to record any changes to this information in the event that a future investigation would be necessary. Dynamic access management techniques should protect information throughout its life cycle (i.e. creation, processing, storage, transmission and disposal), including: a) definition of dynamic access management rules based on specific use cases, taking into consideration: 1) the allocation of access authorizations based on identity, device, location or l'application; 2) use of the classification scheme to determine what information needs to be protected with dynamic access management techniques; b) the establishment of operational, monitoring and reporting processes, and a infrastructure technique support. Dynamic access management systems should protect information by: a) requiring authentication, appropriate credentials or a certificate to access the information; b) limiting access, for example to a specified period of time (for example, after a date given or until a given date); c) using encryption to protect information; d) setting print permissions for the information; (e) recording who accesses the information and how the information is used; f) generating alerts if attempts to misuse the information are detected. Additional Information Dynamic access management techniques and other dynamic information protection technologies can ensure information is protected even if the data is shared beyond the originating organization, where traditional access controls cannot be applied. They can be applied to documents, emails or other files containing information to limit who can access the content and how to access it. They can be at a given level of granularity and can be adapted throughout the information lifecycle. Dynamic access management techniques do not replace traditional access management [e.g., use of Access Control Lists (ACLs )], but they can add additional factors for conditionality, evaluation real-time, on-the-fly data reduction, and other enhancements that can be useful for the most sensitive information. They provide a way to control access outside of the organization's environment. Incident response can be supported by dynamic access management techniques, knowing that permissions can be changed or revoked at any time. Additional information on a framework for access management is available in ISO/IEC 29146. 94 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) 8.4 Access to source codes Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Identity_and_access_management Security domains #Protection #Application_Security #Secure_Configuration Security measure Read and write access to source code, development tools, and software libraries should be appropriately managed. Objective Prevent the introduction of unauthorized functionality, prevent unintended or malicious modification, and maintain the confidentiality of important intellectual property. Recommendations Strictly control access to source codes and related elements (such as designs, specifications, verification and validation plans) and development tools (for example compilers, generators, integration tools, platforms test and environments). With respect to source codes, this can be achieved by controlling the central storage of a code, preferably in the source code management system. Read access and write access to source codes may differ depending on the staff function. For example, read access to source code may be widely provided within the organization, but write access to source code is only granted to privileged employees or designated owners. When components of code are used by multiple developers within an organization, read access to a centralized code repository should be implemented. Additionally, if components of open source code or third party code are used in an organization, read access to these external code repositories can be widely provided. However, write access should always be restricted. Consideration should be given to the following guidelines for controlling access to program source code libraries to reduce the possibility of tampering with computer programs: a) manage access to the source codes of the programs and to the libraries of the source codes of programs in accordance with established procedures; b) assign read and write access to source code based on business needs and manage it to address risks of tampering or misuse and in accordance with established procedures; c) update source code and associated materials and assign access to source code in accordance with change control procedures (see 8.32) and perform access assignment only after receiving appropriate authorization; d) not grant developers direct access to the source code repository, but through developer tools that control source code activities and permissions; e) keep program listings in a secure environment, where online access should be read and write are managed and allocated appropriately; f) maintain an audit log of all source code access and changes. If the source code of the program is intended for publication, additional security measures should be considered to provide assurance of its integrity (eg electronic signature). © ISO/IEC 2022 – All rights reserved 95 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) Additional Information If access to the source code is not properly controlled, the source code may be modified or some data in the development environment (e.g. copies of production data, configuration details) may be taken by unauthorized persons. allowed. 8.5Secure authentication Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Identity_and_access_management Security domains #Protection #Integrity #Availablity Security measure Secure authentication technologies and procedures should be implemented based on information access restrictions and topic-specific access control policy. Objective Ensure that a user or entity is securely authenticated when granted access to systems, applications and services. Recommendations An appropriate authentication technique should be chosen to verify the claimed identity of a user, software, messages and other entities. The robustness of the authentication should be adapted to the classification of the information to be consulted. Where strong authentication and identity verification are required, authentication methods other than passwords should be used, such as digital certificates, smart cards, tokens, or biometric means. The authentication information should be accompanied by additional authentication factors to access critical information systems (also referred to as "multi-factor authentication"). Using a combination of multiple authentication factors, such as what you know, what you have, and what you are, reduces the possibility of unauthorized access. Multi-factor authentication can be combined with other techniques to require additional factors under specific circumstances, based on predefined rules and patterns, such as access from an unusual location, from an unusual terminal or at an unusual hour. Biometric credentials should be invalidated if ever compromised. Biometric authentication may not be available depending on usage conditions (for example, humidity or aging). To anticipate these problems, the biometric authentication should be accompanied by at least one alternative authentication technique. The procedure for logging into a system or application should be designed to minimize the risk of unauthorized access. Connection procedures and technologies should be implemented taking into consideration the following: a) not to display sensitive system or application information until the login process is successfully completed, in order to avoid unnecessary assistance to an unauthorized user; b) display a warning advising that access to the system, application or service is restricted to authorized users only; 96 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) not provide help messages, during the login procedure, which could help an unauthorized user (for example, if an error occurs, the system should not indicate which part of the data is correct or incorrect ); d) validate the connection information only at the end of the capture of all the input data; e) protect against brute force login attempts on usernames and passwords (e.g. use CAPTCHA [ completely automated public Turing test to tell computers and humans apart], require password reset after a predefined number of failed attempts or block the user after a maximum number of errors); f) record successful and failed attempts; g) Trigger a security event on detection if a successful violation or possible attempted violation of login controls is detected (e.g. send an alert to user and organization system administrators when a certain number of attempts with entering incorrect passwords is reached); h) display or send the following information on a separate channel at the end of a successful connection: 1) the date and time of the last successful connection; 2) information about failed login attempts since the last successful login; i) not display a password in plain text while entering it; in some cases, it may be necessary to deactivate this functionality in order to facilitate the user's connection (for example, for accessibility reasons or to avoid blocking users due to repeated errors); j) do not transmit passwords in the clear over a network to prevent them from being recovered by a network listener; k) close inactive sessions after a defined period of inactivity, especially in high-risk locations, such as public or external areas that are outside the organization's security management perimeter, or on endpoints end users; l) restrict connection times to provide additional security to applications using high risk and reduce the possibility of unauthorized access. Additional Information Additional information on entity authentication assurance is available in ISO/IEC 29115. 8.6 Sizing Type of security measure #Preventive #Detective Information Security Properties #Integrity #Availablity Cybersecurity concepts #Identifier #Protect #Detect Operational capabilities #Continuity Security domains #Governance_and_Ecosystem #Protection Security measure Resource usage should be monitored and adjusted based on current and projected scaling needs. Objective Ensure needs in terms of means of processing information, human resources, offices and other facilities. © ISO/IEC 2022 – All rights reserved 97 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations The necessary sizing of information processing resources, human resources, offices and other facilities should be identified, taking into account the level of business criticality of the systems and processes concerned. System optimization and monitoring should be applied to ensure and, if necessary, improve their availability and efficiency. The organization should stress test systems and services to ensure that systems are available with sufficient sizing to meet performance requirements during peak usage. Detection means should be in place to report problems in a timely manner. Projections of future provisioning needs should take into account new business and system requirements, and current and projected trends in the organization's information processing capabilities. Special attention should be paid to resources for which lead times are long or costs are high. Therefore, managers and owners of products or services should monitor the use of key system resources. Managers should use capacity information to identify and avoid potential resource limitations and dependence on key personnel, which may pose a threat to system security or services, and they plan the appropriate action. Providing sufficient sizing can be achieved by increasing capacity or reducing demand. The following should be considered to increase capacity: a) hire new staff; (b) obtain new facilities or new spaces; (c) acquire more efficient processing, memory and storage systems; d) use cloud computing, the inherent characteristics of which directly address sizing issues. Cloud computing has the elasticity and flexibility that allows the rapid, on-demand scaling up and down of available resources for specific applications and services. Consideration should be given to the following to reduce the demand on the organization's resources: a) deletion of obsolete data (disk space); b) disposal of paper documents that have reached their shelf life (freeing up space on the shelves); c) decommissioning of applications, systems, databases or environments; d) optimization of batch processes and schedules; e) optimization of application codes or database queries; f) denial or restriction of bandwidth for resource-intensive services, if not critical (eg video streaming). Consideration should be given to a documented scaling management plan for critical systems. 98 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Additional Information For more information on the elasticity and flexibility of cloud computing, see ISO/IECTS23167. 8.7 Malware Protection Type of security measure #Preventive #Detective #Corrective Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect #Detect Operational capabilities #System_and_network_security #Protection_of_information Security domains #Protection #Defense Security measure Malware protection should be implemented and reinforced by appropriate user awareness. Objective Ensure that information and other associated assets are protected against programs malicious. Recommendations Malware protection should be based on malware detection and remediation software, information security awareness, and appropriate systems access and change management. Using malware detection and repair software alone is generally not sufficient. The following recommendations should be considered: a) implement rules and security measures that prevent or detect the use of unauthorized software (e.g. application allowlisting (i.e. use of a list indicating authorized applications)) (see 8.19 and 8.32); b) implement security measures that prevent or detect the use of known or suspected malicious websites (eg blocklisting); c) reduce vulnerabilities that can be exploited by malicious programs [for example, through the management of technical vulnerabilities (see 8.8 and 8.19)]; d) regularly perform automatic validation of software and data content of systems, especially for systems that manage critical business processes; investigate the presence of any unapproved files or unauthorized modifications; e) put in place safeguards against the risks associated with obtaining files and software either from or via external networks, or on any other medium; f) install and regularly update malware detection and repair software to scan computers and electronic storage media. Conduct regular scans that include: 1) the analysis of any data received on the networks or via any form of electronic storage medium, to ensure the absence of malicious program before use; 2) scanning e-mail and instant message attachments, and downloaded files for malware before use. Perform this analysis in different places (eg on e-mail servers, desktop computers) and when accessing the organization's network; © ISO/IEC 2022 – All rights reserved 99 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) 3) the analysis of web pages when accessing them to ensure the absence of programs malicious; (g) determine the location and configuration of malware detection and repair tools based on the results of the risk assessment and taking into consideration: 1) the principles of defense in depth where they would be most effective. For example, it can lead to the detection of malware at a network gateway (in different application protocols such as email, file transfer, and the Internet) as well as user endpoints and servers; 2) attacker evasion techniques (eg, use of encrypted files) to introduce malware or use of encryption protocols to transmit malware; (h) ensure protection against the introduction of malware during maintenance and emergency procedures, which may circumvent normal malware security measures; i) implement a process for authorizing temporary or permanent disabling of some or all malware protection measures, including exception approval authorities, documented justifications, and review dates. This may be necessary when malware protection causes disruption of normal operations; j) Develop appropriate business continuity plans to enable recovery from malware attacks, including backup of all important software and data (including online as well as offline backup) and recovery measures (see 8.13); k) isolate environments where serious consequences may occur; l) define procedures and responsibilities for managing the protection of systems against malware, including training in their use, reporting and recovery from malware attacks; m) provide education or training (see 6.3) to all users on how to identify and possibly mitigate the receipt, sending or installation of maliciously infected emails, files or programs malicious [the information collected in n) and o) can be used to ensure that awareness and training is always up to date]; (n) implement procedures to regularly collect information about new malicious programs, such as subscribing to mailing lists or consulting relevant websites; o) check that information about malware, such as alert bulletins, comes from recognized and reputable sources (for example, reliable websites or malware detection software providers) and that it is correct and informative . Additional Information It is not always possible to install malware protection software on some systems (eg some industrial control systems). Some types of malware infect computer operating systems and their firmware, so common anti-malware security measures cannot clean the system and a complete reinstallation of the operating system and sometimes firmware is required to return to a secure state. 100 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIX Translated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 8.8 Managing technical vulnerabilities Information Security Properties Type of security measure #Preventive Cybersecurity concepts #Privacy #Identifier #Integrity #Availablity #Protect Operational capabilities Security domains #Governance_and_Ecosystems #Management_of_threats_and_vulnera #Protection #Defense bilities Security measure It is necessary to obtain information on the technical vulnerabilities of the information systems used, to assess the exposure of the organization to these vulnerabilities and to take the appropriate measures. Objective Prevent the exploitation of technical vulnerabilities. Recommendations Identification of technical vulnerabilities The organization should have an accurate inventory of assets (see 5.9 to 5.14) as a prerequisite for effective management of technical vulnerabilities; The inventory should include software vendors, software names, version numbers, current usage status (e.g., what software is installed on what systems), and the person(s) within organization who are responsible for the software. In order to identify technical vulnerabilities, the organization should consider: a) define and establish roles and responsibilities associated with technical vulnerability management, including vulnerability monitoring, vulnerability risk assessment, updates, asset tracking, and any necessary coordination functions ; b) for software and other technologies (according to the list of the inventory of assets, see 5.9), determine the information resources that will be used to identify important technical vulnerabilities and raise awareness about these vulnerabilities. Update the list of information resources based on changes made in the inventory or when other new or useful resources are identified; c) require vendors of information systems (including their components) to provide vulnerability reporting, processing, and disclosure, including applicable contract requirements (see 5.20) ; d) use vulnerability analysis tools appropriate to the technologies used in order to identify vulnerabilities and verify whether the application of patches aimed at resolving vulnerabilities has been effective; e) conduct planned, documented and repeated penetration tests or vulnerability assessments performed by competent and authorized persons to reinforce the identification of vulnerabilities. Take precautions as these activities may lead to a compromise of system security; f) monitor the use of libraries and external source codes from third parties to detect vulnerabilities. This should be incorporated into secure coding (see 8.28). The organization should put in place procedures and develop means for: a) detect the existence of vulnerabilities in its products and services, including all external components used therein; © ISO/IEC 2022 – All rights reserved 101 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) b) receive vulnerability reports from internal or external sources. The organization should provide a public point of contact under a topic-specific policy for publishing vulnerabilities so that researchers and others can report issues. The organization should establish vulnerability reporting procedures, online reporting forms, and leverage appropriate threat intelligence or information sharing forums. The organization should also consider bug bounty programs where rewards are offered as an incentive to help organizations identify vulnerabilities in order to address them appropriately. The organization should also share information with relevant industry organizations or other interested parties. Assessment of technical vulnerabilities To assess the identified technical vulnerabilities, the following considerations should be taken into account: a) analyze and verify the statements to determine the response and remediation activities that are necessary; b) once a possible technical vulnerability has been identified, determine the associated risks and the actions to be taken. These actions may include updating vulnerable systems or applying other security measures. Taking appropriate measures to respond to technical vulnerabilities A software update management process should be implemented to ensure that the latest approved patches and application updates are installed for all authorized software. If changes are necessary, you should keep the original software and apply these changes to a copy intended for this purpose. All changes should be fully tested and documented so that they can be reapplied, if necessary, to future software updates. If necessary, changes should be tested and validated by an independent evaluation organization. Consideration should be given to the following recommendations for responding to technical vulnerabilities: a) take appropriate and prompt action in response to the identification of possible technical vulnerabilities; define a response time to notifications of possible significant technical vulnerabilities; b) depending on the degree of urgency with which the technical vulnerability needs to be addressed, perform the action in accordance with security measures relating to change management (see 8.32) or by following security incident response procedures information (see 5.26); c) use updates only from authorized sources (which may be internal or external to the organization); d) test and evaluate updates before installing them to ensure that they are effective and do not cause adverse effects that cannot be tolerated [i.e., if an update is available, assess the risks associated with installing this update (the risks arising from the vulnerability should be compared to the risks associated with installing the update)]; e) deal with high-risk systems first; f) develop corrective action (usually software updates or patches); g) perform tests to validate the effectiveness of the remediation or risk mitigation; h) provide mechanisms to verify the authenticity of the correction; 102 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) i) If no update is available or the update cannot be installed, consider other security measures, such as: 1) the application of any solution offered by the software supplier or other sources relevant; 2) termination of the services or functions affected by the vulnerability; 3) adapting or adding access controls (e.g. firewalls) to network boundaries (see 8.20 to 8.22); 4) the protection of vulnerable systems, terminals or applications against attacks through the deployment of suitable traffic filters (sometimes called "virtual patches"); 5) increasing surveillance to detect actual attacks; 6) sensitization to vulnerabilities. For purchased software, if vendors regularly release information about security updates to their software and provide a means to install those updates automatically, the organization should decide whether or not to use the update. automatique. Other Considerations An audit log should be kept of all steps taken when managing technical vulnerabilities. The technical vulnerability management process should be regularly monitored and evaluated to ensure its effectiveness and efficiency. An effective technical vulnerability management process should be aligned with incident management activities, to communicate data on vulnerabilities to the incident response function and provide technical procedures to be performed in the event of an incident. Where the organization uses a cloud service provided by a third-party cloud service provider, technical vulnerability management of the cloud service provider's resources should be provided by the cloud service provider. The cloud service provider's responsibilities for managing technical vulnerabilities should be included in the cloud service agreement and the cloud service agreement should include processes for reporting the cloud service provider's actions with respect to technical vulnerabilities. (see 5.23). For some cloud services, there are respective responsibilities for the cloud service provider and the cloud service customer. For example, the cloud service customer is responsible for vulnerability management of its own assets used for cloud services. Additional Information Managing technical vulnerabilities can be considered a sub-function of change management and as such can benefit from change management processes and procedures (see 8.32). It is possible that an update does not adequately address the issue and may produce unwanted effects. Also, in some cases, it may be difficult to uninstall an update once it has been applied. If it is not possible to test the updates adequately (for example, for cost reasons or due to lack of resources), an update deferral may be considered to assess the associated risks in s relying on the experience shared by other users. Use of ISO/IEC 27031 may be helpful. When software patches or updates are developed, the organization may consider providing an automated update process whereby those updates are installed on affected systems or products without requiring customer or the user. If a process © ISO/IEC 2022 – All rights reserved 103 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) automated update is provided, it may allow the customer or user to choose an option to stop the automatic update or control when the update is installed. When the software vendor provides an automated update process and updates can be installed on affected systems or products without the need for intervention, it is up to the organization to decide whether or not to apply the process. automated. One reason not to opt for automated updating is to retain control over when the update is applied. For example, software used for a business activity cannot be updated until the activity is complete. A weakness of vulnerability scanning is that it may not fully consider defense in depth: two countermeasures that are always called in the same order may have vulnerabilities that are hidden by the dots strong on the other. The composite countermeasure is not vulnerable, whereas a vulnerability scanning solution can declare both components to be vulnerable. Therefore, the organization should be careful in reviewing and dealing with vulnerability reports. Many organizations provide software, systems, products and services not only within the organization, but also to interested parties such as customers, partners or other users. These software, systems, products and services may contain information security vulnerabilities that affect user safety. Organizations can post a fix and disclose information about vulnerabilities to users (usually through a public notice) and provide appropriate information for software vulnerability database services. For more information on managing technical vulnerabilities when using cloud computing, see the ISO/IEC 19086 series and ISO/ IEC 27017. ISO/IEC 29147 provides detailed information on receiving vulnerability reports and issuing vulnerability bulletins. ISO/IEC 30111 provides detailed information on the handling and remediation of declared vulnerabilities. 8.9 Configuration management Type of security measure #Preventive Information Security Properties Cybersecurity concepts #Privacy #Protect Operational capabilities Security domains #Secure_Configuration #Protection #Integrity #Availablity Security measure Configurations, including security, hardware, software, service and network configurations, should be defined, documented, implemented, monitored and reviewed. Objective Ensure that hardware, software, services and networks are functioning properly with required security settings, and that the configuration is not altered by unauthorized or incorrect changes. Recommendations General The organization should define and implement processes and tools to enforce defined configurations (including security configurations) for hardware, software, services (e.g. cloud services) and networks, for newly installed systems as well as for operational systems throughout their lifetime. 104 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Roles, responsibilities and procedures should be in place to ensure satisfactory control of all configuration changes. Standard models Standard templates should be defined for the secure configuration of hardware, software, services and networks: a) using publicly available recommendations (e.g. predefined templates from vendors and independent security organizations); b) taking into account the level of protection necessary in order to determine a level of security sufficient; c) supporting the organization's information security policy, its policies specific to a theme, standards and other security requirements; d) taking into consideration the feasibility and applicability of security configurations in the organizational context. Models should be reviewed periodically and updated when new threats or vulnerabilities need to be addressed, or when new versions of hardware or software are introduced. The following should be considered when defining standard patterns for the secure configuration of hardware, software, services and networks: a) minimize the number of identities with privileged or administrator-level access rights; (b) disable unnecessary, unused, or insecure identities; c) disable or restrict unnecessary functions and services; d) restrict access to powerful utility programs and adjustment of their parameters; e) synchronize clocks; f) change vendor default authentication information, such as default passwords, immediately after installation and verify other important default security settings; g) using timeout means that automatically disconnect terminals computers after a predefined period of inactivity; h) check that licensing requirements are met (see 5.32). Configuration Management Defined configurations of hardware, software, services and networks should be recorded and a log of all configuration changes should be maintained. These records should be kept securely. This can be achieved in several ways, for example with configuration databases or configuration templates. Changes to configurations should follow the change management process (see 8.32). Configuration records may contain, if required: (a) updated information on the owner or point of contact associated with the asset; (b) the date of the last configuration change; c) version of the configuration model; © ISO/IEC 2022 – All rights reserved 105 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) d) the link with the configurations of other assets. Configuration Monitoring Configurations should be monitored with a full set of system management tools (for example, maintenance utilities, remote assistance, business management tools, and backup and restore software) and reviewed periodically to verify configuration settings, test password strength, and evaluate performed activities. The currently applied configurations can be compared to the defined target models. Any deviation should be addressed, either by automatic application of the defined target configuration, or by manual analysis of the deviation followed by corrective actions. Additional Information Systems documentation often contains hardware and software configuration details. System hardening is a common part of configuration management. Configuration management can be integrated with asset management processes and related tools. Automation is generally more effective at managing security configuration [eg, using “Infrastructure as Code” ]. Configuration templates and targets may constitute confidential information which should be protected accordingly against unauthorized access. 8.10 Deletion of information Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Protection_of_information Security domains #Protection #Regulations_and_compliance Security measure Information stored in information systems, terminals or any other storage medium should be deleted when it is no longer needed. Objective Prevent unnecessary exposure of sensitive information and comply with legal, statutory, regulatory and contractual requirements for the removal of information. Recommendations General Sensitive information should not be retained longer than necessary to reduce the risk of unwanted disclosure. When deleting information from systems, applications and services, consideration should be given to the following: a) select a deletion method (e.g., electronic overwrite or cryptographic wipe) in accordance with business requirements and taking into account relevant laws and regulations; 106 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) b) record the deletion results as evidence; c) if using providers of information deletion services, obtain proof of the deletion of the information from them. Where third parties store the organization's information on behalf of the organization, the organization should consider including information deletion requirements in agreements with third parties to apply during and after termination of these services. Deletion methods In accordance with the organization's data retention topic-specific policy and taking into account relevant legislation and regulations, sensitive information that is no longer required should be deleted: a) configuring systems to securely destroy information when it is no longer needed (for example, after a period defined by the topic-specific data retention policy or following an access request); b) deleting obsolete versions, copies and temporary files, regardless of their location; c) using approved secure deletion software to permanently delete the information to help ensure that the information cannot be recovered using specialized recovery tools or computer forensic tools; (d) using approved and certified secure deletion service providers; e) using disposal mechanisms appropriate to the type of storage media to be disposed of (eg degaussing of hard drives and other magnetic storage media). Where cloud services are used, the organization should check whether the deletion method provided by the cloud service provider is acceptable and, if so, the organization should use it or ' she asks the cloud service provider to delete the information. Such deletion processes should be automated in accordance with topic-specific policies, where available and applicable. Depending on the sensitivity of the deleted information, logs may trace or verify that these deletion processes have taken place. To prevent inadvertent exposure of sensitive information when equipment is returned to suppliers, sensitive information should be protected by removing auxiliary storage media (e.g. hard drives) and memory before equipment leaves the premises. organisation. Since the secure deletion of certain endpoints (e.g. smartphones) can only be achieved through destruction or by using the functions integrated into these endpoints (e.g. restoring factory settings), the organization should choose the appropriate method according to the classification of the information held by these terminals. The security measures described in 7.14 should be applied to physically destroy the storage medium and at the same time delete the information it contains. An official document attesting to the deletion of information is useful when analyzing the cause of a possible information leak event. Additional Information Information on deleting user data in cloud services is available in ISO/IEC 27017. Information on FAD removal is available in ISO/IEC 27555. © ISO/IEC 2022 – All rights reserved 107 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 8.11 Data masking Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Protection_of_information Security domains #Protection Security measure Data masking should be used in accordance with the organization's access control topic-specific policy and other related topic-specific policies, as well as business requirements, while taking into account the applicable legislation. Objective Limit the exposure of sensitive data, including personal data, and comply with legal, statutory, regulatory and contractual requirements. Recommendations Where the protection of sensitive data (eg personal data) is a concern, the organization should consider concealing that data using techniques such as data masking, pseudonymization or anonymization. Pseudonymization or anonymization techniques may conceal personal data, disguise the true identity of data subjects or other sensitive information, and break the link between personal data and the identity of the data subject or the link between other information. sensitive. When using pseudonymization or anonymization techniques, it should be verified that the data has been appropriately pseudonymized or anonymized. Data anonymization should consider all elements of sensitive information to be effective. By way of example, if all elements of sensitive information are not taken into account correctly, a person can be identified even if the data which can identify this person directly is anonymized, by the presence of other data which makes it possible to identify the person indirectly. Other data masking techniques are: a) encryption (requiring authorized users to have a key); b) cancellation or deletion of characters (to prevent unauthorized users from viewing entire messages); (c) modification of numbers and dates; d) substitution (replacing one value with another to hide sensitive data); e) replacement of values by their hash. The following should be considered when implementing data masking techniques: (a) not grant all users access to all data; therefore, designing queries and masks to display only the minimum data required to the user; b) there are cases where some data should not be visible to the user for some records within a set of data; in this case, design and implement a data obfuscation system (for example, if a patient does not want hospital staff to have the ability to access all of their data, even in an emergency , then the hospital staff sees partially scrambled data and the data can 108 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) only be consulted by staff with the specific functions if they contain information useful to determine the appropriate treatment); c) when data is scrambled, give the data subject the possibility to require that users cannot know if this data is scrambled (scrambling of scrambling; this is used in healthcare facilities, for example if the patient does not do not want staff to see that sensitive data, such as pregnancies or blood test results, has been scrambled); d) any legal or regulatory requirements (for example, requiring the masking of information from payment cards during processing or storage). The following should be considered when using data masking, pseudonymization or anonymization: a) level of resistance of masking, pseudonymization or anonymization of data according to the use made of the processed data; b) access controls to the processed data; c) agreements or restrictions related to the use of the processed data; d) prohibition to combine the processed data with other information for the purpose of identifying the data subject; e) keep track of the provision and receipt of processed data. Additional Information Anonymisation modifies personal data irreversibly, so that the data subject can no longer be identified, directly or indirectly. Pseudonymization replaces credentials with an alias. Knowledge of the algorithm (sometimes called "additional information") used to achieve the pseudonymization allows at least some form of identification of the data subject. This “additional information” should then be kept separate and protected. While pseudonymization is thus less robust than anonymization, pseudonymized datasets may be more useful in statistical research. Data masking is a set of techniques for concealing, substituting or obfuscating sensitive data elements. Data masking can be static (when data items are masked in the originating database), dynamic (using automation and rules to secure data in real time), or on the fly (with masked data in the application's memory). Hash functions can be used to anonymize DCPs. To prevent enumeration attacks, they should always be combined with a salting function. DCPs in resource identifiers and their attributes [eg, filenames and Uniform Resource Locators (URLs)] should be avoided or appropriately anonymized. Additional security measures for protecting DCPs in public clouds are available in ISO/IEC 27018. Additional information on de-identification techniques is available in ISO/IEC 20889. © ISO/IEC 2022 – All rights reserved 109 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) 8.12 Data Leakage Prevention Type of security measure #Preventive #Detective Information Security Properties #Privacy Cybersecurity concepts #Protect #Detect Operational capabilities Security domains #Protection_of_information #Protection #Defense Security measure Data leakage prevention measures should be applied to systems, networks and all other endpoints that process, store or transmit sensitive information. Objective Detect and prevent unauthorized disclosure and extraction of information by people or systems. Recommendations The organization should consider the following to reduce the risk of data leakage: a) identify and classify the information to be protected against leakage (for example, information personal data, pricing models and product designs); b) monitor data leakage channels (eg, email, file transfers, mobile terminals and portable storage media); c) act to prevent information leakage (for example, quarantine mail email containing sensitive information). Data loss prevention tools should be used to: a) identify and monitor sensitive information at risk of unauthorized disclosure (eg, in unstructured data in a user's system); (b) detect the disclosure of sensitive information (for example, when information is uploaded to untrusted third party cloud services or sent by email); c) block user actions or network transmissions that expose sensitive information (for example, preventing the copying of database entries into a spreadsheet). The organization should determine whether it is necessary to limit a user's ability to copy and paste or upload data to services, devices, and storage media external to the organization. If so, the organization should implement solutions such as data loss prevention tools or configuring existing tools to allow users to view and manipulate data held remotely. , but prevent them from copying and pasting them outside of the organization's control. If data export is required, the data owner should have the ability to approve the export and hold users accountable for their actions. Screenshots or screenshots should be addressed in terms and conditions of use, training and audit. When data is backed up, care should be taken to ensure that sensitive information is protected using measures such as encryption, access control and physical protection of the storage media containing the backup. 110 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Data leak prevention should also be considered to protect against intelligence actions by an adversary seeking to obtain confidential or secret information (geopolitical, human, financial, commercial, scientific or other) that may be of interest for espionage purposes or which may be critical to the community. Actions to prevent data leakage should be directed in such a way as to confuse the adversary in his decisions, for example by replacing genuine information with false information, either as an independent action or in response to actions. adversary intelligence. Examples of such actions are reverse social engineering or using honeypots to lure attackers. Additional Information Data loss prevention tools are designed to identify data, monitor data usage and movement, and take action to prevent data loss (for example, alerting users to risky behavior and block data transfer to portable storage media). Preventing data leakage inherently involves monitoring the online communications and activities of staff and, by extension, the messages of external parties, which raises legal issues that need to be considered before use data loss prevention tools. There are several privacy, data protection, employment, data interception and telecommunications laws that are applicable to surveillance and data processing in the context of data leak prevention. Data leakage prevention can be ensured by standard security measures, such as topic-specific policies for access control and secure document management (see 5.12 and 5.15). 8.13 Backing up information Type of security measure #Corrective Information Security Properties #Integrity #Availablity Cybersecurity concepts #To re-establish Operational capabilities #Continuity Security domains #Protection Security measure Back-up copies of information, software and systems should be kept and tested regularly according to the agreed backup topic-specific policy. Objective Enable recovery in the event of loss of data or systems. Recommendations A specific backup policy should be defined to meet the organization's requirements in terms of data retention and information security. Adequate backup means should be provided to ensure that all essential software and information can be recovered following an incident, failure or loss of storage media. Plans should be developed and implemented indicating how the organization will back up information, software and systems to meet the specific backup topic policy. © ISO/IEC 2022 – All rights reserved 111 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) When designing a backup plan, consideration should be given to the elements following: a) produce accurate and complete records of backup copies and documented restoration procedures; b) integrate the business requirements of the organization (e.g. recovery point objective, see 5.30), the security requirements of the information concerned and the level of criticality of the information with respect to the continuous operation of the organization in the scope of backups (eg full or differential backup) and in the frequency of backups; c) keep the backups in a safe and secure remote location, at a sufficient distance to escape any damage resulting from a disaster at the main site; d) provide the backed up information with an appropriate level of physical and environmental protection (see Clause 7 and 8.1) consistent with the standards applied at the main site; e) regularly test backup media to ensure that they can be used in an emergency if necessary. Test the ability to restore backed up data to a test system, without overwriting the original storage media in the event that the backup or restore process fails and results in irreparable damage or data loss; f) protect the backups by means of encryption according to the identified risks (for example, in situations where confidentiality is important); g) take care to ensure that inadvertent data loss is detected prior to completion of the backup. Operational procedures should monitor the execution of backups and address scheduled backup failures to ensure backup completeness in accordance with policy specific to the backup topic. Backup measures for individual systems and services should be tested regularly to ensure that they meet the objectives of incident response and business continuity plans (see 5.30). This should be combined with a test of the recovery procedures checked against the recovery time required by the business continuity plan. In the case of critical systems and services, the backup measures should cover all systems information, applications and data necessary for the recovery of the complete system in the event of a disaster. When the organization uses a cloud service, backup copies of the organization's information, applications and systems in the cloud service environment should be made. The organization should determine whether and how backup requirements are met when using the information backup service provided as part of the cloud service. The retention period for critical business information should be determined, taking into account any requirements for retaining archival copies. The organization should consider deleting information (see 8.10) from storage media used for backup once the information retention period expires, taking into account legislation and regulations. Additional Information For additional information on storage security, including the preservation aspect, see ISO/IEC 27040. 112 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 8.14 Redundancy of information processing resources Type of security measure #Preventive Information Security Properties #Availablity Cybersecurity concepts #Protect Security domains Operational capabilities #Continuity #Asset_management #Protection #Resilience Security measure The means of processing information should be implemented with sufficient redundancy to meet availability requirements. Objective Ensure the continuous operation of information processing resources. Recommendations The organization should identify requirements for the availability of business services and information systems. The organization should design and implement a systems architecture with appropriate redundancy to meet these requirements. Redundancy can be provided by duplicating the information processing means in part or in whole (i.e. spare components or having duplicate everything). The organization should plan and implement procedures for enabling redundant components and processing resources. Procedures should determine whether redundant processing components and activities are always enabled or, in an emergency, whether they are enabled automatically or manually. Redundant components and information processing means should provide the same level of security as the main components and processing means. Mechanisms should be in place to alert the organization to any failure of the information processing means, to enable the planned procedure to be carried out and to ensure the continued availability during the repair or replacement of the information processing means. information. The organization should consider the following when implementing redundant systems: a) enter into a contract with two or more providers of networks and means of processing of critical information, such as Internet service providers; b) use redundant networks; c) use two geographically separated data centers with mirrored systems; d) use physically redundant power sources; e) use several parallel instances of the software components, with automatic load balancing between them (between instances from the same data center or from several data centers); f) have duplicate components in the systems (e.g. CPUs, hard drives, memories) or in networks (eg, firewalls, routers, switches). Where possible, and preferably in operational mode, redundant information systems should be tested to ensure that failover from one component to another component works as intended. © ISO/IEC 2022 – All rights reserved 113 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) Additional Information There is a close relationship between redundancy and ICT readiness for business continuity (see 5.30), particularly if short recovery times are required. Several redundancy measures can be part of business continuity strategies and solutions. The implementation of redundancies can introduce risks impacting integrity (for example, data copying processes on duplicate components can introduce errors) or confidentiality (for example, a weak security measure for duplicate components can lead to compromise) of information and information systems, which must be taken into consideration when designing information systems. The redundancy of the information processing means does not generally deal with the unavailability of the applications due to malfunctions of the application. With the use of public cloud computing, it is possible to have multiple real-time versions of information processing assets residing in multiple separate physical locations with automatic failover and load balancing between them. Some technologies and techniques for redundancy and automatic failover in the context of cloud services are covered in ISO/IEC TS 23167. 8.15 Logging Type of security measure #Detective Information Security Properties #Privacy Cybersecurity concepts #Detect #Integrity #Availablity Operational capabilities Security domains #Protection #Defense #Management_of_information_security_events_ Security measure Logs that record activities, exceptions, failures and other relevant events should be generated, maintained, protected and analyzed. Objective Log events, generate evidence, ensure the integrity of logging information, prevent unauthorized access, identify information security events that may lead to an information security incident and assist investigations. Recommendations General The organization should determine the purpose for which logs are created, what data is collected and logged, and any log-specific requirements for protecting and handling log data. This should be documented in a policy specific to the topic of logging. Event logs should include for each event, if possible: (a) user identifiers; b) system activities; c) dates, times and details of relevant events (e.g. openings and closings session); d) terminal identity, system identifier and location; 114 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) e) network addresses and protocols. Consideration should be given to events for logging: a) successful and failed attempts to access the system; b) attempts to access data and other resources, both successful and unsuccessful; c) changes to system configuration; d) the use of privileges; e) the use of utility programs and applications; f) files accessed and type of access, including deletion of important data files; g) alarms triggered by the access control system; h) the activation and deactivation of security systems, such as anti-virus systems and intrusion detection systems; i) the creation, modification or deletion of identities; j) operations performed by users in the applications. In some cases, applications are a service or product provided or performed by a third party. It is important for all systems to have synchronized time sources (see 8.17) as this allows correlation of logs between systems for analysis, alerting and investigation purposes d'un incident. Protecting Logs Users, including those with privileged access rights, should not have permission to delete or disable logs of their own activities. They can possibly manipulate the newspapers on the information processing means that they directly control. It is therefore necessary to protect and analyze the logs in order to ensure the accountability of privileged users. Security measures should be aimed at protecting the logging medium against unauthorized changes to information and operational problems, which include: a) alteration of the types of messages that are recorded; b) log files that have been edited or deleted; c) failure to record events or overwriting of events already recorded in the event of overflow of the storage medium containing the log file. For log protection, consideration should be given to using the following techniques: cryptographic hashing, saving to an append-only and read-only file, saving to a public transparency file. It may be necessary to archive some audit logs due to data retention requirements or evidence collection and retention requirements (see 5.28). When the organization needs to send system or application logs to a vendor to help resolve debugging or troubleshooting errors, the logs should be de-identified, if possible using masking techniques data (see 8.11) for information such as usernames, Internet Protocol (IP) addresses, hostnames, or organization name, before sending to the provider. Event logs may contain sensitive data and personal data. Appropriate privacy safeguards (see 5.34) should be taken . © ISO/IEC 2022 – All rights reserved 115 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Log Analysis Log analysis should include the analysis and interpretation of information security events to enable the identification of abnormal activity or behavior, which may represent indicators of compromise. The analysis of events should be carried out taking into account: (a) the necessary skills for the experts carrying out the analysis; b) determining the log analysis procedure; c) attributes required for each security event; d) exceptions identified through the use of predefined rules (e.g., rules of SIEM or firewall and IDS or malware signatures); e) Patterns of known behaviors and standard network traffic compared to abnormal behavior and activity (User and Entity Behavior Analysis [UEBA]); f) results of the analysis of trends or patterns (for example, the result of the use of data analytics, big data techniques and specialized analysis tools); (g) available threat information. Log analysis should be supported by specific monitoring activities to facilitate the identification and analysis of abnormal behaviors, which include: a) analysis of successful and failed attempts to access protected resources (eg domain name system [DNS] servers, web portals and file shares); b) consulting DNS logs to identify outgoing network connections to malicious servers, such as those associated with botnet command and control servers; c) analysis of usage reports issued by service providers (e.g. invoices or service reports) to detect abnormal activity within systems and networks (e.g. by analyzing activity patterns) ; d) consideration of physical surveillance event logs, such as entries and outputs, to ensure more accurate incident detection and analysis; e) Correlation of logs to enable efficient and highly accurate analyses. Known and suspected information security incidents (such as malware infection or firewall probing) should be identified and investigated further (e.g. as part of an information security incident management process; see 5.25). Additional Information System logs often contain a significant amount of information, most of which is not relevant to information security monitoring. To facilitate the identification of significant events for information security monitoring purposes, the use of utility programs or appropriate auditing tools that allow file interrogation may be considered. Event logging forms the basis of automated monitoring systems (see 8.16), which are capable of generating consolidated reports and system security alerts. A SIEM tool or equivalent service can be used to store, correlate, normalize, and analyze log information and to generate alerts. SIEMs tend to require careful configuration to optimize their results. Configurations to consider include identifying and 116 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) selecting appropriate log sources, tuning and testing rules, and defining use cases. Public transparency files for recording logs are used, for example, in certificate transparency systems. These files can provide an additional detection mechanism that is useful to protect against log corruption. In cloud environments, log management responsibilities may be shared between the cloud service customer and the cloud service provider. Responsibilities vary depending on the type of cloud service used. Additional recommendations are available in ISO/IEC 27017. 8.16 Monitoring Activities Type of security measure #Detective #Corrective Information Security Properties Cybersecurity concepts #Privacy #Detect #Integrity #Availability #Respond Operational capabilities Security domains #Defense #Management_of_information_security_events_ Security measure Networks, systems and applications should be monitored for abnormal behavior and appropriate measures should be taken to assess possible information security incidents. Objective Detect abnormal behavior and possible information security incidents. Recommendations The scope and level of monitoring should be determined in accordance with business and information security requirements and taking into account relevant laws and regulations. Monitoring records should be retained for defined retention periods. Consideration should be given to including the following in the monitoring system: a) traffic entering and leaving networks, systems and applications; b) access to systems, servers, network equipment, monitoring system, critical applications, etc.; c) critical or administrator level system and network configuration files; d) logs generated by security tools [eg, antivirus, IDS, intrusion prevention system (IPS), web filters, firewalls, data leakage prevention]; e) event logs relating to system or network activities; f) checking that the running code is authorized to run in the system and that it has not been altered (for example, by a recompilation adding unwanted code); g) resource usage (e.g. CPU, hard drives, memory, bandwidth) and their performances. The organization should establish a baseline of normal behavior and monitor for abnormalities against this baseline. When establishing a baseline, consideration should be given to the following: a) analysis of system usage during normal and peak periods; © ISO/IEC 2022 – All rights reserved 117 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) b) the usual access time, access location and access frequency for each user or group of users. The monitoring system should be configured against the established baseline to identify abnormal behaviors, such as: (a) unexpected termination of processes or applications; b) activity commonly associated with malware or traffic originating from known malicious IP addresses or network domains (eg, those associated with botnet command and control servers); c) characteristics of known attacks (e.g. denial of service and memory overflows tampon); d) unusual system behavior (eg, keystroke logging, process injection, and deviations from the use of standard protocols); e) bottlenecks and overloads (e.g. network queues, latency levels and network jitter); (f) unauthorized access (actual or attempted) to systems or information; (g) unauthorized analysis of business applications, systems and networks; h) successful or unsuccessful attempts to access protected resources (e.g. DNS servers, web portals and file systems); i) Unusual user and system behavior compared to expected behavior. Continuous monitoring via a monitoring tool should be used. Monitoring should be done in real time or at regular intervals, subject to organizational needs and capabilities. Surveillance tools should incorporate the ability to handle large amounts of data, adapt to the ever-changing threat landscape and enable realtime notification. The tools should also be able to recognize specific signatures and specific patterns of data, network or application behavior. Automated monitoring software should be configured to generate alerts (eg, via management consoles, e-mail messages or instant messaging systems) based on predefined thresholds. The alert system should be set up and trained against the organization's baseline to minimize false positives. Staff should be dedicated to responding to alerts and properly trained to accurately interpret potential incidents. Redundant systems and processes should be in place to receive and respond to alert notifications. Abnormal events should be communicated to the relevant affected parties in order to improve the following activities: auditing, security assessment, vulnerability analysis and monitoring (see 5.25). Procedures should be in place to respond to positive indicators from the monitoring system promptly to minimize the consequences of adverse events (see 5.26) on information security. Procedures should also be defined to identify and deal with false positives, including tuning monitoring software to reduce the number of future false positives. Additional Information Safety monitoring can be improved by: a) operation of threat intelligence systems (see 5.7); b) exploitation of machine learning and intelligence capabilities artificial; 118 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) c) the use of blocklists or allowlists ; d) conducting a series of technical security assessments (e.g. vulnerability assessments, penetration tests, cyber attack simulations and cyber attack response exercises) and using the results of these assessments to help determine baselines for reference or acceptable behaviors; e) use of performance monitoring systems to help define and detect abnormal behavior; f) operation of logs in conjunction with monitoring systems. Surveillance activities are often carried out using specialized software, such as intrusion detection systems. These can be configured against a baseline of system and network activity considered normal, acceptable, and expected. Monitoring anomalous communications makes it easier to identify botnets (i.e., a collection of endpoints under the malicious control of the botnet owner, typically used to launch distributed denial of service attacks on other computers in other organizations). If the computer is controlled by an external terminal, communication is established between the infected terminal and the controller. The organization should therefore employ technologies to monitor abnormal communications and take such action as often as necessary. 8.17 Synchronization of clocks Type of security measure #Detective Information Security Properties #Integrity Cybersecurity concepts #Protect #Detec to have Operational capabilities Security domains #Protection #Defense #Management_of_information_security_events_ Security measure The clocks of the information processing systems used by the organization should be synchronized with approved time sources. Objective Enable the correlation and analysis of security events and other recorded data, assist in the investigation of information security incidents. Recommendations External and internal requirements for time representation, reliable synchronization and accuracy should be documented and implemented. These requirements may arise from legal, statutory, regulatory, contractual or normative needs and from internal monitoring. A standard reference time for use within the organization should be defined and taken into account by all systems, including building management systems, entry and exit systems and others. which can be used to assist investigations. A clock synchronized to a radio signal broadcasting the time from a national atomic clock or a global positioning system (GPS ) should be used as the reference clock for logging systems; a consistent and reliable date and time source, to ensure accurate timestamps. Protocols such as Network Time Protocol (NTP ) or Precision Time Protocol (PTP) should be used to keep all networked systems synchronized with a reference clock. The organization can use two external time sources at the same time to improve the reliability of the external clocks, and manage any deviations appropriately. © ISO/IEC 2022 – All rights reserved 119 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Synchronizing clocks can be complicated when using multiple cloud services or when using cloud and on-premises services together. In this case, the clock of each service should be managed and the offsets recorded in order to mitigate the risks arising from these offsets. Additional Information Proper setting of computer clocks is important to ensure accurate event logs that may be needed in investigations or used as evidence in legal cases and disciplinary proceedings. Inaccurate audit logs can hamper these investigations and undermine the credibility of this evidence. 8.18 Using Privileged Utility Programs Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities Security domains #System_and_network_security #Protection #Secure_Configuration #Application_Security Security measure The use of utility programs with the ability to circumvent system and application security measures should be limited and tightly controlled. Objective Ensure that the use of utility programs does not compromise the information security measures of systems and applications. Recommendations The following guidelines regarding the use of utility programs that have the ability to circumvent system and application security measures should be considered: a) limit the use of utility programs to a minimum acceptable number of authorized trusted users (see 8.2); (b) use identification, authentication and authorization procedures for utility programs, including the unique identification of the person using the utility program; c) define and document authorization levels for utility programs; d) allow ad hoc uses of utility programs; e) not to make utility programs available to users who have access to applications installed on systems requiring segregation of duties; f) remove or disable any unused utility programs; g) at a minimum, logically separate utility programs from application software. To the extent possible, separate the network communications of these programs from application traffic; h) limit the availability of utility programs (for example, the duration of a modification authorized); i) log all usage of utility programs. 120 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information Most information systems have one or more utility programs that may have the ability to circumvent system and application security measures, such as diagnostics, patching, anti-virus, disk defragmentation, debuggers, backup tools and network tools. 8.19 Installing software on operational systems Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Secure_Configuration #Application_Security Security domains #Protection Security measure Procedures and measures should be implemented to securely manage the installation of software on operational systems. Objective Ensure the integrity of operational systems and prevent the exploitation of technical vulnerabilities. Recommendations The following guidelines should be considered for securely managing software changes and installation on live systems: a) Have operational software updates installed only by trained administrators, after management approval (see 8.5); b) ensure that only approved executable code and not code in development or compilers are installed on operational systems; c) install and update software only after thorough and successful testing (see 8.29 and 8.31); d) update all the libraries of the corresponding source programs; e) use a configuration control system to maintain control of all software operational, as well as system documentation; f) define a rollback strategy before applying changes; g) maintain an audit log of all operational software updates; h) archive older versions of software, with all necessary information and settings, procedures, configuration details and associated support software as a backup measure, and for as long as the software is used to read or process archived data. Any decision to install a new version should take into account the business requirements of the change, as well as the security aspects of the new version (for example, the introduction of a new information security feature or the number and severity of information security vulnerabilities affecting the current version). Software patches should be applied when they remove or reduce information security vulnerabilities (see 8.8 and 8.19). Computer Software may use software and packages provided by an external third party (e.g., software programs using modules hosted on external sites) that it © ISO/IEC 2022 – All rights reserved 121 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) should be monitored and controlled to avoid unauthorized changes, as they may introduce information security vulnerabilities. Software provided by vendors and used in operational systems should be maintained by the vendor. Over time, software vendors will stop servicing older versions of software. The organization should consider the risks associated with the use of out-of-maintenance software. Open source software used in operational systems should be maintained at the latest appropriate software version. Over time, maintenance of open source codes may cease, but these codes remain available in an open source software repository. The organization should also consider the risks associated with unmaintained open source software when used in operational systems. Where vendors are involved in installing or updating software, physical or logical access should be granted only as necessary and with appropriate authorization. Supplier activities should be monitored (see 5.22). The organization should define and enforce strict rules about the types of software that users can install. The principle of least privilege should be applied to the installation of software on operational systems. The organization should determine the types of software installations that are allowed (for example, updates and security patches for existing software) and the types of installations that are prohibited (for example, software intended for for personal use only, and software of unknown or suspicious origin with the possibility of being malicious). These privileges should be granted according to the functions of the users concerned. Additional Information No additional information. 8.20 Network Security Type of security measure #Preventive #Detective Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect #Detect Operational capabilities Security domains #System_and_network_security #Protection Security measure Networks and network devices should be secured, managed and controlled to protect system and application information. Objective Protect the information in the networks and the means of processing the supporting information against compromise via the network. Recommendations Security measures should be implemented to ensure information security in networks and to protect connected services against unauthorized access. In particular, the following should be considered: a) the type and level of information classification that the network can support; b) define responsibilities and procedures for the management of network equipment and terminals; 122 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) maintain documentation, including network diagrams and equipment configuration files (eg routers, switches); d) separate operational responsibility for networks and activities on ICT systems, if necessary (see 5.3); e) define security measures to preserve the confidentiality and integrity of data transiting over public networks, third-party networks or wireless networks and to protect connected systems and applications (see 5.22, 8.24 , 5.14 and 6.6). Additional security measures may also be necessary to ensure the availability of network services and computers connected to the network; f) provide appropriate logging and monitoring to enable recording and detection of actions that may affect, or are relevant to, information security (see 8.16 and 8.15 ) ; g) closely coordinate network management activities both to optimize the service provided to the organization and to ensure that security measures are applied consistently across the information processing infrastructure; h) authenticate systems on the network; i) restricting and filtering the connection of systems to the network (for example, by using firewalls); j) detect, restrict and authenticate the connection of equipment and terminals to the network; k) harden network terminals; l) separate network administration channels from other network traffic; m) temporarily isolate critical subnets [e.g., with drawbridges ] if the network is being attacked; n) disable vulnerable network protocols. The organization should ensure that appropriate security measures are applied for the use of virtual networks. Virtualized networks also include software-defined networking (SDN, SD-WAN). Virtualized networks can be attractive from a security perspective as they can allow logical separation of communications that take place over physical networks, especially for systems and applications that are implemented using IT distributed. Additional Information Additional information on network security is available in the ISO/IEC 27033 series. More information on virtualized networks is available in ISO/IEC TS 23167. 8.21 Network Services Security Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #System_and_network_security #Protection #Integrity #Availablity Security measure Security mechanisms, service levels and service requirements for network services should be identified, implemented and monitored. © ISO/IEC 2022 – All rights reserved 123 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective Ensure security when using network services. Recommendations The security measures necessary for certain services, such as security features, service levels and service requirements, should be identified and implemented by internal or external network service providers. The organization should ensure that network service providers implement these measures. The ability of the network service provider to manage the agreed services securely should be determined and regularly monitored. The right to audit should be agreed between the organization and the supplier. The organization should also consider third-party attestations issued by service providers to demonstrate that they maintain appropriate security measures. Rules for the use of networks and network services should be defined and applied to cover the following: (a) the networks and network services to which access has been granted; b) authentication requirements for access to different network services; (c) authorization procedures for determining which persons are authorized to access which networks and what network services; d) network management and technological security measures and procedures to protect access to network connections and network services; e) the means used to access networks and network services [for example, use of virtual private networks (VPNs) or wireless networks]; f) time, location and other attributes of the user at the time of access; g) monitoring the use of network services. Consideration should be given to the following security features for network services: a) technologies used for the security of network services, such as authentication, encryption and network connection controls; b) the technical parameters necessary for a secure connection to network services, in accordance with security and network connection rules; c) caching [e.g., in a content delivery network ] and its settings that allow users to choose the use of caching according to performance, availability, and privacy; d) procedures for using network services to restrict access to services or network applications, if necessary. Additional Information Network services include the provision of connections, private network services and managed network security solutions, such as firewalls and intrusion detection systems. These services can range from simple unmanaged bandwidth to complex value-added offerings. Additional recommendations on a framework for access management are available in ISO/IEC 29146. 124 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 8.22 Network partitioning Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #System_and_network_security #Protection #Integrity #Availablity Security measure Groups of information services, users, and information systems should be siled within the organization's networks. Objective Divide the network into security perimeters and control traffic between them based on business needs. Recommendations The organization should consider managing the security of large networks by dividing them into separate network domains and separating them from the public network (i.e. the Internet). Domains can be chosen according to levels of trust, criticality and sensitivity (for example, public access domain, workstation domain, server domain, high and low risk systems), according to administrative services (for example, example, human resources, finance, marketing) or according to certain combinations (for example, connection of the domain of servers to several administrative services). The partitioning can be achieved by using either different physical networks or different logical networks. It is important to clearly define the scope of each domain. If access between network domains is allowed, it should be controlled at the perimeter using a gateway (eg, firewall, filtering router). Criteria for partitioning networks into domains and authorized access through gateways should be based on an assessment of the security requirements of each domain. The assessment should be consistent with topic-specific access control policy (see 5.15), access requirements, value and classification of information processed, and take into account the cost relative and performance impacts of integrating appropriate gateway technologies. Wireless networks require special treatment due to an insufficiently defined network perimeter. Radio coverage adjustment should be considered for the partitioning of wireless networks. For sensitive environments, consideration should be given to treating all wireless accesses as external connections and isolating such accesses from internal networks until such accesses pass through a gateway in accordance with the security measures of the networks (see 8.20), before granting access to internal systems. Wireless access networks intended for guests should be separated from those intended for staff if staff use only controlled user end devices that comply with the organization's topic-specific policies. Wi-Fi intended for guests should be subject to at least the same restrictions as staff Wi-Fi, in order to deter staff from using guest Wi-Fi. Additional Information Networks often extend beyond organizational boundaries, and the business partnerships that are formed require the interconnection or sharing of information processing resources and network facilities. These extensions can increase the risk of unauthorized access to the organization's information systems that use the network, some of which need to be protected from other network users because of their level of sensitivity or criticality. © ISO/IEC 2022 – All rights reserved 125 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 8.23 Web filtering Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #System_and_network_security #Protection #Integrity #Availablity Security measure Access to external websites should be managed to reduce exposure to malicious content. Objective Protect systems from malware compromise and prevent access to unauthorized web resources. Recommendations The organization should reduce the risk of its staff accessing websites that contain illegal information or are known to contain viruses or phishing content. One technique to achieve this is to block the IP addresses or domains of the affected website(s). Some browsers and antimalware technologies do this automatically or can be configured to do so. The organization should identify the types of websites to which staff should or should not have access. The organization should consider blocking access to the types of websites following: a) websites with an information download function, unless this is permitted for valid business reasons; b) websites known to be or suspected of being malicious (for example, those which distribute malware or phishing content); c) command and control servers; d) malicious website from threat intelligence (see 5.7); e) websites sharing illegal content. Prior to using this security measure, the organization should establish rules for the safe and appropriate use of online resources, including any restrictions regarding unwanted or inappropriate websites and web applications. These rules should be kept up to date. Staff should be trained in the safe and appropriate use of online resources, including web access. Training should include the organization's rules, point of contact for discussing security issues, and the exception process when staff need access to restricted web resources for legitimate business reasons. Staff should also be trained to ensure that they do not dismiss any browser warnings that a website is not secure, but allow the user to proceed. Additional Information Web filtering can include a combination of techniques, such as signatures, heuristics, list of acceptable websites or domains, list of prohibited websites or domains, and custom configuration, to help prevent malware and malicious software. 'other malicious activities to attack the organization's networks and systems. 126 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 8.24 Use of cryptography Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities Security domains #Secure_Configuration #Protection #Integrity #Availablity Security measure Rules for the effective use of cryptography, including the management of cryptographic keys, should be defined and implemented. Objective Ensure the correct and effective use of cryptography to protect the confidentiality, authenticity or integrity of information in accordance with business and information security requirements, and taking into account legal, statutory, regulatory and contractual requirements relating to cryptography. Recommendations General When using cryptography, the following should be considered: a) the policy specific to the topic of cryptography defined by the organization, including the general principles for the protection of information. A topic-specific policy on the use of cryptography is useful to maximize the benefits and minimize the risks associated with the use of cryptographic techniques, and to prevent inappropriate or incorrect uses; b) the identification of the level of protection required and the classification of the information, and thus the determination of the type, strength and quality of the cryptographic algorithms required; (c) the use of cryptography for the protection of information held on end terminals of mobile users or on storage media and information transmitted by network to such terminals or storage media; d) the key management approach, in particular the methods that manage the generation and protection of cryptographic keys and the recovery of encrypted information in the event of loss, compromise or damage to the keys; e) duties and responsibilities for: 1) the implementation of rules for the effective use of cryptography; 2) key management, including key generation (see 8.24); f) the standards to be adopted as well as the cryptographic algorithms, cipher strength, cryptographic solutions and usage practices approved or required in the organization; g) the consequences of the use of encrypted information on security measures that use content analysis (eg malware detection or content filtering). When implementing organizational rules for the effective use of cryptography, national regulations and restrictions that may apply to the use of cryptographic techniques in different regions of the world should be considered. , as well as the problems of cross-border circulation of encrypted information (see 5.31). © ISO/IEC 2022 – All rights reserved 127 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) The contents of service agreements or contracts with external cryptographic service providers (e.g., with a certificate authority) should address issues of responsibilities, reliability of services, and response times for the provision of services. (see 5.22). Key management Proper key management requires secure processes for generating, storing, archiving, retrieving, distributing, retiring, and destroying cryptographic keys. A key management system should be based on an agreed set of standards, procedures and secure methods for: a) generate keys for different cryptographic systems and different applications; (b) issue and obtain public key certificates; c) distribute keys to recipient entities, indicating how to activate the keys when they are received; d) store keys, including how authorized users gain access to the keys; e) change or update keys, including rules on when to change keys and how to proceed; f) manage compromised keys; g) revoke keys, including how to remove or deactivate keys (eg when keys have been compromised or when a user leaves an organization (in which case keys should also be archived)); h) recover lost or altered keys; (i) backup or archive keys; j) destroy the keys; k) log and audit key management activities; l) set key activation and deactivation dates so that keys can only be used for the period of time provided by the organization's key management rules; m) process legal requests for access to cryptographic keys (for example, encrypted information may need to be made available in unencrypted form as evidence in a legal case). All cryptographic keys should be protected against modification or loss. Additionally, secret and private keys need to be protected from unauthorized use, as well as disclosure. Equipment used to generate, store and archive keys should be physically protected. In addition to integrity, for many use cases, consideration should be given to the authenticity of public keys. Additional Information Authenticity of public keys is usually ensured by public key management processes, through certification authorities and public key certificates, but it is also possible to ensure it using technologies such as application of manual processes for a small number of keys. 128 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Cryptography can be used to meet different information security objectives, for example: a) confidentiality: using information encryption to protect sensitive information or critical, whether stored or transmitted; b) integrity or authenticity: using electronic signatures or message authentication codes to verify the authenticity or integrity of sensitive or critical information stored or transmitted. Use algorithms for file integrity checking; c) non-repudiation: using cryptographic techniques to provide proof of occurrence or the non-occurrence of an event or action; d) Authentication: Using cryptographic techniques to authenticate users and other system entities requesting access or communicating with system users, entities and resources. The ISO/IEC 11770 series provides additional information on key management. 8.25 Secure Development Lifecycle Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Application_Security Security domains #Protection #System_and_network_security Security measure Rules should be defined and applied for the secure development of software and systems. Objective Ensure that information security is designed and implemented during the secure development life cycle of software and systems. Recommendations Secure development is a requirement for developing a secure service, architecture, software, and system. To achieve this, the following aspects should be taken into consideration: a) separation of development, test and production environments (see 8.31); b) recommendations on security in the software development life cycle: 1) security of software development methodologies (see 8.28 and 8.27); 2) secure coding guidelines for each programming language used (see 8.28); c) safety requirements in the specification and design phases (see 5.8); d) security checkpoints in projects (see 5.8); e) security and system testing, such as regression testing, code analysis, and testing penetration (see 8.29); f) secure directories for source codes and configurations (see 8.4 and 8.9); g) security in version control (see 8.32); © ISO/IEC 2022 – All rights reserved 129 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) h) required knowledge and training regarding application security (see 8.28); i) the ability of developers to prevent, identify and correct vulnerabilities (see 8.28); j) Licensing requirements and other alternatives to benefit from cost-effective solutions while avoiding future licensing issues (see 5.32). If development is outsourced, the organization should obtain assurance that the supplier complies with the organization's secure development policies (see 8.30). Additional Information Developments can also take place within applications such as office applications, scripts, browsers and databases. 8.26 Application security requirements Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities Security domains #Protection #System_and_network_security #Defense #Application_Security Security measure Information security requirements should be identified, specified and approved when developing or acquiring applications. Objective Ensure that all information security requirements are identified and addressed when developing or acquiring applications. Recommendations General Application security requirements should be identified and specified. These requirements are usually determined through a risk assessment. Requirements should be developed with the support of information security specialists. Application security requirements can cover a wide range of topics, depending on the purpose of the application. Application security requirements should include, where applicable: a) the level of confidence in the identity of entities [e.g., through authentication (see 5.17, 8.2 and 8.5)]; b) identifying the type of information and level of classification to be processed by the application; c) the need to separate access and levels of access to data and application functions; d) resilience against malicious attacks or inadvertent disruptions (e.g. protection against buffer overflows or structured query language ( SQL) injections ); e) legal, statutory and regulatory requirements in the jurisdiction where the transaction is generated, processed, completed or stored; f) the need for privacy protection in relation to all parties involved; (g) requirements for the protection of all confidential information; 130 © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 ISO/IEC 27002:2022(F) h) data protection during processing, in transit and at rest; i) the need to securely encrypt communications between all parties involved; j) input data checks, including integrity checks and data validation input; k) automated controls (eg, approval limits or double approvals); l) output data controls, also taking into account who can access data from output and associated permissions; m) restrictions related to the content of "free text" fields, knowing that they may lead to uncontrolled storage of confidential data (eg personal data); n) business process requirements, such as transaction logging and monitoring, non-repudiation requirements; o) requirements imposed by other security measures (eg interfaces to logging and monitoring systems or data leak detection systems); p) handling of error messages. Transactional services Additionally, for applications that provide transactional services between the organization and a partner, the following should be considered when identifying information security requirements: a) the level of trust each party needs in the claimed identity of the others; b) the level of confidence required in the integrity of the information exchanged or processed, and the mechanisms for identifying the lack of integrity (eg cyclic redundancy check, hashing , digital/electronic signatures); c) approval processes associated with who can approve content, issue or sign important transactional documents; d) confidentiality, integrity, proof of sending and receipt of material documents and non-repudiation (eg contracts associated with tendering and contracting processes); e) confidentiality and integrity of all transactions (e.g. orders, contact details of delivery and acknowledgments of receipt); f) requirements for how long the transaction is kept confidential; g) insurance and other contractual requirements. Electronic ordering and payment applications Additionally, for applications that include electronic orders and payments, the following should be considered: a) the requirements for maintaining the confidentiality and integrity of the information of order; (b) the appropriate degree of verification to verify the payment information provided by a customer; c) prevention against loss or duplication of transaction information; d) storing transaction information outside of any publicly accessible environment (for example, on an existing storage platform within the organization's intranet, and not © ISO/IEC 2022 – All rights reserved 131 ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) keep them or display them on electronic storage media directly accessible from the Internet); e) where a trusted authority is used (for example, for the purpose of issuing and maintaining electronic signatures or certificates), security is integrated and embedded throughout the end-to-end management process certificates or signatures. Many of the above considerations can be addressed by the application of cryptography (see 8.24), taking into account legal requirements (see 5.31 to 5.36, and see in particular 5.31 for cryptography legislation). Additional Information Applications accessed through networks are exposed to a range of network-associated threats, such as fraudulent activity, contractual disputes, or disclosure of information to the general public; incomplete transmission, misdirection, unauthorized alteration, duplication or replay of messages. Therefore, detailed risk assessments and the careful determination of safety measures are essential. Required security measures often include cryptographic methods for authentication and securing data transfers. More information on application security is available in the ISO/IEC 27034 series. 8.27 Principles of secure system engineering and architecture Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities #Application_Security Security domains #Protection #System_and_network_security Security measure Secure systems engineering principles should be established, documented, maintained, and applied to all information system development activities. Objective Ensure that information systems are designed, implemented and operated securely during the development life cycle. Recommendations Security engineering principles should be established, documented and applied to information systems engineering activities. Security should be designed in all layers of the architecture (business, data, applications and technologies). New technologies should be analyzed for security risks and redesigned against known attack patterns. Secure Engineering Principles provide guidance on user authentication techniques, secure session controls, and data validation and cleansing. Engineering principles for secure systems should include the analysis of: a) all the security measures required to protect the information and systems against identified threats; b) the ability of the security measures to prevent, detect or respond to security events; respond; 132 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) c) specific security measures required for certain business processes (eg encryption of sensitive information, integrity checking and digital signing of information); d) where and how the security measures should be applied (for example, by integrating them into security architecture and technical infrastructure); e) how the individual security measures (manual and automated) work together to produce an integrated set of security measures. Safety engineering principles should take into account: a) the need for integration into a security architecture; b) technical security infrastructure [eg public key infrastructure (PKI), identity and access management (IAM), data leakage prevention and dynamic access management]; c) the organization's ability to develop and maintain the selected technologies; d) the cost, time and complexity of meeting security requirements; e) existing good practices. The engineering of secure systems should involve: a) application of security architecture principles, such as 'security by design' , 'defence in depth' , 'security by default ', 'denial of default" (default deny), " fail securely", "distrust input from external applications" , "security in deployment" , " assume breach” , “ least privilege”, “usability and manageability” and “least functionality”; b) security-oriented design analysis to help identify information security vulnerabilities, ensure that security controls are specified and meet security requirements; c) documentation and formal recognition of security measures that do not fully meet the requirements (eg due to priority security requirements); d) system hardening. The organization should consider zero trust principles such as: a) assume that the organization's information systems are already compromised and not rely on network perimeter security alone; b) use a “ never trust and always verify” approach to access to information systems; c) ensure that requests to information systems are end-to-end encrypted; d) verify every request to an information system as if it came from an open external network, even if these requests come from inside the organization (i.e. trust nothing in any way automatic inside or outside its perimeters); e) use least privilege and dynamic access control techniques (see 5.15, 5.18 and 8.2). This includes authenticating and authorizing information requests or queries to systems based on contextual information, such as authentication information (see 5.17), user identities (5.16), device data user end and data classification (see 5.12); © ISO/IEC 2022 – All rights reserved 133 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) f) always authenticate requestors and always validate authorization requests to information systems based on information, including authentication information (see 5.17 ) and user identities (5.16), data on the terminal end user and data classification (see 5.12), e.g. apply strong authentication (e.g. multi-factor, see 8.5). Established security engineering principles should be applied, where possible, to the outsourced development of information systems through contracts and other enforceable agreements between the organization and the vendor to whom the organization is outsourcing the development. The organization should ensure that the vendor's security engineering practices are aligned with the organization's needs. Safety engineering principles and established engineering procedures should be reviewed regularly to ensure that they contribute effectively to improving safety levels in the engineering process. They should also be reviewed regularly to ensure that they remain up to date to combat possible new threats and to remain applicable in relation to technological advances and the solutions used. Additional Information Security engineering principles can be applied to the design or configuration of a set of techniques, such as: — fault tolerance and other resilience techniques; — partitioning (eg through virtualization or containerization); — inviolability (tamper resistance). Secure virtualization techniques can be used to avoid interference between applications running on the same physical terminal. If a virtual instance of an application is compromised by an attacker, only that instance is affected. The attack has no effect on other applications or data. Tamper-evident techniques can be used to detect tampering with information containers, both physical (eg, tamper alarm) and logical (eg, data file). A feature of these techniques is that there is a record of the attempt to tamper with the container. Additionally, the security measure may prevent the successful extraction of the data by destroying it (for example, a terminal's memory may be erased). 8.28 Secure Coding Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities #Application_Security Security domains #Protection #System_and_network_security Security measure Secure coding principles should be applied to software development. Objective Ensure that software is developed in a secure manner to reduce the number of possible information security vulnerabilities in software. 134 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations General Organization-wide processes should be defined to ensure good governance of secure coding. A minimum secure baseline should be established and enforced. Additionally, these processes and governance should be extended to cover software components from third parties and open source software. The organization should monitor real-world threats and up-to-date guidance, as well as information on software vulnerabilities, to guide the organization's secure coding principles through continuous improvement and learning. This can help ensure that effective secure coding practices are implemented to combat the rapidly changing threat landscape. Coding planning and prerequisites Secure coding principles should be used for both new development and reuse cases. These principles should be applied to development activities both within the organization and to products and services provided by the organization to third parties. Planning and prerequisites before coding should include: a) organization-specific approved expectations and principles for secure coding, apply to both in-house and outsourced code developments; b) current and historical coding practices and coding flaws that lead to information security vulnerabilities; c) configuration of development tools, such as Integrated Development Environments (IDEs ), to support the creation of secure code; d) the follow-up of the recommendations issued by the suppliers of development tools and execution environments, if applicable; e) maintenance and use of updated development tools (eg compilers); f) qualification of developers in writing secure code; g) secure design and architecture, including threat modelling; (h) secure coding standards and, if necessary, obligation to use them; i) the use of controlled environments for development. During coding Consideration should be given during coding: a) secure coding practices specific to the programming languages and techniques used; b) the use of secure programming techniques, such as pair programming, refactoring , peer review, secure iterations, and test-driven development; c) the use of structured programming techniques; d) documentation of code and elimination of programming defects that may allow exploitation of information security vulnerabilities; e) prohibiting the use of insecure design techniques (eg, the use of hard-coded passwords, unapproved code samples, and unauthenticated web services). © ISO/IEC 2022 – All rights reserved 135 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Testing should be performed during and after development (see 8.29). Static application security testing (SAST) processes identify software security vulnerabilities. Before any software becomes operational, the following should be assessed: a) the attack surface and the principle of least privilege; b) performing an analysis of the most common programming errors and documenting of their attenuation. Overhaul and maintenance After the code has become operational: a) updates should be packaged and deployed securely; b) declared information security vulnerabilities should be addressed (see 8.8); c) Errors and suspected attacks should be logged and regularly reviewed. review logs to make adjustments to the code, if needed; d) the source code should be protected against unauthorized access and alteration (eg by using configuration management tools, which usually include functions such as access control and version control). When using external tools and libraries, the organization should consider the following: a) ensure that external libraries are managed (eg, maintaining an inventory of libraries used and their versions) and regularly updated with release cycles; b) selection, authorization and reuse of verified components, in particular components authentication and cryptographic; c) licenses, security and history of external components; (d) ensure that software is maintained and tracked and comes from reliable and reputable sources; e) sufficient long-term availability of development resources and artefacts. When a software package needs to be modified, the following points should be considered: (a) the risk that built-in controls and integrity processes are corrupted; b) the need to obtain or not obtain the supplier's consent; c) the possibility of obtaining the necessary changes from the supplier, as updates standard program; d) the consequences if the organization becomes responsible for the future maintenance of the software as a result of Changes; e) compatibility with other software used. Additional Information A fundamental principle is to ensure that security-related codes are called when needed and that they are tamper-proof. Programs installed from compiled binary codes also have these properties, but only for data held by the application. For interpreted languages, 136 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) the concept only works when the code is executed on a server that is otherwise inaccessible to users and processes that use it and whose data is kept in a database with similar protection. For example, interpreted code may be running in a cloud service where access to the code itself requires administrator privileges. Administrator access should be protected by security mechanisms such as just-in-time administration principles and strong authentication. If the application owner can access the scripts through direct remote access to the server, then an attacker can also do the same, in principle. In these cases, web servers should be configured to prevent directory browsing. Application codes are best designed with the assumption that they are always under attack, through errors or malicious actions. Additionally, critical applications can be designed to be internal fault tolerant. For example, the output data from a complex algorithm can be checked to ensure that it is within safe limits before it is used in an application such as a safety or financial critical application. The code that does the bounds checking is simple and therefore it is much easier to prove correctness. Some web applications are subject to a set of vulnerabilities that are introduced by weaknesses in design and coding, such as database injection attacks and XSS (Cross-site scripting) attacks . In these attacks, requests can be manipulated to misuse web server functionality. More information on ICT security assessment is available in the ISO/IEC 15408 series. 8.29 Security testing in development and acceptance Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identifier Operational capabilities #Application_Security #Information_Security_Assurance Security domains #Protection #System_and_network_security Security measure Processes for security testing should be defined and implemented during the development lifecycle. Objective Validate compliance with information security requirements when applications or code are deployed in the environment. Recommendations New information systems, upgrades and releases should be thoroughly tested and verified during development processes. Security testing should be an integral part of system or component testing. Security testing should be conducted against a set of requirements that can be expressed as functional or non-functional. Security testing should include the tests: a) security features [eg user authentication (see 8.5), access restrictions (see 8.3) and use of cryptography (see 8.24)]; b) secure encryption (see 8.28); © ISO/IEC 2022 – All rights reserved 137 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) c) secure configurations (see 8.9, 8.20 and 8.22), including those of operating systems, firewalls and other security components. Test plans should be determined based on a set of criteria. The scope of the tests should be proportional to the importance, the nature of the system and the potential impact of the change introduced. The test plan should include: a) a detailed program of activities and tests; b) input data and expected output data under a set of conditions; c) the criteria for evaluating the results; d) the decision to take further action, if necessary. The organization can take advantage of automated tools, such as code analysis tools or vulnerability scanners, and should verify the correction of security flaws. In the case of developments carried out internally in the organization, these tests should first be carried out by the development team. Independent acceptance testing should then be performed to ensure that the system operates as intended and only as intended (see 5.8). The following should be considered: a) perform code analysis activities for as an important element to test vulnerabilities security, including input data and unanticipated conditions; b) perform a vulnerability scan to identify insecure configurations and system vulnerabilities; c) perform penetration testing to identify insecure codes and designs. In the case of outsourced developments and the purchase of components, an acquisition process should be followed. Contracts with the supplier should address the identified security requirements (see 5.20). Products and services should be assessed against these criteria prior to acquisition. Testing should be performed in a test environment that resembles the target operational environment as closely as possible to ensure that the system does not introduce vulnerabilities into the organization's environment and that the tests are reliable (see 8.31 ) . Additional Information Multiple test environments can be set up and used for different types of testing (eg, functional and performance testing). These different environments can be virtual, with individual configurations to simulate multiple operational environments. Testing and monitoring of test environments, tools and technologies also need to be considered to ensure effective testing. The same goes for monitoring deployed surveillance systems in development, test, and operational settings. Judgment is needed based on the sensitivity of the systems and data, to determine how many layers of meta-testing are needed. 8.30 Outsourced development Type of security measure #Preventive #Detective 138 Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Identifier #Protect #Detect Operational capabilities #System_and_network_security #Application_Security #Security_of_supplier_relations Security domains #Governance_ and_Ecosystem #Protection © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING Machine Translated by Google ISO/IEC 27002:2022(F) Security measure The organization should direct, control and verify activities relating to outsourced systems development. Objective Ensure that the information security measures required by the organization are implemented as part of the outsourced development of systems. Recommendations When systems development is outsourced, the organization should communicate and agree on requirements and expectations, and continuously monitor and verify whether the delivery of outsourced work meets those expectations. Consideration should be given to the following throughout the organization's external supply chain: a) license agreements, code ownership and intellectual property rights relating to the outsourced content (see 5.32); b) contractual requirements for secure test design, coding and practices (see 8.25 to 8.29); c) providing threat models for consideration by external developers; d) acceptance testing to ensure the quality and accuracy of deliverables (see 8.29); e) provision of evidence to show that minimum acceptable levels of security and means of protecting privacy are in place (eg assurance reports); f) providing evidence that sufficient testing has been performed to protect against the presence of malicious content (intentional or unintentional) at delivery; g) the provision of evidence showing that sufficient tests have been carried out to protect against the presence of known vulnerabilities; h) escrow agreements regarding the source code of the software (for example, if the supplier ceases his activity); i) the contractual right to audit development processes and controls; j) security requirements for the development environment (see 8.31); k) taking into account the applicable legislation (for example, on the protection of personal data). Additional Information More information on supplier relationships is available in the ISO/IEC 27036 series. 8.31 Separation of development, test and operational environments Type of security measure #Preventive Security properties information concepts #Privacy #Integrity #Availablity Cybersecurity #Protect Operational capabilities #Application_Security Security domains #Protection #System_and_network_security Security measure Development, test, and operational environments should be separated and secured. © ISO/IEC 2022 – All rights reserved 139 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective Protect the operating environment and related data from compromises that may arise from development and testing activities. Recommendations The level of separation needed between development, test, and operational environments should be determined and implemented to prevent operational issues. Consideration should be given to the following: a) adequately separate development and production systems and operate them in different domains (eg, in separate physical or virtual environments); b) define, document and implement rules and permissions for software deployment from development to production; c) test changes to operational systems and applications in a test or simulation environment before applying them to operational systems (see 8.29); d) not perform testing in operational environments except in defined and approved circumstances; e) make the compilers, editors and other development tools or programs inaccessible utilities from operating systems when not needed; f) display appropriate environmental identification marks in menus to reduce the risks of error; g) not to copy sensitive information into the environments of the development and test systems unless equivalent security measures are in place for the development and test systems. In all cases, the development and test environments should be protected by taking into consideration: a) the application of patches and updates to all development, integration and test tools (including generators, integrators, compilers, configuration systems and libraries); b) secure configuration of systems and software; c) control of access to environments; (d) monitoring changes to the environment and the code therein; e) secure monitoring of environments; f) environment backups. A single person should not have the ability to make development and production changes without prior verification and approval. This can be achieved, for example, through the separation of access rights or through rules subject to monitoring. In exceptional situations, additional measures such as detailed logging and real-time monitoring should be implemented to detect and act on unauthorized changes. 140 © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Additional Information Without adequate measures and procedures, developers and testers with access to production systems can introduce significant risks (for example, unwanted modification of files or the system environment, failure of the system, execution of unauthorized and untested code in production systems, disclosure of confidential data, data integrity and availability issues). It is necessary to maintain a stable and known environment in which significant testing is performed and to prevent inappropriate developer access to the production environment. Policies and procedures include carefully assigned functions along with the implementation of segregation of duties requirements and the establishment of adequate monitoring processes. Development and testing personnel also pose a threat to the confidentiality of operational information. Development and testing activities may result in unintended changes to software or information if they share the same computing environment. Separation of development, test, and operational environments is therefore desirable to reduce the risk of accidental changes or unauthorized access to production software and operational data (see 8.33 for protection of test information). In some cases, the distinction between development, test and production environments may be deliberately blurred and testing may then be conducted in a development environment or through controlled deployments to users or live servers (e.g. example, a small number of pilot users). In some cases, product testing may take place while the product is being used in operational mode within the organization. Additionally, to reduce downtime in production deployments, two identical production environments can be supported, only one of which is operational at any given time. Support processes for using production data in development and test environments (8.33) are required. Organizations may also want to consider the guidelines given in this section for training environments when conducting training for end users. 8.32 Change Management Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect #Integrity #Availablity Operational capabilities #Application_Security Security domains #Protection #System_and_network_security Security measure Changes to information processing facilities and information systems should be subject to change management procedures. Objective Preserve information security when executing changes. Recommendations The introduction of new systems and major changes to existing systems should follow agreed rules and a formal process of documentation, specification, testing, quality control and managed implementation. Management responsibilities and procedures should be in place to ensure satisfactory control of all changes. © ISO/IEC 2022 – All rights reserved 141 ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Change control procedures should be documented and implemented to ensure the confidentiality, integrity and availability of information in information processing facilities and information systems during the life cycle of development of the entire system, from the initial design stages to subsequent maintenance activities. If possible, change control procedures for ICT infrastructure and software should be integrated. Change control procedures should include: a) planning and assessment of the potential impacts of changes taking into account all dependencies; b) authorization of changes; (c) communicating changes to relevant interested parties; d) testing and acceptance testing of changes (see 8.29); e) implementation of changes, including deployment plans; f) emergency and back-up considerations, including fallback procedures; g) maintaining up-to-date records of changes, which include all of the above; h) ensuring that operating documentation (see 5.37) and user procedures are modified as necessary to remain appropriate; i) ensuring that ICT continuity plans and response and recovery procedures (see 5.30) are modified as necessary to remain appropriate. Additional Information Inadequate control of changes to information processing facilities and information systems is a common cause of system or security failures. Changes to the operational environment, particularly when moving software from the development environment to the operational environment, can impact the integrity and availability of applications. Software changes can impact the operating environment and vice versa. It is good practice, among other things, to test ICT components in an environment separate from the operational and development environments (see 8.31). This provides a way to maintain control of new software and add additional protections to operational information used for testing purposes. This should include software patches, service packs and other updates. The operating environment includes operating systems, databases, and middleware platforms. The security measure should apply to changes to applications and infrastructure. 8.33 Test information Type of security measure #Preventive Information Security Properties #Privacy Cybersecurity concepts #Protect Operational capabilities #Protection_of_information Security domains #Protection #Integrity Security measure Test information should be appropriately selected, protected and managed. 142 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Objective Ensure the relevance of the tests and the protection of the operational information used for the tests. Recommendations Test information should be selected to ensure the reliability of test results and the confidentiality of associated operational information. Sensitive information (including personal data) should not be copied to development and test environments (see 8.31). The following recommendations should be applied to protect copies of operational information when used for testing purposes, regardless of the location of the test environment, internal to the organization or in a department. in cloud: a) apply the same access control procedures to the test environments as to the operating environments; b) obtain a new authorization each time operational information is copied in a test environment; c) log the copying and use of operational information, to ensure a system of traceability; d) protect sensitive information by deleting or masking it (see 8.11) if used for testing purposes; e) properly remove (see 8.10) operational information from the test environment immediately upon completion of testing to prevent unauthorized use of test information. Test information should be stored securely (to prevent tampering that may lead to invalid results) and used only for testing purposes. Additional Information Systems and acceptance testing can require large volumes of test information that is as close to operational information as possible. 8.34 Protection of information systems during audit testing Type of security measure #Preventive Information Security Properties #Privacy #Integrity #Availablity Cybersecurity concepts #Protect Operational capabilities Security domains #System_and_network_security #Governance_ #Protection_of_information and_Ecosystem #Protection Security measure Audit testing and other assurance activities involving the evaluation of operational systems should be planned and agreed between the tester and the appropriate level of management. Objective Minimize the impact of audit and other assurance activities on operational systems and business processes. © ISO/IEC 2022 – All rights reserved 143 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Recommendations The following guidelines should be considered: a) agree audit requests for access to systems and data with the appropriate level management; b) agree and control the scope of the technical audit tests; c) limit audit testing to read-only access to software and data. If read-only access does not allow obtaining the necessary information, have the test carried out by an experienced administrator who has the necessary access rights, on behalf of the auditor; d) if access is granted, establish and verify the security requirements (eg, anti-virus and patching) of endpoints used to access the systems (eg, laptops or tablets) before permitting access. access; e) allow non-read-only access only to isolated copies of system files. Delete them when the audit is complete, or protect them appropriately if there is an obligation to keep these files according to the documentation requirements of the audit; f) identify and agree on requests for special or additional treatments, such as running audit tools; g) run audit tests that may impact the availability of the system outside of business hours. work; h) monitor and log all access for auditing and testing purposes. Additional Information Audit testing and other assurance activities may also take place on development and test systems, where such testing may impact, for example, code integrity or lead to the disclosure of sensitive information held in these environments. 144 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Annexe A (informative) Using attributes A.1 General This appendix provides a table to show the use of attributes as a means of creating different views of security controls. The five examples of attributes are (see 4.2): a) Types of security measures (#Preventive, #Detective, #Corrective) b) Information security properties (#Confidentiality, #Integrity, #Availability) c) Cybersecurity concepts (#Identify, #Protect, #Detect, #Respond, #Restore) d) Operational Capabilities (#Governance, #Asset_Management, #Information_Protection, #Security_of_human_resources, #Physical_Security, #System_and_network_security, #Security_of_applications, #Secure_configuration, #Management_of_identities_and_access, #Management_of_threats_and_vulnerabilities, #Continuity, #Security_of_supplier_relations, #Management_of_information_security_events, #Regulations_and_compliance, #Information_Security_Assurance) e) Security domains (#Governance_and_Ecosystem, #Protection, #Defence, #Resilience) Table A.1 contains a matrix of all the security measures that appear in this document along with their attribute values. Filtering or sorting the matrix can be done using a tool such as a simple spreadsheet or database, which can include more information like security measure text, recommendations, recommendations or organization-specific attributes (see A.2). Table A.1 — Matrix of security controls and attribute values Means identifier in ISO/ IEC 27002 Security measure name Type of security measure Properties of Cybersecurity Operational Information Security capabilities Concepts 5.1 Information Security Policies #Confidence #Preventiveness #Integrity #Availablity 5.2 Information Security Duties and Responsibilities #Preventive #Confidentiality #Integrity #Availablity Separation of duties #Preventive #Confidentiality #Integrity #Availablity #Protect Management Responsibilities #Preventive #Confidentiality #Integrity #Availablity #Identify #Governance 5.3 5.4 © ISO/IEC 2022 – All rights reserved #Identify #Governance #Identify #Governance Security domains #Governance_and_Ecosys #Resilience #Governance_and_Ecosys #Protection #Resilience #Governance #Governance_and_Ecosys #Identity_and_access_management #Governance_and_Ecosys 145 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means identifier in ISO/ IEC 27002 5.5 Security measure name Type of security measure Contacts with the authorities #Preventive #Corrective Contacts with 5.6 5.7 5.8 5.9 5.10 5.11 specific interest groups Threat intelligence #Preventive #Corrective #Preventive #Detective #Corrective Information Security Properties #Confidentiality #Integrity #Availablity #Confidentiality #Integrity #Availablity #Confidentiality #Integrity #Availablity Information Security in #Confidence #Preventiveness#Integrity Project Management #Availablity Inventory of information and other related assets Correct use of information investments and other related assets Return of assets #Confidence #Preventiveness#Integrity #Availablity Cybersecurity concepts #Integrity #Availablity Security domains #Identifier #Protect #Respond #Governance #Defense #Resilience #Governance #Defense #To re-establish #Protect #Respond #To re-establish #Identifier #Detect #Respond #Identifier #Protect #Identifier #Confidentiality #Preventive Operational capabilities #Protect #Defense #Resilience #Management_of_threats_and_vulnerabilities #Governance #Governance_and_Ecosystem #Protection #Asset_Management #Governance_and_Ecosystem #Protection #Asset_Management #Information_Protection #Governance_and_Ecosystem #Protection #Confidence #Preventiveness#Integrity #Availablity #Protect #Identifier #Protection #Protection_of_information #Defense #Protect #Defense #Protection_of_information #Protection #Protect #Asset_Management #Information_Protection#Protection 5.12 Classification of information #Confidence #Preventiveness#Integrity #Availablity 5.13 Marking information #Preventive 5.14 Transfer of information #Preventive 5.15 #Preventive access control #Confidentiality #Integrity #Availablity #Confidentiality #Integrity #Availablity #Asset_Management #Protection #Confidentiality 5.16 Identity management #Integrity #Availablity #Protect #Protection #Identity_and_access_management #Protect #Protection #Identity_and_access_management #Confidentiality #Preventive #Integrity #Availablity 5.17 Authentication information #Confidence #Preventiveness#Integrity #Availablity #Protect #Protection #Identity_and_access_management 5.18 Access rights #Confidence #Preventiveness#Integrity #Availablity #Protect #Protection #Identity_and_access_management #Identifier #Security_of_relationships_supplied #Governance_and_Ecosystem sisters #Protection 5.19 146 Information security in relations with suppliers #Confidentiality #Preventive #Integrity #Availablity © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means Security measure name identifier in ISO/ IEC 27002 5.20 5.21 Consideration of information security in agreements with suppliers Information security management in the Type of security measure Information Security Properties Cybersecurity concepts #Integrity #Availablity #Confidence #Preventiveness #Integrity #Identifier #Security_of_relationships_supplied #Governance_and_Ecosystem sisters #Protection #Identifier #Security_of_relationships_supplied #Governance_and_Ecosystem sisters #Protection #Availablity Oven Services 5.22 5.23 Information security in the use of online services Security domains #Confidentiality #Preventive ICT supply chain Monitoring, Review and Change Management nisers Operational capabilities #Security_of_relationships_supplied #Confidentiality #Preventive #Integrity #Availablity #Confidence #Preventiveness #Integrity sisters #Identifier #Governance_and_Ecosystem #Protection #Defense #Information_Security_Assurance #Protect #Security_of_relationships_supplied #Governance_and_Ecosystem sisters #Protection #Availablity cloud Information security 5.24 incident management planning and preparation #Governance #Confidentiality #Corrective #Integrity #Availablity #Respond #Defense #To re-establish #Management_of_information_security_events 5.25 5.26 Information security event assessment and decision making Responding to Information Security Incidents #Confidentiality #Detective #Integrity #Availablity #Detect #Defense #Respond #Management_of_information_security_events #Confidentiality #Corrective #Integrity #Availablity #Respond #Defense #To re-establish #Management_of_information_security_events Learning lessons 5.27 from information security incidents #Confidentiality #Preventive #Integrity #Availablity #Identifier #Management_of_information_security_events tion 5.28 Collection of #Confidentiality #Corrective evidence 5.29 5.30 Information security during a disruption Preparation of ICT for business continuity © ISO/IEC 2022 – All rights reserved #Preventive #Corrective #Integrity #Availablity #Defense #Protect #Detect #Defense #Respond #Management_of_information_security_events #Confidentiality #Integrity #Availablity #Protect #Respond #Fix #Availability #Respond #Continuity #Continuity #Protection #Resilience #Resilience 147 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIX Translated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means Security measure name Type of security measure Information Security Properties 5.31 Legal, statutory, regulatory and contractual requirements #Preventive #Integrity #Availablity 5.32 #Confidence Intellectual property #Preventiveness #Integrity rights #Availablity identifier in ISO/ IEC 27002 5.33 5.34 5.35 Protection of recordings #Confidentiality #Confidentiality #Preventive #Integrity #Availablity #Confidence Privacy and #Preventiveness #Integrity personal data protection #Availablity Independent Information Security Review tion Cybersecurity concepts #Preventive #Corrective #Confidentiality #Integrity #Availablity #Identifier #Identifier #Identifier #Protect #Identifier #Protect Operational capabilities Security domains #Governance_and_Eco #Regulations_ and_system compliance #Protection #Regulations_ #Governing nance_and_Eco and_system_compliance #Regulations_and_compliance #Asset_Management #Defense #Information_Protection #Protection_of_information #Protection #Regulations_and_compliance #Identifier #Protect #Information_Security_Assurance #Governance_and_Ecosystem Compliance 5.36 with information security policies, rules and standards #Confidentiality #Preventive #Integrity #Availablity #Identifier #Protect #Governance_and_Ecosystem #Regulation_and_Compliance #Information_Security_Assu #Asset_Management #Physical_Security #System_and_network_security #Application_Security Documented 5.37 operating procedures #Preventive #Corrective #Confidentiality #Integrity #Availablity #Protect #To re-establish #Governance_and_Ecosystem #Secure_configuration#Protection #Management_of_identi ties_and_a #Defense #Management_of_threats_and_vulnerabilities #Continuity #Management_of_information_security_events #Confidence 6.1 6.2 148 Preselection General conditions of employment #Preventiveness #Integrity #Availablity #Protect #Security_of_human_resources #Governance_and_Ecosystem #Confidentiality #Preventive #Integrity #Availablity #Protect #Security_of_human_resources #Governance_and_Ecosystem © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means identifier in ISO/ IEC 27002 6.3 6.4 6.5 Security measure name Information security awareness, learning and training Plinary disk Type of security measure #Confidence #Preventiveness#Integrity #Availablity processing #Preventive #Corrective Responsibilities following the end or change of #Preventive 6.6 covenants #Confidentiality #Integrity #Availablity Cybersecurity concepts Operational capabilities Security domains #Protect #Security_of_human_resources #Governance_and_Ecosyste #Protect #Respond #Security_of_human_resources #Governance_and_Ecosyste #Confidentiality employment Confidentiality or non-disclosure Information Security Properties #Preventive #Integrity #Availablity #Confidence lite #Protect #Governance_and_Ecosyste #Security_of_human_resources #Management_of_ #Protect #Governance_and_Ecosyste #Security_of_human_resources #Protection_of_info #Asset_Management #Information_Protection #Confidentiality 6.7 Remote work #Preventive #Integrity #Availablity #Protect #Physical_Security #Protection #System_and_Network_Security 6.8 7.1 Reporting of information security events Physical security perimeters #Confidentiality #Detective #Integrity #Availablity #Confidence #Preventiveness#Integrity #Availablity #Detect #Management_of_information_security_events #Protect 7.3 7.4 Physical Access #Preventiveness #Integrity #Availablity Securing offices, rooms and equipment Physical Security Monitoring 7.5 Protection against physical and environmental threats #Preventive #Detective #Confidentiality #Integrity #Availablity #Confidence #Preventiveness#Integrity #Availablity #Management_of_identities_and_access #Protect #Protect #Detect #Protect #Confidentiality 7.6 Work in secure areas #Preventive 7.7 Clean desktop and blank screen #Preventive © ISO/IEC 2022 – All rights reserved #Integrity #Availablity #Integrity #Availablity #Confidence lite #Protection #Protection #Protect #Confidentiality #Preventive #Physical_Security #Physical_Security #Confidence 7.2 #Defense #Protect #Protect #Physical_Security #Asset_Management #Protection #Physical_Security #Protection #Defense #Physical_Security #Protection #Physical_Security #Protection #Physical_Security #Protection 149 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means Security measure name identifier in ISO/ IEC 27002 7.8 Location and protection of equipment Type of security measure Information Security Properties Cybersecurity concepts #Confidence #Preventiveness #Integrity #Availablity #Physical_Security #Asset_Management #Protection #Protect #Physical_Security #Asset_Management #Protection #Physical_Security #Asset_Management #Protection #Confidence Off-Premises Asset Security 7.10 Supports stock #Preventive #Integrity #Availablity #Protect General services #Preventive #Detective #Integrity #Availablity #Protect #Detect #Preventive #Confidentiality #Availability #Protect 7.11 7.12 ral Wiring Safety 7.13 Hardware Maintenance 7.14 or recycling of hardware #Confidentiality #Confidentiality #Preventive #Integrity #Availablity 8.1 8.2 End user terminals Privileged access rights #Confidence lite #Integrity #Availablity Restriction of access to information 8.4 Code access source 8.5 Secure authentication #Preventive #Integrity #Availablity 8.6 Dimensions ment #Preventive #Detective #Integrity #Availablity Malware Protection #Preventive #Detective #Corrective #Integrity #Availablity 8.8 150 Management of technical vulnerabilities #Physical_Security #Protection #Protect #Physical_Security #Asset_Management #Protection #Asset_Management #Protect #Protection #Information_Protection #Protect #Protection #Identity_and_access_management #Protect #Protection #Identity_and_access_management #Protect #Protection #Identity_and_access_management #Security_of_applicat #Secure_Configuration #Protect #Protection #Identity_and_access_management #Confidentiality #Preventive 8.3 8.7 #Protection #Physical_Security #Protection #Asset_Management #Resilience #Confidence #Preventiveness #Integrity #Availablity #Physical_Security #Protect Safe disposal #Preventive Security domains #Protect 7.9 #Preventiveness #Integrity #Availablity Operational capabilities #Confidentiality #Preventive #Integrity #Availablity #Confidence #Preventiveness #Integrity #Availablity #Confidentiality #Confidentiality #Confidentiality #Preventive #Integrity #Availablity #Identifier #Protect #Detect #Continuity #Protect #Detect #Protection #System_and_network_security #Defense #Protection_of_information #Identifier #Protect #Governance_and_Ecosystem #Protection #Governance_and_Ecosystem #Management_of_threats_and_vulnerabilities #Protection #Defense © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means identifier in ISO/ IEC 27002 8.9 8.10 Security measure name Configuration Type of security measure Information Security Properties Cybersecurity concepts #Confidence Operational capabilities Security domains #Protect #Secure_Configuration#Protection #Protect #Protection_of_information #Protection Management #Preventiveness #Integrity #Availablity Suppression d'information #Preventive #Confidence lite Data masking #Preventive #Confidence lite #Protect #Protection #Protection_of_information Data leak prevention #Preventive #Detective #Confidence lite #Protect #Detect #Protection #Protection_of_information #Defense Backing up information #Corrective #Integrity #Availablity #To re-establish #Continuity #Regulations_and_compliance 8.11 8.12 8.13 #Protection Redundancy of 8.14 #Continuity #Protection #Asset_Management #Resilience information processing resources #Preventive #Availability #Protect mation #Confidentiality 8.15 8.16 Logging #Detective Monitoring activities #Detective #Corrective 8.17 Synchronization of clocks 8.18 privileged utility programs #Integrity #Availablity #Confidentiality #Integrity #Availablity #Detective #Integrity The use of #Detect #Detect #Respond #Defense #Management_of_information_security_events #Protect #Detect #Protection #Defense #Management_of_information_security_events #System_and_network_security #Confidence #Preventiveness #Integrity #Availablity #Protection #Defense #Management_of_information_security_events #Protect #Protection #Secure_configuration #Security_of_applications Installation of 8.19 8.20 8.21 8.22 software on operating systems Network security Network Services Security Network partitioning #Confidence #Preventiveness #Integrity #Availablity #Preventive #Detective #Confidentiality #Integrity #Availablity #Protect #Secure_configuration #Protection #Security_of_applications #Protect #Detect #Protection #System_and_network_security #Protect #Protection #System_and_network_security #Protect #Protection #System_and_network_security #Protect #Protection #System_and_network_security #Confidence #Preventiveness #Integrity #Availablity #Confidence #Preventiveness #Integrity #Availablity #Confidence 8.23 Internet Filtering #Preventiveness #Integrity #Availablity © ISO/IEC 2022 – All rights reserved 151 AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Tableau A.1 (suite) Means identifier in ISO/ IEC 27002 8.24 8.25 8.26 Security measure name Use of cryptography Secure Development Lifecycle Application Security Type of security measure #Confidence #Preventiveness#Integrity #Availablity Principles of secure system engineering and architecture Cybersecurity concepts #Protect #Preventive #Integrity #Availablity #Integrity #Availablity #Confidence #Preventiveness#Integrity #Availablity Secure Coding #Preventiveness #Integrity #Availablity #Protection #System_and_network_security #Application_Security #Protect #Protection #Defense #System_and_network_security #Application_Security #Protection #Protect #System_and_network_security #Application_Security #Confidence 8.28 Security domains #Secure_Configuration#Protection #Protect #Confidentiality #Preventive Operational capabilities #Application_Security #Confidentiality Requirements 8.27 Information Security Properties #Protection #Protect #System_and_network_security #Application_Security Security testing in 8.29 development and acceptance #Confidentiality #Preventive #Integrity #Availablity #Identifier #Protection #Information_Security_Assurance #System_and_network_security 8.30 Outsourced development #Preventive #Detective #Confidentiality #Identifier #Integrity #Availablity #Protect #Detect #System_and_network_security #Application_Security #Governance_and_Ecosystem #Protection #Security_of_relationships_supplied sisters Separation of development, test 8.31 8.32 8.33 and production environments Change management Information relating to tests Protection of 8.34 information systems undergoing audit testing #Confidence #Preventiveness#Integrity #Application_Security #Availablity #System_and_network_security #Application_Security #Confidentiality #Preventive #Preventive #Integrity #Availablity #Confidentiality #Integrity #Confidence #Preventiveness#Integrity #Availablity #Protection #Protect #Protect #Protection #System_and_network_security #Protect #Protection #Protection_of_information #Protect #System_and_network_security #Governance_and_Ecosystem #Protection_of_information #Protection Table A.2 shows an example of how to create a view by filtering on a particular attribute value, in this case #Corrective. 152 © ISO/IEC 2022 – All rights reserved AFNOR LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 Machine Translated by Google ISO/IEC 27002:2022(F) Table A.2 — #Corrective security measures view Means identifier in ISO/ IEC 27002 5.5 Security measure name Contacts with the authorities Contacts with 5.6 specific interest Type of security measure #Preven tive #Cor rective #Preven tive #Cor rective Information Security Properties mation #Confi dentialité #Integrity #Availablity #Confi dentialité #Integrity #Availablity Security Cybersecurity concepts Operational capabilities domains #Identifier #Protect #Respond #Governance #Defense #Resilience #Governance #Defense #To re-establish #Protect #Respond #To re-establish groups 5.7 Information on threat #Prevention #Détec tive #Cor rective #Confi dentialité #Integrity #Availablity #Identifier #Detect #Respond #Defense #Resilience #Management_of_threats_and_vulnerabilities Information security incident 5.24 5.26 5.28 management planning and preparation Information Security Incident Response Collection of evidence 5.29 5.30 5.35 Information security during a disruption ICT readiness for business continuity #Correc tive #Correc tive #Correc tive #Preven tive #Cor rective #Correc tive Independent #Preven Information Security Review tive #Cor rective © ISO/IEC 2022 – All rights reserved #Confi dentialité #Integrity #Availablity #Respond #To re-establish #Governance #Defense #Management_of_information_security_events #Confi dentialité #Integrity #Availablity #Confi dentialité #Integrity #Availablity #Respond #To re-establish #Detect #Respond #Defense #Management_of_information_security_events_ #Defense #Management_of_information_security_events_ #Confi dentialité #Integrity #Availablity #Availablity #Confi dentialité #Integrity #Availablity #Protect #Respond #Continuity #Reply #Continuity #Identifier #Protection #Resilience #Resilience #Information_Security_Assurance #Protect #Governance_and_ Ecosy 153 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau A.2 (suite) Means identifier in ISO/ IEC 27002 Security measure name Type of security Information security properties Cybersecurity concepts Security Operational capabilities domains measure #Asset_management Documented 5.37 operating procedures #Preven tive #Cor rective #Confi dentialité #Integrity #Availablity #Protect #To re-establish #Physical_security #System_and_network_security #Application_Security #Governance_and_ #Secure_Configuration Ecosystem #Management_of_identities_and_access #Pro tection #Management_of_threats_and_vulnerabilities #Defense #Continuity #Management_of_information_security_events 6.4 Disciplinary process 8.7 Protection against malicious programs 8.13 8.16 Backup of information Monitoring activities #Preven tive #Cor rective #Prevention #Détec tive #Cor rective #Correc tive #Détec tive #Cor rective #Confi dentialité #Integrity #Availablity #Protect #Respond #Confi dentialité #Integrity #Availablity #Integrity #Availablity #Confi dentialité #Integrity #Availablity #Protect #Detect #To re-establish #Detect #Respond #Security_of_human_resources #Governance_and_ Ecosys theme #System_and_network_security #Protection_of_information #Continuity #Pro tection #Defense #Protec tion #Defense #Management_of_information_security_events_ A.2 Organizational views Because attributes are used to create different views of security controls, organizations can skip the example attributes provided in this document and create their own attributes with different values to meet specific organizational needs. . Additionally, the values assigned to each attribute may differ from one organization to another as organizations may have different views on the use or applicability of a security measure or the values associated with an attribute ( when the values are specific to the context of the organization). The first step is to understand why an organization-specific attribute is desirable. For example, if an organization has developed its risk treatment plans [see ISO/IEC 27001:2013, 6.1.3 e)] against events, it may wish to associate a risk scenario attribute with each measure. security of this document. The benefit of such an attribute is to speed up the process of meeting the ISO/IEC 27001 risk treatment requirement, which is to compare the security measures determined through the risk treatment process. (referred to as “necessary” security measures) with those of ISO/IEC 27001:2013, Annex A (which are derived from this document) to ensure that no necessary security measures have been omitted. Once the purpose and benefits are known, the next step is to determine the attribute values. For example, the organization might identify 9 events: 1) loss or theft of a mobile terminal; 154 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) 2) loss or theft on the premises of the organization; 3) force majeure, vandalism and terrorism; 4) failure of software, hardware, power supply, Internet and communications; 5) fraud; 6) hacking; 7) disclosure; 8) violation of law; 9) social engineering. The second step can therefore be carried out by assigning identifiers to each event (for example, E1, E2, ..., E9). The third step is to copy the Security Measure IDs and Security Measure Names from this document into a spreadsheet or database and associate the attribute values to each security measure, keeping in mind Keep in mind that each security measure can have multiple attribute values. The last step is to sort the spreadsheet or query the database to extract the required information. Other examples of organization attributes (and possible values) are: a) maturity (values from the ISO/IEC 33000 series or other maturity models); (b) status of implementation (to be done, in progress, partially implemented, fully implemented); c) priority (1, 2, 3, etc.); d) areas of the organization involved (security, ICT, human resources, general management, etc.); e) events; (f) affected assets; g) develop and execute, to differentiate the security measures used in the different service life cycle stages; g) other frameworks that the organization uses or from which it may arise. © ISO/IEC 2022 – All rights reserved 155 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Annexe B (informative) Correspondence of ISO/IEC 27002:2022 (this document) with ISO/ IEC 27002:2013 The purpose of this annex is to provide backward compatibility with ISO/IEC 27002:2013 for organizations that currently use this standard and now wish to upgrade to the current edition. Table B.1 provides the correspondence of the security measures given in Clauses 5 to 8 with those of ISO/IEC 27002:2013. Table B.1 — Correspondence between the security measures of this document and the security measures of ISO/IEC 27002:2013 Identifier of the security measure in the Security measure identifier in ISO/IEC 27002:2013 Security measure name ISO/ IEC 27002:2022 5.1 05.1.1, 05.1.2 Information Security Policies 5.2 06.1.1 Information Security Duties and Responsibilities 5.3 06.1.2 Separation of duties 5.4 07.2.1 Management Responsibilities 5.5 06.1.3 Contacts with the authorities 5.6 06.1.4 Contacts with specific interest groups 5.7 New Threat intelligence 5.8 06.1.5, 14.1.1 Information Security in Project Management 5.9 08.1.1, 08.1.2 Inventory of information and other related assets 5.10 08.1.3, 08.2.3 Proper Use of Information and Other Associated Assets 5.11 08.1.4 Return of assets 5.12 08.2.1 Classification of information 5.13 08.2.2 Marking information 5.14 13.2.1, 13.2.2, 13.2.3 Transfer of information 5.15 09.1.1, 09.1.2 Access control 5.16 09.2.1 Identity Management 5.17 09.2.4, 09.3.1, 09.4.3 Authentication information 5.18 09.2.2, 09.2.5, 09.2.6 Access rights 5.19 15.1.1 Information security in relations with suppliers 5.20 15.1.2 Consideration of information security in agreements with suppliers 5.21 15.1.3 Information security management in the ICT supply chain 5.22 15.2.1, 15.2.2 5.23 New 156 Supplier services monitoring, review and change management Information security in the use of cloud services © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau B.1 (suite) Identifier of the Security measure security identifier in measure in the ISO/IEC 27002:2013 Security measure name ISO/ IEC 27002:2022 5.24 16.1.1 Information security incident management planning and preparation 5.25 16.1.4 Information security event assessment and decision making 5.26 16.1.5 Information Security Incident Response 5.27 16.1.6 Learning from information security incidents 5.28 16.1.7 collection of evidence 5.29 17.1.1, 17.1.2, 17.1.3 Information security during a disruption 5.30 New ICT readiness for business continuity 5.31 18.1.1, 18.1.5 Legal, statutory, regulatory and contractual requirements 5.32 18.1.2 Intellectual property rights 5.33 18.1.3 Protection of recordings 5.34 18.1.4 Personal data privacy and protection 5.35 18.2.1 Independent Information Security Review 5.36 18.2.2, 18.2.3 5.37 12.1.1 Documented operating procedures 6.1 07.1.1 Preselection 6.2 07.1.2 General conditions of employment 6.3 07.2.2 Information security awareness, learning and training 6.4 07.2.3 Disciplinary process 6.5 07.3.1 Responsibilities following the end or change of employment Compliance with information security policies, rules and standards 6.6 13.2.4 Confidentiality or Non-Disclosure Covenants 6.7 06.2.2 Remote work 6.8 16.1.2, 16.1.3 Reporting of information security events 7.1 11.1.1 Physical security perimeters 7.2 11.1.2, 11.1.6 Physical access 7.3 11.1.3 Securing offices, rooms and equipment 7.4 New Physical Security Monitoring 7.5 11.1.4 Protection against physical and environmental threats 7.6 11.1.5 Work in secure areas 7.7 11.2.9 Clean desktop and blank screen 7.8 11.2.1 Location and protection of equipment 7.9 11.2.6 Off-Premises Asset Security 7.10 08.3.1, 08.3.2, 08.3.3, 11.2.5 Storage media 7.11 11.2.2 General Services 7.12 11.2.3 Wiring Safety 7.13 11.2.4 Hardware Maintenance 7.14 11.2.7 Safe disposal or recycling of hardware © ISO/IEC 2022 – All rights reserved 157 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau B.1 (suite) Identifier of the security measure in the Security measure identifier in ISO/IEC 27002:2013 Security measure name ISO/ IEC 27002:2022 8.1 06.2.1, 11.2.8 End user terminals 8.2 09.2.3 Privileged access rights 8.3 09.4.1 Restriction of access to information 8.4 09.4.5 Access to source code 8.5 09.4.2 Secure authentication 8.6 12.1.3 Sizing 8.7 12.2.1 Malware Protection 8.8 12.6.1, 18.2.3 Management of technical vulnerabilities 8.9 New Configuration Management 8.10 New Suppression d'information 8.11 New Data masking 8.12 New Data leak prevention 8.13 12.3.1 Backing up information 8.14 17.2.1 Redundancy of information processing resources 8.15 12.4.1, 12.4.2, 12.4.3 Logging 8.16 New Monitoring activities 8.17 12.4.4 Synchronization of clocks 8.18 09.4.4 Use of privileged utility programs 8.19 12.5.1, 12.6.2 Installation of software on operating systems 8.20 13.1.1 Network security 8.21 13.1.2 Network Services Security 8.22 13.1.3 Network partitioning 8.23 New Internet filtering 8.24 10.1.1, 10.1.2 Use of cryptography 8.25 14.2.1 Secure Development Lifecycle 8.26 14.1.2, 14.1.3 Application Security Requirements 8.27 14.2.5 Principles of secure system engineering and architecture 8.28 New Secure coding 8.29 14.2.8, 14.2.9 Security testing in development and acceptance 8.30 14.2.7 Outsourced development 8.31 12.1.4, 14.2.6 8.32 12.1.2, 14.2.2, 14.2.3, 14.2.4 Change Management 8.33 14.3.1 Test Information 8.34 12.7.1 Protection of information systems during audit testing Separation of development, test and production environments Table B.2 provides the correspondence of the security measures given in ISO/IEC 27002:2013 with those of this document. 158 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Table B.2 — Correspondence between the security measures of ISO/IEC 27002:2013 and the security measures of this document Identifier of the security measure Identifier of the in the ISO/ IEC 27002:2013 security Security measure name according to ISO/IEC 27002:2013 measure in the ISO/ IEC 27002:2022 5 Information Security Policies 5.1 Management guidance on information security 5.1.1 5.1 Information Security Policies 5.1.2 5.1 Review of information security policies 6 Information security organization 6.1 Internal organization 6.1.1 5.2 Information Security Duties and Responsibilities 6.1.2 5.3 Separation of duties 6.1.3 5.5 Contacts with the authorities 6.1.4 5.6 Contacts with specific interest groups 6.1.5 5.8 Information Security in Project Management 6.2 Mobile devices and remote working 6.2.1 8.1 Mobile Device Policy 6.2.2 6.7 Telework 7 Human Resources Security 7.1 Before hiring 7.1.1 6.1 Preselection 7.1.2 6.2 General conditions of employment During the term of the contract 7.2 7.2.1 7.2.2 7.2.3 5.4 6.3 6.4 7.3 7.3.1 Management Responsibilities Information security awareness, learning and training Disciplinary process Termination, term or modification of the employment contract 6.5 Completion or modification of responsibilities associated with the employment contract Asset management 8 8.1 Asset Liabilities Asset inventory 8.1.1 5.9 8.1.2 5.9 Ownership of assets 8.1.3 5.10 Correct use of assets 8.1.4 5.11 Return of assets 8.2.1 5.12 Classification of information 8.2.2 5.13 Marking information 8.2.3 5.10 Asset handling Classification of information 8.2 8.3 Media handling 8.3.1 7.10 Removable media management 8.3.2 7.10 Disposal of media 8.3.3 7.10 Physical transfer of media © ISO/IEC 2022 – All rights reserved 159 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau B.2 (suite) Identifier of the security measure Identifier of the in the ISO/ IEC 27002:2013 security Security measure name according to ISO/IEC 27002:2013 measure in the ISO/ IEC 27002:2022 Access control 9 9.1 Access control business requirements 9.1.1 5.15 Access control policy 9.1.2 5.15 Access to networks and network services User Access Management 9.2 9.2.1 5.16 Registration and deregistration of users 9.2.2 5.18 Mastery of user access management 9.2.3 8.2 Management of privileged access rights 9.2.4 5.17 Managing User Authentication Secret Information sators 9.2.5 5.18 Review of user access rights 9.2.6 5.18 Removal or adaptation of access rights 5.17 Using Secret Authentication Information 9.3 9.3.1 User responsibilities 9.4 System and application access control 9.4.1 8.3 Restriction of access to information 9.4.2 8.5 Secure login procedures 9.4.3 5.17 Password management system 9.4.4 8.18 Use of privileged utility programs 9.4.5 8.4 Program source code access control 10 Cryptography 10.1 Cryptographic means 10.1.1 8.24 Policy for the use of cryptographic means 10.1.2 8.24 Key management 11 Physical and environmental security 11.1 Secure areas 11.1.1 7.1 Physical security perimeter 11.1.2 7.2 Physical access controls 11.1.3 7.3 Securing offices, rooms and equipment 11.1.4 7.5 Protection against external and environmental threats 11.1.5 7.6 Work in secure areas 11.1.6 7.2 Delivery and loading areas 11.2 Materials 11.2.1 7.8 Location and protection of equipment 11.2.2 7.11 General Services 11.2.3 7.12 Wiring Safety 11.2.4 7.13 Hardware Maintenance 11.2.5 7.10 Exit of assets 11.2.6 7.9 Security of equipment and assets outside the premises 11.2.7 7.14 Safe disposal or recycling of hardware 160 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau B.2 (suite) Identifier of the security measure in the ISO/ IEC 27002:2013 Identifier of the security measure Security measure name according to ISO/IEC 27002:2013 in the ISO/ IEC 27002:2022 11.2.8 8.1 User equipment left unattended 11.2.9 7.7 Clean Desktop and Blank Screen Policy 12 Operational Security 12.1 Operating Procedures and Responsibilities 12.1.1 5.37 Documented operating procedures 12.1.2 8.32 Change Management 12.1.3 8.6 Sizing 12.1.4 8.31 12.2 12.2.1 Malware Protection 8.7 12.3 12.3.1 Separation of development, test and operating environments Means against malicious programs Backup 8.13 12.4 Backing up information Logging and monitoring 12.4.1 8.15 Event Logging 12.4.2 8.15 Protection of logged information 12.4.3 8.15 Administrator and operator logs 12.4.4 8.17 Synchronization of clocks 12.5 12.5.1 Mastery of operating software 8.19 12.6 Installation of software on operating systems Management of technical vulnerabilities 12.6.1 8.8 Management of technical vulnerabilities 12.6.2 8.19 Software Installation Restrictions 12.7 12.7.1 Information System Audit Considerations 8.34 Means relating to the audit of information systems Communications Security 13 13.1 Network Security Management Facilities 13.1.1 8.20 Means related to networks 13.1.2 8.21 Network Services Security 13.1.3 8.22 Network partitioning Transfer of information 13.2 13.2.1 5.14 Information transfer policies and procedures 13.2.2 5.14 Information Transfer Agreements 13.2.3 5.14 Email 13.2.4 6.6 Confidentiality or Non-Disclosure Covenants 14 Acquisition, development and maintenance of information systems 14.1 Security requirements applicable to information systems 14.1.1 5.8 Analysis and specification of information security requirements 14.1.2 8.26 Securing Application Services on Public Networks 14.1.3 8.26 Application Services Transaction Protection © ISO/IEC 2022 – All rights reserved 161 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau B.2 (suite) Identifier of the security measure in the ISO/ IEC 27002:2013 Identifier of the security measure Security measure name according to ISO/IEC 27002:2013 in the ISO/ IEC 27002:2022 14.2 Security of development and technical support processes 14.2.1 8.25 Secure Development Policy 14.2.2 8.32 System Change Control Procedures 8.32 Technical review of applications after changes to the operating platform 14.2.4 8.32 Restrictions on Changes to Software Packages 14.2.5 8.27 Principles of Systems Security Engineering 14.2.6 8.31 Secure development environment 14.2.7 8.30 Outsourced development 14.2.8 8.29 System security testing phase 14.2.9 8.29 System compliance test 8.33 Protection of test data 14.2.3 Test data 14.3 14.3.1 Relations with suppliers 15 Information security in relations with suppliers 15.1 sisters 15.1.1 5.19 Information security policy in relations with suppliers 15.1.2 5.20 Security in agreements with suppliers 15.1.3 5.21 IT supply chain 5.22 Supplier Services Monitoring and Review 5.22 Management of changes in supplier services 15.2 15.2.1 15.2.2 Service delivery management 16 Information Security Incident Management 16.1 Information Security Incident Management and Improvements 16.1.1 5.24 Responsibilities and Procedures 16.1.2 6.8 Reporting of information security events 16.1.3 6.8 Declaration of vulnerabilities related to information security 16.1.4 16.1.5 16.1.6 16.1.7 5.25 Information security event assessment and decision making 5.26 Information Security Incident Response 5.27 Learning from information security incidents 5.28 collection of evidence 17 Aspects of Information Security in Business Continuity Management Information Security Continuity 17.1 17.1.1 5.29 Information security continuity organization 17.1.2 5.29 Implementing Information Security Continuity 17.1.3 162 5.29 Check, review and assess the continuity of information security © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Tableau B.2 (suite) Identifier of the security measure Identifier of the in the ISO/ IEC 27002:2013 Security measure name according to ISO/IEC 27002:2013 security measure in the ISO/ IEC 27002:2022 Redundancies 17.2 17.2.1 8.14 Availability of means of information processing 18 Compliance 18.1 Compliance with legal and regulatory obligations 18.1.1 5.31 Identification of applicable legislation and contractual requirements 18.1.2 5.32 Intellectual property rights 18.1.3 5.33 Protection of recordings 5.34 Protection of privacy and protection of personal data 5.31 Regulations relating to cryptographic means 18.1.4 18.1.5 Information Security Review 18.2 18.2.1 5.35 Independent Information Security Review 18.2.2 5.36 Compliance with security policies and standards 18.2.3 5.36, 8.8 Technical Compliance Review © ISO/IEC 2022 – All rights reserved 163 AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) Bibliography [1] ISO 9000, Quality management systems — Fundamentals and vocabulary [2] ISO 55001, Asset management — Management systems — Requirements [3] ISO/IEC 11770 (all parts), Information security — Key management [4] ISO/IEC 15408 (all parts), Information technology — Security techniques — Evaluation criteria for IT security [5] ISO 15489 (all parts), Information and documentation — Records management [6] ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary [7] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture [8] ISO/IEC 19086 (all parts), Cloud computing — Service level agreement framework [9] ISO/IEC 19770 (all parts), Information technology — Software asset management [10] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability [11] ISO/IEC 20889, Terminology and classification of data de-identification techniques for the protection of privacy [12] ISO 21500, Project, program and portfolio management — Background and concepts [13] ISO 21502, Project, program and portfolio management — Guidance on the project management [14] ISO 22301, Security and resilience — Business continuity management systems — Requirements [15] ISO 22313, Security and resilience — Business continuity management systems — Guidance on using ISO 22301 [16] ISO/TS 22317, Security and resilience — Business continuity management systems — Business Impact Statement Guidelines [17] ISO 22396, Security and resilience — Community resilience — Guidelines for information exchange between organizations [18] ISO/IEC TS 23167, Information technology — Cloud computing — Common technologies and techniques [19] ISO/IEC 23751, Information technology — Cloud computing and distributed platforms — Data sharing agreement (DSA) framework [20] ISO/IEC 24760 (all parts), IT security and privacy — Framework for managing identity [21] ISO/IEC 27001:2013, Information technology — Security techniques — Security systems information security management — Requirements [22] ISO/IEC 27005, Information technology — Security techniques — Information security risk management 164 © ISO/IEC 2022 – All rights reserved AFNOR ISO/ IEC 27002:20222022-02 Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) [23] ISO/IEC 27007, Information security, cybersecurity and privacy protection — Guidelines for auditing information security management systems [24] ISO/IEC TS 27008, Information technology — Security techniques — Guidelines for auditors of information security controls [25] ISO/IEC 27011, Information technology — Security techniques — Code of practice for information security controls based on ISO/ IEC 27002 for telecommunications organizations [26] ISO/IEC TR 27016, Information technology — Security techniques — Security management information security — Organizational economics [27] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/ IEC 27002 for cloud services [28] ISO/IEC 27018, Information technology — Security techniques — Code of practice for the protection of personally identifiable information (PII) in public cloud computing acting as a processor of PII [29] ISO/IEC 27019, Information technology — Security techniques — Security measures for information for the energy operators industry [30] ISO/IEC 27031, Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity [31] ISO/IEC 27033 (all parts), Information technology — Security techniques — Network Security [32] ISO/IEC 27034 (all parts), Information technology — Application security [33] ISO/IEC 27035 (all parts), Information technology — Security techniques — Information Security Incident Management [34] ISO/IEC 27036 (all parts), Information technology — Security techniques — Information security for the relationship with the supplier [35] ISO/IEC 27037, Information technology — Security techniques — Guidelines for the identification, collection, acquisition and preservation of digital evidence [36] ISO/IEC 27040, Information technology — Security techniques — Storage security [37] ISO/IEC 27050 (all parts), Information technology — Electronic discovery [38] ISO/IEC/TS 27110, Information security, cybersecurity and privacy protection — Guidelines for developing a cybersecurity framework [39] ISO/IEC 27701, Security techniques — Extension of ISO/ IEC 27001 and ISO/ IEC 27002 to privacy management — Requirements and guidelines [40] ISO 27799, Health informatics — Health information security management using ISO/ IEC 27002 [41] ISO/IEC 29100, Information technology — Security techniques — Privacy framework [42] ISO/IEC 29115, Information technology — Security techniques — Entity authentication assurance framework [43] ISO/IEC 29134, Information technology — Security techniques — Guidelines for privacy impact study [44] ISO/IEC 29146, Information technology — Security techniques — Framework for managing access © ISO/IEC 2022 – All rights reserved 165 AFNOR ISO/ IEC 27002:20222022-02 Machine by Google LACROIXTranslated John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) [45] ISO/IEC 29147, Information technology — Security techniques — Disclosure of vulnerability [46] ISO 30000, Ships and marine technology — Ship recycling management systems — Specifications for management systems for safe and non-polluting ship recycling yards [47] ISO/IEC 30111, Information technology — Security techniques — Vulnerability handling process [48] ISO 31000:2018, Risk management — Guidelines [49] IEC 31010, Risk management — Risk assessment techniques [50] ISO/IEC 22123 (all parts), Information technology — Cloud computing [51] ISO/IEC 27555, Information security, cybersecurity and privacy protection — Guidelines for the removal of personally identifiable information [52] Information Security Forum (ISF). ISF Standard of Good Practice for Information Security 2020, August 2018. Available at: 1) [53] ITIL® Foundation, ITIL 4 edition, AXELOS, February 2019, ISBN: 9780113316076 [54] National Institute of Standards and Technology (NIST). SP 800-37, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, Révision 2. Décembre 2018 [consulté le 2020-07-31]. Disponible à l'adresse: https:// doi.org/10.6028/NIST.SP.800-37r2 [55] Open Web Application Security Project (OWASP). OWASP Top Ten — 2017, The Ten Most Critical Web Application Security Risks, 2017 [consulté le 2020-07-31]. Disponible à l'adresse https:// owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/ [56] Open Web Application Security Project (OWASP). OWASP Developer Guide, [online] [accessed 2020-10-22]. Available at https://github.com/OWASP/DevGuide [57] National Institute of Standards and Technology (NIST). SP 800-63B, Digital Identity Guidelines; Authentication and Lifecycle Management. Février 2020 [consulté le 2020-07-31]. Available at: https://doi.org/10.6028/NIST.SP.800-63b [58] OASIS, Structured Threat Information Expression. Available at https://www.oasis -open.org/standards#stix2.0 [59] OASIS, Trusted Automated Exchange of Indicator Information. Available at https:// www.oasis-open.org/standards#taxii2.0 1) https://www.securityforum.org/tool/standard-of-good-practice-for-information-security-2020/ 166 © ISO/IEC 2022 – All rights reserved AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/ IEC 27002:20222022-02 AFNOR Machine Translated by Google LACROIX John (john.lacroix@jcld-consulting.com) For: JCLD CONSULTING ISO/IEC 27002:2022(F) ICSÿ35.030 Price based on 152 pages © ISO/IEC 2022 – All rights reserved ISO/ IEC 27002:20222022-02