Improve your information security program or prepare for compliance with the ISO 27001 standard by learning about the 93 Annex A security control requirements.
Overview
Syllabus
Introduction
- Introduction to the Annex A controls
- Policies for information security (Control 5.1)
- Roles, responsibilities, and duties (Controls 5.2–5.4)
- Contacts and project management (Controls 5.5, 5.6, and 5.8)
- Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1)
- Asset security procedures (Controls 5.11, 5.14, and 5.37)
- Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34)
- Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33)
- Access management (Controls 5.15–5.18)
- System and application access control (Controls 8.2–8.5)
- Supplier relationships security (Controls 5.19–5.21)
- Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23)
- Information security incident management (Controls 5.24–5.28, and 6.8)
- Logging and monitoring (Controls 8.15–8.17)
- Continuity (Controls 5.29, 5.30, and 8.13)
- Backup and availability (Controls 8.13 and 8.14)
- Legal and compliance (Controls 5.31–5.33)
- Information security assurance (Control 5.35 and 5.36)
- Prior to employment (Controls 6.1 and 6.2)
- During employment (Controls 6.3–6.6)
- Ensuring authorized access (Controls 7.1–7.3)
- Protecting secure areas (Controls 7.4–7.6)
- Equipment security (Controls 7.7–7.10)
- Utilities, cabling, and equipment management (Controls 7.11–7.14)
- Network security management (Controls 8.20–8.23)
- Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34)
- Threat and vulnerability management (Controls 5.7 and 8.8)
- Secure configuration (Controls 8.9, 8.19, and 8.24)
- Secure development (Controls 8.25–8.28)
- Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32)
- Achieving ISO 27001 compliance
Taught by
Marc Menninger