Statement Of Applicability.Generated

Control IDControl nameApplicable (Y/N)Justification (if N or partial)Implementation status (Planned/Partial/Implemented)OwnerPolicy/Procedure referenceEvidence / record linkNotes
A.5.1Policies for Information SecurityYPlannedISO 27001:2022/A.5-organizational-controls/A.5.1-policies-for-information-security.md
A.5.2Information Security Roles and ResponsibilitiesYPlannedISO 27001:2022/A.5-organizational-controls/A.5.2-information-security-roles-and-responsibilities.md
A.5.3Segregation of DutiesYPlannedISO 27001:2022/A.5-organizational-controls/A.5.3-segregation-of-duties.md
A.5.4Management ResponsibilitiesYPlannedISO 27001:2022/A.5-organizational-controls/A.5.4-management-responsibilities.md
A.5.5Contact with AuthoritiesYPlannedISO 27001:2022/A.5-organizational-controls/A.5.5-contact-with-authorities.md
A.5.6Contact with Special Interest GroupsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.6-contact-with-special-interest-groups.md
A.5.7Threat IntelligenceYPlannedISO 27001:2022/A.5-organizational-controls/A.5.7-threat-intelligence.md
A.5.8Information Security in Project ManagementYPlannedISO 27001:2022/A.5-organizational-controls/A.5.8-information-security-in-project-management.md
A.5.9Inventory of Information and Other Associated AssetsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.9-inventory-of-information-and-other-associated-assets.md
A.5.10Acceptable Use of Information and Other Associated AssetsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.10-acceptable-use-of-information-and-other-associated-assets.md
A.5.11Return of AssetsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.11-return-of-assets.md
A.5.12Classification of InformationYPlannedISO 27001:2022/A.5-organizational-controls/A.5.12-classification-of-information.md
A.5.13Labelling of InformationYPlannedISO 27001:2022/A.5-organizational-controls/A.5.13-labelling-of-information.md
A.5.14Information TransferYPlannedISO 27001:2022/A.5-organizational-controls/A.5.14-information-transfer.md
A.5.15Access ControlYPlannedISO 27001:2022/A.5-organizational-controls/A.5.15-access-control.md
A.5.16Identity ManagementYPlannedISO 27001:2022/A.5-organizational-controls/A.5.16-identity-management.md
A.5.17Authentication InformationYPlannedISO 27001:2022/A.5-organizational-controls/A.5.17-authentication-information.md
A.5.18Access RightsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.18-access-rights.md
A.5.19Information Security in Supplier RelationshipsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.19-information-security-in-supplier-relationships.md
A.5.20Addressing Information Security within Supplier AgreementsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.20-addressing-information-security-within-supplier-agreements.md
A.5.21Managing Information Security in the ICT Supply ChainYPlannedISO 27001:2022/A.5-organizational-controls/A.5.21-managing-information-security-in-the-ict-supply-chain.md
A.5.22Monitoring, Review, and Change Management of Supplier ServicesYPlannedISO 27001:2022/A.5-organizational-controls/A.5.22-monitoring-review-and-change-management-of-supplier-services.md
A.5.23Information Security for Use of Cloud ServicesYPlannedISO 27001:2022/A.5-organizational-controls/A.5.23-information-security-for-use-of-cloud-services.md
A.5.24Information Security Incident Management Planning and PreparationYPlannedISO 27001:2022/A.5-organizational-controls/A.5.24-information-security-incident-management-planning-and-preparation.md
A.5.25Assessment and Decision on Information Security EventsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.25-assessment-and-decision-on-information-security-events.md
A.5.26Response to Information Security IncidentsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.26-response-to-information-security-incidents.md
A.5.27Learning from Information Security IncidentsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.27-learning-from-information-security-incidents.md
A.5.28Collection of EvidenceYPlannedISO 27001:2022/A.5-organizational-controls/A.5.28-collection-of-evidence.md
A.5.29Information Security During DisruptionYPlannedISO 27001:2022/A.5-organizational-controls/A.5.29-information-security-during-disruption.md
A.5.30ICT Readiness for Business ContinuityYPlannedISO 27001:2022/A.5-organizational-controls/A.5.30-ict-readiness-for-business-continuity.md
A.5.31Legal, Statutory, Regulatory, and Contractual RequirementsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.31-legal-statutory-regulatory-and-contractual-requirements.md
A.5.32Intellectual Property RightsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.32-intellectual-property-rights.md
A.5.33Protection of RecordsYPlannedISO 27001:2022/A.5-organizational-controls/A.5.33-protection-of-records.md
A.5.34Privacy and Protection of Personal Identifiable Information (PII)YPlannedISO 27001:2022/A.5-organizational-controls/A.5.34-privacy-and-protection-of-personal-identifiable-information-pii.md
A.5.35Independent Review of Information SecurityYPlannedISO 27001:2022/A.5-organizational-controls/A.5.35-independent-review-of-information-security.md
A.5.36Compliance with Policies, Rules, and Standards for Information SecurityYPlannedISO 27001:2022/A.5-organizational-controls/A.5.36-compliance-with-policies-rules-and-standards-for-information-security.md
A.5.37Documented Operating ProceduresYPlannedISO 27001:2022/A.5-organizational-controls/A.5.37-documented-operating-procedures.md
A.6.1ScreeningYPlannedISO 27001:2022/A.6-people-controls/A.6.1-screening.md
A.6.2Terms and Conditions of EmploymentYPlannedISO 27001:2022/A.6-people-controls/A.6.2-terms-and-conditions-of-employment.md
A.6.3Information Security Awareness, Education, and TrainingYPlannedISO 27001:2022/A.6-people-controls/A.6.3-information-security-awareness-education-and-training.md
A.6.4Disciplinary ProcessYPlannedISO 27001:2022/A.6-people-controls/A.6.4-disciplinary-process.md
A.6.5Responsibilities After Termination or Change of EmploymentYPlannedISO 27001:2022/A.6-people-controls/A.6.5-responsibilities-after-termination-or-change-of-employment.md
A.6.6Confidentiality or Non-disclosure AgreementsYPlannedISO 27001:2022/A.6-people-controls/A.6.6-confidentiality-or-non-disclosure-agreements.md
A.6.7Remote WorkingYPlannedISO 27001:2022/A.6-people-controls/A.6.7-remote-working.md
A.6.8Information Security Event ReportingYPlannedISO 27001:2022/A.6-people-controls/A.6.8-information-security-event-reporting.md
A.7.1Physical Security PerimetersYPlannedISO 27001:2022/A.7-physical-controls/A.7.1-physical-security-perimeters.md
A.7.2Physical EntryYPlannedISO 27001:2022/A.7-physical-controls/A.7.2-physical-entry.md
A.7.3Securing Offices, Rooms, and FacilitiesYPlannedISO 27001:2022/A.7-physical-controls/A.7.3-securing-offices-rooms-and-facilities.md
A.7.4Physical Security MonitoringYPlannedISO 27001:2022/A.7-physical-controls/A.7.4-physical-security-monitoring.md
A.7.5Protecting Against Physical and Environmental ThreatsYPlannedISO 27001:2022/A.7-physical-controls/A.7.5-protecting-against-physical-and-environmental-threats.md
A.7.6Working in Secure AreasYPlannedISO 27001:2022/A.7-physical-controls/A.7.6-working-in-secure-areas.md
A.7.7Clear Desk and Clear ScreenYPlannedISO 27001:2022/A.7-physical-controls/A.7.7-clear-desk-and-clear-screen.md
A.7.8Equipment Siting and ProtectionYPlannedISO 27001:2022/A.7-physical-controls/A.7.8-equipment-siting-and-protection.md
A.7.9Security of Assets Off-premisesYPlannedISO 27001:2022/A.7-physical-controls/A.7.9-security-of-assets-off-premises.md
A.7.10Storage MediaYPlannedISO 27001:2022/A.7-physical-controls/A.7.10-storage-media.md
A.7.11Supporting UtilitiesYPlannedISO 27001:2022/A.7-physical-controls/A.7.11-supporting-utilities.md
A.7.12Cabling SecurityYPlannedISO 27001:2022/A.7-physical-controls/A.7.12-cabling-security.md
A.7.13Equipment MaintenanceYPlannedISO 27001:2022/A.7-physical-controls/A.7.13-equipment-maintenance.md
A.7.14Secure Disposal or Re-use of EquipmentYPlannedISO 27001:2022/A.7-physical-controls/A.7.14-secure-disposal-or-re-use-of-equipment.md
A.8.1User End Point DevicesYPlannedISO 27001:2022/A.8-technological-controls/A.8.1-user-end-point-devices.md
A.8.2Privileged Access RightsYPlannedISO 27001:2022/A.8-technological-controls/A.8.2-privileged-access-rights.md
A.8.3Information Access RestrictionYPlannedISO 27001:2022/A.8-technological-controls/A.8.3-information-access-restriction.md
A.8.4Access to Source CodeYPlannedISO 27001:2022/A.8-technological-controls/A.8.4-access-to-source-code.md
A.8.5Secure AuthenticationYPlannedISO 27001:2022/A.8-technological-controls/A.8.5-secure-authentication.md
A.8.6Capacity ManagementYPlannedISO 27001:2022/A.8-technological-controls/A.8.6-capacity-management.md
A.8.7Protection Against MalwareYPlannedISO 27001:2022/A.8-technological-controls/A.8.7-protection-against-malware.md
A.8.8Management of Technical VulnerabilitiesYPlannedISO 27001:2022/A.8-technological-controls/A.8.8-management-of-technical-vulnerabilities.md
A.8.9Configuration ManagementYPlannedISO 27001:2022/A.8-technological-controls/A.8.9-configuration-management.md
A.8.10Information DeletionYPlannedISO 27001:2022/A.8-technological-controls/A.8.10-information-deletion.md
A.8.11Data MaskingYPlannedISO 27001:2022/A.8-technological-controls/A.8.11-data-masking.md
A.8.12Data Leakage PreventionYPlannedISO 27001:2022/A.8-technological-controls/A.8.12-data-leakage-prevention.md
A.8.13Information BackupYPlannedISO 27001:2022/A.8-technological-controls/A.8.13-information-backup.md
A.8.14Redundancy of Information Processing FacilitiesYPlannedISO 27001:2022/A.8-technological-controls/A.8.14-redundancy-of-information-processing-facilities.md
A.8.15LoggingYPlannedISO 27001:2022/A.8-technological-controls/A.8.15-logging.md
A.8.16Monitoring ActivitiesYPlannedISO 27001:2022/A.8-technological-controls/A.8.16-monitoring-activities.md
A.8.17Clock SynchronizationYPlannedISO 27001:2022/A.8-technological-controls/A.8.17-clock-synchronization.md
A.8.18Use of Privileged Utility ProgramsYPlannedISO 27001:2022/A.8-technological-controls/A.8.18-use-of-privileged-utility-programs.md
A.8.19Installation of Software on Operational SystemsYPlannedISO 27001:2022/A.8-technological-controls/A.8.19-installation-of-software-on-operational-systems.md
A.8.20Network SecurityYPlannedISO 27001:2022/A.8-technological-controls/A.8.20-network-security.md
A.8.21Security of Network ServicesYPlannedISO 27001:2022/A.8-technological-controls/A.8.21-security-of-network-services.md
A.8.22Segregation of NetworksYPlannedISO 27001:2022/A.8-technological-controls/A.8.22-segregation-of-networks.md
A.8.23Web FilteringYPlannedISO 27001:2022/A.8-technological-controls/A.8.23-web-filtering.md
A.8.24Use of CryptographyYPlannedISO 27001:2022/A.8-technological-controls/A.8.24-use-of-cryptography.md
A.8.25Secure Development Life CycleYPlannedISO 27001:2022/A.8-technological-controls/A.8.25-secure-development-life-cycle.md
A.8.26Application Security RequirementsYPlannedISO 27001:2022/A.8-technological-controls/A.8.26-application-security-requirements.md
A.8.27Secure System Architecture and Engineering PrinciplesYPlannedISO 27001:2022/A.8-technological-controls/A.8.27-secure-system-architecture-and-engineering-principles.md
A.8.28Secure CodingYPlannedISO 27001:2022/A.8-technological-controls/A.8.28-secure-coding.md
A.8.29Security Testing in Development and AcceptanceYPlannedISO 27001:2022/A.8-technological-controls/A.8.29-security-testing-in-development-and-acceptance.md
A.8.30Outsourced DevelopmentYPlannedISO 27001:2022/A.8-technological-controls/A.8.30-outsourced-development.md
A.8.31Separation of Development, Test, and Production EnvironmentsYPlannedISO 27001:2022/A.8-technological-controls/A.8.31-separation-of-development-test-and-production-environments.md
A.8.32Change ManagementYPlannedISO 27001:2022/A.8-technological-controls/A.8.32-change-management.md
A.8.33Test InformationYPlannedISO 27001:2022/A.8-technological-controls/A.8.33-test-information.md
A.8.34Protection of Information Systems During Audit TestingYPlannedISO 27001:2022/A.8-technological-controls/A.8.34-protection-of-information-systems-during-audit-testing.md