Outline for ISO/IEC 27002:2022 The standard starts with 4 introductory chapters: Scope Normative Reference Terms, definitions, and abbreviated terms Structure of this document These are followed by 4 main chapters: Organizational controls People controls Physical controls Technological controls
Outline for ISO/IEC 27002:2013 The standard starts with 5 introductory chapters: Introduction Scope Normative references Terms and definitions Structure of this standard These are followed by 14 main chapters: Information Security Policies Organization of Information Security Human Resource Security Asset Management Access Control Cryptography Physical and environmental security Operation Security- procedures and responsibilities, Protection from malware, Backup, Logging and monitoring, Control of operational software, Technical vulnerability management and Information systems audit coordination Communication security - Network security management and Information transfer System acquisition, development and maintenance - Security requirements of information systems, Security in development and support processes and Test data Supplier relationships - Information security in supplier relationships and Supplier service delivery management Information security incident management - Management of information security incidents and improvements Information security aspects of business continuity management - Information security continuity and Redundancies Compliance - Compliance with legal and contractual requirements and Information security reviews
Controls Within each chapter, information
security controls and their objectives are specified and outlined. The information security controls are generally regarded as best practice means of achieving those objectives. For each of the controls, implementation guidance is provided. Specific controls are not mandated since: • Each organization is expected to undertake a structured information security risk assessment process to determine its specific requirements before selecting controls that are appropriate to its particular circumstances. The introduction section outlines a risk assessment process although there are more specific standards covering this area such as
ISO/IEC 27005. The use of information security risk analysis to drive the selection and implementation of information security controls is an important feature of the
ISO/IEC 27000-series standards: it means that the generic good practice advice in this standard gets tailored to the specific context of each user organization, rather than being applied by rote. Not all of the 39 control objectives are necessarily relevant to every organization for instance, hence entire categories of control may not be deemed necessary. The standards are also open ended in the sense that the information security controls are 'suggested', leaving the door open for users to adopt alternative controls if they wish, just so long as the key control objectives relating to the mitigation of information security risks, are satisfied. This helps keep the standard relevant despite the evolving nature of information security threats, vulnerabilities and impacts, and trends in the use of certain information security controls. • It is practically impossible to list all conceivable controls in a general purpose standard. Industry-specific implementation guidelines for
ISO/IEC 27001:2013 and ISO/IEC 27002 offer advice tailored to organizations in the telecomms industry (see
ISO/IEC 27011) and healthcare (see
ISO 27799). Most organizations implement a wide range of information security-related controls, many of which are recommended in general terms by ISO/IEC 27002. Structuring the information security controls infrastructure in accordance with ISO/IEC 27002 may be advantageous since it: • Is associated with a well-respected international standard • Helps avoid coverage gaps and overlaps • Is likely to be recognized by those who are familiar with the ISO/IEC standard ==Implementation example of ISO/IEC 27002==