bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,181 @@
|
|
|
1
|
+
# ISM — Control Applicability Framework
|
|
2
|
+
|
|
3
|
+
Source: Australian Information Security Manual, March 2026 edition
|
|
4
|
+
Published by: Australian Signals Directorate (ASD)
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Classification Levels & Applicability Markings
|
|
9
|
+
|
|
10
|
+
Each ISM control carries applicability markings indicating which system classification levels require that control.
|
|
11
|
+
|
|
12
|
+
| Marking | Classification Level | Description |
|
|
13
|
+
|---------|---------------------|-------------|
|
|
14
|
+
| **NC** | Non-Classified | General government information; no formal protective marking required |
|
|
15
|
+
| **OS** | OFFICIAL: Sensitive | Sensitive but unclassified; default baseline for most federal agency systems |
|
|
16
|
+
| **P** | PROTECTED | Classified information; compromise could damage national/organisational interests |
|
|
17
|
+
| **S** | SECRET | Highly sensitive; serious damage to national security if compromised |
|
|
18
|
+
| **TS** | TOP SECRET | Exceptionally sensitive; grave damage to national security if compromised |
|
|
19
|
+
|
|
20
|
+
### Stacking Rule
|
|
21
|
+
Higher classification systems must implement **all controls for lower levels plus their own level**:
|
|
22
|
+
- NC system → NC controls only
|
|
23
|
+
- OS system → NC + OS controls
|
|
24
|
+
- PROTECTED system → NC + OS + P controls
|
|
25
|
+
- SECRET system → NC + OS + P + S controls
|
|
26
|
+
- TOP SECRET system → NC + OS + P + S + TS controls
|
|
27
|
+
|
|
28
|
+
---
|
|
29
|
+
|
|
30
|
+
## Risk-Based Control Selection Process
|
|
31
|
+
|
|
32
|
+
The ISM does not mandate a one-size-fits-all approach. The selection process:
|
|
33
|
+
|
|
34
|
+
1. **Determine system classification** based on the highest sensitivity of information the system stores, processes, or communicates
|
|
35
|
+
2. **Define security objectives** — identify CIA (Confidentiality, Integrity, Availability) requirements
|
|
36
|
+
3. **Select baseline controls** using applicability markings
|
|
37
|
+
4. **Tailor controls** — add controls for specific threats; document exclusions with risk justification
|
|
38
|
+
5. **Document in SSP** — all selected controls, exclusions, and justifications must be recorded in the System Security Plan
|
|
39
|
+
|
|
40
|
+
---
|
|
41
|
+
|
|
42
|
+
## System Security Plan (SSP) — Required Content
|
|
43
|
+
|
|
44
|
+
The SSP is the primary authorisation artefact. It must include:
|
|
45
|
+
|
|
46
|
+
| Section | Content |
|
|
47
|
+
|---------|---------|
|
|
48
|
+
| System overview | Name, owner, purpose, environment |
|
|
49
|
+
| System boundary | What is in scope (hardware, software, interfaces) |
|
|
50
|
+
| Classification level | Highest classification handled |
|
|
51
|
+
| Security objectives | Confidentiality, Integrity, Availability ratings (High/Medium/Low) |
|
|
52
|
+
| Control selection | All applicable ISM controls with applicability justification |
|
|
53
|
+
| Implemented controls | Evidence of implementation for each control |
|
|
54
|
+
| Excluded controls | Controls not implemented with documented risk acceptance |
|
|
55
|
+
| Risk register | Identified risks, likelihood, impact, treatment |
|
|
56
|
+
| Authorisation | Authorising Official signature and date |
|
|
57
|
+
| Review schedule | Next review date (minimum: every 24 months or after significant change) |
|
|
58
|
+
|
|
59
|
+
---
|
|
60
|
+
|
|
61
|
+
## IRAP Assessment Requirements
|
|
62
|
+
|
|
63
|
+
### Who Needs an IRAP Assessment?
|
|
64
|
+
- **Mandatory**: Systems handling PROTECTED and above
|
|
65
|
+
- **Strongly recommended**: Systems handling OFFICIAL: Sensitive
|
|
66
|
+
- **Government policy**: Any system used to deliver government services to citizens
|
|
67
|
+
|
|
68
|
+
### IRAP Assessor Requirements
|
|
69
|
+
- Must be listed on the ASD IRAP Assessors Register
|
|
70
|
+
- Must be independent of the system being assessed
|
|
71
|
+
- Must have current ASD-recognised qualifications
|
|
72
|
+
- Find assessors: https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/irap/irap-assessors
|
|
73
|
+
|
|
74
|
+
### Assessment Cycle
|
|
75
|
+
- Initial assessment before system authorisation
|
|
76
|
+
- Re-assessment every **24 months** (minimum)
|
|
77
|
+
- Re-assessment required after **significant change** (major architecture change, new classification level, major new functionality)
|
|
78
|
+
|
|
79
|
+
### IRAP Assessment Artefact Checklist
|
|
80
|
+
- [ ] Current System Security Plan (SSP)
|
|
81
|
+
- [ ] Network architecture diagrams
|
|
82
|
+
- [ ] Asset register (hardware and software)
|
|
83
|
+
- [ ] Risk register with current risk ratings
|
|
84
|
+
- [ ] Policy suite (all security policies referenced in SSP)
|
|
85
|
+
- [ ] Evidence of implemented controls (configuration screenshots, logs, test results)
|
|
86
|
+
- [ ] Previous IRAP assessment report (if re-assessment)
|
|
87
|
+
- [ ] Plan of Action & Milestones (POA&M) for any outstanding findings
|
|
88
|
+
- [ ] Incident register (last 12 months)
|
|
89
|
+
- [ ] Patch management reports
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## Essential Eight — ISM Relationship
|
|
94
|
+
|
|
95
|
+
The Essential Eight are **eight priority mitigation strategies** extracted from the broader ISM control set. They are not a separate standard but a prioritised subset.
|
|
96
|
+
|
|
97
|
+
| Essential Eight Strategy | Primary ISM Chapter(s) | Notes |
|
|
98
|
+
|-------------------------|----------------------|-------|
|
|
99
|
+
| Application control (allow-listing) | Ch. 13 System Hardening | Prevents execution of unapproved software |
|
|
100
|
+
| Patch applications | Ch. 14 System Management | Critical patches ≤14 days |
|
|
101
|
+
| Configure Microsoft Office macros | Ch. 13 System Hardening | Restrict macro execution |
|
|
102
|
+
| User application hardening | Ch. 13 System Hardening | Browser, Office, PDF hardening |
|
|
103
|
+
| Restrict administrative privileges | Ch. 13 System Hardening, Ch. 6 Personnel | Least privilege, PAM |
|
|
104
|
+
| Patch operating systems | Ch. 14 System Management | Critical OS patches ≤14 days |
|
|
105
|
+
| Multi-factor authentication (MFA) | Ch. 6, Ch. 9, Ch. 19 | MFA for all remote access, privileged accounts |
|
|
106
|
+
| Regular backups | Ch. 14 System Management | Tested, offline/offsite, 3-2-1 rule |
|
|
107
|
+
|
|
108
|
+
### Essential Eight Maturity Levels
|
|
109
|
+
|
|
110
|
+
| Level | Description | Who It Applies To |
|
|
111
|
+
|-------|-------------|------------------|
|
|
112
|
+
| **ML0** | Incomplete or ineffective implementation | Non-compliant |
|
|
113
|
+
| **ML1** | Partially aligned; addresses targeted attacks | Minimum for small/low-risk organisations |
|
|
114
|
+
| **ML2** | Mostly aligned; addresses sophisticated threats | ASD-recommended baseline for all government entities (2026 target) |
|
|
115
|
+
| **ML3** | Fully aligned; addresses advanced persistent threats | Required for critical infrastructure and high-risk sectors |
|
|
116
|
+
|
|
117
|
+
---
|
|
118
|
+
|
|
119
|
+
## Patch Management SLAs (Chapter 14)
|
|
120
|
+
|
|
121
|
+
| Patch Criticality | Maximum Remediation Timeframe |
|
|
122
|
+
|------------------|------------------------------|
|
|
123
|
+
| Critical (CVSS 9–10) | 48 hours for internet-facing; 14 days for internal |
|
|
124
|
+
| High (CVSS 7–8.9) | 14 days |
|
|
125
|
+
| Medium (CVSS 4–6.9) | 30 days |
|
|
126
|
+
| Low (CVSS < 4) | Within next maintenance window |
|
|
127
|
+
|
|
128
|
+
---
|
|
129
|
+
|
|
130
|
+
## Approved Cryptographic Algorithms (Chapter 20)
|
|
131
|
+
|
|
132
|
+
The ISM mandates ASD-approved algorithms. Key requirements for March 2026:
|
|
133
|
+
|
|
134
|
+
| Use Case | Approved Algorithm(s) | Notes |
|
|
135
|
+
|----------|----------------------|-------|
|
|
136
|
+
| Symmetric encryption | AES-128 minimum (AES-256 for PROTECTED+) | |
|
|
137
|
+
| Asymmetric encryption | RSA-2048 minimum; EC P-256 or above | RSA-4096 / P-384 for PROTECTED+ |
|
|
138
|
+
| Hashing | SHA-256 minimum (SHA-384 for PROTECTED+) | MD5 and SHA-1 prohibited |
|
|
139
|
+
| TLS | TLS 1.2 minimum; TLS 1.3 preferred | SSL and TLS 1.0/1.1 prohibited |
|
|
140
|
+
| Key exchange | ECDH or DHE (2048-bit minimum) | Static DH prohibited |
|
|
141
|
+
| SSH | SSH2 only; ED25519 or RSA-4096 | SSH1 prohibited |
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## Log Retention Requirements (Chapter 15)
|
|
146
|
+
|
|
147
|
+
| System Classification | Minimum Log Retention |
|
|
148
|
+
|----------------------|----------------------|
|
|
149
|
+
| NC | 12 months |
|
|
150
|
+
| OFFICIAL: Sensitive | 18 months |
|
|
151
|
+
| PROTECTED | 18 months |
|
|
152
|
+
| SECRET / TOP SECRET | As directed by agency security policy (typically 7 years) |
|
|
153
|
+
|
|
154
|
+
Logs must be stored in a tamper-evident manner, separate from the system being monitored.
|
|
155
|
+
|
|
156
|
+
---
|
|
157
|
+
|
|
158
|
+
## Key Differences: ISM vs ISO 27001
|
|
159
|
+
|
|
160
|
+
| Aspect | ISM (ASD) | ISO 27001 |
|
|
161
|
+
|--------|-----------|-----------|
|
|
162
|
+
| Jurisdiction | Australia (government mandatory) | International (voluntary certification) |
|
|
163
|
+
| Structure | 22 guideline chapters + individual controls | 10 clauses + 93 Annex A controls (2022) |
|
|
164
|
+
| Assessment | IRAP (ASD-certified assessors) | Third-party certification bodies |
|
|
165
|
+
| Classification | NC / OS / P / S / TS markings | Not classification-based |
|
|
166
|
+
| Update cycle | Typically annually (March edition) | Major revision every ~7 years |
|
|
167
|
+
| Audience | Government entities + supply chain | Any organisation |
|
|
168
|
+
| Essential Eight | Subset of ISM; ASD-mandated for government | No direct equivalent |
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
## Useful Official References
|
|
173
|
+
|
|
174
|
+
| Resource | URL |
|
|
175
|
+
|----------|-----|
|
|
176
|
+
| ISM (March 2026 PDF) | https://www.cyber.gov.au/sites/default/files/2026-03/Information%20security%20manual%20(March%202026).pdf |
|
|
177
|
+
| ISM OSCAL releases | https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/ism-oscal-releases |
|
|
178
|
+
| IRAP Assessors Register | https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/irap/irap-assessors |
|
|
179
|
+
| Essential Eight | https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight |
|
|
180
|
+
| Essential Eight to ISM mapping | https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping |
|
|
181
|
+
| ISM GitHub (OSCAL) | https://github.com/AustralianCyberSecurityCentre/ism-oscal |
|
|
@@ -0,0 +1,183 @@
|
|
|
1
|
+
# ISM — 22 Guideline Chapters Overview
|
|
2
|
+
|
|
3
|
+
Source: Australian Information Security Manual, March 2026 edition
|
|
4
|
+
Published by: Australian Signals Directorate (ASD)
|
|
5
|
+
URL: https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## Chapter Summary Table
|
|
10
|
+
|
|
11
|
+
| # | Chapter | Domain | Key Control Areas |
|
|
12
|
+
|---|---------|--------|------------------|
|
|
13
|
+
| 1 | Cyber Security Roles | Governance | CISO appointment, security responsibilities, accountability structures, security culture |
|
|
14
|
+
| 2 | Cyber Security Incidents | Detect/Respond | Incident definition, reporting obligations, response procedures, ASD notification |
|
|
15
|
+
| 3 | Procurement & Outsourcing | Governance | Supply chain security, vendor assessment, cloud service security requirements |
|
|
16
|
+
| 4 | Cyber Security Documentation | Governance | SSP, risk register, security policies, document classification and review |
|
|
17
|
+
| 5 | Physical Security | Protect | Secure areas, physical access controls, equipment security, clean desk |
|
|
18
|
+
| 6 | Personnel Security | Protect | Personnel screening, security clearances, user awareness, termination procedures |
|
|
19
|
+
| 7 | Communications Infrastructure | Protect | Cabling, network zoning, physical comms protection, signal security |
|
|
20
|
+
| 8 | Communications Systems | Protect | Voice systems, video conferencing, fax and messaging security |
|
|
21
|
+
| 9 | Enterprise Mobility | Protect | Mobile devices, BYOD, remote access, mobile device management (MDM) |
|
|
22
|
+
| 10 | Evaluated Products | Protect | Use of evaluated/certified products (Common Criteria, FIPS), cryptographic modules |
|
|
23
|
+
| 11 | IT Equipment | Protect | Hardware procurement, asset register, equipment disposal, TEMPEST |
|
|
24
|
+
| 12 | Media | Protect | Removable media controls, media sanitisation, media destruction |
|
|
25
|
+
| 13 | System Hardening | Protect | OS hardening, application hardening, firmware security, least privilege |
|
|
26
|
+
| 14 | System Management | Protect | Patch management, change management, backups, configuration management |
|
|
27
|
+
| 15 | System Monitoring | Detect | Logging requirements, SIEM, anomaly detection, audit log retention |
|
|
28
|
+
| 16 | Software Development | Protect | Secure SDLC, code review, dependency management, vulnerability disclosure |
|
|
29
|
+
| 17 | Database Systems | Protect | Database hardening, access controls, encryption at rest, query controls |
|
|
30
|
+
| 18 | Email | Protect | Email filtering, DMARC/SPF/DKIM, email content security, phishing controls |
|
|
31
|
+
| 19 | Networking | Protect | Network segmentation, firewall rules, DNS security, VPN standards |
|
|
32
|
+
| 20 | Cryptography | Protect | Approved algorithms, key management, PKI, TLS standards |
|
|
33
|
+
| 21 | Gateways | Protect | Content filtering, data diodes, cross-domain solutions, proxy security |
|
|
34
|
+
| 22 | Data Transfers | Protect | Approved transfer methods, data labelling, transfer logging |
|
|
35
|
+
|
|
36
|
+
---
|
|
37
|
+
|
|
38
|
+
## Chapter Detail
|
|
39
|
+
|
|
40
|
+
### Chapter 1 — Cyber Security Roles
|
|
41
|
+
- Organisations must appoint a Chief Information Security Officer (CISO) with appropriate authority
|
|
42
|
+
- Security responsibilities must be defined across all levels of the organisation
|
|
43
|
+
- A system owner must be designated for each ICT system
|
|
44
|
+
- Key controls cover: CISO role definition, security advisor appointments, escalation paths
|
|
45
|
+
|
|
46
|
+
### Chapter 2 — Cyber Security Incidents
|
|
47
|
+
- Defines a cyber security incident as any actual or suspected compromise of a system's confidentiality, integrity, or availability
|
|
48
|
+
- ASD must be notified of significant incidents — especially for systems handling PROTECTED and above
|
|
49
|
+
- Response procedures must be documented and tested
|
|
50
|
+
- Incident evidence must be preserved; post-incident reviews required
|
|
51
|
+
- Key controls: incident categorisation, notification timelines, forensic preservation, lessons learned
|
|
52
|
+
|
|
53
|
+
### Chapter 3 — Procurement & Outsourcing
|
|
54
|
+
- All ICT procurement must consider cyber security requirements before purchase
|
|
55
|
+
- Cloud services must be assessed for compliance with the ISM and ASD Cloud Security Guidance
|
|
56
|
+
- Outsourced services must contractually require ISM-aligned security controls
|
|
57
|
+
- Supply chain risks must be assessed and managed
|
|
58
|
+
- Key controls: vendor security assessments, contract clauses, cloud service provider evaluation
|
|
59
|
+
|
|
60
|
+
### Chapter 4 — Cyber Security Documentation
|
|
61
|
+
- Every system must have a current System Security Plan (SSP) — the primary authorisation document
|
|
62
|
+
- Risk registers must be maintained and reviewed
|
|
63
|
+
- Security policies and procedures must be version-controlled, approved by management, and reviewed at least annually
|
|
64
|
+
- Key documents: SSP, risk register, incident response plan, change management plan, business continuity plan
|
|
65
|
+
|
|
66
|
+
### Chapter 5 — Physical Security
|
|
67
|
+
- Secure areas must be established and access controlled
|
|
68
|
+
- Visitors must be escorted in secure areas
|
|
69
|
+
- Equipment must be protected from physical tampering
|
|
70
|
+
- Clean desk and clear screen policies required
|
|
71
|
+
- Key controls: physical access logs, secure area classifications, equipment labelling
|
|
72
|
+
|
|
73
|
+
### Chapter 6 — Personnel Security
|
|
74
|
+
- Personnel must be screened before access to sensitive systems
|
|
75
|
+
- Security clearances must match the classification level of systems accessed
|
|
76
|
+
- Security awareness training must be provided at onboarding and annually
|
|
77
|
+
- Access must be revoked promptly on termination
|
|
78
|
+
- Key controls: background checks, clearance validation, training records, offboarding checklist
|
|
79
|
+
|
|
80
|
+
### Chapter 7 — Communications Infrastructure
|
|
81
|
+
- Cabling must be protected from interception and damage
|
|
82
|
+
- Network zones must be established with appropriate separation
|
|
83
|
+
- Physical communications infrastructure in secure areas must be physically protected
|
|
84
|
+
- Key controls: cable labelling, conduit requirements, zone separation
|
|
85
|
+
|
|
86
|
+
### Chapter 8 — Communications Systems
|
|
87
|
+
- Voice over IP (VoIP) and video conferencing systems must be secured
|
|
88
|
+
- PSTN systems connected to secure networks require additional controls
|
|
89
|
+
- Fax and messaging systems handling sensitive information must use approved encryption
|
|
90
|
+
- Key controls: VoIP hardening, conferencing system security, messaging encryption
|
|
91
|
+
|
|
92
|
+
### Chapter 9 — Enterprise Mobility
|
|
93
|
+
- Mobile devices accessing government systems must be enrolled in an approved MDM solution
|
|
94
|
+
- BYOD must be managed through containerisation or equivalent
|
|
95
|
+
- Remote access must use approved VPN with MFA
|
|
96
|
+
- Lost or stolen devices must be remotely wipeable
|
|
97
|
+
- Key controls: MDM enrolment, remote wipe capability, MFA for remote access, mobile app vetting
|
|
98
|
+
|
|
99
|
+
### Chapter 10 — Evaluated Products
|
|
100
|
+
- Systems handling PROTECTED and above must use cryptographic products evaluated or approved by ASD
|
|
101
|
+
- Common Criteria evaluated products are preferred for high-assurance environments
|
|
102
|
+
- FIPS 140-2/3 validated modules required for classified cryptographic operations
|
|
103
|
+
- Key controls: product evaluation requirements, cryptographic module validation
|
|
104
|
+
|
|
105
|
+
### Chapter 11 — IT Equipment
|
|
106
|
+
- All ICT equipment must be recorded in an asset register
|
|
107
|
+
- Equipment must be disposed of securely (data sanitisation before disposal)
|
|
108
|
+
- Equipment in sensitive areas may require TEMPEST certification
|
|
109
|
+
- Key controls: asset register, equipment disposal procedures, TEMPEST assessment
|
|
110
|
+
|
|
111
|
+
### Chapter 12 — Media
|
|
112
|
+
- Removable media must be controlled and authorised
|
|
113
|
+
- Media used in classified environments must be treated at the classification level of the system
|
|
114
|
+
- Media must be sanitised (overwrite/degauss) or destroyed before disposal
|
|
115
|
+
- Key controls: removable media register, sanitisation procedures, destruction certificates
|
|
116
|
+
|
|
117
|
+
### Chapter 13 — System Hardening
|
|
118
|
+
- Operating systems must be hardened before deployment (remove unnecessary services, disable default accounts)
|
|
119
|
+
- Applications must be hardened (disable unused features, apply vendor hardening guides)
|
|
120
|
+
- Firmware security settings must be configured (Secure Boot, BIOS passwords)
|
|
121
|
+
- Least privilege must be enforced — no standing administrative access
|
|
122
|
+
- Key controls: OS hardening checklists, application allow-listing, firmware configuration, privileged access management
|
|
123
|
+
|
|
124
|
+
### Chapter 14 — System Management
|
|
125
|
+
- Critical patches must be applied within defined timeframes (14 days for critical, 30 days for non-critical)
|
|
126
|
+
- Change management must follow a documented and approved process
|
|
127
|
+
- Backups must be tested regularly; backup media must be stored securely
|
|
128
|
+
- Configuration management must track all changes to system baseline
|
|
129
|
+
- Key controls: patch management SLAs, backup testing schedule, change approval process
|
|
130
|
+
|
|
131
|
+
### Chapter 15 — System Monitoring
|
|
132
|
+
- Centralised event logging must be implemented (SIEM or equivalent)
|
|
133
|
+
- Log retention: minimum 18 months for systems handling PROTECTED and above
|
|
134
|
+
- Anomalous events must trigger alerts and investigation
|
|
135
|
+
- Privileged access and system changes must be logged
|
|
136
|
+
- Key controls: log collection scope, retention periods, alerting thresholds, log integrity
|
|
137
|
+
|
|
138
|
+
### Chapter 16 — Software Development
|
|
139
|
+
- Software development must follow a secure Software Development Life Cycle (SDLC)
|
|
140
|
+
- Code reviews and vulnerability testing required before deployment
|
|
141
|
+
- Third-party dependencies must be tracked and patched
|
|
142
|
+
- Vulnerability disclosure policy required for externally facing systems
|
|
143
|
+
- Key controls: SDLC documentation, code review evidence, dependency scanning, pen testing
|
|
144
|
+
|
|
145
|
+
### Chapter 17 — Database Systems
|
|
146
|
+
- Databases must be hardened (remove default accounts, disable unnecessary features)
|
|
147
|
+
- Access to databases must follow least privilege
|
|
148
|
+
- Sensitive data at rest must be encrypted
|
|
149
|
+
- Database activity must be logged
|
|
150
|
+
- Key controls: database hardening checklist, access control matrix, encryption at rest, query logging
|
|
151
|
+
|
|
152
|
+
### Chapter 18 — Email
|
|
153
|
+
- Email gateways must implement DMARC, DKIM, and SPF
|
|
154
|
+
- Email filtering must block malicious attachments and phishing content
|
|
155
|
+
- Outbound emails containing sensitive information must be controlled
|
|
156
|
+
- Key controls: DMARC policy (reject), DKIM signing, SPF records, gateway filtering logs
|
|
157
|
+
|
|
158
|
+
### Chapter 19 — Networking
|
|
159
|
+
- Network segmentation must separate sensitive systems from general-purpose networks
|
|
160
|
+
- Firewall rule sets must be documented, reviewed, and audited
|
|
161
|
+
- DNS security extensions (DNSSEC) recommended
|
|
162
|
+
- VPNs must use approved encryption standards
|
|
163
|
+
- Key controls: network architecture diagram, firewall rule review schedule, DNSSEC configuration
|
|
164
|
+
|
|
165
|
+
### Chapter 20 — Cryptography
|
|
166
|
+
- Only ASD-approved cryptographic algorithms must be used
|
|
167
|
+
- TLS 1.2 minimum (TLS 1.3 preferred) for data in transit
|
|
168
|
+
- Key management must follow documented procedures (generation, storage, rotation, destruction)
|
|
169
|
+
- PKI must be underpinned by a trusted root CA
|
|
170
|
+
- Key controls: algorithm approval list, key management procedures, TLS version configuration, CA management
|
|
171
|
+
|
|
172
|
+
### Chapter 21 — Gateways
|
|
173
|
+
- Internet gateways must implement web content filtering
|
|
174
|
+
- Cross-domain solutions (CDS) required for moving information between classification levels
|
|
175
|
+
- Data diodes used for one-way transfers in high-security environments
|
|
176
|
+
- Gateway security must be regularly assessed
|
|
177
|
+
- Key controls: content filtering policy, CDS accreditation, gateway security assessments
|
|
178
|
+
|
|
179
|
+
### Chapter 22 — Data Transfers
|
|
180
|
+
- Data transfers between different classification domains must use approved methods
|
|
181
|
+
- All transfers of classified data must be logged
|
|
182
|
+
- Data must be labelled with its protective marking before transfer
|
|
183
|
+
- Key controls: approved transfer mechanisms, transfer logs, label verification procedures
|
|
@@ -0,0 +1,203 @@
|
|
|
1
|
+
# ISO 27001:2013 Annex A — All 114 Controls
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
- [A.5 Information Security Policies (2)](#a5-information-security-policies)
|
|
5
|
+
- [A.6 Organisation of Information Security (7)](#a6-organisation-of-information-security)
|
|
6
|
+
- [A.7 Human Resource Security (6)](#a7-human-resource-security)
|
|
7
|
+
- [A.8 Asset Management (10)](#a8-asset-management)
|
|
8
|
+
- [A.9 Access Control (14)](#a9-access-control)
|
|
9
|
+
- [A.10 Cryptography (2)](#a10-cryptography)
|
|
10
|
+
- [A.11 Physical and Environmental Security (15)](#a11-physical-and-environmental-security)
|
|
11
|
+
- [A.12 Operations Security (14)](#a12-operations-security)
|
|
12
|
+
- [A.13 Communications Security (7)](#a13-communications-security)
|
|
13
|
+
- [A.14 System Acquisition, Development and Maintenance (13)](#a14-system-acquisition)
|
|
14
|
+
- [A.15 Supplier Relationships (5)](#a15-supplier-relationships)
|
|
15
|
+
- [A.16 Information Security Incident Management (7)](#a16-information-security-incident-management)
|
|
16
|
+
- [A.17 IS Aspects of Business Continuity Management (4)](#a17-business-continuity)
|
|
17
|
+
- [A.18 Compliance (8)](#a18-compliance)
|
|
18
|
+
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
## A.5 Information Security Policies
|
|
22
|
+
|
|
23
|
+
| ID | Control Name |
|
|
24
|
+
|----|-------------|
|
|
25
|
+
| A.5.1.1 | Policies for information security |
|
|
26
|
+
| A.5.1.2 | Review of the policies for information security |
|
|
27
|
+
|
|
28
|
+
## A.6 Organisation of Information Security
|
|
29
|
+
|
|
30
|
+
| ID | Control Name |
|
|
31
|
+
|----|-------------|
|
|
32
|
+
| A.6.1.1 | Information security roles and responsibilities |
|
|
33
|
+
| A.6.1.2 | Segregation of duties |
|
|
34
|
+
| A.6.1.3 | Contact with authorities |
|
|
35
|
+
| A.6.1.4 | Contact with special interest groups |
|
|
36
|
+
| A.6.1.5 | Information security in project management |
|
|
37
|
+
| A.6.2.1 | Mobile device policy |
|
|
38
|
+
| A.6.2.2 | Teleworking |
|
|
39
|
+
|
|
40
|
+
## A.7 Human Resource Security
|
|
41
|
+
|
|
42
|
+
| ID | Control Name |
|
|
43
|
+
|----|-------------|
|
|
44
|
+
| A.7.1.1 | Screening |
|
|
45
|
+
| A.7.1.2 | Terms and conditions of employment |
|
|
46
|
+
| A.7.2.1 | Management responsibilities |
|
|
47
|
+
| A.7.2.2 | Information security awareness, education and training |
|
|
48
|
+
| A.7.2.3 | Disciplinary process |
|
|
49
|
+
| A.7.3.1 | Termination or change of employment responsibilities |
|
|
50
|
+
|
|
51
|
+
## A.8 Asset Management
|
|
52
|
+
|
|
53
|
+
| ID | Control Name |
|
|
54
|
+
|----|-------------|
|
|
55
|
+
| A.8.1.1 | Inventory of assets |
|
|
56
|
+
| A.8.1.2 | Ownership of assets |
|
|
57
|
+
| A.8.1.3 | Acceptable use of assets |
|
|
58
|
+
| A.8.1.4 | Return of assets |
|
|
59
|
+
| A.8.2.1 | Classification of information |
|
|
60
|
+
| A.8.2.2 | Labelling of information |
|
|
61
|
+
| A.8.2.3 | Handling of assets |
|
|
62
|
+
| A.8.3.1 | Management of removable media |
|
|
63
|
+
| A.8.3.2 | Disposal of media |
|
|
64
|
+
| A.8.3.3 | Physical media transfer |
|
|
65
|
+
|
|
66
|
+
## A.9 Access Control
|
|
67
|
+
|
|
68
|
+
| ID | Control Name |
|
|
69
|
+
|----|-------------|
|
|
70
|
+
| A.9.1.1 | Access control policy |
|
|
71
|
+
| A.9.1.2 | Access to networks and network services |
|
|
72
|
+
| A.9.2.1 | User registration and de-registration |
|
|
73
|
+
| A.9.2.2 | User access provisioning |
|
|
74
|
+
| A.9.2.3 | Management of privileged access rights |
|
|
75
|
+
| A.9.2.4 | Management of secret authentication information of users |
|
|
76
|
+
| A.9.2.5 | Review of user access rights |
|
|
77
|
+
| A.9.2.6 | Removal or adjustment of access rights |
|
|
78
|
+
| A.9.3.1 | Use of secret authentication information |
|
|
79
|
+
| A.9.4.1 | Information access restriction |
|
|
80
|
+
| A.9.4.2 | Secure log-on procedures |
|
|
81
|
+
| A.9.4.3 | Password management system |
|
|
82
|
+
| A.9.4.4 | Use of privileged utility programs |
|
|
83
|
+
| A.9.4.5 | Access control to program source code |
|
|
84
|
+
|
|
85
|
+
## A.10 Cryptography
|
|
86
|
+
|
|
87
|
+
| ID | Control Name |
|
|
88
|
+
|----|-------------|
|
|
89
|
+
| A.10.1.1 | Policy on the use of cryptographic controls |
|
|
90
|
+
| A.10.1.2 | Key management |
|
|
91
|
+
|
|
92
|
+
## A.11 Physical and Environmental Security
|
|
93
|
+
|
|
94
|
+
| ID | Control Name |
|
|
95
|
+
|----|-------------|
|
|
96
|
+
| A.11.1.1 | Physical security perimeter |
|
|
97
|
+
| A.11.1.2 | Physical entry controls |
|
|
98
|
+
| A.11.1.3 | Securing offices, rooms and facilities |
|
|
99
|
+
| A.11.1.4 | Protecting against external and environmental threats |
|
|
100
|
+
| A.11.1.5 | Working in secure areas |
|
|
101
|
+
| A.11.1.6 | Delivery and loading areas |
|
|
102
|
+
| A.11.2.1 | Equipment siting and protection |
|
|
103
|
+
| A.11.2.2 | Supporting utilities |
|
|
104
|
+
| A.11.2.3 | Cabling security |
|
|
105
|
+
| A.11.2.4 | Equipment maintenance |
|
|
106
|
+
| A.11.2.5 | Removal of assets |
|
|
107
|
+
| A.11.2.6 | Security of equipment and assets off-premises |
|
|
108
|
+
| A.11.2.7 | Secure disposal or re-use of equipment |
|
|
109
|
+
| A.11.2.8 | Unattended user equipment |
|
|
110
|
+
| A.11.2.9 | Clear desk and clear screen policy |
|
|
111
|
+
|
|
112
|
+
## A.12 Operations Security
|
|
113
|
+
|
|
114
|
+
| ID | Control Name |
|
|
115
|
+
|----|-------------|
|
|
116
|
+
| A.12.1.1 | Documented operating procedures |
|
|
117
|
+
| A.12.1.2 | Change management |
|
|
118
|
+
| A.12.1.3 | Capacity management |
|
|
119
|
+
| A.12.1.4 | Separation of development, testing and operational environments |
|
|
120
|
+
| A.12.2.1 | Controls against malware |
|
|
121
|
+
| A.12.3.1 | Information backup |
|
|
122
|
+
| A.12.4.1 | Event logging |
|
|
123
|
+
| A.12.4.2 | Protection of log information |
|
|
124
|
+
| A.12.4.3 | Administrator and operator logs |
|
|
125
|
+
| A.12.4.4 | Clock synchronisation |
|
|
126
|
+
| A.12.5.1 | Installation of software on operational systems |
|
|
127
|
+
| A.12.6.1 | Management of technical vulnerabilities |
|
|
128
|
+
| A.12.6.2 | Restrictions on software installation |
|
|
129
|
+
| A.12.7.1 | Information systems audit controls |
|
|
130
|
+
|
|
131
|
+
## A.13 Communications Security
|
|
132
|
+
|
|
133
|
+
| ID | Control Name |
|
|
134
|
+
|----|-------------|
|
|
135
|
+
| A.13.1.1 | Network controls |
|
|
136
|
+
| A.13.1.2 | Security of network services |
|
|
137
|
+
| A.13.1.3 | Segregation in networks |
|
|
138
|
+
| A.13.2.1 | Information transfer policies and procedures |
|
|
139
|
+
| A.13.2.2 | Agreements on information transfer |
|
|
140
|
+
| A.13.2.3 | Electronic messaging |
|
|
141
|
+
| A.13.2.4 | Confidentiality or non-disclosure agreements |
|
|
142
|
+
|
|
143
|
+
## A.14 System Acquisition, Development and Maintenance
|
|
144
|
+
|
|
145
|
+
| ID | Control Name |
|
|
146
|
+
|----|-------------|
|
|
147
|
+
| A.14.1.1 | Information security requirements analysis and specification |
|
|
148
|
+
| A.14.1.2 | Securing application services on public networks |
|
|
149
|
+
| A.14.1.3 | Protecting application services transactions |
|
|
150
|
+
| A.14.2.1 | Secure development policy |
|
|
151
|
+
| A.14.2.2 | System change control procedures |
|
|
152
|
+
| A.14.2.3 | Technical review of applications after operating platform changes |
|
|
153
|
+
| A.14.2.4 | Restrictions on changes to software packages |
|
|
154
|
+
| A.14.2.5 | Secure system engineering principles |
|
|
155
|
+
| A.14.2.6 | Secure development environment |
|
|
156
|
+
| A.14.2.7 | Outsourced development |
|
|
157
|
+
| A.14.2.8 | System security testing |
|
|
158
|
+
| A.14.2.9 | System acceptance testing |
|
|
159
|
+
| A.14.3.1 | Protection of test data |
|
|
160
|
+
|
|
161
|
+
## A.15 Supplier Relationships
|
|
162
|
+
|
|
163
|
+
| ID | Control Name |
|
|
164
|
+
|----|-------------|
|
|
165
|
+
| A.15.1.1 | Information security policy for supplier relationships |
|
|
166
|
+
| A.15.1.2 | Addressing security within supplier agreements |
|
|
167
|
+
| A.15.1.3 | Information and communication technology supply chain |
|
|
168
|
+
| A.15.2.1 | Monitoring and review of supplier services |
|
|
169
|
+
| A.15.2.2 | Managing changes to supplier services |
|
|
170
|
+
|
|
171
|
+
## A.16 Information Security Incident Management
|
|
172
|
+
|
|
173
|
+
| ID | Control Name |
|
|
174
|
+
|----|-------------|
|
|
175
|
+
| A.16.1.1 | Responsibilities and procedures |
|
|
176
|
+
| A.16.1.2 | Reporting information security events |
|
|
177
|
+
| A.16.1.3 | Reporting information security weaknesses |
|
|
178
|
+
| A.16.1.4 | Assessment of and decision on information security events |
|
|
179
|
+
| A.16.1.5 | Response to information security incidents |
|
|
180
|
+
| A.16.1.6 | Learning from information security incidents |
|
|
181
|
+
| A.16.1.7 | Collection of evidence |
|
|
182
|
+
|
|
183
|
+
## A.17 IS Aspects of Business Continuity Management
|
|
184
|
+
|
|
185
|
+
| ID | Control Name |
|
|
186
|
+
|----|-------------|
|
|
187
|
+
| A.17.1.1 | Planning information security continuity |
|
|
188
|
+
| A.17.1.2 | Implementing information security continuity |
|
|
189
|
+
| A.17.1.3 | Verify, review and evaluate information security continuity |
|
|
190
|
+
| A.17.2.1 | Availability of information processing facilities |
|
|
191
|
+
|
|
192
|
+
## A.18 Compliance
|
|
193
|
+
|
|
194
|
+
| ID | Control Name |
|
|
195
|
+
|----|-------------|
|
|
196
|
+
| A.18.1.1 | Identification of applicable legislation and contractual requirements |
|
|
197
|
+
| A.18.1.2 | Intellectual property rights |
|
|
198
|
+
| A.18.1.3 | Protection of records |
|
|
199
|
+
| A.18.1.4 | Privacy and protection of personally identifiable information |
|
|
200
|
+
| A.18.1.5 | Regulation of cryptographic controls |
|
|
201
|
+
| A.18.2.1 | Independent review of information security |
|
|
202
|
+
| A.18.2.2 | Compliance with security policies and standards |
|
|
203
|
+
| A.18.2.3 | Technical compliance review |
|