bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,132 @@
|
|
|
1
|
+
# ISO 27001:2022 Annex A — All 93 Controls
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
- [A.5 Organisational Controls (37 controls)](#a5-organisational-controls)
|
|
5
|
+
- [A.6 People Controls (8 controls)](#a6-people-controls)
|
|
6
|
+
- [A.7 Physical Controls (14 controls)](#a7-physical-controls)
|
|
7
|
+
- [A.8 Technological Controls (34 controls)](#a8-technological-controls)
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## A.5 Organisational Controls
|
|
12
|
+
|
|
13
|
+
| ID | Control Name | Description |
|
|
14
|
+
|----|-------------|-------------|
|
|
15
|
+
| A.5.1 | Policies for information security | Define, approve, publish, and review IS policies |
|
|
16
|
+
| A.5.2 | Information security roles and responsibilities | Assign and communicate IS roles |
|
|
17
|
+
| A.5.3 | Segregation of duties | Separate conflicting duties to reduce fraud/error risk |
|
|
18
|
+
| A.5.4 | Management responsibilities | Require managers to enforce IS policies |
|
|
19
|
+
| A.5.5 | Contact with authorities | Maintain contacts with relevant authorities (law enforcement, regulators) |
|
|
20
|
+
| A.5.6 | Contact with special interest groups | Maintain contacts with security forums, professional bodies |
|
|
21
|
+
| A.5.7 | Threat intelligence ⭐NEW | Collect, analyse, and act on information about IS threats |
|
|
22
|
+
| A.5.8 | Information security in project management | Address IS in project management |
|
|
23
|
+
| A.5.9 | Inventory of information and other associated assets | Identify assets and assign ownership |
|
|
24
|
+
| A.5.10 | Acceptable use of information and other associated assets | Define rules for acceptable use of assets |
|
|
25
|
+
| A.5.11 | Return of assets | Ensure assets are returned upon change/termination |
|
|
26
|
+
| A.5.12 | Classification of information | Classify information per legal, value, and sensitivity needs |
|
|
27
|
+
| A.5.13 | Labelling of information | Apply labels per classification scheme |
|
|
28
|
+
| A.5.14 | Information transfer | Define rules and controls for transferring information |
|
|
29
|
+
| A.5.15 | Access control | Define and implement access control rules based on business/security needs |
|
|
30
|
+
| A.5.16 | Identity management | Manage full lifecycle of identities |
|
|
31
|
+
| A.5.17 | Authentication information | Control allocation and use of authentication info (passwords etc.) |
|
|
32
|
+
| A.5.18 | Access rights | Provision, review, modify, and remove access rights |
|
|
33
|
+
| A.5.19 | Information security in supplier relationships | Define IS requirements for supplier relationships |
|
|
34
|
+
| A.5.20 | Addressing information security within supplier agreements | Include IS in supplier contracts |
|
|
35
|
+
| A.5.21 | Managing information security in the ICT supply chain | Monitor and manage IS risks in the ICT supply chain |
|
|
36
|
+
| A.5.22 | Monitoring, review and change management of supplier services | Regularly review and audit supplier service delivery |
|
|
37
|
+
| A.5.23 | Information security for use of cloud services ⭐NEW | Manage IS for acquisition, use, and exit of cloud services |
|
|
38
|
+
| A.5.24 | Information security incident management planning and preparation | Plan and prepare for IS incident management |
|
|
39
|
+
| A.5.25 | Assessment and decision on information security events | Assess events and classify as incidents if applicable |
|
|
40
|
+
| A.5.26 | Response to information security incidents | Respond to incidents per documented procedures |
|
|
41
|
+
| A.5.27 | Learning from information security incidents | Use knowledge from incidents to improve controls |
|
|
42
|
+
| A.5.28 | Collection of evidence | Define procedures for identifying, collecting, and preserving evidence |
|
|
43
|
+
| A.5.29 | Information security during disruption ⭐NEW | Plan for maintaining IS during disruption |
|
|
44
|
+
| A.5.30 | ICT readiness for business continuity ⭐NEW | Plan, implement, monitor ICT continuity |
|
|
45
|
+
| A.5.31 | Legal, statutory, regulatory and contractual requirements | Identify and document legal/regulatory requirements |
|
|
46
|
+
| A.5.32 | Intellectual property rights | Protect intellectual property per legal requirements |
|
|
47
|
+
| A.5.33 | Protection of records | Protect records from loss, destruction, and falsification |
|
|
48
|
+
| A.5.34 | Privacy and protection of PII | Protect privacy and PII per applicable legislation |
|
|
49
|
+
| A.5.35 | Independent review of information security | Review IS implementation and controls independently |
|
|
50
|
+
| A.5.36 | Compliance with policies, rules and standards | Ensure compliance with IS policies and standards |
|
|
51
|
+
| A.5.37 | Documented operating procedures | Document and maintain operating procedures for IS |
|
|
52
|
+
|
|
53
|
+
---
|
|
54
|
+
|
|
55
|
+
## A.6 People Controls
|
|
56
|
+
|
|
57
|
+
| ID | Control Name | Description |
|
|
58
|
+
|----|-------------|-------------|
|
|
59
|
+
| A.6.1 | Screening | Background verification checks on all candidates |
|
|
60
|
+
| A.6.2 | Terms and conditions of employment | Contractual IS responsibilities for employees and contractors |
|
|
61
|
+
| A.6.3 | Information security awareness, education and training | IS awareness and training for all personnel |
|
|
62
|
+
| A.6.4 | Disciplinary process | Formal process for IS policy violations |
|
|
63
|
+
| A.6.5 | Responsibilities after termination or change of employment | Define post-employment IS responsibilities |
|
|
64
|
+
| A.6.6 | Confidentiality or non-disclosure agreements | Require NDAs for personnel and contractors |
|
|
65
|
+
| A.6.7 | Remote working | Define IS policies for remote working |
|
|
66
|
+
| A.6.8 | Information security event reporting | Require personnel to report IS events |
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## A.7 Physical Controls
|
|
71
|
+
|
|
72
|
+
| ID | Control Name | Description |
|
|
73
|
+
|----|-------------|-------------|
|
|
74
|
+
| A.7.1 | Physical security perimeters | Define and use security perimeters to protect sensitive areas |
|
|
75
|
+
| A.7.2 | Physical entry | Control physical access with authentication mechanisms |
|
|
76
|
+
| A.7.3 | Securing offices, rooms and facilities | Design and apply physical security for offices |
|
|
77
|
+
| A.7.4 | Physical security monitoring ⭐NEW | Continuously monitor premises for unauthorised access |
|
|
78
|
+
| A.7.5 | Protecting against physical and environmental threats | Protect against physical/environmental threats (fire, flood, etc.) |
|
|
79
|
+
| A.7.6 | Working in secure areas | Define procedures for working in secure areas |
|
|
80
|
+
| A.7.7 | Clear desk and clear screen | Require clear desk and clear screen policies |
|
|
81
|
+
| A.7.8 | Equipment siting and protection | Protect equipment from threats and environmental hazards |
|
|
82
|
+
| A.7.9 | Security of assets off-premises | Protect assets used off-site |
|
|
83
|
+
| A.7.10 | Storage media | Manage storage media through acquisition, use, transport, and disposal |
|
|
84
|
+
| A.7.11 | Supporting utilities | Protect equipment from power/utility failures |
|
|
85
|
+
| A.7.12 | Cabling security | Protect cables from interception/damage |
|
|
86
|
+
| A.7.13 | Equipment maintenance | Maintain equipment to ensure availability and integrity |
|
|
87
|
+
| A.7.14 | Secure disposal or re-use of equipment | Securely dispose of or sanitise equipment before re-use |
|
|
88
|
+
|
|
89
|
+
---
|
|
90
|
+
|
|
91
|
+
## A.8 Technological Controls
|
|
92
|
+
|
|
93
|
+
| ID | Control Name | Description |
|
|
94
|
+
|----|-------------|-------------|
|
|
95
|
+
| A.8.1 | User end point devices | Protect end-point devices with policies and controls |
|
|
96
|
+
| A.8.2 | Privileged access rights | Restrict, manage, and monitor privileged access |
|
|
97
|
+
| A.8.3 | Information access restriction | Restrict access to information per access control policy |
|
|
98
|
+
| A.8.4 | Access to source code | Restrict access to source code, dev tools, and software libraries |
|
|
99
|
+
| A.8.5 | Secure authentication | Implement secure authentication technologies and procedures |
|
|
100
|
+
| A.8.6 | Capacity management | Monitor and manage resource capacity (storage, compute, network) |
|
|
101
|
+
| A.8.7 | Protection against malware | Implement malware detection and prevention controls |
|
|
102
|
+
| A.8.8 | Management of technical vulnerabilities | Identify, evaluate, and remediate technical vulnerabilities |
|
|
103
|
+
| A.8.9 | Configuration management ⭐NEW | Define, document, implement, and monitor configurations |
|
|
104
|
+
| A.8.10 | Information deletion ⭐NEW | Delete information when no longer required |
|
|
105
|
+
| A.8.11 | Data masking ⭐NEW | Mask data in line with access control and business/legal needs |
|
|
106
|
+
| A.8.12 | Data leakage prevention ⭐NEW | Apply DLP controls to systems, networks, and devices |
|
|
107
|
+
| A.8.13 | Information backup | Maintain and test backup copies of information |
|
|
108
|
+
| A.8.14 | Redundancy of information processing facilities | Implement redundancy to meet availability requirements |
|
|
109
|
+
| A.8.15 | Logging | Produce, store, protect, and analyse event logs |
|
|
110
|
+
| A.8.16 | Monitoring activities ⭐NEW | Monitor networks, systems, and applications for anomalies |
|
|
111
|
+
| A.8.17 | Clock synchronisation | Synchronise clocks across systems to a single reference |
|
|
112
|
+
| A.8.18 | Use of privileged utility programs | Restrict and control use of utility programs with admin capabilities |
|
|
113
|
+
| A.8.19 | Installation of software on operational systems | Control software installations on operational systems |
|
|
114
|
+
| A.8.20 | Networks security | Secure, manage, and control networks and devices |
|
|
115
|
+
| A.8.21 | Security of network services | Define security requirements for all network services |
|
|
116
|
+
| A.8.22 | Segregation of networks | Segregate groups of services, users, and systems |
|
|
117
|
+
| A.8.23 | Web filtering ⭐NEW | Manage access to external websites to reduce exposure |
|
|
118
|
+
| A.8.24 | Use of cryptography | Define rules for use of cryptography (algorithms, key management) |
|
|
119
|
+
| A.8.25 | Secure development life cycle | Establish rules for secure software/system development |
|
|
120
|
+
| A.8.26 | Application security requirements | Identify and approve IS requirements for application development |
|
|
121
|
+
| A.8.27 | Secure system architecture and engineering principles | Define and apply security engineering principles |
|
|
122
|
+
| A.8.28 | Secure coding ⭐NEW | Apply secure coding principles to software development |
|
|
123
|
+
| A.8.29 | Security testing in development and acceptance | Define and perform security testing in development pipelines |
|
|
124
|
+
| A.8.30 | Outsourced development | Supervise and monitor outsourced software development |
|
|
125
|
+
| A.8.31 | Separation of development, test and production environments | Separate dev, test, and prod environments |
|
|
126
|
+
| A.8.32 | Change management | Manage changes to IS, systems, and processes |
|
|
127
|
+
| A.8.33 | Test information | Select, protect, and manage test data appropriately |
|
|
128
|
+
| A.8.34 | Protection of information systems during audit testing | Plan and control audit activities to minimise operational disruption |
|
|
129
|
+
|
|
130
|
+
---
|
|
131
|
+
|
|
132
|
+
⭐NEW = New control introduced in ISO 27001:2022 (not present in 2013 version)
|
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
# ISO 27001 Control Mapping: 2013 ↔ 2022
|
|
2
|
+
|
|
3
|
+
This file provides cross-reference mapping between ISO 27001:2013 (114 controls) and ISO 27001:2022 (93 controls).
|
|
4
|
+
|
|
5
|
+
## Summary of Changes
|
|
6
|
+
- Controls reduced from **114 → 93**
|
|
7
|
+
- Domains reduced from **14 → 4 themes**
|
|
8
|
+
- **11 new controls** added (marked ⭐)
|
|
9
|
+
- **Merged**: Many 2013 controls were consolidated into single 2022 controls
|
|
10
|
+
- **Renamed**: Several controls were renamed for clarity
|
|
11
|
+
- **Deleted**: No controls were fully removed — all 2013 concepts are still covered
|
|
12
|
+
|
|
13
|
+
---
|
|
14
|
+
|
|
15
|
+
## 2022 → 2013 Mapping
|
|
16
|
+
|
|
17
|
+
### A.5 Organisational Controls (2022) → 2013 Equivalents
|
|
18
|
+
|
|
19
|
+
| 2022 Control | 2022 Name | 2013 Equivalent(s) |
|
|
20
|
+
|-------------|-----------|-------------------|
|
|
21
|
+
| A.5.1 | Policies for information security | A.5.1.1, A.5.1.2 |
|
|
22
|
+
| A.5.2 | IS roles and responsibilities | A.6.1.1 |
|
|
23
|
+
| A.5.3 | Segregation of duties | A.6.1.2 |
|
|
24
|
+
| A.5.4 | Management responsibilities | A.7.2.1 |
|
|
25
|
+
| A.5.5 | Contact with authorities | A.6.1.3 |
|
|
26
|
+
| A.5.6 | Contact with special interest groups | A.6.1.4 |
|
|
27
|
+
| A.5.7 | Threat intelligence | ⭐ NEW |
|
|
28
|
+
| A.5.8 | IS in project management | A.6.1.5 |
|
|
29
|
+
| A.5.9 | Inventory of information and assets | A.8.1.1, A.8.1.2 |
|
|
30
|
+
| A.5.10 | Acceptable use of information and assets | A.8.1.3 |
|
|
31
|
+
| A.5.11 | Return of assets | A.8.1.4 |
|
|
32
|
+
| A.5.12 | Classification of information | A.8.2.1 |
|
|
33
|
+
| A.5.13 | Labelling of information | A.8.2.2 |
|
|
34
|
+
| A.5.14 | Information transfer | A.13.2.1, A.13.2.2, A.13.2.3 |
|
|
35
|
+
| A.5.15 | Access control | A.9.1.1, A.9.1.2 |
|
|
36
|
+
| A.5.16 | Identity management | A.9.2.1 |
|
|
37
|
+
| A.5.17 | Authentication information | A.9.2.4, A.9.3.1, A.9.4.3 |
|
|
38
|
+
| A.5.18 | Access rights | A.9.2.2, A.9.2.5, A.9.2.6 |
|
|
39
|
+
| A.5.19 | IS in supplier relationships | A.15.1.1 |
|
|
40
|
+
| A.5.20 | IS within supplier agreements | A.15.1.2 |
|
|
41
|
+
| A.5.21 | Managing IS in the ICT supply chain | A.15.1.3 |
|
|
42
|
+
| A.5.22 | Monitoring/review of supplier services | A.15.2.1, A.15.2.2 |
|
|
43
|
+
| A.5.23 | IS for use of cloud services | ⭐ NEW |
|
|
44
|
+
| A.5.24 | IS incident management planning | A.16.1.1 |
|
|
45
|
+
| A.5.25 | Assessment of IS events | A.16.1.4 |
|
|
46
|
+
| A.5.26 | Response to IS incidents | A.16.1.5 |
|
|
47
|
+
| A.5.27 | Learning from IS incidents | A.16.1.6 |
|
|
48
|
+
| A.5.28 | Collection of evidence | A.16.1.7 |
|
|
49
|
+
| A.5.29 | IS during disruption | A.17.1.1, A.17.1.2 |
|
|
50
|
+
| A.5.30 | ICT readiness for business continuity | ⭐ NEW |
|
|
51
|
+
| A.5.31 | Legal, statutory, regulatory requirements | A.18.1.1 |
|
|
52
|
+
| A.5.32 | Intellectual property rights | A.18.1.2 |
|
|
53
|
+
| A.5.33 | Protection of records | A.18.1.3 |
|
|
54
|
+
| A.5.34 | Privacy and protection of PII | A.18.1.4 |
|
|
55
|
+
| A.5.35 | Independent review of IS | A.18.2.1 |
|
|
56
|
+
| A.5.36 | Compliance with policies, rules, standards | A.18.2.2, A.18.2.3 |
|
|
57
|
+
| A.5.37 | Documented operating procedures | A.12.1.1 |
|
|
58
|
+
|
|
59
|
+
### A.6 People Controls (2022) → 2013 Equivalents
|
|
60
|
+
|
|
61
|
+
| 2022 Control | 2022 Name | 2013 Equivalent(s) |
|
|
62
|
+
|-------------|-----------|-------------------|
|
|
63
|
+
| A.6.1 | Screening | A.7.1.1 |
|
|
64
|
+
| A.6.2 | Terms and conditions of employment | A.7.1.2 |
|
|
65
|
+
| A.6.3 | IS awareness, education and training | A.7.2.2 |
|
|
66
|
+
| A.6.4 | Disciplinary process | A.7.2.3 |
|
|
67
|
+
| A.6.5 | Responsibilities after termination | A.7.3.1 |
|
|
68
|
+
| A.6.6 | Confidentiality or NDA agreements | A.13.2.4 |
|
|
69
|
+
| A.6.7 | Remote working | A.6.2.2 |
|
|
70
|
+
| A.6.8 | IS event reporting | A.16.1.2, A.16.1.3 |
|
|
71
|
+
|
|
72
|
+
### A.7 Physical Controls (2022) → 2013 Equivalents
|
|
73
|
+
|
|
74
|
+
| 2022 Control | 2022 Name | 2013 Equivalent(s) |
|
|
75
|
+
|-------------|-----------|-------------------|
|
|
76
|
+
| A.7.1 | Physical security perimeters | A.11.1.1 |
|
|
77
|
+
| A.7.2 | Physical entry | A.11.1.2, A.11.1.6 |
|
|
78
|
+
| A.7.3 | Securing offices, rooms and facilities | A.11.1.3 |
|
|
79
|
+
| A.7.4 | Physical security monitoring | ⭐ NEW |
|
|
80
|
+
| A.7.5 | Protecting against physical/environmental threats | A.11.1.4 |
|
|
81
|
+
| A.7.6 | Working in secure areas | A.11.1.5 |
|
|
82
|
+
| A.7.7 | Clear desk and clear screen | A.11.2.9 |
|
|
83
|
+
| A.7.8 | Equipment siting and protection | A.11.2.1 |
|
|
84
|
+
| A.7.9 | Security of assets off-premises | A.11.2.6 |
|
|
85
|
+
| A.7.10 | Storage media | A.8.3.1, A.8.3.2, A.8.3.3, A.11.2.5 |
|
|
86
|
+
| A.7.11 | Supporting utilities | A.11.2.2 |
|
|
87
|
+
| A.7.12 | Cabling security | A.11.2.3 |
|
|
88
|
+
| A.7.13 | Equipment maintenance | A.11.2.4 |
|
|
89
|
+
| A.7.14 | Secure disposal or re-use of equipment | A.11.2.7 |
|
|
90
|
+
|
|
91
|
+
### A.8 Technological Controls (2022) → 2013 Equivalents
|
|
92
|
+
|
|
93
|
+
| 2022 Control | 2022 Name | 2013 Equivalent(s) |
|
|
94
|
+
|-------------|-----------|-------------------|
|
|
95
|
+
| A.8.1 | User end point devices | A.6.2.1, A.11.2.8 |
|
|
96
|
+
| A.8.2 | Privileged access rights | A.9.2.3 |
|
|
97
|
+
| A.8.3 | Information access restriction | A.9.4.1 |
|
|
98
|
+
| A.8.4 | Access to source code | A.9.4.5 |
|
|
99
|
+
| A.8.5 | Secure authentication | A.9.4.2 |
|
|
100
|
+
| A.8.6 | Capacity management | A.12.1.3 |
|
|
101
|
+
| A.8.7 | Protection against malware | A.12.2.1 |
|
|
102
|
+
| A.8.8 | Management of technical vulnerabilities | A.12.6.1, A.12.6.2 |
|
|
103
|
+
| A.8.9 | Configuration management | ⭐ NEW |
|
|
104
|
+
| A.8.10 | Information deletion | ⭐ NEW |
|
|
105
|
+
| A.8.11 | Data masking | ⭐ NEW |
|
|
106
|
+
| A.8.12 | Data leakage prevention | ⭐ NEW |
|
|
107
|
+
| A.8.13 | Information backup | A.12.3.1 |
|
|
108
|
+
| A.8.14 | Redundancy of information processing facilities | A.17.2.1 |
|
|
109
|
+
| A.8.15 | Logging | A.12.4.1, A.12.4.2, A.12.4.3 |
|
|
110
|
+
| A.8.16 | Monitoring activities | ⭐ NEW |
|
|
111
|
+
| A.8.17 | Clock synchronisation | A.12.4.4 |
|
|
112
|
+
| A.8.18 | Use of privileged utility programs | A.9.4.4 |
|
|
113
|
+
| A.8.19 | Installation of software on operational systems | A.12.5.1 |
|
|
114
|
+
| A.8.20 | Networks security | A.13.1.1 |
|
|
115
|
+
| A.8.21 | Security of network services | A.13.1.2 |
|
|
116
|
+
| A.8.22 | Segregation of networks | A.13.1.3 |
|
|
117
|
+
| A.8.23 | Web filtering | ⭐ NEW |
|
|
118
|
+
| A.8.24 | Use of cryptography | A.10.1.1, A.10.1.2, A.18.1.5 |
|
|
119
|
+
| A.8.25 | Secure development life cycle | A.14.2.1 |
|
|
120
|
+
| A.8.26 | Application security requirements | A.14.1.1, A.14.1.2, A.14.1.3 |
|
|
121
|
+
| A.8.27 | Secure system architecture and engineering principles | A.14.2.5 |
|
|
122
|
+
| A.8.28 | Secure coding | ⭐ NEW |
|
|
123
|
+
| A.8.29 | Security testing in development and acceptance | A.14.2.8, A.14.2.9 |
|
|
124
|
+
| A.8.30 | Outsourced development | A.14.2.7 |
|
|
125
|
+
| A.8.31 | Separation of dev, test and production environments | A.12.1.4, A.14.2.6 |
|
|
126
|
+
| A.8.32 | Change management | A.12.1.2, A.14.2.2, A.14.2.3, A.14.2.4 |
|
|
127
|
+
| A.8.33 | Test information | A.14.3.1 |
|
|
128
|
+
| A.8.34 | Protection of IS during audit testing | A.12.7.1 |
|
|
129
|
+
|
|
130
|
+
---
|
|
131
|
+
|
|
132
|
+
## Controls Only in 2013 (removed/merged in 2022)
|
|
133
|
+
No controls were deleted outright. All were merged:
|
|
134
|
+
- A.8.2.3 (Handling of assets) → merged into A.5.10 (Acceptable use)
|
|
135
|
+
- A.16.1.3 (Reporting weaknesses) → merged into A.6.8 (IS event reporting)
|
|
136
|
+
- A.17.1.3 (Verify IS continuity) → merged into A.5.29
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## 11 New Controls in 2022 (not in 2013)
|
|
141
|
+
| 2022 ID | Name |
|
|
142
|
+
|---------|------|
|
|
143
|
+
| A.5.7 | Threat intelligence |
|
|
144
|
+
| A.5.23 | Information security for use of cloud services |
|
|
145
|
+
| A.5.30 | ICT readiness for business continuity |
|
|
146
|
+
| A.7.4 | Physical security monitoring |
|
|
147
|
+
| A.8.9 | Configuration management |
|
|
148
|
+
| A.8.10 | Information deletion |
|
|
149
|
+
| A.8.11 | Data masking |
|
|
150
|
+
| A.8.12 | Data leakage prevention |
|
|
151
|
+
| A.8.16 | Monitoring activities |
|
|
152
|
+
| A.8.23 | Web filtering |
|
|
153
|
+
| A.8.28 | Secure coding |
|
|
@@ -0,0 +1,195 @@
|
|
|
1
|
+
# ISO 27701:2025 Annex A — Complete Control Reference
|
|
2
|
+
|
|
3
|
+
ISO/IEC 27701:2025 contains **78 controls** in three tables:
|
|
4
|
+
- **A.1**: 31 controls for PII Controllers
|
|
5
|
+
- **A.2**: 18 controls for PII Processors
|
|
6
|
+
- **A.3**: 29 shared information security controls (both roles)
|
|
7
|
+
|
|
8
|
+
**Note on numbering:** Within each domain, .1 is the domain objective statement
|
|
9
|
+
(not a numbered control). Controls begin at .2. For example, A.1.2.1 is the
|
|
10
|
+
objective for the A.1.2 domain; controls run from A.1.2.2 onward.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## Table A.1 — PII Controller Controls (31 controls)
|
|
15
|
+
|
|
16
|
+
Organizations acting as PII controllers must implement all applicable A.1 controls
|
|
17
|
+
plus all A.3 controls (60 total).
|
|
18
|
+
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
### A.1.2 — Conditions for Collection and Processing (8 controls)
|
|
22
|
+
|
|
23
|
+
**Domain objective**: Ensure PII is collected and processed only under conditions
|
|
24
|
+
that establish a clear, documented legal basis and that processing is transparent
|
|
25
|
+
to relevant parties.
|
|
26
|
+
|
|
27
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
28
|
+
|-----------|--------------|-------------|-------------|
|
|
29
|
+
| A.1.2.2 | Identify and Document Purpose | Document the specific purposes for which PII is collected; purpose must be stated before collection begins | Vague or catch-all purpose statements; purposes undocumented in RoPA |
|
|
30
|
+
| A.1.2.3 | Identify Lawful Basis | Identify and document the lawful basis for each processing activity (consent, contract, legal obligation, vital interests, public task, legitimate interests) | No per-activity lawful basis mapping; LIA not completed for legitimate interest claims |
|
|
31
|
+
| A.1.2.4 | Determine Consent | Where consent is the lawful basis, define when and how consent will be obtained; ensure it meets the required standard (freely given, specific, informed, unambiguous) | Pre-ticked boxes; bundled consent; no record of when consent was obtained |
|
|
32
|
+
| A.1.2.5 | Obtain and Record Consent | Implement mechanisms to capture, record, and maintain proof of consent | No consent audit trail; inability to retrieve consent records for specific individuals |
|
|
33
|
+
| A.1.2.6 | Privacy Impact Assessment | Conduct PIAs / DPIAs for new or significantly changed processing activities; document findings and decisions | PIA process exists but not triggered consistently; no DPIA for high-risk processing |
|
|
34
|
+
| A.1.2.7 | Contracts with PII Processors | Ensure all PII processors are engaged under a written Data Processing Agreement (DPA) specifying obligations | Processor contracts missing; legacy contracts without GDPR-compliant DPA clauses |
|
|
35
|
+
| A.1.2.8 | Joint PII Controller | Where two organizations jointly determine purposes, document the joint controller arrangement and each party's obligations | Joint controller arrangement undocumented; responsibilities undefined |
|
|
36
|
+
| A.1.2.9 | Records of Processing PII | Maintain complete Records of Processing Activities (RoPA) covering all processing operations | RoPA incomplete, out of date, or not maintained; no process to update on system changes |
|
|
37
|
+
|
|
38
|
+
---
|
|
39
|
+
|
|
40
|
+
### A.1.3 — Obligations to PII Principals (10 controls)
|
|
41
|
+
|
|
42
|
+
**Domain objective**: Ensure PII principals can exercise their rights and are
|
|
43
|
+
provided with sufficient information about how their PII is processed.
|
|
44
|
+
|
|
45
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
46
|
+
|-----------|--------------|-------------|-------------|
|
|
47
|
+
| A.1.3.2 | Obligations to PII Principals | Establish and document the organization's obligations to PII principals and the mechanisms by which those obligations are met | No documented obligations register; rights not mapped to processes |
|
|
48
|
+
| A.1.3.3 | Information for PII Principals | Determine what information must be provided to PII principals before or at the point of collection | Privacy notice does not cover all required information elements |
|
|
49
|
+
| A.1.3.4 | Providing Information | Provide the required information to PII principals in a clear, accessible, and timely manner (typically via privacy notice) | Privacy notice not easy to find; information presented in complex legal language |
|
|
50
|
+
| A.1.3.5 | Modify or Withdraw Consent | Provide PII principals with a mechanism to modify or withdraw previously given consent, without detriment | No withdrawal mechanism; withdrawal treated as deletion rather than consent change |
|
|
51
|
+
| A.1.3.6 | Object to PII Processing | Provide mechanism for PII principals to object to processing (particularly for legitimate interest or direct marketing) | No documented objection process; no SLA for response |
|
|
52
|
+
| A.1.3.7 | Access, Correction or Erasure | Provide mechanism for PII principals to access their data, request correction of inaccuracies, or request erasure (right to erasure / right to be forgotten) | No DSR workflow; erasure requests not propagated to all systems |
|
|
53
|
+
| A.1.3.8 | Inform Third Parties | When PII is corrected or erased, inform relevant third parties to whom it was disclosed | No process to track and notify third parties after correction/erasure |
|
|
54
|
+
| A.1.3.9 | Providing Copy of PII | Provide PII principals with a copy of their PII upon request (right of access / right to data portability) | No automated or streamlined way to fulfil subject access requests |
|
|
55
|
+
| A.1.3.10 | Handling Requests | Establish a process for receiving, tracking, authenticating, and responding to all DSR types within required timescales | Requests handled ad hoc; no SLA tracking; identity verification process missing |
|
|
56
|
+
| A.1.3.11 | Automated Decision Making | Where automated decision-making with significant effects is used, disclose this and provide mechanisms for human review | Automated decisions undisclosed; no opt-out or appeal mechanism |
|
|
57
|
+
|
|
58
|
+
---
|
|
59
|
+
|
|
60
|
+
### A.1.4 — Privacy by Design and by Default (9 controls)
|
|
61
|
+
|
|
62
|
+
**Domain objective**: Embed privacy principles into the design and operation of
|
|
63
|
+
systems and processes, ensuring PII is collected and processed only to the extent
|
|
64
|
+
necessary.
|
|
65
|
+
|
|
66
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
67
|
+
|-----------|--------------|-------------|-------------|
|
|
68
|
+
| A.1.4.2 | Limit Collection | Collect only the PII that is necessary for the stated purpose (data minimisation) | Collecting more fields than required "just in case"; no data minimisation review in product design |
|
|
69
|
+
| A.1.4.3 | Limit Processing | Process PII only for the stated purpose; prevent secondary use without additional legal basis | Processing PII for analytics or profiling beyond original purpose |
|
|
70
|
+
| A.1.4.4 | Accuracy and Quality | Implement controls to maintain accuracy of PII; provide mechanisms for correction | No data quality validation; no user self-service correction mechanism |
|
|
71
|
+
| A.1.4.5 | PII Minimisation | Apply systematic controls to minimise the amount of PII held and processed | No PII minimisation checklist in SDLC; fields not reviewed for necessity |
|
|
72
|
+
| A.1.4.6 | De-identification and Deletion | Implement de-identification and deletion procedures to remove PII when it is no longer needed | No automated deletion; PII retained indefinitely in test environments |
|
|
73
|
+
| A.1.4.7 | Temporary Files | Ensure temporary files containing PII are securely managed and deleted when no longer needed | Temp files, logs, and cache containing PII not covered by retention/deletion policy |
|
|
74
|
+
| A.1.4.8 | Retention | Define and implement data retention schedules for each PII category, aligned to legal obligations | No retention schedule; all data kept indefinitely; retention schedule not enforced technically |
|
|
75
|
+
| A.1.4.9 | Disposal | Securely dispose of PII at end of retention period; document disposal | No secure deletion process; PII disposed with general data |
|
|
76
|
+
| A.1.4.10 | PII Transmission Controls | Apply controls to protect PII in transit (encryption, secure channels, access controls) | PII transmitted over unencrypted channels; no controls on email transmission of PII |
|
|
77
|
+
|
|
78
|
+
---
|
|
79
|
+
|
|
80
|
+
### A.1.5 — PII Sharing, Transfer and Disclosure (4 controls)
|
|
81
|
+
|
|
82
|
+
**Domain objective**: Ensure that transfers of PII to third countries or international
|
|
83
|
+
organizations comply with applicable law, and that all transfers and disclosures
|
|
84
|
+
are documented.
|
|
85
|
+
|
|
86
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
87
|
+
|-----------|--------------|-------------|-------------|
|
|
88
|
+
| A.1.5.2 | Basis for PII Transfer | Identify and document the legal basis for each transfer of PII to a third country or international organization (adequacy decision, SCCs, BCRs, derogations) | Transfers to third countries without documented legal basis; SCCs not signed |
|
|
89
|
+
| A.1.5.3 | Countries for PII Transfer | Document the countries or international organizations to which PII is transferred | No transfer mapping; transfers via cloud providers not documented |
|
|
90
|
+
| A.1.5.4 | Records of PII Transfer | Maintain records of all PII transfers to third parties | Transfer log not maintained; no visibility into all third-party transfers |
|
|
91
|
+
| A.1.5.5 | Records of PII Disclosures | Maintain records of all disclosures of PII to third parties (including law enforcement requests) | Disclosure log not maintained; no record of ad hoc disclosures |
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## Table A.2 — PII Processor Controls (18 controls)
|
|
96
|
+
|
|
97
|
+
Organizations acting as PII processors must implement all applicable A.2 controls
|
|
98
|
+
plus all A.3 controls (47 total).
|
|
99
|
+
|
|
100
|
+
---
|
|
101
|
+
|
|
102
|
+
### A.2.2 — Conditions for Collection and Processing (6 controls)
|
|
103
|
+
|
|
104
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
105
|
+
|-----------|--------------|-------------|-------------|
|
|
106
|
+
| A.2.2.2 | Customer Agreement | Process PII only in accordance with documented instructions from the PII controller; ensure a written DPA is in place | Processing PII outside contract scope; no DPA in place for all controllers |
|
|
107
|
+
| A.2.2.3 | Organisation's Purposes | Do not process PII for the processor's own purposes; processing is limited to what is specified by the controller | Using controller PII for own analytics, product training, or marketing |
|
|
108
|
+
| A.2.2.4 | Marketing and Advertising | Do not use PII processed on behalf of a controller for marketing or advertising without explicit authorization | Using customer data for cross-marketing between controller clients |
|
|
109
|
+
| A.2.2.5 | Infringing Instruction | Notify the controller if an instruction would infringe applicable privacy law; do not execute infringing instructions | No process to review and escalate potentially infringing controller instructions |
|
|
110
|
+
| A.2.2.6 | Customer Obligations | Assist the controller in meeting its obligations to PII principals (e.g., DSRs, DPIAs, breach notification) | No defined process to support controller's DSR fulfilment within contractual timeframes |
|
|
111
|
+
| A.2.2.7 | Records of Processing PII | Maintain records of all processing activities carried out on behalf of each controller | No per-controller processing records; single combined log not sufficient |
|
|
112
|
+
|
|
113
|
+
---
|
|
114
|
+
|
|
115
|
+
### A.2.3 — Obligations to PII Principals (1 control)
|
|
116
|
+
|
|
117
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
118
|
+
|-----------|--------------|-------------|-------------|
|
|
119
|
+
| A.2.3.2 | Obligations to PII Principals | Where the processor interacts with PII principals, fulfil the obligations defined by the controller; redirect inquiries to the controller where appropriate | Processor staff unaware of how to handle DSR inquiries received directly |
|
|
120
|
+
|
|
121
|
+
---
|
|
122
|
+
|
|
123
|
+
### A.2.4 — Privacy by Design and by Default (3 controls)
|
|
124
|
+
|
|
125
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
126
|
+
|-----------|--------------|-------------|-------------|
|
|
127
|
+
| A.2.4.2 | Temporary Files | Ensure temporary files created during processing on behalf of a controller are managed and deleted per agreed schedules | Temporary processing files retained beyond task completion |
|
|
128
|
+
| A.2.4.3 | Return, Transfer or Disposal of PII | Upon termination of the processing agreement, return all PII to the controller or securely dispose of it as instructed | No offboarding procedure; PII retained after contract end |
|
|
129
|
+
| A.2.4.4 | PII Transmission Controls | Apply controls to protect PII in transit during processing operations | PII transmitted without encryption between processor subsystems |
|
|
130
|
+
|
|
131
|
+
---
|
|
132
|
+
|
|
133
|
+
### A.2.5 — PII Sharing, Transfer and Disclosure (8 controls)
|
|
134
|
+
|
|
135
|
+
| Control ID | Control Name | Description | Common Gaps |
|
|
136
|
+
|-----------|--------------|-------------|-------------|
|
|
137
|
+
| A.2.5.2 | Basis for PII Transfer | Identify and document the legal basis for any transfer of PII to a third country or international organization | Sub-processor transfers not mapped to legal transfer mechanism |
|
|
138
|
+
| A.2.5.3 | Countries for PII Transfer | Document the countries or international organizations to which PII is transferred during processing | Data residency commitments made but not enforced; sub-processor locations undocumented |
|
|
139
|
+
| A.2.5.4 | Records of PII Disclosures | Maintain records of all disclosures of PII to third parties | Disclosure log not maintained at processor level |
|
|
140
|
+
| A.2.5.5 | Notification of PII Disclosure Requests | Notify the controller when a third party requests disclosure of PII (e.g., law enforcement) before disclosing, where legally permitted | No process to notify controllers of government/law enforcement access requests |
|
|
141
|
+
| A.2.5.6 | Legally Binding PII Disclosures | Where legally compelled to disclose PII (e.g., court order), notify the controller where legally permitted and record the disclosure | Disclosures made without notifying controller; no legal review process |
|
|
142
|
+
| A.2.5.7 | Disclosure of Subcontractors | Disclose to the controller the identity and location of all sub-processors used | Sub-processor list not maintained or shared with controllers |
|
|
143
|
+
| A.2.5.8 | Engagement of a Subcontractor | Obtain controller authorization before engaging a new sub-processor; flow down equivalent data protection obligations | Sub-processors engaged without controller authorization; no data protection clauses in sub-processor contracts |
|
|
144
|
+
| A.2.5.9 | Change of Subcontractor | Notify the controller in advance of any changes to sub-processors; provide the controller opportunity to object | Controllers not notified of sub-processor changes; no prior notice mechanism |
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
## Table A.3 — Shared Information Security Controls (29 controls)
|
|
149
|
+
|
|
150
|
+
Applies to **all organizations** (controllers and processors). These are information
|
|
151
|
+
security controls selected from the ISO 27001/27002:2022 framework, adapted to
|
|
152
|
+
support privacy protection.
|
|
153
|
+
|
|
154
|
+
| Control ID | Control Name | Privacy Relevance |
|
|
155
|
+
|-----------|--------------|------------------|
|
|
156
|
+
| A.3.3 | Information Security Policies | Policies must explicitly address privacy and PII protection |
|
|
157
|
+
| A.3.4 | Security Roles | Define privacy-relevant security roles; ensure DPO / privacy officer interactions |
|
|
158
|
+
| A.3.5 | Classification of Information | PII must be classified appropriately to drive correct handling controls |
|
|
159
|
+
| A.3.6 | Labelling of Information | Label PII-containing assets so handling controls are applied consistently |
|
|
160
|
+
| A.3.7 | Information Transfer | Controls on transferring PII between systems, people, and organizations |
|
|
161
|
+
| A.3.8 | Identity Management | Manage identities of all personnel with access to PII systems |
|
|
162
|
+
| A.3.9 | Access Rights | Restrict access to PII on a need-to-know / least-privilege basis |
|
|
163
|
+
| A.3.10 | Supplier Agreements | Supplier/vendor contracts must include appropriate privacy and data protection clauses |
|
|
164
|
+
| A.3.11 | Incident Management | Privacy breaches must be identified, reported, and managed within required timeframes |
|
|
165
|
+
| A.3.12 | Security Incident Response | Incident response plans must cover personal data breaches; GDPR 72-hour notification must be built in |
|
|
166
|
+
| A.3.13 | Legal and Regulatory Requirements | Identify and comply with all applicable privacy laws and regulations |
|
|
167
|
+
| A.3.14 | Protection of Records | Records containing PII must be protected against unauthorized access, loss, or destruction |
|
|
168
|
+
| A.3.15 | Independent Review | Periodic independent review of PIMS and privacy controls (internal or external audit) |
|
|
169
|
+
| A.3.16 | Compliance with Policies | Monitor and verify compliance with privacy policies and procedures |
|
|
170
|
+
| A.3.17 | Security Awareness and Training | Privacy training must be included in security awareness; role-based privacy training for high-risk roles |
|
|
171
|
+
| A.3.18 | Confidentiality Agreements | All personnel with access to PII must sign confidentiality / NDA agreements |
|
|
172
|
+
| A.3.19 | Clear Desk and Clear Screen | PII-containing physical documents and screen displays must be protected when unattended |
|
|
173
|
+
| A.3.20 | Storage Media | Removable media containing PII must be controlled; disposal must be secure |
|
|
174
|
+
| A.3.21 | Secure Disposal of Equipment | Equipment that held PII must be securely wiped before disposal or reuse |
|
|
175
|
+
| A.3.22 | User Endpoint Devices | Endpoints with access to PII must have appropriate security controls (encryption, MDM, screen lock) |
|
|
176
|
+
| A.3.23 | Secure Authentication | Strong authentication controls for systems processing PII; MFA recommended |
|
|
177
|
+
| A.3.24 | Information Backup | Backups of PII-containing systems must be protected with equivalent controls to primary systems |
|
|
178
|
+
| A.3.25 | Logging | Access to and processing of PII must be logged; logs must be protected against tampering |
|
|
179
|
+
| A.3.26 | Use of Cryptography | Encryption at rest and in transit for PII; key management procedures |
|
|
180
|
+
| A.3.27 | Secure Development Life Cycle | Privacy by design embedded in SDLC; privacy requirements defined before development begins |
|
|
181
|
+
| A.3.28 | Application Security | Applications processing PII must be tested for security vulnerabilities (including input validation, authentication) |
|
|
182
|
+
| A.3.29 | Secure System Architecture | System architecture must segregate PII and support principle of least privilege |
|
|
183
|
+
| A.3.30 | Outsourced Development | Privacy and security requirements must be flowed into outsourced development contracts |
|
|
184
|
+
| A.3.31 | Test Information | Live PII must not be used in test environments without authorization and equivalent controls |
|
|
185
|
+
|
|
186
|
+
---
|
|
187
|
+
|
|
188
|
+
## Control Counts Summary
|
|
189
|
+
|
|
190
|
+
| Table | Role | Controls | Combined with A.3 |
|
|
191
|
+
|-------|------|----------|-------------------|
|
|
192
|
+
| A.1 | PII Controller only | 31 | 31 + 29 = **60** |
|
|
193
|
+
| A.2 | PII Processor only | 18 | 18 + 29 = **47** |
|
|
194
|
+
| A.1 + A.2 | Both controller and processor | 49 | 49 + 29 = **78** |
|
|
195
|
+
| A.3 | All organizations | 29 | Always included |
|