Buscar

Checklist-ISO-27001

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 3, do total de 7 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 6, do total de 7 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Prévia do material em texto

ISO 27001 CHECKLIST TEMPLATE 
ISO 27001 CONTROL IMPLEMENTATION PHASES TASKS IN COMPLIANCE? NOTES
5
5.1
Security Policies exist?
5.1.1 Policies for information security
All policies approved by 
management?
Evidence of compliance?
6
6.1
6.1.1 Security roles and responsibilities Roles and responsibilities defined?
6.1.2 Segregation of duties Segregation of duties defined?
6.1.3 Contact with authorities
Verification body / authority 
contacted for compliance 
verification?
6.1.4
Contact with special interest 
groups
Establish contact with special 
interest groups regarding 
compliance?
6.1.5
Information security in project 
management
Evidence of information security in 
project management? 
6.2
6.2.1 Mobile device policy Defined policy for mobile devices?
6.2.2 Teleworking
Defined policy for working 
remotely?
7
7.1
7.1.1 Screening
Defined policy for screening 
employees prior to employment?
7.1.2
Terms and conditions of 
employment
Defined policy for HR terms and 
conditions of employment?
7.2
7.2.1 Management responsibilities
Defined policy for management 
responsibilities? 
7.2.2
Information security awareness, 
education, and training
Defined policy for information 
security awareness, education, 
and training? 
7.2.3 Disciplinary process
Defined policy for 
disciplinary process regarding 
information security? 
Information Security Policies
Human resource security
Mobile devices and teleworking
information security roles and responsibilities
Organization of information security
Management direction for information security
During employment
Prior to employment
https://bit.ly/2VmHe9C
7.3
7.3.1
Termination or change of 
employment responsibilities
Defined policy for HR termination 
or change-of-employment policy 
regarding information security? 
8
8.1
8.1.1 Inventory of assets Complete inventory list of assets?
8.1.2 Ownership of assets Complete ownership list of assets
8.1.3 Acceptable use of assets
Defined "acceptable use" of assets 
policy
8.1.4 Return of assets Defined return of assets policy?
8.2
8.2.1 Classification of information
Defined policy for classification 
of information? 
8.2.2 Labeling of information
Defined policy for labeling 
information? 
8.2.3 Handling of assets
Defined policy for handling 
of assets? 
8.3
8.3.1
Management of removable 
media
Defined policy for management 
of removable media? 
8.3.2 Disposal of media
Defined policy for disposal 
of media? 
8.3.3. Physical media transfer
Defined policy for physical 
media transfer? 
9
9.1
9.1.1 Access policy control
Defined policy for access 
control policy? 
9.1.2
Access to networks and 
network services
Defined policy for access to 
networks and network services? 
9.2
9.2.1
User registration and de-
registration
Defined policy for user asset 
registration and de-registration? 
9.2.2 User access provisioning
Defined policy for user access 
provisioning? 
9.2.3
Management of privileged 
access rights
Defined policy for management 
of privileged access rights? 
Responsibilities for assets
Asset management
Termination and change of employment
Responsibilities for assets
Responsibilities for assets
Access control
Media handling
Information classification
9.2.4
Management of secret 
authentication information of users
Defined policy for management 
of secret authentication 
information of users? 
9.2.5 Review of user access rights
Defined policy for review of user 
access rights? 
9.2.6
Removal or adjustment 
of access rights
Defined policy for removal or 
adjustment of access rights? 
9.3
9.3.1
Use of secret authentication 
information
Defined policy for use of secret 
authentication information? 
9.4
9.4.1 Information access restrictions
Defined policy for information 
access restrictions? 
9.4.2 Secure log-on procedures
Defined policy for secure log-in 
procedures? 
9.4.3 Password management system
Defined policy for password 
management systems? 
9.4.4 Use of privileged utility programs
Defined policy for use of 
privileged utility programs? 
9.4.5
Access control to program source 
code
Defined policy for access control 
to program source code? 
10
10.1
10.1.1
Policy on the use of 
cryptographic controls
Defined policy for use of 
cryptographic controls? 
10.1.2 Key management
Defined policy for key 
management? 
11
11.1
11.1.1 Physical security perimeter
Defined policy for physical security 
perimeter? 
11.1.2 Physical entry controls
Defined policy for physical entry 
controls? 
11.1.3
Securing offices, rooms and 
facilities
Defined policy for securing offices, 
rooms and facilities? 
11.1.4
Protection against external and 
environmental threats
Defined policy for protection 
against external and 
environmental threats? 
11.1.5 Working in secure areas
Defined policy for working in 
secure areas? 
11.1.6 Delivery and loading areas
Defined policy for delivery and 
loading areas? 
Physical and environmental security
Cryptographic controls
Cryptography
System and application access control
User responsibilities
Secure areas
11.2
11.2.1 Equipment siting and protection
Defined policy for equipment siting 
and protection? 
11.2.2 Supporting utilities
Defined policy for supporting 
utilities? 
11.2.3 Cabling security
Defined policy for cabling 
security? 
11.2.4 Equipment maintenance
Defined policy for equipment 
maintenance? 
11.2.5 Removal of assets
Defined policy for removal of 
assets? 
11.2.6
Security of equipment and assets 
off-premises
Defined policy for security of 
equipment and assets off-
premises? 
11.2.7
Secure disposal or re-use of 
equipment
Secure disposal or re-use of 
equipment? 
11.2.8 Unattended user equipment
Defined policy for unattended user 
equipment? 
11.2.9 Clear desk and clear screen policy
Defined policy for clear desk and 
clear screen policy? 
12
12.1
12.1.1
Documented operating 
procedures
Defined policy for documented 
operating procedures? 
12.1.2 Change management
Defined policy for change 
management? 
12.1.3 Capacity management
Defined policy for capacity 
management? 
12.1.4
Separation of development, 
testing and operational 
environments
Defined policy for separation of 
development, testing and 
operational environments? 
12.2
12.2.1 Controls against malware
Defined policy for controls against 
malware? 
12.3
12.3.1 Backup
Defined policy for backing up 
systems? 
12.3.2 Information Backup
Defined policy for information 
backup? 
12.4
12.4.1 Event logging Defined policy for event logging? 
Protection from malware
Operational procedures and responsibilities
Operations security
Equipment
Logging and Monitoring
System Backup
12.4.2 Protection of log information
Defined policy for protection of 
log information? 
12.4.3 Administrator and operator log
Defined policy for administrator 
and operator log?
12.4.4 Clock synchronization
Defined policy for clock 
synchronization? 
12.5
12.5.1
Installation of software on 
operational systems
Defined policy for installation of 
software on operational systems?
12.6
12.6.1
Management of technical 
vulnerabilities
Defined policy for management of 
technical vulnerabilities?
12.6.2 Restriction on software installation
Defined policy for restriction on 
software installation? 
12.7
12.7.1 Information system audit control
Defined policy for information 
system audit control? 
13
13.1
13.1.1 Network controls
Defined policy for network 
controls? 
13.1.2 Security of network services
Defined policy for security of 
network services? 
13.1.3 Segregation in networks
Defined policy for segregation in 
networks?
13.2
13.2.1
Information transfer policies and 
procedures
Defined policy for information 
transfer policies and procedures? 
13.2.2
Agreements on information 
transfer
Defined policy for agreements on 
information transfer? 
13.2.3 Electronic messaging
Defined policy for electronic 
messaging? 
13.2.4
Confidentialityor non-disclosure 
agreements
Defined policy for confidentiality 
or non-disclosure agreements?
13.2.5
System acquisition, development 
and maintenance
Defined policy for system 
acquisition, development and 
maintenance? 
14
14.1
14.1.1
Information security requirements 
analysis and specification
Defined policy for information 
security requirements analysis and 
specification? 
Information systems audit considerations
Technical vulnerability management
Control of operational software
Security requirements of information systems
System acquisition, development and maintenance
Information transfer
Network security management
Communications security
14.1.2
Securing application services on 
public networks
Defined policy for securing 
application services on public 
networks? 
14.1.3
Protecting application service 
transactions
Defined policy for protecting 
application service transactions? 
14.2
14.2.1 In-house development
Defined policy for in-house 
development? 
15
15.1.1 Suppliers relationships
Defined policy for supplier 
relationships? 
16
16.1.1 Information security management
Defined policy for information 
security management? 
17
17.1
17.1.1 Information security continuity 
Defined policy for information 
security continuity? 
17.2
17.2.1 Redundancies Defined policy for redundancies? 
18
18.1
18.1.1
Identification of applicable 
legislation and contractual 
requirement
Defined policy for identification of 
applicable legislation and 
contractual requirement? 
18.1.2 Intellectual property rights
Defined policy for intellectual 
property rights? 
18.1.3 Protection of records
Defined policy for protection of 
records? 
18.1.4
Privacy and protection of 
personally identifiable information
Defined policy for privacy and 
protection of personally 
identifiable information? 
18.1.5
Regulation of cryptographic 
control
Defined policy for regulation of 
cryptographic control?
18.1
18.1.1
Compliance with security policies 
and standards
Defined policy for compliance 
with security policies and 
standards? 
18.1.2 Technical compliance review
Defined policy for technical 
compliance review? 
Information security continuity
Information security aspects of business continuity management
Information security incident management
Suppliers relationships
Security in development and support processes
Independent review of information security
Compliance with legal and contractual requirements
Compliance
Redundancies
DISCLAIMER 
Any articles, templates, or information provided by Smartsheet on the website are for 
reference only. While we strive to keep the information up to date and correct, we make no 
representations or warranties of any kind, express or implied, about the completeness, 
accuracy, reliability, suitability, or availability with respect to the website or the information, 
articles, templates, or related graphics contained on the website. Any reliance you place on 
such information is therefore strictly at your own risk.
This template is provided as a sample only. This template is in no way meant as legal or 
compliance advice. Users of the template must determine what information is necessary 
and needed to accomplish their objectives. 
	Security Policies exist: 
	All policies approved by management: 
	Evidence of compliance: 
	Roles and responsibilities defined: 
	Segregation of duties defined: 
	Verification body authority contacted for compliance verification: 
	Establish contact with specia interest groups regarding compliance: 
	Evidence of information security in pro ect management: 
	Defined policy for mobile devices: 
	Defined policy for working remotely: 
	Defined policy for screening employees prior to employment: 
	Defined policy for HR terms and conditions of employment: 
	Defined policy for management responsibilities: 
	Defined policy for information security awareness education and training: 
	Defined policy for disciplinary process regarding information security: 
	Defined policy for HR termination or changeofemployment policy regarding information security: 
	Complete inventory list of assets: 
	Complete ownership list of assets: 
	Defined acceptable use of assets policy: 
	Defined return of assets policy: 
	Defined policy for classification of information: 
	Defined policy for labeling information: 
	Defined policy for handling of assets: 
	Defined policy for management of removable media: 
	Defined policy for disposa of media: 
	Defined policy for physica media transfer: 
	Defined policy for access contro policy: 
	Defined policy for access to networks and network services: 
	Defined policy for user asset registration and deregistration: 
	Defined policy for user access provisioning: 
	Defined policy for management of privileged access rights: 
	Defined policy for management of secret authentication information of users: 
	Defined policy for review of user access rights: 
	Defined policy for remova or ad ustment of access rights: 
	Defined policy for use of secret authentication information: 
	Defined policy for information access restrictions: 
	Defined policy for secure login procedures: 
	Defined policy for password management systems: 
	Defined policy for use of privileged utility programs: 
	Defined policy for access contro to program source code: 
	Defined policy for use of cryptographic controls: 
	Defined policy for key management: 
	Defined policy for physica security perimeter: 
	Defined policy for physica entry controls: 
	Defined policy for securing offices rooms and facilities: 
	Defined policy for protection against externa and environmenta threats: 
	Defined policy for working in secure areas: 
	Defined policy for delivery and loading areas: 
	Defined policy for equipment siting and protection: 
	Defined policy for supporting utilities: 
	Defined policy for cabling security: 
	Defined policy for equipment maintenance: 
	Defined policy for remova of assets: 
	Defined policy for security of equipment and assets off premises: 
	Secure disposa or reuse of equipment: 
	Defined policy for unattended user equipment: 
	Defined policy for clear desk and clear screen policy: 
	Defined policy for documented operating procedures: 
	Defined policy for change management: 
	Defined policy for capacity management: 
	Defined policy for separation of development testing and operationa environments: 
	Defined policy for controls against malware: 
	Defined policy for backing up systems: 
	Defined policy for information backup: 
	Defined policy for event logging: 
	Defined policy for protection of log information: 
	Defined policy for administrator and operator log: 
	Defined policy for clock synchronization: 
	Defined policy for installation of software on operationa systems: 
	Defined policy for management of technica vulnerabilities: 
	Defined policy for restriction on software installation: 
	Defined policy for information system audit control: 
	Defined policy for network controls: 
	Defined policy for security of network services: 
	Defined policy for segregation in networks: 
	Defined policy for information transfer policies and procedures: 
	Defined policy for agreements on information transfer: 
	Defined policy for electronic messaging: 
	Defined policy for confidentiality or nondisclosure agreements: 
	Defined policy for system acquisition development and maintenance: 
	Defined policy for information security requirements analysis and specification: 
	Defined policy for securing application services on public networks: 
	Defined policy for protecting application service transactions: 
	Defined policy for inhouse development: 
	Defined policy for supplier relationships: 
	Defined policy for information security management: 
	Defined policy for information security continuity: 
	Defined policy for redundancies: 
	Defined policy for identification of applicable legislation and contractua requirement: 
	Defined policy for intellectua property rights: 
	Defined policy for protection of records:Defined policy for privacy and protection of personally identifiable information: 
	Defined policy for regulation of cryptographic control: 
	Defined policy for compliance with security policies and standards: 
	Defined policy for technica compliance review: 
	Check Box1: Off
	Check Box2: Off
	Check Box3: Off
	Check Box4: Off
	Check Box5: Off
	Check Box6: Off
	Check Box613: Off
	Check Box612: Off
	Check Box611: Off
	Check Box610: Off
	Check Box69: Off
	Check Box68: Off
	Check Box67: Off
	Check Box66: Off
	Check Box65: Off
	Check Box64: Off
	Check Box63: Off
	Check Box62: Off
	Check Box61: Off
	Check Box515: Off
	Check Box514: Off
	Check Box513: Off
	Check Box512: Off
	Check Box511: Off
	Check Box510: Off
	Check Box59: Off
	Check Box58: Off
	Check Box57: Off
	Check Box56: Off
	Check Box55: Off
	Check Box54: Off
	Check Box53: Off
	Check Box52: Off
	Check Box51: Off
	Check Box416: Off
	Check Box415: Off
	Check Box414: Off
	Check Box413: Off
	Check Box412: Off
	Check Box411: Off
	Check Box410: Off
	Check Box49: Off
	Check Box48: Off
	Check Box47: Off
	Check Box46: Off
	Check Box45: Off
	Check Box44: Off
	Check Box43: Off
	Check Box42: Off
	Check Box41: Off
	Check Box316: Off
	Check Box315: Off
	Check Box314: Off
	Check Box313: Off
	Check Box312: Off
	Check Box311: Off
	Check Box310: Off
	Check Box39: Off
	Check Box38: Off
	Check Box37: Off
	Check Box36: Off
	Check Box35: Off
	Check Box34: Off
	Check Box33: Off
	Check Box32: Off
	Check Box31: Off
	Check Box215: Off
	Check Box214: Off
	Check Box213: Off
	Check Box212: Off
	Check Box211: Off
	Check Box210: Off
	Check Box29: Off
	Check Box28: Off
	Check Box27: Off
	Check Box26: Off
	Check Box25: Off
	Check Box24: Off
	Check Box23: Off
	Check Box22: Off
	Check Box21: Off
	Check Box114: Off
	Check Box113: Off
	Check Box112: Off
	Check Box111: Off
	Check Box110: Off
	Check Box19: Off
	Check Box18: Off
	Check Box17: Off
	Check Box16: Off
	Check Box15: Off
	Check Box14: Off
	Check Box13: Off
	Check Box12: Off
	Check Box11: Off

Outros materiais