Dataset Viewer
Auto-converted to Parquet Duplicate
Search is not available for this dataset
index
int64
Label
string
Identifier
string
Description
string
1
Policies for information security
5.1
Information security policy and topic-specific policies should be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occur. Purpose : To ensure continuing suitability, adequacy, ...
2
Information security roles and responsibilities
5.2
Information security roles and responsibilities should be defined and allocated according to the organization needs. Purpose : To establish a defined, approved and understood structure for the implementation, operation and management of information security within the organization.
3
Segregation of duties
5.3
Conflicting duties and conflicting areas of responsibility should be segregated. Purpose : To reduce the risk of fraud, error and bypassing of information security controls.
4
Management responsibilities
5.4
Management should require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization. Purpose : To ensure management understand their role in information security and undertake actions aiming to ensure all person...
5
Contact with authorities
5.5
The organization should establish and maintain contact with relevant authorities. Purpose : To ensure appropriate flow of information takes place with respect to information security between the organization and relevant legal, regulatory and supervisory authorities.
6
Contact with special interest groups
5.6
The organization should establish and maintain contact with special interest groups or other specialist security forums and professional associations. Purpose : To ensure appropriate flow of information takes place with respect to information security.
7
Threat intelligence
5.7
Information relating to information security threats should be collected and analysed to produce threat intelligence. Purpose : To provide awareness of the organization’s threat environment so that the appropriate mitigation actions can be taken.
8
Information security in project management
5.8
Information security should be integrated into project management. Purpose : To ensure information security risks related to projects and deliverables are effectively addressed in project management throughout the project life cycle.
9
Inventory of information and other associated assets
5.9
An inventory of information and other associated assets, including owners, should be developed and maintained. Purpose : To identify the organization’s information and other associated assets in order to preserve their information security and assign appropriate ownership.
10
Acceptable use of information and other associated assets
5.10
Rules for the acceptable use and procedures for handling information and other associated assets should be identified, documented and implemented. Purpose : To ensure information and other associated assets are appropriately protected, used and handled.
11
Return of assets
5.11
Personnel and other interested parties as appropriate should return all the organization’s assets in their possession upon change or termination of their employment, contract or agreement. Purpose : To protect the organization’s assets as part of the process of changing or terminating employment, contract or agreement.
12
Classification of information
5.12
Information should be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements. Purpose : To ensure identification and understanding of protection needs of information in accordance with its importance to the ...
13
Labelling of information
5.13
An appropriate set of procedures for information labelling should be developed and implemented in accordance with the information classification scheme adopted by the organization. Purpose : To facilitate the communication of classification of information and support automation of information processing and management.
14
Information transfer
5.14
Information transfer rules, procedures, or agreements should be in place for all types of transfer facilities within the organization and between the organization and other parties. Purpose : To maintain the security of information transferred within an organization and with any external interested party.
15
Access control
5.15
Rules to control physical and logical access to information and other associated assets should be established and implemented based on business and information security requirements. Purpose : To ensure authorized access and to prevent unauthorized access to information and other associated assets.
16
Identity management
5.16
The full life cycle of identities should be managed. Purpose : To allow for the unique identification of individuals and systems accessing the organization’s information and other associated assets and to enable appropriate assignment of access rights.
17
Authentication information
5.17
Allocation and management of authentication information should be controlled by a management process, including advising personnel on the appropriate handling of authentication information. Purpose : To ensure proper entity authentication and prevent failures of authentication processes.
18
Access rights
5.18
Access rights to information and other associated assets should be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy on and rules for access control. Purpose : To ensure access to information and other associated assets is defined and authorized according to the bus...
19
Information security in supplier relationships
5.19
Processes and procedures should be defined and implemented to manage the information security risks associated with the use of supplier’s products or services. Purpose : To maintain an agreed level of information security in supplier relationships.
20
Addressing information security within supplier agreements
5.20
Relevant information security requirements should be established and agreed with each supplier based on the type of supplier relationship. Purpose : To maintain an agreed level of information security in supplier relationships.
21
Managing information security in the ICT supply chain
5.21
Processes and procedures should be defined and implemented to manage the information security risks associated with the ICT products and services supply chain. Purpose : To maintain an agreed level of information security in supplier relationships.
22
Monitoring, review and change management of supplier services
5.22
The organization should regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery. Purpose : To maintain an agreed level of information security and service delivery in line with supplier agreements.
23
Information security for use of cloud services
5.23
Processes for acquisition, use, management and exit from cloud services should be established in accordance with the organization’s information security requirements. Purpose : To specify and manage information security for the use of cloud services.
24
Information security incident management planning and preparation
5.24
The organization should plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities. Purpose : To ensure quick, effective, consistent and orderly response to information security incidents, includ...
25
Assessment and decision on information security events
5.25
The organization should assess information security events and decide if they are to be categorized as information security incidents. Purpose : To ensure effective categorization and prioritization of information security events.
26
Response to information security incidents
5.26
Information security incidents should be responded to in accordance with the documented procedures. Purpose : To ensure efficient and effective response to information security incidents.
27
Learning from information security incidents
5.27
Knowledge gained from information security incidents should be used to strengthen and improve the information security controls. Purpose : To reduce the likelihood or consequences of future incidents.
28
Collection of evidence
5.28
The organization should establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events. Purpose : To ensure a consistent and effective management of evidence related to information security incidents for the Purpose :s of disciplina...
29
Information security during disruption
5.29
The organization should plan how to maintain information security at an appropriate level during disruption. Purpose : To protect information and other associated assets during disruption.
30
ICT readiness for business continuity
5.30
ICT readiness should be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements. Purpose : To ensure the availability of the organization’s information and other associated assets during disruption.
31
Legal, statutory, regulatory and contractual requirements
5.31
Legal, statutory, regulatory and contractual requirements relevant to information security and the organization’s approach to meet these requirements should be identified, documented and kept up to date. Purpose : To ensure compliance with legal, statutory, regulatory and contractual requirements related to information...
32
Intellectual property rights
5.32
The organization should implement appropriate procedures to protect intellectual property rights. Purpose : To ensure compliance with legal, statutory, regulatory and contractual requirements related to intellectual property rights and use of proprietary products.
33
Protection of records
5.33
Records should be protected from loss, destruction, falsification, unauthorized access and unauthorized release. Purpose : To ensure compliance with legal, statutory, regulatory and contractual requirements, as well as community or societal expectations related to the protection and availability of records.
34
Privacy and protection of PII
5.34
The organization should identify and meet the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements. Purpose : To ensure compliance with legal, statutory, regulatory and contractual requirements related to the information secur...
35
Independent review of information security
5.35
The organization’s approach to managing information security and its implementation including people, processes and technologies should be reviewed independently at planned intervals, or when significant changes occur. Purpose : To ensure the continuing suitability, adequacy and effectiveness of the organization’s appr...
36
Compliance with policies, rules and standards for information security
5.36
Compliance with the organization’s information security policy, topic-specific policies, rules and standards should be regularly reviewed. Purpose : To ensure that information security is implemented and operated in accordance with the organization’s information security policy, topic-specific policies, rules and stand...
37
Documented operating procedures
5.37
Operating procedures for information processing facilities should be documented and made available to personnel who need them. Purpose : To ensure the correct and secure operation of information processing facilities.
39
Screening
6.1
Background verification checks on all candidates to become personnel should be carried out prior to joining the organization and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed an...
40
Terms and conditions of employment
6.2
The employment contractual agreements should state the personnel’s and the organization’s responsibilities for information security. Purpose : To ensure personnel understand their information security responsibilities for the roles for which they are considered.
41
Information security awareness, education and training
6.3
Personnel of the organization and relevant interested parties should receive appropriate information security awareness, education and training and regular updates of the organization's information security policy, topic-specific policies and procedures, as relevant for their job function. Purpose : To ensure personnel...
42
Disciplinary process
6.4
A disciplinary process should be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation. Purpose : To ensure personnel and other relevant interested parties understand the consequences of information security policy...
43
Responsibilities after termination or change of employment
6.5
Information security responsibilities and duties that remain valid after termination or change of employment should be defined, enforced and communicated to relevant personnel and other interested parties. Purpose : To protect the organization’s interests as part of the process of changing or terminating employment or ...
44
Confidentiality or non-disclosure agreements
6.6
Confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information should be identified, documented, regularly reviewed and signed by personnel and other relevant interested parties. Purpose : To maintain confidentiality of information accessible by personnel or external ...
45
Remote working
6.7
Security measures should be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization’s premises. Purpose : To ensure the security of information when personnel are working remotely.
46
Information security event reporting
6.8
The organization should provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner. Purpose : To support timely, consistent and effective reporting of information security events that can be identified by personnel.
48
Physical security perimeters
7.1
Security perimeters should be defined and used to protect areas that contain information and other associated assets. Purpose : To prevent unauthorized physical access, damage and interference to the organization’s information and other associated assets.
49
Physical entry
7.2
Secure areas should be protected by appropriate entry controls and access points. Purpose : To ensure only authorized physical access to the organization’s information and other associated assets occurs.
50
Securing offices, rooms and facilities
7.3
Physical security for offices, rooms and facilities should be designed and implemented. Purpose : To prevent unauthorized physical access, damage and interference to the organization’s information and other associated assets in offices, rooms and facilities.
51
New Physical security monitoring
7.4
Premises should be continuously monitored for unauthorized physical access. Purpose : To detect and deter unauthorized physical access.
52
Protecting against physical and environmental threats
7.5
Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure should be designed and implemented. Purpose : To prevent or reduce the consequences of events originating from physical and environmental threats.
53
Working in secure areas
7.6
Security measures for working in secure areas should be designed and implemented. Purpose : To protect information and other associated assets in secure areas from damage and unauthorized interference by personnel working in these areas.
54
Clear desk and clear screen
7.7
Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities should be defined and appropriately enforced. Purpose : To reduce the risks of unauthorized access, loss of and damage to information on desks, screens and in other accessible locations during and outsid...
55
Equipment siting and protection
7.8
Equipment should be sited securely and protected. Purpose : To reduce the risks from physical and environmental threats, and from unauthorized access and damage.
56
Security of assets off-premises
7.9
Off-site assets should be protected. Purpose : To prevent loss, damage, theft or compromise of off-site devices and interruption to the organization’s operations.
57
Storage media
7.10
Storage media should be managed through their life cycle of acquisition, use, transportation and disposal in accordance with the organization’s classification scheme and handling requirements. Purpose : To ensure only authorized disclosure, modification, removal or destruction of information on storage media.
58
Supporting utilities
7.11
Information processing facilities should be protected from power failures and other disruptions caused by failures in supporting utilities. Purpose : To prevent loss, damage or compromise of information and other associated assets, or interruption to the organization’s operations due to failure and disruption of suppor...
59
Cabling security
7.12
Cables carrying power, data or supporting information services should be protected from interception, interference or damage. Purpose : To prevent loss, damage, theft or compromise of information and other associated assets and interruption to the organization’s operations related to power and communications cabling.
60
Equipment maintenance
7.13
Equipment should be maintained correctly to ensure availability, integrity and confidentiality of information. Purpose : To prevent loss, damage, theft or compromise of information and other associated assets and interruption to the organization’s operations caused by lack of maintenance.
61
Secure disposal or re-use of equipment
7.14
Items of equipment containing storage media should be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use. Purpose : To prevent leakage of information from equipment to be disposed or re-used.
63
User endpoint devices
8.1
Information stored on, processed by or accessible via user endpoint devices should be protected. Purpose : To protect information against the risks introduced by using user endpoint devices.
64
Privileged access rights
8.2
The allocation and use of privileged access rights should be restricted and managed. Purpose : To ensure only authorized users, software components and services are provided with privileged access rights.
65
Information access restriction
8.3
Access to information and other associated assets should be restricted in accordance with the established topic-specific policy on access control. Purpose : To ensure only authorized access and to prevent unauthorized access to information and other associated assets.
66
Access to source code
8.4
Read and write access to source code, development tools and software libraries should be appropriately managed. Purpose : To prevent the introduction of unauthorized functionality, avoid unintentional or malicious changes and to maintain the confidentiality of valuable intellectual property.
67
Secure authentication
8.5
Secure authentication technologies and procedures should be implemented based on information access restrictions and the topic-specific policy on access control. Purpose : To ensure a user or an entity is securely authenticated, when access to systems, applications and services is granted.
68
Capacity management
8.6
The use of resources should be monitored and adjusted in line with current and expected capacity requirements. Purpose : To ensure the required capacity of information processing facilities, human resources, offices and other facilities.
69
Protection against malware
8.7
Protection against malware should be implemented and supported by appropriate user awareness. Purpose : To ensure information and other associated assets are protected against malware.
70
Management of technical vulnerabilities
8.8
Information about technical vulnerabilities of information systems in use should be obtained, the organization’s exposure to such vulnerabilities should be evaluated and appropriate measures should be taken. Purpose : To prevent exploitation of technical vulnerabilities.
71
Configuration management
8.9
Configurations, including security configurations, of hardware, software, services and networks should be established, documented, implemented, monitored and reviewed. Purpose : To ensure hardware, software, services and networks function correctly with required security settings, and configuration is not altered by un...
72
Information deletion
8.10
Information stored in information systems, devices or in any other storage media should be deleted when no longer required. Purpose : To prevent unnecessary exposure of sensitive information and to comply with legal, statutory, regulatory and contractual requirements for information deletion.
73
Data masking
8.11
Data masking should be used in accordance with the organization’s topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration. Purpose : To limit the exposure of sensitive data including PII, and to comply with legal, sta...
74
Data leakage prevention
8.12
Data leakage prevention measures should be applied to systems, networks and any other devices that process, store or transmit sensitive information. Purpose : To detect and prevent the unauthorized disclosure and extraction of information by individuals or systems.
75
Information backup
8.13
Backup copies of information, software and systems should be maintained and regularly tested in accordance with the agreed topic-specific policy on backup. Purpose : To enable recovery from loss of data or systems.
76
Redundancy of information processing facilities
8.14
Information processing facilities should be implemented with redundancy sufficient to meet availability requirements. Purpose : To ensure the continuous operation of information processing facilities.
77
Logging
8.15
Logs that record activities, exceptions, faults and other relevant events should be produced, stored, protected and analysed. Purpose : To record events, generate evidence, ensure the integrity of log information, prevent against unauthorized access, identify information security events that can lead to an information ...
78
Monitoring activities
8.16
Networks, systems and applications should be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents. Purpose : To detect anomalous behaviour and potential information security incidents.
79
Clock synchronization
8.17
The clocks of information processing systems used by the organization should be synchronized to approved time sources. Purpose : To enable the correlation and analysis of security-related events and other recorded data, and to support investigations into information security incidents.
80
Use of privileged utility programs
8.18
The use of utility programs that can be capable of overriding system and application controls should be restricted and tightly controlled. Purpose : To ensure the use of utility programs does not harm system and application controls for information security.
81
Installation of software on operational systems
8.19
Procedures and measures should be implemented to securely manage software installation on operational systems. Purpose : To ensure the integrity of operational systems and prevent exploitation of technical vulnerabilities.
82
Networks security
8.20
Networks and network devices should be secured, managed and controlled to protect information in systems and applications. Purpose : To protect information in networks and its supporting information processing facilities from compromise via the network.
83
Security of network services
8.21
Security mechanisms, service levels and service requirements of network services should be identified, implemented and monitored. Purpose : To ensure security in the use of network services.
84
Segregation of networks
8.22
Groups of information services, users and information systems should be segregated in the organization’s networks. Purpose : To split the network in security boundaries and to control traffic between them based on business needs.
85
Web filtering
8.23
Access to external websites should be managed to reduce exposure to malicious content. Purpose : To protect systems from being compromised by malware and to prevent access to unauthorized web resources.
86
Use of cryptography
8.24
Rules for the effective use of cryptography, including cryptographic key management, should be defined and implemented. Purpose : To ensure proper and effective use of cryptography to protect the confidentiality, authenticity or integrity of information according to business and information security requirements, and t...
87
Secure development life cycle
8.25
Rules for the secure development of software and systems should be established and applied. Purpose : To ensure information security is designed and implemented within the secure development life cycle of software and systems.
88
Application security requirements
8.26
Information security requirements should be identified, specified and approved when developing or acquiring applications. Purpose : To ensure all information security requirements are identified and addressed when developing or acquiring applications.
89
Secure system architecture and engineering principles
8.27
Principles for engineering secure systems should be established, documented, maintained and applied to any information system development activities. Purpose : To ensure information systems are securely designed, implemented and operated within the development life cycle.
90
Secure coding
8.28
Secure coding principles should be applied to software development. Purpose : To ensure software is written securely thereby reducing the number of potential information security vulnerabilities in the software.
91
Security testing in development and acceptance
8.29
Security testing processes should be defined and implemented in the development life cycle. Purpose : To validate if information security requirements are met when applications or code are deployed to the production environment.
92
Outsourced development
8.30
The organization should direct, monitor and review the activities related to outsourced system development. Purpose : To ensure information security measures required by the organization are implemented in outsourced system development.
93
Separation of development, test and production environments
8.31
Development, testing and production environments should be separated and secured. Purpose : To protect the production environment and data from compromise by development and test activities.
94
Change management
8.32
Changes to information processing facilities and information systems should be subject to change management procedures. Purpose : To preserve information security when executing changes.
95
Test information
8.33
Test information should be appropriately selected, protected and managed. Purpose : To ensure relevance of testing and protection of operational information used for testing.
96
Protection of information systems during audit testing
8.34
Audit tests and other assurance activities involving assessment of operational systems should be planned and agreed between the tester and appropriate management. Purpose : To minimize the impact of audit and other assurance activities on operational systems and business processes.
README.md exists but content is empty.
Downloads last month
7