Updated 2022-10-17 19:09

https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New

27001/2013/control-New

About https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
iso:correspondsTo Configuration management
Data masking
Monitoring activities
Secure coding
Web filtering
Data leakage prevention
ICT readiness for business continuity
Information deletion
Information security for use of cloud services
Physical security monitoring
Threat intelligence
Show more

Outsourced development

27002/2022/control-8.30

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should direct, monitor and review the activities related to outsourced system development
About Outsourced development
dcterms:description The organization should direct, monitor and review the activities related to outsourced system development
dcterms:identifier 27002/2022/control-8.30
dcterms:title Outsourced development
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Outsourced development
hasControlType Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Identify
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
Supplier and Relationship Security
System Network Security
iso:hasRelatedControls Intellectual property rights
Separation of development, test and production environments
https://par-tec.github.io/security-ontologies/onto/iso#27002/2022/control-8.25-8.29
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure information security measures required by the organization are implemented in outsourced system development
Show more

Access control

27002/2022/control-5.15

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules to control physical and logical access to information and other associated assets should be established and implemented based on business and information security requirements
About Access control
dcterms:description Rules to control physical and logical access to information and other associated assets should be established and implemented based on business and information security requirements
dcterms:identifier 27002/2022/control-5.15
dcterms:title Access control
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Access control policy
Access to networks and network services
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
iso:hasRelatedControls Access rights
Access to source code
Application security requirements
Authentication information
Classification of information
Identity management
Labelling of information
Logging
Physical entry controls
Privacy and protection of PII
Privileged access rights
Protection of records
Secure authentication
Use of privileged utility programs
Acceptable use of information and associated assets
Identification of legal, statutory, regulatory and contractual requirements
Information access restriction
Information security roles and responsibilities
Intellectual property rights
Physical security monitoring
Securing offices, rooms and facilities
Segregation of duties
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure authorized access and to prevent unauthorized access to information and other associated assets
Show more

Access rights

27002/2022/control-5.18

https://par-tec.github.io/security-ontologies/onto/iso#Control

Access rights to information and other associated assets should be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy and rules on access control
About Access rights
dcterms:description Access rights to information and other associated assets should be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy and rules on access control
dcterms:identifier 27002/2022/control-5.18
dcterms:title Access rights
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Removal or adjustment of access rights
Review of user access rights
User access provisioning
hasControlType Preventive
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
iso:hasRelatedControls Access control
Authentication information
Confidentiality or non-disclosure agreements
Disciplinary process
Screening
Addressing information security within supplier agreements
Inventory of information and other associated assets
Responsibilities after termination or change of employment
Segregation of duties
Terms and conditions of employment
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure only authorized access to information and other associated assets
Show more

Access to source code

27002/2022/control-8.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Read and write access to source code, development tools and software libraries should be appropriately managed
About Access to source code
dcterms:description Read and write access to source code, development tools and software libraries should be appropriately managed
dcterms:identifier 27002/2022/control-8.4
dcterms:title Access to source code
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Access control to program source code
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
Identity and Access Management
iso:hasRelatedControls Change management
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent the introduction of unauthorized functionality, avoid unintentional or malicious changes and to maintain the confidentiality of valuable intellectual property
Show more

Application security requirements

27002/2022/control-8.26

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security requirements should be identified, specified and approved when developing or acquiring applications
About Application security requirements
dcterms:description Information security requirements should be identified, specified and approved when developing or acquiring applications
dcterms:identifier 27002/2022/control-8.26
dcterms:title Application security requirements
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Protecting application services transactions
Securing application services on public networks
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
System Network Security
iso:hasRelatedControls Authentication information
Privileged access rights
Secure authentication
Use of cryptography
https://par-tec.github.io/security-ontologies/onto/iso#27002/2022/control-5.31-5.36
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To ensure all information security requirements are identified and addressed when developing or acquiring applications
Show more

Authentication information

27002/2022/control-5.17

https://par-tec.github.io/security-ontologies/onto/iso#Control

Allocation and management of authentication information should be controlled by a management process, including advising personnel of appropriate handling of authentication information
About Authentication information
dcterms:description Allocation and management of authentication information should be controlled by a management process, including advising personnel of appropriate handling of authentication information
dcterms:identifier 27002/2022/control-5.17
dcterms:title Authentication information
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Management of secret authentication information of users
Password management system
Use of secret authentication information
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
iso:hasRelatedControls Terms and conditions of employment
Use of cryptography
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure proper entity authentication and prevent failures of authentication processes
Show more

Cabling security

27002/2022/control-7.12

https://par-tec.github.io/security-ontologies/onto/iso#Control

Cables carrying power, data or supporting information services should be protected from interception, interference or damage
About Cabling security
dcterms:description Cables carrying power, data or supporting information services should be protected from interception, interference or damage
dcterms:identifier 27002/2022/control-7.12
dcterms:title Cabling security
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Cabling security
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
hasOperationalCapability Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent loss, damage, theft or compromise of information and other associated assets and interruption to the organization’s operations due to failure in power and communications cabling
Show more

Capacity management

27002/2022/control-8.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

The use of resources should be monitored and adjusted in line with current and expected capacity requirements
About Capacity management
dcterms:description The use of resources should be monitored and adjusted in line with current and expected capacity requirements
dcterms:identifier 27002/2022/control-8.6
dcterms:title Capacity management
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Capacity management
hasControlType Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Identify
Protect
hasInformationSecurityProperty Availability
hasOperationalCapability Continuity
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure the required capacity of information processing facilities
Show more

Change management

27002/2022/control-8.32

https://par-tec.github.io/security-ontologies/onto/iso#Control

Changes to information processing facilities and information systems should be subject to change management procedures
About Change management
dcterms:description Changes to information processing facilities and information systems should be subject to change management procedures
dcterms:identifier 27002/2022/control-8.32
dcterms:title Change management
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Change management
Restrictions on changes to software packages
System change control procedures
Technical review of applications after operating platform changes
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
System Network Security
iso:hasRelatedControls Documented operating procedures
Security testing in development and acceptance
ICT readiness for business continuity
Separation of development, test and production environments
hasInformationSecurityProperty Protection and Risk
iso:purpose To preserve information security when executing changes
Show more

Classification of information

27002/2022/control-5.12

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information should be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements
About Classification of information
dcterms:description Information should be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements
dcterms:identifier 27002/2022/control-5.12
dcterms:title Classification of information
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Classification of information
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Protection
iso:hasRelatedControls Access control
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To ensure identification and understanding of protection needs of information in accordance with its importance to the organization
Show more

Clock synchronization

27002/2022/control-8.17

https://par-tec.github.io/security-ontologies/onto/iso#Control

The clocks of information processing systems used by the organization should be synchronized to approved time sources
About Clock synchronization
dcterms:description The clocks of information processing systems used by the organization should be synchronized to approved time sources
dcterms:identifier 27002/2022/control-8.17
dcterms:title Clock synchronization
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Clock synchronization
hasControlType Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Protect
hasInformationSecurityProperty Integrity
hasOperationalCapability Information Security Event Management
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To enable the correlation and analysis of security-related events and other recorded data, and to support investigations into information security incidents
Show more

Collection of evidence

27002/2022/control-5.28

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should establish and implement procedures for the identification, collection, acquisition and preservation of information from information security incidents
About Collection of evidence
dcterms:description The organization should establish and implement procedures for the identification, collection, acquisition and preservation of information from information security incidents
dcterms:identifier 27002/2022/control-5.28
dcterms:title Collection of evidence
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Collection of evidence
hasControlType Corrective
Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
hasInformationSecurityProperty Defence and Security
iso:purpose To ensure a consistent and effective management of evidence related to information security incidents for the purposes of disciplinary and legal action
Show more

Confidentiality or non-disclosure agreements

27002/2022/control-6.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

Confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information should be identified, documented, regularly reviewed and signed by personnel and other relevant interested parties
About Confidentiality or non-disclosure agreements
dcterms:description Confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information should be identified, documented, regularly reviewed and signed by personnel and other relevant interested parties
dcterms:identifier 27002/2022/control-6.6
dcterms:title Confidentiality or non-disclosure agreements
rdf:type Control
iso:controlCategory People
iso:correspondsTo Confidentiality or nondisclosure agreements
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
hasOperationalCapability Human Resources Security
Information Protection
Supplier and Relationship Security
iso:hasRelatedControls Privacy and protection of PII
Protection of records
Identification of legal, statutory, regulatory and contractual requirements
Intellectual property rights
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To maintain confidentiality of information accessible by personnel or external parties
Show more

Configuration management

27002/2022/control-8.9

https://par-tec.github.io/security-ontologies/onto/iso#Control

Configurations, including security configurations, of hardware, software, services and networks should be established, documented, implemented, monitored and reviewed
About Configuration management
dcterms:description Configurations, including security configurations, of hardware, software, services and networks should be established, documented, implemented, monitored and reviewed
dcterms:identifier 27002/2022/control-8.9
dcterms:title Configuration management
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Secure Configuration
iso:hasRelatedControls Change management
Intellectual property rights
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure hardware, software, services and networks function correctly with required security settings, and configuration is not altered by unauthorized or incorrect changes
Show more

Contact with authorities

27002/2022/control-5.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should establish and maintain contact with relevant authorities
About Contact with authorities
dcterms:description The organization should establish and maintain contact with relevant authorities
dcterms:identifier 27002/2022/control-5.5
dcterms:title Contact with authorities
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Contact with authorities
hasControlType Corrective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
Recover
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
iso:hasRelatedControls Collection of evidence
Assessment and decision on information security events
ICT readiness for business continuity
Information security during disruption
Information security incident management responsibilities and preparation
Learning from information security incidents
Response to information security incidents
hasInformationSecurityProperty Defence and Security
Resilience and Recovery
iso:purpose To ensure appropriate flow of information takes place with respect to information security between the organization and relevant legal, regulatory and supervisory authorities
Show more

Data masking

27002/2022/control-8.11

https://par-tec.github.io/security-ontologies/onto/iso#Control

Data masking should be used in accordance with the organization’s topic-specific policy on access control and business requirement, taking legal requirements into consideration
About Data masking
dcterms:description Data masking should be used in accordance with the organization’s topic-specific policy on access control and business requirement, taking legal requirements into consideration
dcterms:identifier 27002/2022/control-8.11
dcterms:title Data masking
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
hasOperationalCapability Information Protection
hasInformationSecurityProperty Protection and Risk
iso:purpose To limit the exposure of sensitive data including personally identifiable information, and to comply with legal, statutory, regulatory and contractual requirements
Show more

Disciplinary process

27002/2022/control-6.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

A disciplinary process should be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation
About Disciplinary process
dcterms:description A disciplinary process should be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation
dcterms:identifier 27002/2022/control-6.4
dcterms:title Disciplinary process
rdf:type Control
iso:controlCategory People
iso:correspondsTo Disciplinary process
hasControlType Corrective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Human Resources Security
iso:hasRelatedControls Collection of evidence
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure personnel and other relevant interested parties understand the consequences of information security breaches, and non-compliant activities are deterred
Show more

Documented operating procedures

27002/2022/control-5.37

https://par-tec.github.io/security-ontologies/onto/iso#Control

Operating procedures for information processing facilities should be documented and made available to personnel who need them
About Documented operating procedures
dcterms:description Operating procedures for information processing facilities should be documented and made available to personnel who need them
dcterms:identifier 27002/2022/control-5.37
dcterms:title Documented operating procedures
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Documented operating procedures
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Continuity
Physical Security
System Network Security
iso:hasRelatedControls Clock synchronization
Logging
Storage media
Use of privileged utility programs
Information backup
Physical security monitoring
Secure disposal or re-use of equipment
hasInformationSecurityProperty Defence and Security
Governance and Ecosystem
Protection and Risk
iso:purpose To ensure the correct and secure operation of information processing facilities
Show more

Equipment maintenance

27002/2022/control-7.13

https://par-tec.github.io/security-ontologies/onto/iso#Control

Equipment should be maintained correctly
About Equipment maintenance
dcterms:description Equipment should be maintained correctly
dcterms:identifier 27002/2022/control-7.13
dcterms:title Equipment maintenance
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Equipment maintenance
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Physical Security
iso:hasRelatedControls Secure disposal or re-use of equipment
Security of assets off-premises
hasInformationSecurityProperty Protection and Risk
Resilience and Recovery
iso:purpose To prevent loss, damage, theft or compromise of information and other associated assets and interruption to the organization’s operations
Show more

Identity management

27002/2022/control-5.16

https://par-tec.github.io/security-ontologies/onto/iso#Control

The full lifecycle of identities should be managed
About Identity management
dcterms:description The full lifecycle of identities should be managed
dcterms:identifier 27002/2022/control-5.16
dcterms:title Identity management
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo User registration and de-registration
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
iso:hasRelatedControls Access rights
hasInformationSecurityProperty Protection and Risk
iso:purpose To allow for the unique identification of individuals and systems accessing the organisation's information and other associated assets, and to enable appropriate assignment of access rights
Show more

Information security event reporting

27002/2022/control-6.8

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner
About Information security event reporting
dcterms:description The organization should provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner
dcterms:identifier 27002/2022/control-6.8
dcterms:title Information security event reporting
rdf:type Control
iso:controlCategory People
iso:correspondsTo Reporting information security events
Reporting information security weaknesses
hasControlType Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
hasInformationSecurityProperty Defence and Security
iso:purpose To support timely, consistent and effective reporting of information security events that can be identified by personnel
Show more

Information transfer

27002/2022/control-5.14

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information transfer rules, procedures, or agreements, both within the organization and between the organization and other parties, should be in place for all types of transfer facilities
About Information transfer
dcterms:description Information transfer rules, procedures, or agreements, both within the organization and between the organization and other parties, should be in place for all types of transfer facilities
dcterms:identifier 27002/2022/control-5.14
dcterms:title Information transfer
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Agreements on information transfer
Electronic messaging
Information transfer policies and procedures
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Information Protection
iso:hasRelatedControls Labelling of information
Privacy and protection of PII
Protection of records
Acceptable use of information and associated assets
Identification of legal, statutory, regulatory and contractual requirements
Intellectual property rights
Protection against malware
Use of cryptography
https://par-tec.github.io/security-ontologies/onto/iso#27002/2022/control-7,10
hasInformationSecurityProperty Protection and Risk
iso:purpose To maintain the security of information transferred within an organization and with any external interested party
Show more

Labelling of information

27002/2022/control-5.13

https://par-tec.github.io/security-ontologies/onto/iso#Control

An appropriate set of procedures for information labelling should be developed and implemented in accordance with the information classification scheme adopted by the organization
About Labelling of information
dcterms:description An appropriate set of procedures for information labelling should be developed and implemented in accordance with the information classification scheme adopted by the organization
dcterms:identifier 27002/2022/control-5.13
dcterms:title Labelling of information
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Labeling of information
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Protection
iso:hasRelatedControls Classification of information
hasInformationSecurityProperty Defence and Security
iso:purpose To facilitate the communication of classification of information and support automation of information processing and management
Show more

Logging

27002/2022/control-8.15

https://par-tec.github.io/security-ontologies/onto/iso#Control

Logs that record activities, exceptions, faults and other relevant events should be produced, protected, stored and analysed
About Logging
dcterms:description Logs that record activities, exceptions, faults and other relevant events should be produced, protected, stored and analysed
dcterms:identifier 27002/2022/control-8.15
dcterms:title Logging
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Administrator and operator logs
Event logging
Protection of log information
hasControlType Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
iso:hasRelatedControls Clock synchronization
Collection of evidence
Data masking
Monitoring activities
Privacy and protection of PII
Assessment and decision on information security events
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To record events, generate evidence, ensure the integrity of log information, prevent against unauthorized access, identify information security events that can lead to an information security incident and to support investigations
Show more

Management of technical vulnerabilities

27002/2022/control-8.8

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information about technical vulnerabilities of information systems in use should be obtained, the organization’s exposure to such vulnerabilities should be evaluated and appropriate measures should be taken
About Management of technical vulnerabilities
dcterms:description Information about technical vulnerabilities of information systems in use should be obtained, the organization’s exposure to such vulnerabilities should be evaluated and appropriate measures should be taken
dcterms:identifier 27002/2022/control-8.8
dcterms:title Management of technical vulnerabilities
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Management of technical vulnerabilities
Technical compliance review
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Threat and Vulnerability Management
iso:hasRelatedControls Change management
Information transfer
Network controls
Secure coding
Secure development lifecycle
Security testing in development and acceptance
Segregation in networks
Addressing information security within supplier agreements
Information security for use of cloud services
Inventory of information and other associated assets
Response to information security incidents
hasInformationSecurityProperty Defence and Security
Governance and Ecosystem
Protection and Risk
iso:purpose To prevent exploitation of technical vulnerabilities
Show more

Monitoring activities

27002/2022/control-8.16

https://par-tec.github.io/security-ontologies/onto/iso#Control

Networks, systems and applications should be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents
About Monitoring activities
dcterms:description Networks, systems and applications should be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents
dcterms:identifier 27002/2022/control-8.16
dcterms:title Monitoring activities
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Corrective
Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
iso:hasRelatedControls Assessment and decision on information security events
Response to information security incidents
Threat intelligence
hasInformationSecurityProperty Defence and Security
iso:purpose To detect anomalous behaviour and potential information security incidents
Show more

Network controls

27002/2022/control-8.20

https://par-tec.github.io/security-ontologies/onto/iso#Control

Networks should be managed and controlled to protect information in systems and applications
About Network controls
dcterms:description Networks should be managed and controlled to protect information in systems and applications
dcterms:identifier 27002/2022/control-8.20
dcterms:title Network controls
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Network controls
hasControlType Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability System Network Security
iso:hasRelatedControls Confidentiality or non-disclosure agreements
Information transfer
Logging
Information backup
Monitoring, review and change management of supplier services
Segregation of duties
Use of cryptography
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure the protection of information in networks and its supporting information processing facilities
Show more

Physical entry controls

27002/2022/control-7.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Secure areas should be protected by appropriate entry controls and access points
About Physical entry controls
dcterms:description Secure areas should be protected by appropriate entry controls and access points
dcterms:identifier 27002/2022/control-7.2
dcterms:title Physical entry controls
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Delivery and loading areas
Physical entry controls
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Physical Security
iso:hasRelatedControls Access rights
Authentication information
Protection of records
Storage media
Inventory of information and other associated assets
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure only authorized physical access to the organization’s information and other associated assets occurs
Show more

Physical security perimeter

27002/2022/control-7.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security perimeters should be defined and used to protect areas that contain either sensitive or critical information and other associated assets
About Physical security perimeter
dcterms:description Security perimeters should be defined and used to protect areas that contain either sensitive or critical information and other associated assets
dcterms:identifier 27002/2022/control-7.1
dcterms:title Physical security perimeter
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Physical security perimeter
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent unauthorized physical access, damage and interference to the organization’s information and other associated assets
Show more

Privacy and protection of PII

27002/2022/control-5.34

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should identify and meet the requirements regarding preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements
About Privacy and protection of PII
dcterms:description The organization should identify and meet the requirements regarding preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements
dcterms:identifier 27002/2022/control-5.34
dcterms:title Privacy and protection of PII
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Privacy and protection of personally identifiable information
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Protection
Legal andCompliance
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure compliance with legal, statutory, regulatory or contractual requirements related to the information security aspects of the protection of PII
Show more

Privileged access rights

27002/2022/control-8.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

The allocation and use of privileged access rights should be restricted and managed
About Privileged access rights
dcterms:description The allocation and use of privileged access rights should be restricted and managed
dcterms:identifier 27002/2022/control-8.2
dcterms:title Privileged access rights
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Management of privileged access rights
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
iso:hasRelatedControls Access control
Access rights
Authentication information
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure only authorized users, software components and services are provided with privileged access rights
Show more

Protection of records

27002/2022/control-5.33

https://par-tec.github.io/security-ontologies/onto/iso#Control

Records should be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legal, statutory, regulatory, contractual and business requirements
About Protection of records
dcterms:description Records should be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legal, statutory, regulatory, contractual and business requirements
dcterms:identifier 27002/2022/control-5.33
dcterms:title Protection of records
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Protection of records
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Information Protection
Legal andCompliance
iso:hasRelatedControls Use of cryptography
hasInformationSecurityProperty Defence and Security
iso:purpose To ensure compliance with legal, statutory, regulatory or contractual requirements related to the protection of records
Show more

Remote working

27002/2022/control-6.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security measures should be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization's premises
About Remote working
dcterms:description Security measures should be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization's premises
dcterms:identifier 27002/2022/control-6.7
dcterms:title Remote working
rdf:type Control
iso:controlCategory People
iso:correspondsTo Teleworking
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Physical Security
System Network Security
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure the security of information when personnel are working remotely
Show more

Return of assets

27002/2022/control-5.11

https://par-tec.github.io/security-ontologies/onto/iso#Control

Personnel and other interested parties as appropriate should return all the organization's assets in their possession upon change or termination of their employment, contract or agreement
About Return of assets
dcterms:description Personnel and other interested parties as appropriate should return all the organization's assets in their possession upon change or termination of their employment, contract or agreement
dcterms:identifier 27002/2022/control-5.11
dcterms:title Return of assets
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Return of assets
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
iso:hasRelatedControls Access to source code
Secure disposal or re-use of equipment
hasInformationSecurityProperty Protection and Risk
iso:purpose To protect the organization’s assets as part of the process of changing or terminating employment or contract
Show more

Screening

27002/2022/control-6.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Background verification checks on all candidates to become personnel should be carried out prior to joining the organization and on an ongoing basis in accordance with applicable laws, regulations and ethics, and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks
About Screening
dcterms:description Background verification checks on all candidates to become personnel should be carried out prior to joining the organization and on an ongoing basis in accordance with applicable laws, regulations and ethics, and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks
dcterms:identifier 27002/2022/control-6.1
dcterms:title Screening
rdf:type Control
iso:controlCategory People
iso:correspondsTo Screening
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Human Resources Security
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure all personnel are eligible and suitable for the roles for which they are considered and remain eligible and suitable during their employment
Show more

Secure authentication

27002/2022/control-8.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Secure authentication technologies and procedures should be implemented based on information access restrictions and the topic-specific policy on access control
About Secure authentication
dcterms:description Secure authentication technologies and procedures should be implemented based on information access restrictions and the topic-specific policy on access control
dcterms:identifier 27002/2022/control-8.5
dcterms:title Secure authentication
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Secure log-on procedures
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure a user or an entity is securely authenticated when access to systems, applications, and services is granted
Show more

Secure coding

27002/2022/control-8.28

https://par-tec.github.io/security-ontologies/onto/iso#Control

Secure coding principles should be applied to software development
About Secure coding
dcterms:description Secure coding principles should be applied to software development
dcterms:identifier 27002/2022/control-8.28
dcterms:title Secure coding
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
System Network Security
iso:hasRelatedControls Access rights
Management of technical vulnerabilities
Security testing in development and acceptance
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure software is written securely thereby reducing the number of potential information security vulnerabilities in the software
Show more

Secure development lifecycle

27002/2022/control-8.25

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules for the secure development of software and systems should be established and applied
About Secure development lifecycle
dcterms:description Rules for the secure development of software and systems should be established and applied
dcterms:identifier 27002/2022/control-8.25
dcterms:title Secure development lifecycle
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Secure development policy
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
System Network Security
iso:hasRelatedControls Outsourced development
Access to source code
Change management
Configuration management
Secure coding
Secure system architecture and engineering principles
Security testing in development and acceptance
Information security in project management
Intellectual property rights
Separation of development, test and production environments
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure information security is designed and implemented within the secure development lifecycle of software and systems
Show more

Secure system architecture and engineering principles

27002/2022/control-8.27

https://par-tec.github.io/security-ontologies/onto/iso#Control

Principles for engineering secure systems should be established, documented, maintained and applied to any information system development activities
About Secure system architecture and engineering principles
dcterms:description Principles for engineering secure systems should be established, documented, maintained and applied to any information system development activities
dcterms:identifier 27002/2022/control-8.27
dcterms:title Secure system architecture and engineering principles
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Secure system engineering principles
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
System Network Security
iso:hasRelatedControls Access rights
Authentication information
Classification of information
Identity management
Privileged access rights
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure information systems are securely designed, implemented and operated within the development lifecycle
Show more

Security testing in development and acceptance

27002/2022/control-8.29

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security testing processes should be defined and implemented in the development lifecycle
About Security testing in development and acceptance
dcterms:description Security testing processes should be defined and implemented in the development lifecycle
dcterms:identifier 27002/2022/control-8.29
dcterms:title Security testing in development and acceptance
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo System acceptance testing
System security testing
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
Information Security Event Management
System Network Security
iso:hasRelatedControls Configuration management
Network controls
Secure authentication
Secure coding
Security testing in development and acceptance
Segregation in networks
Addressing information security within supplier agreements
Information access restriction
Information security in project management
Separation of development, test and production environments
Use of cryptography
hasInformationSecurityProperty Protection and Risk
iso:purpose To validate if information security requirements are met when deployed to the production environment
Show more

Segregation in networks

27002/2022/control-8.23

https://par-tec.github.io/security-ontologies/onto/iso#Control

Groups of information services, users, and information systems should be segregated in the organization’s networks
About Segregation in networks
dcterms:description Groups of information services, users, and information systems should be segregated in the organization’s networks
dcterms:identifier 27002/2022/control-8.23
dcterms:title Segregation in networks
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Segregation in networks
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability System Network Security
iso:hasRelatedControls Access control
Network controls
hasInformationSecurityProperty Protection and Risk
iso:purpose To split the network in security boundaries and to control traffic between them based on business needs
Show more

Storage media

27002/2022/control-7.10

https://par-tec.github.io/security-ontologies/onto/iso#Control

Storage media should be managed through its lifecycle of acquisition, use, transportation and disposal in accordance with the organization’s classification scheme and handling requirements
About Storage media
dcterms:description Storage media should be managed through its lifecycle of acquisition, use, transportation and disposal in accordance with the organization’s classification scheme and handling requirements
dcterms:identifier 27002/2022/control-7.10
dcterms:title Storage media
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Disposal of media
Management of removable media
Physical media transfer
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Physical Security
iso:hasRelatedControls Information deletion
Secure disposal or re-use of equipment
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure only authorized disclosure, modification, removal or destruction of information stored on media
Show more

Use of privileged utility programs

27002/2022/control-8.18

https://par-tec.github.io/security-ontologies/onto/iso#Control

The use of utility programs that might be capable of overriding system and application controls should be restricted and tightly controlled
About Use of privileged utility programs
dcterms:description The use of utility programs that might be capable of overriding system and application controls should be restricted and tightly controlled
dcterms:identifier 27002/2022/control-8.18
dcterms:title Use of privileged utility programs
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Use of privileged utility programs
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Secure Configuration
System Network Security
iso:hasRelatedControls Privileged access rights
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure the use of utility programs does not harm system and application controls for information security
Show more

User endpoint devices

27002/2022/control-8.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information stored on, processed by or accessible via user endpoint devices should be protected
About User endpoint devices
dcterms:description Information stored on, processed by or accessible via user endpoint devices should be protected
dcterms:identifier 27002/2022/control-8.1
dcterms:title User endpoint devices
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Mobile device policy
Unattended user equipment
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Information Protection
iso:hasRelatedControls Configuration management
hasInformationSecurityProperty Protection and Risk
iso:purpose To protect information against the risks introduced by using user endpoint devices
Show more

Web filtering

27002/2022/control-8.22

https://par-tec.github.io/security-ontologies/onto/iso#Control

Access to external websites should be managed to reduce exposure to malicious content
About Web filtering
dcterms:description Access to external websites should be managed to reduce exposure to malicious content
dcterms:identifier 27002/2022/control-8.22
dcterms:title Web filtering
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability System Network Security
iso:hasRelatedControls Threat intelligence
hasInformationSecurityProperty Protection and Risk
iso:purpose To protect systems from being compromised by malware and to prevent access to unauthorized web resources
Show more

Working in secure areas

27002/2022/control-7.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

Procedures for working in secure areas should be designed and implemented
About Working in secure areas
dcterms:description Procedures for working in secure areas should be designed and implemented
dcterms:identifier 27002/2022/control-7.6
dcterms:title Working in secure areas
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Working in secure areas
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent damage and interference to the organization’s information and other associated assets in secure areas
Show more

Acceptable use of assets

27001/2013/control-8.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules for the acceptable use of information and of assets associated with information and information processing facilities shall be identified, documented and implemented.
About Acceptable use of assets
dcterms:description Rules for the acceptable use of information and of assets associated with information and information processing facilities shall be identified, documented and implemented.
dcterms:identifier 8.1.3
dcterms:title Acceptable use of assets
rdf:type Control
iso:controlSection Responsibility for assets
iso:correspondsTo Acceptable use of information and associated assets
Show more

Acceptable use of information and associated assets

27002/2022/control-5.10

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules for the acceptable use and procedures for the handling of information and other associated assets should be identified, documented and implemented
About Acceptable use of information and associated assets
dcterms:description Rules for the acceptable use and procedures for the handling of information and other associated assets should be identified, documented and implemented
dcterms:identifier 27002/2022/control-5.10
dcterms:title Acceptable use of information and associated assets
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Acceptable use of assets
Handling of assets
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Information Protection
iso:hasRelatedControls Classification of information
Storage media
Equipment siting and protection
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure information and other associated assets are appropriately protected, used and handled
Show more

Access control policy

27001/2013/control-9.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

An access control policy shall be established, documented and reviewed based on business and information security requirements.
About Access control policy
dcterms:description An access control policy shall be established, documented and reviewed based on business and information security requirements.
dcterms:identifier 9.1.1
dcterms:title Access control policy
rdf:type Control
iso:controlSection Business requirements of access control
iso:correspondsTo Access control
Show more

Access control to program source code

27001/2013/control-9.4.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Access to program source code shall be restricted.
About Access control to program source code
dcterms:description Access to program source code shall be restricted.
dcterms:identifier 9.4.5
dcterms:title Access control to program source code
rdf:type Control
iso:controlSection System and application access control
iso:correspondsTo Access to source code
Show more

Access to networks and network services

27001/2013/control-9.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Users shall only be provided with access to the network and network services that they have been specifically authorized to use.
About Access to networks and network services
dcterms:description Users shall only be provided with access to the network and network services that they have been specifically authorized to use.
dcterms:identifier 9.1.2
dcterms:title Access to networks and network services
rdf:type Control
iso:controlSection Business requirements of access control
iso:correspondsTo Access control
Show more

Addressing information security within supplier agreements

27002/2022/control-5.20

https://par-tec.github.io/security-ontologies/onto/iso#Control

Relevant information security requirements should be established and agreed with each supplier based on the type of supplier relationship
About Addressing information security within supplier agreements
dcterms:description Relevant information security requirements should be established and agreed with each supplier based on the type of supplier relationship
dcterms:identifier 27002/2022/control-5.20
dcterms:title Addressing information security within supplier agreements
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Addressing security within supplier agreements
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Supplier and Relationship Security
iso:hasRelatedControls Classification of information
Labelling of information
Acceptable use of information and associated assets
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure information security of the organization in supplier relationships
Show more

Addressing security within supplier agreements

27001/2013/control-15.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

All relevant information security requirements shall be established and agreed with each supplier that may access, process, store, communicate, or provide IT infrastructure components for, the organization’s information.
About Addressing security within supplier agreements
dcterms:description All relevant information security requirements shall be established and agreed with each supplier that may access, process, store, communicate, or provide IT infrastructure components for, the organization’s information.
dcterms:identifier 15.1.2
dcterms:title Addressing security within supplier agreements
rdf:type Control
iso:controlSection Information security in supplier relationships
iso:correspondsTo Addressing information security within supplier agreements
Show more

Administrator and operator logs

27001/2013/control-12.4.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

System administrator and system operator activities shall be logged and the logs protected and regularly reviewed.
About Administrator and operator logs
dcterms:description System administrator and system operator activities shall be logged and the logs protected and regularly reviewed.
dcterms:identifier 12.4.3
dcterms:title Administrator and operator logs
rdf:type Control
iso:controlSection Logging and monitoring
iso:correspondsTo Logging
Show more

Agreements on information transfer

27001/2013/control-13.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Agreements shall address the secure transfer of business information between the organization and external parties.
About Agreements on information transfer
dcterms:description Agreements shall address the secure transfer of business information between the organization and external parties.
dcterms:identifier 13.2.2
dcterms:title Agreements on information transfer
rdf:type Control
iso:controlSection Information transfer
iso:correspondsTo Information transfer
Show more

Assessment and decision on information security events

27002/2022/control-5.25

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should assess information security events and decide if they are to be categorized as information security incidents
About Assessment and decision on information security events
dcterms:description The organization should assess information security events and decide if they are to be categorized as information security incidents
dcterms:identifier 27002/2022/control-5.25
dcterms:title Assessment and decision on information security events
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Assessment of and decision on information security events
hasControlType Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
hasInformationSecurityProperty Defence and Security
iso:purpose To ensure effective categorization and prioritization of information security events
Show more

Assessment of and decision on information security events

27001/2013/control-16.1.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents.
About Assessment of and decision on information security events
dcterms:description Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents.
dcterms:identifier 16.1.4
dcterms:title Assessment of and decision on information security events
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Assessment and decision on information security events
Show more

Availability of information processing facilities

27001/2013/control-17.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.
About Availability of information processing facilities
dcterms:description Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.
dcterms:identifier 17.2.1
dcterms:title Availability of information processing facilities
rdf:type Control
iso:controlSection Redundancies
iso:correspondsTo Redundancy of information processing facilities
Show more

Cabling security

27001/2013/control-11.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Power and telecommunications cabling carrying data or supporting information services shall be protected from interception, interference or damage.
About Cabling security
dcterms:description Power and telecommunications cabling carrying data or supporting information services shall be protected from interception, interference or damage.
dcterms:identifier 11.2.3
dcterms:title Cabling security
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Cabling security
Show more

Capacity management

27001/2013/control-12.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

The use of resources shall be monitored, tuned and projections made of future capacity requirements to ensure the required system performance.
About Capacity management
dcterms:description The use of resources shall be monitored, tuned and projections made of future capacity requirements to ensure the required system performance.
dcterms:identifier 12.1.3
dcterms:title Capacity management
rdf:type Control
iso:controlSection Operational procedures and responsibilities
iso:correspondsTo Capacity management
Show more

Change management

27001/2013/control-12.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Changes to the organization, business processes, information processing facilities and systems that affect information security shall be controlled.
About Change management
dcterms:description Changes to the organization, business processes, information processing facilities and systems that affect information security shall be controlled.
dcterms:identifier 12.1.2
dcterms:title Change management
rdf:type Control
iso:controlSection Operational procedures and responsibilities
iso:correspondsTo Change management
Show more

Classification of information

27001/2013/control-8.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information shall be classified in terms of legal requirements, value, criticality and sensitivity to unauthorized disclosure or modification.
About Classification of information
dcterms:description Information shall be classified in terms of legal requirements, value, criticality and sensitivity to unauthorized disclosure or modification.
dcterms:identifier 8.2.1
dcterms:title Classification of information
rdf:type Control
iso:controlSection Information classification
iso:correspondsTo Classification of information
Show more

Clear desk and clear screen

27002/2022/control-7.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities should be defined and enforced
About Clear desk and clear screen
dcterms:description Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities should be defined and enforced
dcterms:identifier 27002/2022/control-7.7
dcterms:title Clear desk and clear screen
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Clear desk and clear screen policy
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
hasOperationalCapability Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To reduce the risks of unauthorized access, loss of and damage to information on the desks, screens and in other accessible locations during and outside normal working hours
Show more

Clear desk and clear screen policy

27001/2013/control-11.2.9

https://par-tec.github.io/security-ontologies/onto/iso#Control

A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities shall be adopted.
About Clear desk and clear screen policy
dcterms:description A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities shall be adopted.
dcterms:identifier 11.2.9
dcterms:title Clear desk and clear screen policy
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Clear desk and clear screen
Show more

Clock synchronization

27001/2013/control-12.4.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

The clocks of all relevant information processing systems within an organization or security domain shall be synchronized to a single reference time source.
About Clock synchronization
dcterms:description The clocks of all relevant information processing systems within an organization or security domain shall be synchronized to a single reference time source.
dcterms:identifier 12.4.4
dcterms:title Clock synchronization
rdf:type Control
iso:controlSection Logging and monitoring
iso:correspondsTo Clock synchronization
Show more

Collection of evidence

27001/2013/control-16.1.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization shall define and apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence.
About Collection of evidence
dcterms:description The organization shall define and apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence.
dcterms:identifier 16.1.7
dcterms:title Collection of evidence
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Collection of evidence
Show more

Compliance with policies and standards for information security

27002/2022/control-5.36

https://par-tec.github.io/security-ontologies/onto/iso#Control

Compliance with the organization’s information security policy, topic-specific policies and standards should be regularly reviewed
About Compliance with policies and standards for information security
dcterms:description Compliance with the organization’s information security policy, topic-specific policies and standards should be regularly reviewed
dcterms:identifier 27002/2022/control-5.36
dcterms:title Compliance with policies and standards for information security
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Compliance with security policies and standards
Technical compliance review
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Legal andCompliance
iso:hasRelatedControls Clock synchronization
Logging
Monitoring activities
Independent review of information security
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure that information security is implemented and operated in accordance with the organizational policies topic-specific policies and standards
Show more

Compliance with security policies and standards

27001/2013/control-18.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Managers shall regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards and any other security requirements.
About Compliance with security policies and standards
dcterms:description Managers shall regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards and any other security requirements.
dcterms:identifier 18.2.2
dcterms:title Compliance with security policies and standards
rdf:type Control
iso:controlSection Information security reviews
iso:correspondsTo Compliance with policies and standards for information security
Show more

Confidentiality or nondisclosure agreements

27001/2013/control-13.2.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Requirements for confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information shall be identified, regularly reviewed and documented.
About Confidentiality or nondisclosure agreements
dcterms:description Requirements for confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information shall be identified, regularly reviewed and documented.
dcterms:identifier 13.2.4
dcterms:title Confidentiality or nondisclosure agreements
rdf:type Control
iso:controlSection Information transfer
iso:correspondsTo Confidentiality or non-disclosure agreements
Show more

Contact with authorities

27001/2013/control-6.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Appropriate contacts with relevant authorities shall be maintained.
About Contact with authorities
dcterms:description Appropriate contacts with relevant authorities shall be maintained.
dcterms:identifier 6.1.3
dcterms:title Contact with authorities
rdf:type Control
iso:controlSection Internal organization
iso:correspondsTo Contact with authorities
Show more

Contact with special interest groups

27002/2022/control-5.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should establish and maintain contact with special interest groups or other specialist security forums and professional associations
About Contact with special interest groups
dcterms:description The organization should establish and maintain contact with special interest groups or other specialist security forums and professional associations
dcterms:identifier 27002/2022/control-5.6
dcterms:title Contact with special interest groups
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Contact with special interest groups
hasControlType Corrective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
Recover
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
iso:hasRelatedControls Collection of evidence
Assessment and decision on information security events
Information security incident management responsibilities and preparation
Learning from information security incidents
Response to information security incidents
hasInformationSecurityProperty Defence and Security
iso:purpose To ensure appropriate flow of information takes place with respect to information security
Show more

Contact with special interest groups

27001/2013/control-6.1.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.
About Contact with special interest groups
dcterms:description Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.
dcterms:identifier 6.1.4
dcterms:title Contact with special interest groups
rdf:type Control
iso:controlSection Internal organization
iso:correspondsTo Contact with special interest groups
Show more

Controls against malware

27001/2013/control-12.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user awareness.
About Controls against malware
dcterms:description Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user awareness.
dcterms:identifier 12.2.1
dcterms:title Controls against malware
rdf:type Control
iso:controlSection Protection from malware
iso:correspondsTo Protection against malware
Show more

Data leakage prevention

27002/2022/control-8.12

https://par-tec.github.io/security-ontologies/onto/iso#Control

Data leakage prevention measures should be applied to systems, networks and endpoint devices that process, store or transmit sensitive information
About Data leakage prevention
dcterms:description Data leakage prevention measures should be applied to systems, networks and endpoint devices that process, store or transmit sensitive information
dcterms:identifier 27002/2022/control-8.12
dcterms:title Data leakage prevention
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Protect
hasInformationSecurityProperty Confidentiality
hasOperationalCapability Information Protection
iso:hasRelatedControls Access control
Classification of information
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To detect and prevent the unauthorized disclosure and extraction of information by individuals or systems
Show more

Delivery and loading areas

27001/2013/control-11.1.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

Access points such as delivery and loading areas and other points where unauthorized persons could enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access.
About Delivery and loading areas
dcterms:description Access points such as delivery and loading areas and other points where unauthorized persons could enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access.
dcterms:identifier 11.1.6
dcterms:title Delivery and loading areas
rdf:type Control
iso:controlSection Secure areas
iso:correspondsTo Physical entry controls
Show more

Disciplinary process

27001/2013/control-7.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

There shall be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breach.
About Disciplinary process
dcterms:description There shall be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breach.
dcterms:identifier 7.2.3
dcterms:title Disciplinary process
rdf:type Control
iso:controlSection During employment
iso:correspondsTo Disciplinary process
Show more

Disposal of media

27001/2013/control-8.3.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Media shall be disposed of securely when no longer required, using formal procedures.
About Disposal of media
dcterms:description Media shall be disposed of securely when no longer required, using formal procedures.
dcterms:identifier 8.3.2
dcterms:title Disposal of media
rdf:type Control
iso:controlSection Media Handling
iso:correspondsTo Storage media
Show more

Documented operating procedures

27001/2013/control-12.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Operating procedures shall be documented and made available to all users who need them.
About Documented operating procedures
dcterms:description Operating procedures shall be documented and made available to all users who need them.
dcterms:identifier 12.1.1
dcterms:title Documented operating procedures
rdf:type Control
iso:controlSection Operational procedures and responsibilities
iso:correspondsTo Documented operating procedures
Show more

Electronic messaging

27001/2013/control-13.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information involved in electronic messaging shall be appropriately protected.
About Electronic messaging
dcterms:description Information involved in electronic messaging shall be appropriately protected.
dcterms:identifier 13.2.3
dcterms:title Electronic messaging
rdf:type Control
iso:controlSection Information transfer
iso:correspondsTo Information transfer
Show more

Equipment maintenance

27001/2013/control-11.2.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Equipment shall be correctly maintained to ensure its continued availability and integrity.
About Equipment maintenance
dcterms:description Equipment shall be correctly maintained to ensure its continued availability and integrity.
dcterms:identifier 11.2.4
dcterms:title Equipment maintenance
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Equipment maintenance
Show more

Equipment siting and protection

27002/2022/control-7.8

https://par-tec.github.io/security-ontologies/onto/iso#Control

Equipment should be sited securely and protected
About Equipment siting and protection
dcterms:description Equipment should be sited securely and protected
dcterms:identifier 27002/2022/control-7.8
dcterms:title Equipment siting and protection
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Equipment siting and protection
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To reduce the risks from environmental threats and hazards, and opportunities for unauthorized access
Show more

Equipment siting and protection

27001/2013/control-11.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Equipment shall be sited and protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized access.
About Equipment siting and protection
dcterms:description Equipment shall be sited and protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized access.
dcterms:identifier 11.2.1
dcterms:title Equipment siting and protection
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Equipment siting and protection
Show more

Event logging

27001/2013/control-12.4.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed.
About Event logging
dcterms:description Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed.
dcterms:identifier 12.4.1
dcterms:title Event logging
rdf:type Control
iso:controlSection Logging and monitoring
iso:correspondsTo Logging
Show more

Handling of assets

27001/2013/control-8.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
About Handling of assets
dcterms:description Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
dcterms:identifier 8.2.3
dcterms:title Handling of assets
rdf:type Control
iso:controlSection Information classification
iso:correspondsTo Acceptable use of information and associated assets
Show more

ICT readiness for business continuity

27002/2022/control-5.30

https://par-tec.github.io/security-ontologies/onto/iso#Control

ICT readiness should be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements
About ICT readiness for business continuity
dcterms:description ICT readiness should be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements
dcterms:identifier 27002/2022/control-5.30
dcterms:title ICT readiness for business continuity
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Corrective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
Respond
hasInformationSecurityProperty Availability
hasOperationalCapability Continuity
hasInformationSecurityProperty Resilience and Recovery
iso:purpose To ensure the availability of the organization’s information and other associated assets in the event of a disruption
Show more

Identification of applicable legislation and contractual requirements

27001/2013/control-18.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

All relevant legislative statutory, regulatory, contractual requirements and the organization’s approach to meet these requirements shall be explicitly identified, documented and kept up to date for each information system and the organization.
About Identification of applicable legislation and contractual requirements
dcterms:description All relevant legislative statutory, regulatory, contractual requirements and the organization’s approach to meet these requirements shall be explicitly identified, documented and kept up to date for each information system and the organization.
dcterms:identifier 18.1.1
dcterms:title Identification of applicable legislation and contractual requirements
rdf:type Control
iso:controlSection Compliance with legal and contractual requirements
iso:correspondsTo Identification of legal, statutory, regulatory and contractual requirements
Show more

Identification of legal, statutory, regulatory and contractual requirements

27002/2022/control-5.31

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security relevant legal, statutory, regulatory and contractual requirements and the organization’s approach to meet these requirements should be identified, documented and kept up to date
About Identification of legal, statutory, regulatory and contractual requirements
dcterms:description Information security relevant legal, statutory, regulatory and contractual requirements and the organization’s approach to meet these requirements should be identified, documented and kept up to date
dcterms:identifier 27002/2022/control-5.31
dcterms:title Identification of legal, statutory, regulatory and contractual requirements
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Identification of applicable legislation and contractual requirements
Regulation of cryptographic controls
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Legal andCompliance
iso:hasRelatedControls Addressing information security within supplier agreements
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure compliance with legal, statutory, regulatory or contractual requirements related to information security
Show more

Implementing information security continuity

27001/2013/control-17.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization shall establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for information security during an adverse situation.
About Implementing information security continuity
dcterms:description The organization shall establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for information security during an adverse situation.
dcterms:identifier 17.1.2
dcterms:title Implementing information security continuity
rdf:type Control
iso:controlSection Information security continuity
iso:correspondsTo Information security during disruption
Show more

Independent review of information security

27001/2013/control-18.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization’s approach to managing information security and its implementation (i.e. control objectives, controls, policies, processes and procedures for information security) shall be reviewed independently at planned intervals or when significant changes occur.
About Independent review of information security
dcterms:description The organization’s approach to managing information security and its implementation (i.e. control objectives, controls, policies, processes and procedures for information security) shall be reviewed independently at planned intervals or when significant changes occur.
dcterms:identifier 18.2.1
dcterms:title Independent review of information security
rdf:type Control
iso:controlSection Information security reviews
iso:correspondsTo Independent review of information security
Show more

Independent review of information security

27002/2022/control-5.35

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization’s approach to managing information security and its implementation including people process and technology should be reviewed independently at planned intervals, or when significant changes occur
About Independent review of information security
dcterms:description The organization’s approach to managing information security and its implementation including people process and technology should be reviewed independently at planned intervals, or when significant changes occur
dcterms:identifier 27002/2022/control-5.35
dcterms:title Independent review of information security
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Independent review of information security
hasControlType Corrective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
iso:purpose To ensure the continuing suitability, adequacy and effectiveness of the organization’s approach to managing information security
Show more

Information access restriction

27002/2022/control-8.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Access to information and other associated assets should be restricted in accordance with the established topic-specific policy on access control
About Information access restriction
dcterms:description Access to information and other associated assets should be restricted in accordance with the established topic-specific policy on access control
dcterms:identifier 27002/2022/control-8.3
dcterms:title Information access restriction
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Information access restriction
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Identity and Access Management
iso:hasRelatedControls Access control
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure only authorized access and to prevent unauthorized access to information and other associated assets
Show more

Information access restriction

27001/2013/control-9.4.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Access to information and application system functions shall be restricted in accordance with the access control policy.
About Information access restriction
dcterms:description Access to information and application system functions shall be restricted in accordance with the access control policy.
dcterms:identifier 9.4.1
dcterms:title Information access restriction
rdf:type Control
iso:controlSection System and application access control
iso:correspondsTo Information access restriction
Show more

Information and communication technology supply chain

27001/2013/control-15.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Agreements with suppliers shall include requirements to address the information security risks associated with information and communications technology services and product supply chain.
About Information and communication technology supply chain
dcterms:description Agreements with suppliers shall include requirements to address the information security risks associated with information and communications technology services and product supply chain.
dcterms:identifier 15.1.3
dcterms:title Information and communication technology supply chain
rdf:type Control
iso:controlSection Information security in supplier relationships
iso:correspondsTo Managing information security in the ICT supply chain
Show more

Information backup

27001/2013/control-12.3.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Backup copies of information, software and system images shall be taken and tested regularly in accordance with an agreed backup policy.
About Information backup
dcterms:description Backup copies of information, software and system images shall be taken and tested regularly in accordance with an agreed backup policy.
dcterms:identifier 12.3.1
dcterms:title Information backup
rdf:type Control
iso:controlSection Backup
iso:correspondsTo Information backup
Show more

Information backup

27002/2022/control-8.13

https://par-tec.github.io/security-ontologies/onto/iso#Control

Backup copies of information, software and systems should be maintained and regularly tested in accordance with the agreed topic-specific policy on backup
About Information backup
dcterms:description Backup copies of information, software and systems should be maintained and regularly tested in accordance with the agreed topic-specific policy on backup
dcterms:identifier 27002/2022/control-8.13
dcterms:title Information backup
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Information backup
hasControlType Corrective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Recover
hasInformationSecurityProperty Availability
Integrity
hasOperationalCapability Continuity
iso:hasRelatedControls User endpoint devices
ICT readiness for business continuity
Information deletion
https://par-tec.github.io/security-ontologies/onto/iso#27002/2022/control-7
https://par-tec.github.io/security-ontologies/onto/iso#27002/2022/control-Clause
hasInformationSecurityProperty Protection and Risk
iso:purpose To enable recovery from loss of data or systems
Show more

Information deletion

27002/2022/control-8.10

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information stored in information systems and devices should be deleted when no longer required
About Information deletion
dcterms:description Information stored in information systems and devices should be deleted when no longer required
dcterms:identifier 27002/2022/control-8.10
dcterms:title Information deletion
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
hasOperationalCapability Information Protection
iso:hasRelatedControls Secure disposal or re-use of equipment
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent unnecessary exposure of sensitive information and to comply with legal, statutory, regulatory and contractual requirements for data deletion
Show more

Information security requirements analysis and specification

27001/2013/control-14.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

The information security related requirements shall be included in the requirements for new information systems or enhancements to existing information systems.
About Information security requirements analysis and specification
dcterms:description The information security related requirements shall be included in the requirements for new information systems or enhancements to existing information systems.
dcterms:identifier 14.1.1
dcterms:title Information security requirements analysis and specification
rdf:type Control
iso:controlSection Security requirements of information systems
iso:correspondsTo Information security in project management
Show more

Information security awareness, education and training

27002/2022/control-6.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Personnel of the organization and relevant interested parties should receive appropriate information security awareness, education and training and regular updates of organizational policies and procedures, as relevant for their job function
About Information security awareness, education and training
dcterms:description Personnel of the organization and relevant interested parties should receive appropriate information security awareness, education and training and regular updates of organizational policies and procedures, as relevant for their job function
dcterms:identifier 27002/2022/control-6.3
dcterms:title Information security awareness, education and training
rdf:type Control
iso:controlCategory People
iso:correspondsTo Information security awareness, education and training
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Human Resources Security
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure personnel and relevant interested parties are aware of and fulfil their information security responsibilities
Show more

Information security awareness, education and training

27001/2013/control-7.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

All employees of the organization and, where relevant, contractors shall receive appropriate awareness education and training and regular updates in organizational policies and procedures, as relevant for their job function.
About Information security awareness, education and training
dcterms:description All employees of the organization and, where relevant, contractors shall receive appropriate awareness education and training and regular updates in organizational policies and procedures, as relevant for their job function.
dcterms:identifier 7.2.2
dcterms:title Information security awareness, education and training
rdf:type Control
iso:controlSection During employment
iso:correspondsTo Information security awareness, education and training
Show more

Information security during disruption

27002/2022/control-5.29

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should plan how to maintain information security at an appropriate level during disruption
About Information security during disruption
dcterms:description The organization should plan how to maintain information security at an appropriate level during disruption
dcterms:identifier 27002/2022/control-5.29
dcterms:title Information security during disruption
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Implementing information security continuity
Planning information security continuity
Verify, review and evaluate information security continuity
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Continuity
hasInformationSecurityProperty Protection and Risk
Resilience and Recovery
iso:purpose To provide information and other associated asset with adequate protection during disruption
Show more

Information security for use of cloud services

27002/2022/control-5.23

https://par-tec.github.io/security-ontologies/onto/iso#Control

Processes for acquisition, use, management and exit from cloud services should be established in accordance with the organization’s information security requirements
About Information security for use of cloud services
dcterms:description Processes for acquisition, use, management and exit from cloud services should be established in accordance with the organization’s information security requirements
dcterms:identifier 27002/2022/control-5.23
dcterms:title Information security for use of cloud services
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Supplier and Relationship Security
iso:hasRelatedControls Managing information security in the ICT supply chain
Monitoring, review and change management of supplier services
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To specify and manage information security for the use of cloud services
Show more

Information security in project management

27002/2022/control-5.8

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security should be integrated into the organization's project management activities
About Information security in project management
dcterms:description Information security should be integrated into the organization's project management activities
dcterms:identifier 27002/2022/control-5.8
dcterms:title Information security in project management
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Information security requirements analysis and specification
Information security in project management
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
iso:hasRelatedControls Application security requirements
Classification of information
Labelling of information
Acceptable use of information and associated assets
Intellectual property rights
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure information security risks related to projects and deliverables are efficiently and effectively included in project management activities throughout the project lifecycle
Show more

Information security in project management

27001/2013/control-6.1.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security shall be addressed in project management, regardless of the type of the project.
About Information security in project management
dcterms:description Information security shall be addressed in project management, regardless of the type of the project.
dcterms:identifier 6.1.5
dcterms:title Information security in project management
rdf:type Control
iso:controlSection Internal organization
iso:correspondsTo Information security in project management
Show more

Information security in supplier relationships

27002/2022/control-5.19

https://par-tec.github.io/security-ontologies/onto/iso#Control

Processes and procedures should be identified and implemented to manage the information security risks associated with the use of supplier's products or services
About Information security in supplier relationships
dcterms:description Processes and procedures should be identified and implemented to manage the information security risks associated with the use of supplier's products or services
dcterms:identifier 27002/2022/control-5.19
dcterms:title Information security in supplier relationships
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Information security policy for supplier relationships
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Supplier and Relationship Security
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To maintain an agreed level of information security in supplier relationships
Show more

Information security incident management responsibilities and preparation

27002/2022/control-5.24

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities
About Information security incident management responsibilities and preparation
dcterms:description The organization should plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities
dcterms:identifier 27002/2022/control-5.24
dcterms:title Information security incident management responsibilities and preparation
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Responsibilities and procedures
hasControlType Corrective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Recover
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
iso:hasRelatedControls Collection of evidence
Contact with authorities
Information security event reporting
Logging
Assessment and decision on information security events
Contact with special interest groups
Redundancy of information processing facilities
Response to information security incidents
hasInformationSecurityProperty Defence and Security
iso:purpose To ensure quick, effective, consistent and orderly response to information security incidents, including communication on information security events
Show more

Information security policy for supplier relationships

27001/2013/control-15.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security requirements for mitigating the risks associated with supplier’s access to the organization’s assets shall be agreed with the supplier and documented.
About Information security policy for supplier relationships
dcterms:description Information security requirements for mitigating the risks associated with supplier’s access to the organization’s assets shall be agreed with the supplier and documented.
dcterms:identifier 15.1.1
dcterms:title Information security policy for supplier relationships
rdf:type Control
iso:controlSection Information security in supplier relationships
iso:correspondsTo Information security in supplier relationships
Show more

Information security roles and responsibilities

27002/2022/control-5.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security roles and responsibilities should be defined and allocated according to the organization needs
About Information security roles and responsibilities
dcterms:description Information security roles and responsibilities should be defined and allocated according to the organization needs
dcterms:identifier 27002/2022/control-5.2
dcterms:title Information security roles and responsibilities
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Information security roles and responsibilities
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
iso:hasRelatedControls Policies for information security
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
Resilience and Recovery
iso:purpose To establish a defined, approved and understood structure for the implementation, operation and management of information security within the organization
Show more

Information security roles and responsibilities

27001/2013/control-6.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

All information security responsibilities shall be defined and allocated.
About Information security roles and responsibilities
dcterms:description All information security responsibilities shall be defined and allocated.
dcterms:identifier 6.1.1
dcterms:title Information security roles and responsibilities
rdf:type Control
iso:controlSection Internal organization
iso:correspondsTo Information security roles and responsibilities
Show more

Information systems audit controls

27001/2013/control-12.7.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Audit requirements and activities involving verification of operational systems shall be carefully planned and agreed to minimize disruptions to business processes.
About Information systems audit controls
dcterms:description Audit requirements and activities involving verification of operational systems shall be carefully planned and agreed to minimize disruptions to business processes.
dcterms:identifier 12.7.1
dcterms:title Information systems audit controls
rdf:type Control
iso:controlSection Information systems audit considerations
iso:correspondsTo Protection of information systems during audit and testing
Show more

Information transfer policies and procedures

27001/2013/control-13.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Formal transfer policies, procedures and controls shall be in place to protect the transfer of information through the use of all types of communication facilities.
About Information transfer policies and procedures
dcterms:description Formal transfer policies, procedures and controls shall be in place to protect the transfer of information through the use of all types of communication facilities.
dcterms:identifier 13.2.1
dcterms:title Information transfer policies and procedures
rdf:type Control
iso:controlSection Information transfer
iso:correspondsTo Information transfer
Show more

Installation of software on operational systems

27002/2022/control-8.19

https://par-tec.github.io/security-ontologies/onto/iso#Control

Procedures and measures should be implemented to securely manage software installation on operational systems
About Installation of software on operational systems
dcterms:description Procedures and measures should be implemented to securely manage software installation on operational systems
dcterms:identifier 27002/2022/control-8.19
dcterms:title Installation of software on operational systems
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Installation of software on operational systems
Restrictions on software installation
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Secure Configuration
iso:hasRelatedControls Management of technical vulnerabilities
Secure authentication
Security testing in development and acceptance
Installation of software on operational systems
Monitoring, review and change management of supplier services
Separation of development, test and production environments
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure the integrity of operational systems and prevent exploitation of technical vulnerabilities
Show more

Installation of software on operational systems

27001/2013/control-12.5.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Procedures shall be implemented to control the installation of software on operational systems.
About Installation of software on operational systems
dcterms:description Procedures shall be implemented to control the installation of software on operational systems.
dcterms:identifier 12.5.1
dcterms:title Installation of software on operational systems
rdf:type Control
iso:controlSection Control of operational software
iso:correspondsTo Installation of software on operational systems
Show more

Intellectual property rights

27002/2022/control-5.32

https://par-tec.github.io/security-ontologies/onto/iso#Control

Organizations should implement appropriate procedures should be implemented to protect intellectual property rights
About Intellectual property rights
dcterms:description Organizations should implement appropriate procedures should be implemented to protect intellectual property rights
dcterms:identifier 27002/2022/control-5.32
dcterms:title Intellectual property rights
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Intellectual property rights
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Legal andCompliance
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure compliance with legal, statutory, regulatory and contractual requirements related to intellectual property rights and use of proprietary products
Show more

Intellectual property rights

27001/2013/control-18.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary software products.
About Intellectual property rights
dcterms:description Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary software products.
dcterms:identifier 18.1.2
dcterms:title Intellectual property rights
rdf:type Control
iso:controlSection Compliance with legal and contractual requirements
iso:correspondsTo Intellectual property rights
Show more

Inventory of assets

27001/2013/control-8.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Assets associated with information and information processing facilities shall be identified and an inventory of these assets shall be drawn up and maintained.
About Inventory of assets
dcterms:description Assets associated with information and information processing facilities shall be identified and an inventory of these assets shall be drawn up and maintained.
dcterms:identifier 8.1.1
dcterms:title Inventory of assets
rdf:type Control
iso:controlSection Responsibility for assets
iso:correspondsTo Inventory of information and other associated assets
Show more

Inventory of information and other associated assets

27002/2022/control-5.9

https://par-tec.github.io/security-ontologies/onto/iso#Control

An inventory of information and other associated assets, including owners, should be developed and maintained
About Inventory of information and other associated assets
dcterms:description An inventory of information and other associated assets, including owners, should be developed and maintained
dcterms:identifier 27002/2022/control-5.9
dcterms:title Inventory of information and other associated assets
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Inventory of assets
Ownership of assets
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
iso:hasRelatedControls Classification of information
Labelling of information
Acceptable use of information and associated assets
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To identify the organization's information and other associated assets in order to preserve their information security and assign appropriate ownership
Show more

Key management

27001/2013/control-10.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

A policy on the use, protection and lifetime of cryptographic keys shall be developed and implemented through their whole lifecycle.
About Key management
dcterms:description A policy on the use, protection and lifetime of cryptographic keys shall be developed and implemented through their whole lifecycle.
dcterms:identifier 10.1.2
dcterms:title Key management
rdf:type Control
iso:controlSection Cryptographic controls
iso:correspondsTo Use of cryptography
Show more

Labeling of information

27001/2013/control-8.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

An appropriate set of procedures for information labeling shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
About Labeling of information
dcterms:description An appropriate set of procedures for information labeling shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
dcterms:identifier 8.2.2
dcterms:title Labeling of information
rdf:type Control
iso:controlSection Information classification
iso:correspondsTo Labelling of information
Show more

Learning from information security incidents

27001/2013/control-16.1.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

Knowledge gained from analyzing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidents.
About Learning from information security incidents
dcterms:description Knowledge gained from analyzing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidents.
dcterms:identifier 16.1.6
dcterms:title Learning from information security incidents
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Learning from information security incidents
Show more

Learning from information security incidents

27002/2022/control-5.27

https://par-tec.github.io/security-ontologies/onto/iso#Control

Knowledge gained from information security incidents should be used to strengthen and improve the control environment
About Learning from information security incidents
dcterms:description Knowledge gained from information security incidents should be used to strengthen and improve the control environment
dcterms:identifier 27002/2022/control-5.27
dcterms:title Learning from information security incidents
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Learning from information security incidents
hasControlType Corrective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
Protect
hasInformationSecurityProperty Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
iso:hasRelatedControls Information security awareness, education and training
Information security incident management responsibilities and preparation
hasInformationSecurityProperty Defence and Security
iso:purpose To reduce the likelihood or impact of future incidents
Show more

Management of privileged access rights

27001/2013/control-9.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

The allocation and use of privileged access rights shall be restricted and controlled.
About Management of privileged access rights
dcterms:description The allocation and use of privileged access rights shall be restricted and controlled.
dcterms:identifier 9.2.3
dcterms:title Management of privileged access rights
rdf:type Control
iso:controlSection User access management
iso:correspondsTo Privileged access rights
Show more

Management of removable media

27001/2013/control-8.3.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Procedures shall be implemented for the management of removable media in accordance with the classification scheme adopted by the organization.
About Management of removable media
dcterms:description Procedures shall be implemented for the management of removable media in accordance with the classification scheme adopted by the organization.
dcterms:identifier 8.3.1
dcterms:title Management of removable media
rdf:type Control
iso:controlSection Media Handling
iso:correspondsTo Storage media
Show more

Management of secret authentication information of users

27001/2013/control-9.2.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

The allocation of secret authentication information shall be controlled through a formal management process.
About Management of secret authentication information of users
dcterms:description The allocation of secret authentication information shall be controlled through a formal management process.
dcterms:identifier 9.2.4
dcterms:title Management of secret authentication information of users
rdf:type Control
iso:controlSection User access management
iso:correspondsTo Authentication information
Show more

Management of technical vulnerabilities

27001/2013/control-12.6.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk.
About Management of technical vulnerabilities
dcterms:description Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk.
dcterms:identifier 12.6.1
dcterms:title Management of technical vulnerabilities
rdf:type Control
iso:controlSection Technical vulnerability management
iso:correspondsTo Management of technical vulnerabilities
Show more

Management responsibilities

27002/2022/control-5.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Management should be a role model for information security and require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization
About Management responsibilities
dcterms:description Management should be a role model for information security and require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization
dcterms:identifier 27002/2022/control-5.4
dcterms:title Management responsibilities
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Management responsibilities
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
iso:hasRelatedControls Information security awareness, education and training
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure management understand their role in information security and undertake actions aiming to ensure all personnel are aware of and fulfil their information security responsibilities
Show more

Management responsibilities

27001/2013/control-7.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Management shall require all employees and contractors to apply information security in accordance with the established policies and procedures of the organization.
About Management responsibilities
dcterms:description Management shall require all employees and contractors to apply information security in accordance with the established policies and procedures of the organization.
dcterms:identifier 7.2.1
dcterms:title Management responsibilities
rdf:type Control
iso:controlSection During employment
iso:correspondsTo Management responsibilities
Show more

Managing changes to supplier services

27001/2013/control-15.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Changes to the provision of services by suppliers, including maintaining and improving existing information security policies, procedures and controls, shall be managed, taking account of the criticality of business information, systems and processes involved and re-assessment of risks.
About Managing changes to supplier services
dcterms:description Changes to the provision of services by suppliers, including maintaining and improving existing information security policies, procedures and controls, shall be managed, taking account of the criticality of business information, systems and processes involved and re-assessment of risks.
dcterms:identifier 15.2.2
dcterms:title Managing changes to supplier services
rdf:type Control
iso:controlSection Supplier service delivery management
iso:correspondsTo Monitoring, review and change management of supplier services
Show more

Managing information security in the ICT supply chain

27002/2022/control-5.21

https://par-tec.github.io/security-ontologies/onto/iso#Control

Processes and procedures should be defined and implemented to address information security risks associated with ICT services and product supply chain
About Managing information security in the ICT supply chain
dcterms:description Processes and procedures should be defined and implemented to address information security risks associated with ICT services and product supply chain
dcterms:identifier 27002/2022/control-5.21
dcterms:title Managing information security in the ICT supply chain
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Information and communication technology supply chain
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Supplier and Relationship Security
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To ensure information security of the organization in ICT supply chain
Show more

Mobile device policy

27001/2013/control-6.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.
About Mobile device policy
dcterms:description A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.
dcterms:identifier 6.2.1
dcterms:title Mobile device policy
rdf:type Control
iso:controlSection Mobile devices and teleworking
iso:correspondsTo User endpoint devices
Show more

Monitoring and review of supplier services

27001/2013/control-15.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Organizations shall regularly monitor, review and audit supplier service delivery.
About Monitoring and review of supplier services
dcterms:description Organizations shall regularly monitor, review and audit supplier service delivery.
dcterms:identifier 15.2.1
dcterms:title Monitoring and review of supplier services
rdf:type Control
iso:controlSection Supplier service delivery management
iso:correspondsTo Monitoring, review and change management of supplier services
Show more

Monitoring, review and change management of supplier services

27002/2022/control-5.22

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization should regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery
About Monitoring, review and change management of supplier services
dcterms:description The organization should regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery
dcterms:identifier 27002/2022/control-5.22
dcterms:title Monitoring, review and change management of supplier services
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Managing changes to supplier services
Monitoring and review of supplier services
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Supplier and Relationship Security
iso:hasRelatedControls Compliance with policies and standards for information security
Independent review of information security
Information security during disruption
Redundancy of information processing facilities
hasInformationSecurityProperty Defence and Security
Governance and Ecosystem
Protection and Risk
iso:purpose To maintain an agreed level of information security and service delivery in line with supplier agreements
Show more

Network controls

27001/2013/control-13.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Networks shall be managed and controlled to protect information in systems and applications.
About Network controls
dcterms:description Networks shall be managed and controlled to protect information in systems and applications.
dcterms:identifier 13.1.1
dcterms:title Network controls
rdf:type Control
iso:controlSection Network security management
iso:correspondsTo Network controls
Show more

Outsourced development

27001/2013/control-14.2.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization shall supervise and monitor the activity of outsourced system development.
About Outsourced development
dcterms:description The organization shall supervise and monitor the activity of outsourced system development.
dcterms:identifier 14.2.7
dcterms:title Outsourced development
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Outsourced development
Show more

Ownership of assets

27001/2013/control-8.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Assets maintained in the inventory shall be owned.
About Ownership of assets
dcterms:description Assets maintained in the inventory shall be owned.
dcterms:identifier 8.1.2
dcterms:title Ownership of assets
rdf:type Control
iso:controlSection Responsibility for assets
iso:correspondsTo Inventory of information and other associated assets
Show more

Password management system

27001/2013/control-9.4.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Password management systems shall be interactive and shall ensure quality passwords.
About Password management system
dcterms:description Password management systems shall be interactive and shall ensure quality passwords.
dcterms:identifier 9.4.3
dcterms:title Password management system
rdf:type Control
iso:controlSection System and application access control
iso:correspondsTo Authentication information
Show more

Physical entry controls

27001/2013/control-11.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access.
About Physical entry controls
dcterms:description Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access.
dcterms:identifier 11.1.2
dcterms:title Physical entry controls
rdf:type Control
iso:controlSection Secure areas
iso:correspondsTo Physical entry controls
Show more

Physical media transfer

27001/2013/control-8.3.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Media containing information shall be protected against unauthorized access, misuse or corruption during transportation.
About Physical media transfer
dcterms:description Media containing information shall be protected against unauthorized access, misuse or corruption during transportation.
dcterms:identifier 8.3.3
dcterms:title Physical media transfer
rdf:type Control
iso:controlSection Media Handling
iso:correspondsTo Storage media
Show more

Physical security monitoring

27002/2022/control-7.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Premises should be continuously monitored for unauthorized physical access
About Physical security monitoring
dcterms:description Premises should be continuously monitored for unauthorized physical access
dcterms:identifier 27002/2022/control-7.4
dcterms:title Physical security monitoring
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Detective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Physical Security
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To detect and deter unauthorized physical access
Show more

Physical security perimeter

27001/2013/control-11.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security perimeters shall be defined and used to protect areas that contain either sensitive or critical information and information processing facilities.
About Physical security perimeter
dcterms:description Security perimeters shall be defined and used to protect areas that contain either sensitive or critical information and information processing facilities.
dcterms:identifier 11.1.1
dcterms:title Physical security perimeter
rdf:type Control
iso:controlSection Secure areas
iso:correspondsTo Physical security perimeter
Show more

Planning information security continuity

27001/2013/control-17.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization shall determine its requirements for information security and the continuity of information security management in adverse situations, e.g. during a crisis or disaster.
About Planning information security continuity
dcterms:description The organization shall determine its requirements for information security and the continuity of information security management in adverse situations, e.g. during a crisis or disaster.
dcterms:identifier 17.1.1
dcterms:title Planning information security continuity
rdf:type Control
iso:controlSection Information security continuity
iso:correspondsTo Information security during disruption
Show more

Policies for information security

27001/2013/control-5.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

A set of policies for information security shall be defined, approved by management, published and communicated to employees and relevant external parties.
About Policies for information security
dcterms:description A set of policies for information security shall be defined, approved by management, published and communicated to employees and relevant external parties.
dcterms:identifier 5.1.1
dcterms:title Policies for information security
rdf:type Control
iso:controlSection Management direction for information security
iso:correspondsTo Policies for information security
Show more

Policies for information security

27002/2022/control-5.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security policy and topic-specific policies should be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occur.
About Policies for information security
dcterms:description Information security policy and topic-specific policies should be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occur.
dcterms:identifier 27002/2022/control-5.1
dcterms:title Policies for information security
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Policies for information security
Review of the policies for information security
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
hasInformationSecurityProperty Governance and Ecosystem
Resilience and Recovery
iso:purpose To ensure continuing suitability, adequacy, effectiveness of management direction and support for information security in accordance with business requirements, legal, statutory, regulatory and contractual requirements.
Show more

Policy on the use of cryptographic controls

27001/2013/control-10.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

A policy on the use of cryptographic controls for protection of information shall be developed and implemented.
About Policy on the use of cryptographic controls
dcterms:description A policy on the use of cryptographic controls for protection of information shall be developed and implemented.
dcterms:identifier 10.1.1
dcterms:title Policy on the use of cryptographic controls
rdf:type Control
iso:controlSection Cryptographic controls
iso:correspondsTo Use of cryptography
Show more

Privacy and protection of personally identifiable information

27001/2013/control-18.1.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable.
About Privacy and protection of personally identifiable information
dcterms:description Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable.
dcterms:identifier 18.1.4
dcterms:title Privacy and protection of personally identifiable information
rdf:type Control
iso:controlSection Compliance with legal and contractual requirements
iso:correspondsTo Privacy and protection of PII
Show more

Protecting against external and environmental threats

27001/2013/control-11.1.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Physical protection against natural disasters, malicious attack or accidents shall be designed and applied.
About Protecting against external and environmental threats
dcterms:description Physical protection against natural disasters, malicious attack or accidents shall be designed and applied.
dcterms:identifier 11.1.4
dcterms:title Protecting against external and environmental threats
rdf:type Control
iso:controlSection Secure areas
iso:correspondsTo Protecting against physical and environmental threats
Show more

Protecting against physical and environmental threats

27002/2022/control-7.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure should be designed and implemented
About Protecting against physical and environmental threats
dcterms:description Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure should be designed and implemented
dcterms:identifier 27002/2022/control-7.5
dcterms:title Protecting against physical and environmental threats
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Protecting against external and environmental threats
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent or reduce the impacts of events originating from physical and environmental threats
Show more

Protecting application services transactions

27001/2013/control-14.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information involved in application service transactions shall be protected to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication or replay
About Protecting application services transactions
dcterms:description Information involved in application service transactions shall be protected to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication or replay
dcterms:identifier 14.1.3
dcterms:title Protecting application services transactions
rdf:type Control
iso:controlSection Security requirements of information systems
iso:correspondsTo Application security requirements
Show more

Protection against malware

27002/2022/control-8.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

Protection against malware should be implemented, supported by appropriate user awareness
About Protection against malware
dcterms:description Protection against malware should be implemented, supported by appropriate user awareness
dcterms:identifier 27002/2022/control-8.7
dcterms:title Protection against malware
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Controls against malware
hasControlType Corrective
Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability System Network Security
iso:hasRelatedControls Change management
Management of technical vulnerabilities
Information backup
Information security awareness, education and training
Installation of software on operational systems
hasInformationSecurityProperty Defence and Security
Protection and Risk
iso:purpose To ensure information and other associated assets are protected against malware
Show more

Protection of information systems during audit and testing

27002/2022/control-8.34

https://par-tec.github.io/security-ontologies/onto/iso#Control

Audit tests and other assurance activities involving assessment of operational systems should be planned and agreed between the tester and appropriate management
About Protection of information systems during audit and testing
dcterms:description Audit tests and other assurance activities involving assessment of operational systems should be planned and agreed between the tester and appropriate management
dcterms:identifier 27002/2022/control-8.34
dcterms:title Protection of information systems during audit and testing
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Information systems audit controls
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Integrity
hasOperationalCapability Information Protection
System Network Security
hasInformationSecurityProperty Governance and Ecosystem
Protection and Risk
iso:purpose To minimize the impact of audit and other assurance activities on operational systems and business processes
Show more

Protection of log information

27001/2013/control-12.4.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Logging facilities and log information shall be protected against tampering and unauthorized access.
About Protection of log information
dcterms:description Logging facilities and log information shall be protected against tampering and unauthorized access.
dcterms:identifier 12.4.2
dcterms:title Protection of log information
rdf:type Control
iso:controlSection Logging and monitoring
iso:correspondsTo Logging
Show more

Protection of records

27001/2013/control-18.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legislative, regulatory, contractual and business requirements.
About Protection of records
dcterms:description Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legislative, regulatory, contractual and business requirements.
dcterms:identifier 18.1.3
dcterms:title Protection of records
rdf:type Control
iso:controlSection Compliance with legal and contractual requirements
iso:correspondsTo Protection of records
Show more

Protection of test data

27001/2013/control-14.3.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Test data shall be selected carefully, protected and controlled.
About Protection of test data
dcterms:description Test data shall be selected carefully, protected and controlled.
dcterms:identifier 14.3.1
dcterms:title Protection of test data
rdf:type Control
iso:controlSection Test data
iso:correspondsTo Test information
Show more

Redundancy of information processing facilities

27002/2022/control-8.14

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information processing facilities should be implemented with redundancy sufficient to meet availability requirements
About Redundancy of information processing facilities
dcterms:description Information processing facilities should be implemented with redundancy sufficient to meet availability requirements
dcterms:identifier 27002/2022/control-8.14
dcterms:title Redundancy of information processing facilities
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Availability of information processing facilities
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
hasOperationalCapability Asset Management
Continuity
iso:hasRelatedControls ICT readiness for business continuity
hasInformationSecurityProperty Protection and Risk
Resilience and Recovery
iso:purpose To ensure the continuous operation of information processing facilities
Show more

Regulation of cryptographic controls

27001/2013/control-18.1.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations.
About Regulation of cryptographic controls
dcterms:description Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations.
dcterms:identifier 18.1.5
dcterms:title Regulation of cryptographic controls
rdf:type Control
iso:controlSection Compliance with legal and contractual requirements
iso:correspondsTo Identification of legal, statutory, regulatory and contractual requirements
Show more

Removal of assets

27001/2013/control-11.2.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Equipment, information or software shall not be taken off-site without prior authorization.
About Removal of assets
dcterms:description Equipment, information or software shall not be taken off-site without prior authorization.
dcterms:identifier 11.2.5
dcterms:title Removal of assets
rdf:type Control
iso:controlSection Equipment
Show more

Removal or adjustment of access rights

27001/2013/control-9.2.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

The access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change.
About Removal or adjustment of access rights
dcterms:description The access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change.
dcterms:identifier 9.2.6
dcterms:title Removal or adjustment of access rights
rdf:type Control
iso:controlSection User access management
iso:correspondsTo Access rights
Show more

Reporting information security events

27001/2013/control-16.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security events shall be reported through appropriate management channels as quickly as possible.
About Reporting information security events
dcterms:description Information security events shall be reported through appropriate management channels as quickly as possible.
dcterms:identifier 16.1.2
dcterms:title Reporting information security events
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Information security event reporting
Show more

Reporting information security weaknesses

27001/2013/control-16.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Employees and contractors using the organization’s information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or services.
About Reporting information security weaknesses
dcterms:description Employees and contractors using the organization’s information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or services.
dcterms:identifier 16.1.3
dcterms:title Reporting information security weaknesses
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Information security event reporting
Show more

Response to information security incidents

27002/2022/control-5.26

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security incidents should be responded to in accordance with the documented procedures
About Response to information security incidents
dcterms:description Information security incidents should be responded to in accordance with the documented procedures
dcterms:identifier 27002/2022/control-5.26
dcterms:title Response to information security incidents
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Response to information security incidents
hasControlType Corrective
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Recover
Respond
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Information Security Event Management
iso:hasRelatedControls Collection of evidence
ICT readiness for business continuity
Information security during disruption
Information security incident management responsibilities and preparation
Learning from information security incidents
hasInformationSecurityProperty Defence and Security
iso:purpose To ensure efficient and effective response to information security incidents
Show more

Response to information security incidents

27001/2013/control-16.1.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security incidents shall be responded to in accordance with the documented procedures.
About Response to information security incidents
dcterms:description Information security incidents shall be responded to in accordance with the documented procedures.
dcterms:identifier 16.1.5
dcterms:title Response to information security incidents
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Response to information security incidents
Show more

Responsibilities after termination or change of employment

27002/2022/control-6.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security responsibilities and duties that remain valid after termination or change of employment should be defined, enforced and communicated to relevant personnel and other interested parties
About Responsibilities after termination or change of employment
dcterms:description Information security responsibilities and duties that remain valid after termination or change of employment should be defined, enforced and communicated to relevant personnel and other interested parties
dcterms:identifier 27002/2022/control-6.5
dcterms:title Responsibilities after termination or change of employment
rdf:type Control
iso:controlCategory People
iso:correspondsTo Termination or change of employment responsibilities
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Human Resources Security
iso:hasRelatedControls Confidentiality or non-disclosure agreements
Terms and conditions of employment
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To protect the organization’s interests as part of the process of changing or terminating employment or contract
Show more

Responsibilities and procedures

27001/2013/control-16.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Management responsibilities and procedures shall be established to ensure a quick, effective and orderly response to information security incidents.
About Responsibilities and procedures
dcterms:description Management responsibilities and procedures shall be established to ensure a quick, effective and orderly response to information security incidents.
dcterms:identifier 16.1.1
dcterms:title Responsibilities and procedures
rdf:type Control
iso:controlSection Management of information security incidents and improvements
iso:correspondsTo Information security incident management responsibilities and preparation
Show more

Restrictions on changes to software packages

27001/2013/control-14.2.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Modifications to software packages shall be discouraged, limited to necessary changes and all changes shall be strictly controlled.
About Restrictions on changes to software packages
dcterms:description Modifications to software packages shall be discouraged, limited to necessary changes and all changes shall be strictly controlled.
dcterms:identifier 14.2.4
dcterms:title Restrictions on changes to software packages
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Change management
Show more

Restrictions on software installation

27001/2013/control-12.6.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules governing the installation of software by users shall be established and implemented.
About Restrictions on software installation
dcterms:description Rules governing the installation of software by users shall be established and implemented.
dcterms:identifier 12.6.2
dcterms:title Restrictions on software installation
rdf:type Control
iso:controlSection Technical vulnerability management
iso:correspondsTo Installation of software on operational systems
Show more

Return of assets

27001/2013/control-8.1.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

All employees and external party users shall return all of the organizational assets in their possession upon termination of their employment, contract or agreement.
About Return of assets
dcterms:description All employees and external party users shall return all of the organizational assets in their possession upon termination of their employment, contract or agreement.
dcterms:identifier 8.1.4
dcterms:title Return of assets
rdf:type Control
iso:controlSection Responsibility for assets
iso:correspondsTo Return of assets
Show more

Review of the policies for information security

27001/2013/control-5.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

The policies for information security shall be reviewed at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
About Review of the policies for information security
dcterms:description The policies for information security shall be reviewed at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
dcterms:identifier 5.1.2
dcterms:title Review of the policies for information security
rdf:type Control
iso:controlSection Management direction for information security
iso:correspondsTo Policies for information security
Show more

Review of user access rights

27001/2013/control-9.2.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Asset owners shall review users’ access rights at regular intervals.
About Review of user access rights
dcterms:description Asset owners shall review users’ access rights at regular intervals.
dcterms:identifier 9.2.5
dcterms:title Review of user access rights
rdf:type Control
iso:controlSection User access management
iso:correspondsTo Access rights
Show more

Screening

27001/2013/control-7.1.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Background verification checks on all candidates for employment shall be carried out in accordance with relevant laws, regulations and ethics and shall be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.
About Screening
dcterms:description Background verification checks on all candidates for employment shall be carried out in accordance with relevant laws, regulations and ethics and shall be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.
dcterms:identifier 7.1.1
dcterms:title Screening
rdf:type Control
iso:controlSection Prior to employment
iso:correspondsTo Screening
Show more

Secure development environment

27001/2013/control-14.2.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

Organizations shall establish and appropriately protect secure development environments for system development and integration efforts that cover the entire system development lifecycle.
About Secure development environment
dcterms:description Organizations shall establish and appropriately protect secure development environments for system development and integration efforts that cover the entire system development lifecycle.
dcterms:identifier 14.2.6
dcterms:title Secure development environment
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Separation of development, test and production environments
Show more

Secure development policy

27001/2013/control-14.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules for the development of software and systems shall be established and applied to developments within the organization.
About Secure development policy
dcterms:description Rules for the development of software and systems shall be established and applied to developments within the organization.
dcterms:identifier 14.2.1
dcterms:title Secure development policy
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Secure development lifecycle
Show more

Secure disposal or re-use of equipment

27002/2022/control-7.14

https://par-tec.github.io/security-ontologies/onto/iso#Control

Items of equipment containing storage media should be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use
About Secure disposal or re-use of equipment
dcterms:description Items of equipment containing storage media should be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use
dcterms:identifier 27002/2022/control-7.14
dcterms:title Secure disposal or re-use of equipment
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Secure disposal or reuse of equipment
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
hasOperationalCapability Asset Management
Physical Security
iso:hasRelatedControls Storage media
Information deletion
Use of cryptography
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent leakage of information from equipment to be disposed or re-used
Show more

Secure disposal or reuse of equipment

27001/2013/control-11.2.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.
About Secure disposal or reuse of equipment
dcterms:description All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.
dcterms:identifier 11.2.7
dcterms:title Secure disposal or reuse of equipment
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Secure disposal or re-use of equipment
Show more

Secure log-on procedures

27001/2013/control-9.4.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedure.
About Secure log-on procedures
dcterms:description Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedure.
dcterms:identifier 9.4.2
dcterms:title Secure log-on procedures
rdf:type Control
iso:controlSection System and application access control
iso:correspondsTo Secure authentication
Show more

Secure system engineering principles

27001/2013/control-14.2.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Principles for engineering secure systems shall be established, documented, maintained and applied to any information system implementation efforts.
About Secure system engineering principles
dcterms:description Principles for engineering secure systems shall be established, documented, maintained and applied to any information system implementation efforts.
dcterms:identifier 14.2.5
dcterms:title Secure system engineering principles
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Secure system architecture and engineering principles
Show more

Securing application services on public networks

27001/2013/control-14.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information involved in application services passing over public networks shall be protected from fraudulent activity, contract dispute and unauthorized disclosure and modification.
About Securing application services on public networks
dcterms:description Information involved in application services passing over public networks shall be protected from fraudulent activity, contract dispute and unauthorized disclosure and modification.
dcterms:identifier 14.1.2
dcterms:title Securing application services on public networks
rdf:type Control
iso:controlSection Security requirements of information systems
iso:correspondsTo Application security requirements
Show more

Securing offices, rooms and facilities

27002/2022/control-7.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Physical security for offices, rooms, and facilities should be designed and implemented
About Securing offices, rooms and facilities
dcterms:description Physical security for offices, rooms, and facilities should be designed and implemented
dcterms:identifier 27002/2022/control-7.3
dcterms:title Securing offices, rooms and facilities
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Securing offices, rooms and facilities
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent unauthorized physical access, damage and interference to the organization’s information and other associated assets in offices, rooms and facilities
Show more

Securing offices, rooms and facilities

27001/2013/control-11.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Physical security for offices, rooms and facilities shall be designed and applied.
About Securing offices, rooms and facilities
dcterms:description Physical security for offices, rooms and facilities shall be designed and applied.
dcterms:identifier 11.1.3
dcterms:title Securing offices, rooms and facilities
rdf:type Control
iso:controlSection Secure areas
iso:correspondsTo Securing offices, rooms and facilities
Show more

Security of assets off-premises

27002/2022/control-7.9

https://par-tec.github.io/security-ontologies/onto/iso#Control

Off-site assets should be protected taking into account the different risks
About Security of assets off-premises
dcterms:description Off-site assets should be protected taking into account the different risks
dcterms:identifier 27002/2022/control-7.9
dcterms:title Security of assets off-premises
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Security of equipment and assets off-premises
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Asset Management
Physical Security
iso:hasRelatedControls Remote working
User endpoint devices
Physical security monitoring
Protecting against physical and environmental threats
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent loss, damage, theft or compromise of off-site assets and interruption to the organization’s operations
Show more

Security of equipment and assets off-premises

27001/2013/control-11.2.6

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security shall be applied to off-site assets taking into account the different risks of working outside the organization’s premises.
About Security of equipment and assets off-premises
dcterms:description Security shall be applied to off-site assets taking into account the different risks of working outside the organization’s premises.
dcterms:identifier 11.2.6
dcterms:title Security of equipment and assets off-premises
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Security of assets off-premises
Show more

Security of network services

27001/2013/control-13.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security mechanisms, service levels and management requirements of all network services shall be identified and included in network services agreements, whether these services are provided in-house or outsourced.
About Security of network services
dcterms:description Security mechanisms, service levels and management requirements of all network services shall be identified and included in network services agreements, whether these services are provided in-house or outsourced.
dcterms:identifier 13.1.2
dcterms:title Security of network services
rdf:type Control
iso:controlSection Network security management
iso:correspondsTo Security of network services
Show more

Security of network services

27002/2022/control-8.21

https://par-tec.github.io/security-ontologies/onto/iso#Control

Security mechanisms, service levels, and service requirements of network services should be identified, implemented and monitored
About Security of network services
dcterms:description Security mechanisms, service levels, and service requirements of network services should be identified, implemented and monitored
dcterms:identifier 27002/2022/control-8.21
dcterms:title Security of network services
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Security of network services
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability System Network Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure security in the use of network services
Show more

Segregation in networks

27001/2013/control-13.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Groups of information services, users and information systems shall be segregated on networks.
About Segregation in networks
dcterms:description Groups of information services, users and information systems shall be segregated on networks.
dcterms:identifier 13.1.3
dcterms:title Segregation in networks
rdf:type Control
iso:controlSection Network security management
iso:correspondsTo Segregation in networks
Show more

Segregation of duties

27002/2022/control-5.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Conflicting duties and areas of responsibility should be segregated
About Segregation of duties
dcterms:description Conflicting duties and areas of responsibility should be segregated
dcterms:identifier 27002/2022/control-5.3
dcterms:title Segregation of duties
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo Segregation of duties
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Governance
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To reduce the risk of fraud, error and bypassing of information security controls
Show more

Segregation of duties

27001/2013/control-6.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets.
About Segregation of duties
dcterms:description Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets.
dcterms:identifier 6.1.2
dcterms:title Segregation of duties
rdf:type Control
iso:controlSection Internal organization
iso:correspondsTo Segregation of duties
Show more

Separation of development, test and production environments

27002/2022/control-8.31

https://par-tec.github.io/security-ontologies/onto/iso#Control

Development, testing, and production environments should be separated and secured
About Separation of development, test and production environments
dcterms:description Development, testing, and production environments should be separated and secured
dcterms:identifier 27002/2022/control-8.31
dcterms:title Separation of development, test and production environments
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Secure development environment
Separation of development, testing and operational environments
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Application Security
System Network Security
iso:hasRelatedControls Security testing in development and acceptance
Test information
hasInformationSecurityProperty Protection and Risk
iso:purpose To protect the production environment and data from compromise by development and test activities
Show more

Separation of development, testing and operational environments

27001/2013/control-12.1.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

Development, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to the operational environment.
About Separation of development, testing and operational environments
dcterms:description Development, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to the operational environment.
dcterms:identifier 12.1.4
dcterms:title Separation of development, testing and operational environments
rdf:type Control
iso:controlSection Operational procedures and responsibilities
iso:correspondsTo Separation of development, test and production environments
Show more

Supporting utilities

27002/2022/control-7.11

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information processing facilities should be protected from power failures and other disruptions caused by failures in supporting utilities
About Supporting utilities
dcterms:description Information processing facilities should be protected from power failures and other disruptions caused by failures in supporting utilities
dcterms:identifier 27002/2022/control-7.11
dcterms:title Supporting utilities
rdf:type Control
iso:controlCategory Physical
iso:correspondsTo Supporting utilities
hasControlType Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Protect
hasInformationSecurityProperty Availability
hasOperationalCapability Physical Security
hasInformationSecurityProperty Protection and Risk
iso:purpose To prevent loss, damage or compromise of information and other associated assets due to the failure and disruption of supporting utilities or interruption to the organization’s operations
Show more

Supporting utilities

27001/2013/control-11.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Equipment shall be protected from power failures and other disruptions caused by failures in supporting utilities.
About Supporting utilities
dcterms:description Equipment shall be protected from power failures and other disruptions caused by failures in supporting utilities.
dcterms:identifier 11.2.2
dcterms:title Supporting utilities
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo Supporting utilities
Show more

System acceptance testing

27001/2013/control-14.2.9

https://par-tec.github.io/security-ontologies/onto/iso#Control

Acceptance testing programs and related criteria shall be established for new information systems, upgrades and new versions.
About System acceptance testing
dcterms:description Acceptance testing programs and related criteria shall be established for new information systems, upgrades and new versions.
dcterms:identifier 14.2.9
dcterms:title System acceptance testing
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Security testing in development and acceptance
Show more

System change control procedures

27001/2013/control-14.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

Changes to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
About System change control procedures
dcterms:description Changes to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
dcterms:identifier 14.2.2
dcterms:title System change control procedures
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Change management
Show more

System security testing

27001/2013/control-14.2.8

https://par-tec.github.io/security-ontologies/onto/iso#Control

Testing of security functionality shall be carried out during development.
About System security testing
dcterms:description Testing of security functionality shall be carried out during development.
dcterms:identifier 14.2.8
dcterms:title System security testing
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Security testing in development and acceptance
Show more

Technical compliance review

27001/2013/control-18.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information systems shall be regularly reviewed for compliance with the organization’s information security policies and standards.
About Technical compliance review
dcterms:description Information systems shall be regularly reviewed for compliance with the organization’s information security policies and standards.
dcterms:identifier 18.2.3
dcterms:title Technical compliance review
rdf:type Control
iso:controlSection Information security reviews
iso:correspondsTo Management of technical vulnerabilities
Compliance with policies and standards for information security
Show more

Technical review of applications after operating platform changes

27001/2013/control-14.2.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

When operating platforms are changed, business critical applications shall be reviewed and tested to ensure there is no adverse impact on organizational operations or security.
About Technical review of applications after operating platform changes
dcterms:description When operating platforms are changed, business critical applications shall be reviewed and tested to ensure there is no adverse impact on organizational operations or security.
dcterms:identifier 14.2.3
dcterms:title Technical review of applications after operating platform changes
rdf:type Control
iso:controlSection Security in development and support processes
iso:correspondsTo Change management
Show more

Teleworking

27001/2013/control-6.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

A policy and supporting security measures shall be implemented to protect information accessed, processed or stored at teleworking sites.
About Teleworking
dcterms:description A policy and supporting security measures shall be implemented to protect information accessed, processed or stored at teleworking sites.
dcterms:identifier 6.2.2
dcterms:title Teleworking
rdf:type Control
iso:controlSection Mobile devices and teleworking
iso:correspondsTo Remote working
Show more

Termination or change of employment responsibilities

27001/2013/control-7.3.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, communicated to the employee or contractor and enforced.
About Termination or change of employment responsibilities
dcterms:description Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, communicated to the employee or contractor and enforced.
dcterms:identifier 7.3.1
dcterms:title Termination or change of employment responsibilities
rdf:type Control
iso:controlSection Termination and change of employment
iso:correspondsTo Responsibilities after termination or change of employment
Show more

Terms and conditions of employment

27002/2022/control-6.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

The employment contractual agreements should state the personnel’s and the organization’s responsibilities for information security
About Terms and conditions of employment
dcterms:description The employment contractual agreements should state the personnel’s and the organization’s responsibilities for information security
dcterms:identifier 27002/2022/control-6.2
dcterms:title Terms and conditions of employment
rdf:type Control
iso:controlCategory People
iso:correspondsTo Terms and conditions of employment
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Human Resources Security
iso:hasRelatedControls Confidentiality or non-disclosure agreements
Disciplinary process
Labelling of information
Privacy and protection of PII
Intellectual property rights
Inventory of information and other associated assets
Responsibilities after termination or change of employment
hasInformationSecurityProperty Governance and Ecosystem
iso:purpose To ensure personnel understand their information security responsibilities for the roles for which they are considered
Show more

Terms and conditions of employment

27001/2013/control-7.1.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

The contractual agreements with employees and contractors shall state their and the organization’s responsibilities for information security.
About Terms and conditions of employment
dcterms:description The contractual agreements with employees and contractors shall state their and the organization’s responsibilities for information security.
dcterms:identifier 7.1.2
dcterms:title Terms and conditions of employment
rdf:type Control
iso:controlSection Prior to employment
iso:correspondsTo Terms and conditions of employment
Show more

Test information

27002/2022/control-8.33

https://par-tec.github.io/security-ontologies/onto/iso#Control

Test information should be appropriately selected, protected and managed
About Test information
dcterms:description Test information should be appropriately selected, protected and managed
dcterms:identifier 27002/2022/control-8.33
dcterms:title Test information
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Protection of test data
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
Integrity
hasOperationalCapability Information Protection
iso:hasRelatedControls Data masking
Information deletion
Separation of development, test and production environments
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure relevance of testing and protection of operational information used for testing
Show more

Threat intelligence

27002/2022/control-5.7

https://par-tec.github.io/security-ontologies/onto/iso#Control

Information relating to information security threats should be collected and analysed to produce threat intelligence
About Threat intelligence
dcterms:description Information relating to information security threats should be collected and analysed to produce threat intelligence
dcterms:identifier 27002/2022/control-5.7
dcterms:title Threat intelligence
rdf:type Control
iso:controlCategory Organizational
iso:correspondsTo https://par-tec.github.io/security-ontologies/onto/iso#27001/2013/control-New
hasControlType Detective
Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Detect
Identify
hasInformationSecurityProperty Availability
Confidentiality
Integrity
hasOperationalCapability Threat and Vulnerability Management
iso:hasRelatedControls Monitoring activities
Web filtering
Assessment and decision on information security events
Protection against malware
hasInformationSecurityProperty Defence and Security
Resilience and Recovery
iso:purpose To provide awareness of the threat environment that can impact the organization so that the organization can take appropriate mitigation actions
Show more

Unattended user equipment

27001/2013/control-11.2.8

https://par-tec.github.io/security-ontologies/onto/iso#Control

Users shall ensure that unattended equipment has appropriate protection.
About Unattended user equipment
dcterms:description Users shall ensure that unattended equipment has appropriate protection.
dcterms:identifier 11.2.8
dcterms:title Unattended user equipment
rdf:type Control
iso:controlSection Equipment
iso:correspondsTo User endpoint devices
Show more

Use of cryptography

27002/2022/control-8.24

https://par-tec.github.io/security-ontologies/onto/iso#Control

Rules for the effective use of cryptography, including cryptographic key management, should be defined and implemented
About Use of cryptography
dcterms:description Rules for the effective use of cryptography, including cryptographic key management, should be defined and implemented
dcterms:identifier 27002/2022/control-8.24
dcterms:title Use of cryptography
rdf:type Control
iso:controlCategory Technological
iso:correspondsTo Key management
Policy on the use of cryptographic controls
hasControlType Preventive
https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept Protect
hasInformationSecurityProperty Confidentiality
Integrity
hasOperationalCapability Secure Configuration
iso:hasRelatedControls Identification of legal, statutory, regulatory and contractual requirements
Monitoring, review and change management of supplier services
Use of cryptography
hasInformationSecurityProperty Protection and Risk
iso:purpose To ensure proper and effective use of cryptography to protect the confidentiality, authenticity or integrity of information in compliance with legal, statutory, regulatory or contractual requirements related to cryptography
Show more

Use of privileged utility programs

27001/2013/control-9.4.4

https://par-tec.github.io/security-ontologies/onto/iso#Control

The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlled.
About Use of privileged utility programs
dcterms:description The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlled.
dcterms:identifier 9.4.4
dcterms:title Use of privileged utility programs
rdf:type Control
iso:controlSection System and application access control
iso:correspondsTo Use of privileged utility programs
Show more

Use of secret authentication information

27001/2013/control-9.3.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

Users shall be required to follow the organization’s practices in the use of secret authentication information.
About Use of secret authentication information
dcterms:description Users shall be required to follow the organization’s practices in the use of secret authentication information.
dcterms:identifier 9.3.1
dcterms:title Use of secret authentication information
rdf:type Control
iso:controlSection User responsibilities
iso:correspondsTo Authentication information
Show more

User access provisioning

27001/2013/control-9.2.2

https://par-tec.github.io/security-ontologies/onto/iso#Control

A formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and services.
About User access provisioning
dcterms:description A formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and services.
dcterms:identifier 9.2.2
dcterms:title User access provisioning
rdf:type Control
iso:controlSection User access management
iso:correspondsTo Access rights
Show more

User registration and de-registration

27001/2013/control-9.2.1

https://par-tec.github.io/security-ontologies/onto/iso#Control

A formal user registration and de-registration process shall be implemented to enable assignment of access rights.
About User registration and de-registration
dcterms:description A formal user registration and de-registration process shall be implemented to enable assignment of access rights.
dcterms:identifier 9.2.1
dcterms:title User registration and de-registration
rdf:type Control
iso:controlSection User access management
iso:correspondsTo Identity management
Show more

Verify, review and evaluate information security continuity

27001/2013/control-17.1.3

https://par-tec.github.io/security-ontologies/onto/iso#Control

The organization shall verify the established and implemented information security continuity controls at regular intervals in order to ensure that they are valid and effective during adverse situations.
About Verify, review and evaluate information security continuity
dcterms:description The organization shall verify the established and implemented information security continuity controls at regular intervals in order to ensure that they are valid and effective during adverse situations.
dcterms:identifier 17.1.3
dcterms:title Verify, review and evaluate information security continuity
rdf:type Control
iso:controlSection Information security continuity
iso:correspondsTo Information security during disruption
Show more

Working in secure areas

27001/2013/control-11.1.5

https://par-tec.github.io/security-ontologies/onto/iso#Control

Procedures for working in secure areas shall be designed and applied.
About Working in secure areas
dcterms:description Procedures for working in secure areas shall be designed and applied.
dcterms:identifier 11.1.5
dcterms:title Working in secure areas
rdf:type Control
iso:controlSection Secure areas
iso:correspondsTo Working in secure areas
Show more

Access control

27001/2013/category-9

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Access control
rdf:type Control Category
rdfs:label Access control
Show more

Asset management

27001/2013/category-8

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Asset management
rdf:type Control Category
rdfs:label Asset management
Show more

Communications security

27001/2013/category-13

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Communications security
rdf:type Control Category
rdfs:label Communications security
Show more

Compliance

27001/2013/category-18

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Compliance
rdf:type Control Category
rdfs:label Compliance
Show more

Cryptography

27001/2013/category-10

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Cryptography
rdf:type Control Category
rdfs:label Cryptography
Show more

Human resources security

27001/2013/category-7

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Human resources security
rdf:type Control Category
rdfs:label Human resources security
Show more

Information security aspects of business continuity management

27001/2013/category-17

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Information security aspects of business continuity management
rdf:type Control Category
rdfs:label Information security aspects of business continuity management
Show more

Information security incident management

27001/2013/category-16

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Information security incident management
rdf:type Control Category
rdfs:label Information security incident management
Show more

Information security policies

27001/2013/category-5

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Information security policies
rdf:type Control Category
rdfs:label Information security policies
Show more

Operations security

27001/2013/category-12

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Operations security
rdf:type Control Category
rdfs:label Operations security
Show more

Organization of information security

27001/2013/category-6

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Organization of information security
rdf:type Control Category
rdfs:label Organization of information security
Show more

Organizational

category-5

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Organizational
rdf:type Control Category
rdfs:label Organizational
Show more

People

category-6

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About People
rdf:type Control Category
rdfs:label People
Show more

Physical

category-7

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Physical
rdf:type Control Category
rdfs:label Physical
Show more

Physical and environmental security

27001/2013/category-11

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Physical and environmental security
rdf:type Control Category
rdfs:label Physical and environmental security
Show more

Supplier relationships

27001/2013/category-15

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Supplier relationships
rdf:type Control Category
rdfs:label Supplier relationships
Show more

System acquisition, development and maintenance

27001/2013/category-14

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About System acquisition, development and maintenance
rdf:type Control Category
rdfs:label System acquisition, development and maintenance
Show more

Technological

category-8

https://par-tec.github.io/security-ontologies/onto/iso#ControlCategory

About Technological
rdf:type Control Category
rdfs:label Technological
Show more

Corrective

Corrective

https://par-tec.github.io/security-ontologies/onto/iso#ControlType

About Corrective
rdf:type Control Type
rdfs:comment Corrective controls are controls after an incident.
rdfs:label Corrective
Show more

Detective

Detective

https://par-tec.github.io/security-ontologies/onto/iso#ControlType

About Detective
rdf:type Control Type
rdfs:comment Detective controls are controls that detect an incident.
rdfs:label Detective
Show more

Preventive

Preventive

https://par-tec.github.io/security-ontologies/onto/iso#ControlType

About Preventive
rdf:type Control Type
rdfs:comment Preventive controls are controls that prevent an incident.
rdfs:label Preventive
Show more

Detect

Detect

https://par-tec.github.io/security-ontologies/onto/iso#CybersecurityConcept

About Detect
rdf:type Cybersecurity Concepts
rdfs:comment Detect concepts are concepts that detect information.
rdfs:label Detect
Show more

Identify

Identify

https://par-tec.github.io/security-ontologies/onto/iso#CybersecurityConcept

About Identify
rdf:type Cybersecurity Concepts
rdfs:comment The Identify Function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs
rdfs:label Identify
Show more

Protect

Protect

https://par-tec.github.io/security-ontologies/onto/iso#CybersecurityConcept

About Protect
rdf:type Cybersecurity Concepts
rdfs:comment Protect concepts are concepts that protect information.
rdfs:label Protect
Show more

Recover

Recover

https://par-tec.github.io/security-ontologies/onto/iso#CybersecurityConcept

About Recover
rdf:type Cybersecurity Concepts
rdfs:comment Recover concepts are concepts that recover information.
rdfs:label Recover
Show more

Respond

Respond

https://par-tec.github.io/security-ontologies/onto/iso#CybersecurityConcept

About Respond
rdf:type Cybersecurity Concepts
rdfs:comment Respond concepts are concepts that respond to information.
rdfs:label Respond
Show more

Ecosystem Cybersecurity Management

EcosystemCybersecurityManagement

https://par-tec.github.io/security-ontologies/onto/iso#GovernanceEcosystem

About Ecosystem Cybersecurity Management
rdf:type Governance and Ecosystem
rdfs:comment Ecosystem cybersecurity management domain is a domain that manages ecosystem cybersecurity.
rdfs:label Ecosystem Cybersecurity Management
Show more

Information System Security Governance and Risk Management

InformationSystemSecurityGovernance_RiskManagement

https://par-tec.github.io/security-ontologies/onto/iso#GovernanceEcosystem

About Information System Security Governance and Risk Management
rdf:type Governance and Ecosystem
rdfs:comment Information system security governance and risk management domain is a domain that manages information system security governance and risk management.
rdfs:label Information System Security Governance and Risk Management
Show more

Availability

Availability

https://par-tec.github.io/security-ontologies/onto/iso#InformationSecurityProperty

About Availability
rdf:type Information Security Properties
rdfs:comment Availability of information.
rdfs:label Availability
Show more

Confidentiality

Confidentiality

https://par-tec.github.io/security-ontologies/onto/iso#InformationSecurityProperty

About Confidentiality
rdf:type Information Security Properties
rdfs:comment Confidentiality of information.
rdfs:label Confidentiality
Show more

Integrity

Integrity

https://par-tec.github.io/security-ontologies/onto/iso#InformationSecurityProperty

About Integrity
rdf:type Information Security Properties
rdfs:comment Integrity of information.
rdfs:label Integrity
Show more

Application Security

ApplicationSecurity

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Application Security
rdf:type Operational Capabilities
rdfs:comment Application security capabilities are capabilities that protect applications.
rdfs:label Application Security
Show more

Asset Management

AssetManagement

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Asset Management
rdf:type Operational Capabilities
rdfs:comment Asset management capabilities are capabilities that manage information assets.
rdfs:label Asset Management
Show more

Continuity

Continuity

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Continuity
rdf:type Operational Capabilities
rdfs:comment Continuity capabilities are capabilities that manage continuity.
rdfs:label Continuity
Show more

Governance

Governance

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Governance
rdf:type Operational Capabilities
rdfs:comment Governance capabilities are capabilities that govern the operation of information systems.
rdfs:label Governance
Show more

Human Resources Security

HRSecurity

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Human Resources Security
rdf:type Operational Capabilities
rdfs:comment Human resources security capabilities are capabilities that protect human resources.
rdfs:label Human Resources Security
Show more

Identity and Access Management

IAM

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Identity and Access Management
rdf:type Operational Capabilities
rdfs:comment Identity and access management capabilities are capabilities that manage identities and access.
rdfs:label Identity and Access Management
Show more

Information Protection

InformationProtection

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Information Protection
rdf:type Operational Capabilities
rdfs:comment Information protection capabilities are capabilities that protect information.
rdfs:label Information Protection
Show more

Information Security Event Management

EventManangement

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Information Security Event Management
rdf:type Operational Capabilities
rdfs:comment Event management capabilities are capabilities that manage events.
rdfs:label Information Security Event Management
Show more

Information security Assurance

Assurance

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Information security Assurance
rdf:type Operational Capabilities
rdfs:comment Event management capabilities are capabilities that manage events.
rdfs:label Information security Assurance
Show more

Legal andCompliance

Compliance

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Legal andCompliance
rdf:type Operational Capabilities
rdfs:comment Compliance capabilities are capabilities that manage compliance.
rdfs:label Legal andCompliance
Show more

Physical Security

PhysicalSecurity

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Physical Security
rdf:type Operational Capabilities
rdfs:comment Physical security capabilities are capabilities that protect physical assets.
rdfs:label Physical Security
Show more

Secure Configuration

SecureConfiguration

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Secure Configuration
rdf:type Operational Capabilities
rdfs:comment Secure configuration capabilities are capabilities that secure configuration.
rdfs:label Secure Configuration
Show more

Supplier and Relationship Security

SupplierSecurity

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Supplier and Relationship Security
rdf:type Operational Capabilities
rdfs:comment Supplier security capabilities are capabilities that manage supplier assets.
rdfs:label Supplier and Relationship Security
Show more

System Network Security

SystemNetworkSecurity

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About System Network Security
rdf:type Operational Capabilities
rdfs:comment System network security capabilities are capabilities that protect system network assets.
rdfs:label System Network Security
Show more

Threat and Vulnerability Management

ThreatManagement

https://par-tec.github.io/security-ontologies/onto/iso#OperationalCapability

About Threat and Vulnerability Management
rdf:type Operational Capabilities
rdfs:comment Threat and Vulnerability management capabilities are capabilities that manage threats.
rdfs:label Threat and Vulnerability Management
Show more

IT Security Administration

ITSecurityAdministration

https://par-tec.github.io/security-ontologies/onto/iso#Protection

About IT Security Administration
rdf:type Protection and Risk
rdfs:comment IT security administration domain is a domain that manages IT security administration.
rdfs:label IT Security Administration
Show more

IT Security Architecture

ITSecurityArchitecture

https://par-tec.github.io/security-ontologies/onto/iso#Protection

About IT Security Architecture
rdf:type Protection and Risk
rdfs:comment IT security architecture domain is a domain that manages IT security architecture.
rdfs:label IT Security Architecture
Show more

Backup

27001/2013/section-12.3

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Backup
rdf:type iso:Section
rdfs:label Backup
iso:controlCategory Operations security
Show more

Business requirements of access control

27001/2013/section-9.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Business requirements of access control
rdf:type iso:Section
rdfs:label Business requirements of access control
iso:controlCategory Access control
Show more

Compliance with legal and contractual requirements

27001/2013/section-18.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Compliance with legal and contractual requirements
rdf:type iso:Section
rdfs:label Compliance with legal and contractual requirements
iso:controlCategory Compliance
Show more

Control of operational software

27001/2013/section-12.5

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Control of operational software
rdf:type iso:Section
rdfs:label Control of operational software
iso:controlCategory Operations security
Show more

Cryptographic controls

27001/2013/section-10.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Cryptographic controls
rdf:type iso:Section
rdfs:label Cryptographic controls
iso:controlCategory Cryptography
Show more

During employment

27001/2013/section-7.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About During employment
rdf:type iso:Section
rdfs:label During employment
iso:controlCategory Human resources security
Show more

Equipment

27001/2013/section-11.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Equipment
rdf:type iso:Section
rdfs:label Equipment
iso:controlCategory Physical and environmental security
Show more

Information classification

27001/2013/section-8.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Information classification
rdf:type iso:Section
rdfs:label Information classification
iso:controlCategory Asset management
Show more

Information security continuity

27001/2013/section-17.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Information security continuity
rdf:type iso:Section
rdfs:label Information security continuity
iso:controlCategory Information security aspects of business continuity management
Show more

Information security in supplier relationships

27001/2013/section-15.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Information security in supplier relationships
rdf:type iso:Section
rdfs:label Information security in supplier relationships
iso:controlCategory Supplier relationships
Show more

Information security reviews

27001/2013/section-18.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Information security reviews
rdf:type iso:Section
rdfs:label Information security reviews
iso:controlCategory Compliance
Show more

Information systems audit considerations

27001/2013/section-12.7

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Information systems audit considerations
rdf:type iso:Section
rdfs:label Information systems audit considerations
iso:controlCategory Operations security
Show more

Information transfer

27001/2013/section-13.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Information transfer
rdf:type iso:Section
rdfs:label Information transfer
iso:controlCategory Communications security
Show more

Internal organization

27001/2013/section-6.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Internal organization
rdf:type iso:Section
rdfs:label Internal organization
iso:controlCategory Organization of information security
Show more

Logging and monitoring

27001/2013/section-12.4

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Logging and monitoring
rdf:type iso:Section
rdfs:label Logging and monitoring
iso:controlCategory Operations security
Show more

Management direction for information security

27001/2013/section-5.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Management direction for information security
rdf:type iso:Section
rdfs:label Management direction for information security
iso:controlCategory Information security policies
Show more

Management of information security incidents and improvements

27001/2013/section-16.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Management of information security incidents and improvements
rdf:type iso:Section
rdfs:label Management of information security incidents and improvements
iso:controlCategory Information security incident management
Show more

Media Handling

27001/2013/section-8.3

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Media Handling
rdf:type iso:Section
rdfs:label Media Handling
iso:controlCategory Asset management
Show more

Mobile devices and teleworking

27001/2013/section-6.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Mobile devices and teleworking
rdf:type iso:Section
rdfs:label Mobile devices and teleworking
iso:controlCategory Organization of information security
Show more

Network security management

27001/2013/section-13.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Network security management
rdf:type iso:Section
rdfs:label Network security management
iso:controlCategory Communications security
Show more

Operational procedures and responsibilities

27001/2013/section-12.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Operational procedures and responsibilities
rdf:type iso:Section
rdfs:label Operational procedures and responsibilities
iso:controlCategory Operations security
Show more

Prior to employment

27001/2013/section-7.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Prior to employment
rdf:type iso:Section
rdfs:label Prior to employment
iso:controlCategory Human resources security
Show more

Protection from malware

27001/2013/section-12.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Protection from malware
rdf:type iso:Section
rdfs:label Protection from malware
iso:controlCategory Operations security
Show more

Redundancies

27001/2013/section-17.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Redundancies
rdf:type iso:Section
rdfs:label Redundancies
iso:controlCategory Information security aspects of business continuity management
Show more

Responsibility for assets

27001/2013/section-8.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Responsibility for assets
rdf:type iso:Section
rdfs:label Responsibility for assets
iso:controlCategory Asset management
Show more

Secure areas

27001/2013/section-11.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Secure areas
rdf:type iso:Section
rdfs:label Secure areas
iso:controlCategory Physical and environmental security
Show more

Security in development and support processes

27001/2013/section-14.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Security in development and support processes
rdf:type iso:Section
rdfs:label Security in development and support processes
iso:controlCategory System acquisition, development and maintenance
Show more

Security requirements of information systems

27001/2013/section-14.1

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Security requirements of information systems
rdf:type iso:Section
rdfs:label Security requirements of information systems
iso:controlCategory System acquisition, development and maintenance
Show more

Supplier service delivery management

27001/2013/section-15.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Supplier service delivery management
rdf:type iso:Section
rdfs:label Supplier service delivery management
iso:controlCategory Supplier relationships
Show more

System and application access control

27001/2013/section-9.4

https://par-tec.github.io/security-ontologies/onto/iso#Section

About System and application access control
rdf:type iso:Section
rdfs:label System and application access control
iso:controlCategory Access control
Show more

Technical vulnerability management

27001/2013/section-12.6

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Technical vulnerability management
rdf:type iso:Section
rdfs:label Technical vulnerability management
iso:controlCategory Operations security
Show more

Termination and change of employment

27001/2013/section-7.3

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Termination and change of employment
rdf:type iso:Section
rdfs:label Termination and change of employment
iso:controlCategory Human resources security
Show more

Test data

27001/2013/section-14.3

https://par-tec.github.io/security-ontologies/onto/iso#Section

About Test data
rdf:type iso:Section
rdfs:label Test data
iso:controlCategory System acquisition, development and maintenance
Show more

User access management

27001/2013/section-9.2

https://par-tec.github.io/security-ontologies/onto/iso#Section

About User access management
rdf:type iso:Section
rdfs:label User access management
iso:controlCategory Access control
Show more

User responsibilities

27001/2013/section-9.3

https://par-tec.github.io/security-ontologies/onto/iso#Section

About User responsibilities
rdf:type iso:Section
rdfs:label User responsibilities
iso:controlCategory Access control
Show more

Defence and Security

Defence

https://par-tec.github.io/security-ontologies/onto/iso#SecurityDomain

About Defence and Security
rdf:type Security Domains
rdfs:comment Defence and Security domain are domains that protect information.
rdfs:label Defence and Security
Show more

Governance and Ecosystem

GovernanceEcosystem

https://par-tec.github.io/security-ontologies/onto/iso#SecurityDomain

About Governance and Ecosystem
rdf:type Security Domains
rdfs:comment Governance and Ecosystem domain are domains that govern the operation of information systems.
rdfs:label Governance and Ecosystem
Show more

Protection and Risk

Protection

https://par-tec.github.io/security-ontologies/onto/iso#SecurityDomain

About Protection and Risk
rdf:type Security Domains
rdfs:comment Protection and Risk domain are domains that protect information.
rdfs:label Protection and Risk
Show more

Resilience and Recovery

Resilience

https://par-tec.github.io/security-ontologies/onto/iso#SecurityDomain

About Resilience and Recovery
rdf:type Security Domains
rdfs:comment Resilience and Recovery domain are domains that manage resilience.
rdfs:label Resilience and Recovery
Show more

Control

Control

http://www.w3.org/2002/07/owl#Class

About Control
rdf:type owl:Class
skos:Concept
rdfs:comment Controls are the basic building blocks of the ISO 27001 standard.
rdfs:label Control
rdfs:subClassOf n88b4ce733c314ae997b89adc30714a33b1
Show more

Control Category

ControlCategory

http://www.w3.org/2002/07/owl#Class

About Control Category
rdf:type owl:Class
skos:Concept
rdfs:comment Control categories are the basic building blocks of the ISO 27001 standard.
rdfs:label Control Category
Show more

Cybersecurity Concepts

CybersecurityConcept

http://www.w3.org/2002/07/owl#Class

About Cybersecurity Concepts
rdf:type owl:Class
skos:Concept
rdfs:comment Cybersecurity frameworks based on ISO/IEC TS 27110 provide a way to organize and communicate cybersecurity activities through 5 concepts: Identify, Protect, Detect, Respond, and Recover.
rdfs:label Cybersecurity Concepts
rdfs:seeAlso https://www.nist.gov/cyberframework
Show more

Information Security Properties

InformationSecurityProperty

http://www.w3.org/2002/07/owl#Class

About Information Security Properties
rdf:type owl:Class
skos:Concept
rdfs:comment Information security properties are the different properties of information.
rdfs:label Information Security Properties
rdfs:seeAlso https://dbpedia.org/page/Information_security
Show more

Operational Capabilities

OperationalCapability

http://www.w3.org/2002/07/owl#Class

About Operational Capabilities
rdf:type owl:Class
skos:Concept
rdfs:comment Operational capabilities correlate controls with the perspective of the practitioners.
rdfs:label Operational Capabilities
skos:prefLabel Skos Operational Capabilities
Show more

Security Domains

SecurityDomain

http://www.w3.org/2002/07/owl#Class

About Security Domains
rdf:type owl:Class
skos:Concept
rdfs:comment Security domains are the different domains that can be used in the ISO 27001 standard.
rdfs:label Security Domains
Show more

hasControlCategory

hasControlCategory

http://www.w3.org/2002/07/owl#ObjectProperty

About hasControlCategory
rdf:type owl:ObjectProperty
rdfs:comment The category of the control.
rdfs:domain Control
rdfs:label hasControlCategory
rdfs:range Control Category
Show more

hasControlType

hasControlType

http://www.w3.org/2002/07/owl#ObjectProperty

About hasControlType
rdf:type owl:ObjectProperty
rdfs:comment The type of the control.
rdfs:domain Control
rdfs:label hasControlType
rdfs:range Control Type
Show more

hasInformationSecurityProperty

hasSecurityDomain

http://www.w3.org/2002/07/owl#ObjectProperty

About hasInformationSecurityProperty
rdf:type owl:ObjectProperty
rdfs:comment The information security property of the control.
rdfs:domain Control
rdfs:label hasInformationSecurityProperty
rdfs:range Security Domains
Show more

hasInformationSecurityProperty

hasInformationSecurityProperty

http://www.w3.org/2002/07/owl#ObjectProperty

About hasInformationSecurityProperty
rdf:type owl:ObjectProperty
rdfs:comment The information security property.
rdfs:domain Control
rdfs:label hasInformationSecurityProperty
rdfs:range Information Security Properties
Show more

hasOperationalCapability

hasOperationalCapability

http://www.w3.org/2002/07/owl#ObjectProperty

About hasOperationalCapability
rdf:type owl:ObjectProperty
rdfs:comment The operational capability.
rdfs:domain Control
rdfs:label hasOperationalCapability
rdfs:range Operational Capabilities
Show more

https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept

hasCybersecurityConcept

http://www.w3.org/2002/07/owl#ObjectProperty

About https://par-tec.github.io/security-ontologies/onto/iso#hasCybersecurityConcept
rdf:type owl:ObjectProperty
rdfs:comment Associates an ISO Control to a NIST Cybersecurity Function.
rdfs:domain Control
rdfs:range Cybersecurity Concepts
Show more

https://par-tec.github.io/security-ontologies/onto/iso#

http://www.w3.org/2002/07/owl#Ontology

ISO27001 Controls Ontology
About https://par-tec.github.io/security-ontologies/onto/iso#
dcterms:creator mailto:robipolli@gmail.com
dcterms:description ISO27001 Controls Ontology
dcterms:license https://creativecommons.org/licenses/by-sa/4.0
rdf:type owl:Ontology
Show more

n88b4ce733c314ae997b89adc30714a33b1

n88b4ce733c314ae997b89adc30714a33b1

http://www.w3.org/2002/07/owl#Restriction

About n88b4ce733c314ae997b89adc30714a33b1
rdf:type owl:Restriction
owl:onProperty iso:purpose
owl:someValuesFrom xsd:string
Show more

Control Type

ControlType

http://www.w3.org/2004/02/skos/core#Concept

About Control Type
rdf:type owl:Class
skos:Concept
rdfs:comment Control type is an attribute to view controls from the perspective of when and how the control modifies the risk with regard to the occurrence of an information security incident.
rdfs:label Control Type
Show more