Professional Documents
Culture Documents
Controls List
Helping you select the best methods to tackle identified data breach threats
to your organisation
ISO 27001 is the international standard that describes the best practice for an ISMS.
Minimise the risk of a data breach by implementing a series of best practice information
security controls for your business. Use this controls list to select the appropriate methods
to tackle identified threats to your organisation.
ISO27001:2013 - Which Annex A Controls Objectives & Controls Are You Applying?
A6.2.2 Teleworking
www.douglasthornton.co.uk 1
ISO 27001 Controls List
A7.1.1 Screening
A8 Asset management
www.douglasthornton.co.uk 2
ISO 27001 Controls List
A9 Access control
A10 Cryptography
www.douglasthornton.co.uk 3
ISO 27001 Controls List
A11.2 Equipment
www.douglasthornton.co.uk 4
ISO 27001 Controls List
A12.3 Backup
www.douglasthornton.co.uk 5
ISO 27001 Controls List
www.douglasthornton.co.uk 6
ISO 27001 Controls List
A17.2 Redundancies
www.douglasthornton.co.uk 7
ISO 27001 Controls List
A18 Compliance
www.douglasthornton.co.uk 8