Professional Documents
Culture Documents
10%
20%
30%
40%
50%
60%
80%
90%
100%
70%
Information Security Policies
Asset management
www.halkynconsulting.co.uk
Access control
Cryptography
Operations security
Communications security
Supplier relationships
Compliance
A.5 A.6 A.7 A.8 A.9 A.10 A.11 A.12 A.13 A.14 A.15 A.16 A.17 A.18
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Media handling
Business requirements for access control
User access management
User responsibilities
System and application access control
Crypographic controls
Secure areas
Equipment
Operational procedures and responsibilities
Protection from malware
Backup
Logging and monitoring
Control of operational software
Technical vulnerability management
Information systems audit considerations
Network security management
Information transfer
Compliance Status - By Control