ISO 27001 Security Assessment

Information Security Management System Questionnaire - All 93 Controls

Progress: 0%

Respondent Information

Q1A.5.1
Are information security policies established, approved by management, communicated, and reviewed at planned intervals?
Q2A.5.2
Are information security roles and responsibilities defined and allocated?
Q3A.5.3
Is segregation of duties implemented to reduce opportunities for unauthorized or unintentional modification?
Q4A.5.5
Are contacts with relevant authorities maintained?
Q5A.5.6
Are contacts with special interest groups and professional associations maintained?
Q6A.5.7
Is threat intelligence collected and analyzed?
Q7A.5.8
Is information security incorporated in project management?
Q8A.5.9
Is an inventory of information and information-processing facilities maintained?
Q9A.5.10
Is acceptable use of information and assets defined and documented?
Q10A.5.11
Are procedures for the return of organizational assets upon termination established?
Q11A.5.12
Is information classified according to legal, value, criticality, and sensitivity criteria?
Q12A.5.13
Are information labeling procedures developed and implemented?
Q13A.5.14
Are information transfer policies and procedures established?
Q14A.5.15
Are access control policies established, documented, and reviewed?
Q15A.5.16
Is identity management for personnel and entities accessing systems implemented?
Q16A.5.17
Are authentication methods appropriate to access control policy?
Q17A.5.18
Are access rights reviewed at regular intervals?
Q18A.5.19
Is information security addressed in supplier agreements?
Q19A.5.21
Is information security in the ICT supply chain managed?
Q20A.5.22
Are supplier service delivery monitored, reviewed, and audited?
Q21A.5.23
Is information security for use of cloud services defined and implemented?
Q22A.5.24
Is an information security incident management plan established?
Q23A.5.25
Are information security events assessed and classified?
Q24A.5.26
Are information security incidents responded to appropriately?
Q25A.5.27
Is evidence relating to information security events collected and preserved?
Q26A.5.28
Is evidence collection conducted according to procedures?
Q27A.5.29
Is information security addressed during disruption?
Q28A.5.30
Are ICT systems prepared for business continuity?
Q29A.5.31
Are legal, statutory, regulatory, and contractual requirements identified?
Q30A.5.32
Are intellectual property rights protected?
Q31A.5.33
Are records protected from loss, destruction, and falsification?
Q32A.5.34
Are privacy and protection of personally identifiable information ensured?
Q33A.5.35
Is information security independently reviewed at planned intervals?
Q34A.5.36
Are policies and procedures for information security regularly reviewed?
Q35A.5.37
Are documented operating procedures for information security established?
Q36A.6.1
Are background verification checks conducted on all candidates for employment?
Q37A.6.2
Do employment contracts include information security responsibilities?
Q38A.6.3
Are information security awareness, education, and training programs conducted?
Q39A.6.4
Is a disciplinary process for information security violations established?
Q40A.6.5
Are responsibilities defined for termination or change of employment?
Q41A.6.6
Are confidentiality or non-disclosure agreements established?
Q42A.6.7
Is remote working security implemented?
Q43A.6.8
Are information security events reported through appropriate channels?
Q44A.7.1
Are physical security perimeters defined and used?
Q45A.7.2
Are physical entry controls implemented?
Q46A.7.3
Are offices, rooms, and facilities secured?
Q47A.7.4
Is physical security monitoring conducted?
Q48A.7.5
Is protection against physical and environmental threats implemented?
Q49A.7.6
Is work conducted in secure areas?
Q50A.7.7
Are clear desk and clear screen policies enforced?
Q51A.7.8
Is equipment sited and protected appropriately?
Q52A.7.9
Are assets secured off-premises?
Q53A.7.10
Are storage media handled securely?
Q54A.7.11
Are supporting utilities protected from interruption?
Q55A.7.12
Is cabling security implemented?
Q56A.7.13
Is equipment maintenance conducted securely?
Q57A.7.14
Is secure disposal or reuse of equipment implemented?
Q58A.8.1
Are user endpoints protected with appropriate security software?
Q59A.8.2
Is there a formal user access provisioning process?
Q60A.8.3
Are user access rights managed effectively?
Q61A.8.4
Is access to source code restricted?
Q62A.8.5
Is secure authentication implemented?
Q63A.8.6
Is capacity management implemented?
Q64A.8.7
Is protection against malware implemented?
Q65A.8.8
Is management of technical vulnerabilities implemented?
Q66A.8.9
Are configuration management procedures established?
Q67A.8.10
Is information deletion implemented securely?
Q68A.8.11
Is data masking used according to policy?
Q69A.8.12
Is data leakage prevention implemented?
Q70A.8.13
Is information backup conducted regularly?
Q71A.8.14
Is redundancy of information processing facilities implemented?
Q72A.8.15
Is logging of activities implemented?
Q73A.8.16
Are monitoring activities conducted?
Q74A.8.17
Are clocks synchronized to an approved time source?
Q75A.8.18
Is use of privileged utility programs controlled?
Q76A.8.19
Is software installation on operational systems controlled?
Q77A.8.20
Are networks and network services secured?
Q78A.8.21
Is security of network services ensured?
Q79A.8.22
Is network segregation implemented?
Q80A.8.23
Are web filtering controls implemented?
Q81A.8.24
Is use of cryptography planned and managed?
Q82A.8.25
Is the secure development life cycle implemented?
Q83A.8.26
Are application security requirements defined?
Q84A.8.27
Is secure system architecture and engineering principles applied?
Q85A.8.28
Is secure coding practiced?
Q86A.8.29
Is security testing in development and acceptance conducted?
Q87A.8.30
Is outsourced development supervised?
Q88A.8.31
Is separation of development, test, and production environments enforced?
Q89A.8.32
Is change management implemented?
Q90A.8.33
Is test information protected?
Q91A.8.34
Is protection of information systems during audit testing ensured?
Q92A.5.4
Are management responsibilities for information security defined and allocated?
Q93A.5.20
Is information security addressed within supplier agreements?

Your responses will be securely submitted and stored for assessment purposes.