Evaluate alignment with ISO/IEC 27001:2022 requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System
Clause 4.3: Scope includes processes, locations, and information assets
Clause 5.2: Policy approved by leadership, accessible to all personnel
Clause 5.3: CISO or equivalent role with authority and resources
Clause 6.1.2: Risk assessment methodology defined and consistently applied
Clause 6.1.3: Risk treatment options (avoid, transfer, accept, mitigate)
Clause 6.1.3d: Documented risk acceptance by authorized personnel
Clause 6.2: Objectives aligned with policy, monitored and communicated
Clause 7.1: Personnel, infrastructure, budget for security operations
Clause 7.2: Training on policies, threats, incident reporting
Clause 7.5: Document control (versioning, approval, retention)
Clause 8.1: Controls selected from ISO 27002 or justified alternatives
Clause 6.1.3d: SoA documents which controls are implemented and why
Clause 8.1: Security integrated into change management
Clause 9.1: KPIs for control effectiveness and security objectives
Clause 9.2: Internal audits evaluate compliance and effectiveness
Clause 9.3: Review of audit results, incidents, metrics, changes
Clause 10.1: Root cause analysis and effectiveness verification
A.5.9: Asset inventory including hardware, software, data, services
A.5.15-5.18: Access control policies and user access management
A.5.33-5.34: Encryption for data at rest and in transit
A.5.24-5.28: Incident detection, reporting, response, and lessons learned
A.8.8: Technical vulnerability management program
A.8.13: Backup and recovery procedures verified
Please answer all required questions to see your results