Skip to end of banner
Go to start of banner

Statement of Applicability

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 36 Current »

This page outlines the required Statement of Applicabilty and all relevant links to the required documents/samples/templates/evidence.

Information security management systems: Requirements

AREA/SECTION

CONTROL

APPLICABLE

IMPLEMENTED

JUSTIFICATION FOR INCLUSION OR EXCLUSION

A.5 Information security policies

A.5.1 Management direction for information security

A.5.1.1 Policies for information security

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.5.1.2 Review of the policies for information security

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

2

2

A.6 Organisation of information security

A.6.1 Internal organisation

A.6.1.1 Information security roles and responsibilities

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.6.1.2 Segregation of duties

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.6.1.3 Contact with authorities

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.6.1.4 Contact with special interest groups

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.6.1.5 Information security in project management

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.6.2 Mobile devices and teleworking

A.6.2.1 Mobile device policy

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.6.2.2 Teleworking

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

4

3

A.7 Human resources security

A.7.1 Prior to employment

A.7.1.1 Screening

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.7.1.2 Terms and conditions of employment

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.7.2 During employment

A.7.2.1 Management responsibilities

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.7.2.2 Information security awareness, education and training

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.7.2.3 Disciplinary process

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.7.3 Termination and change of employment

A.7.3.1 Termination or change of employment responsibilities

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

6

4

A.8 Asset management

A.8.1 Responsibility for assets

A.8.1.1 Inventory of assets

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.1.2 Ownership of assets

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.1.3 Acceptable use of assets

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.1.4 Return of assets

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.2 Information classification

A.8.2.1 Classification of information

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.2.2 Labelling of information

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.2.3 Handling of assets

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.3 Media Handling

A.8.3.1 Management of removable media

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.3.2 Disposal of media

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.8.3.3 Physical media transfer

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

4

4

A.9 Access control

A.9.1 Business requirements of access control

A.9.1.1 Access control policy

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.1.2 Access to networks and network services

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.2 User access management

A.9.2.1 User registration and de-registration

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.2.2 User access provisioning

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.2.3 Management of privileged access rights

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.2.4 Management of secret authentication information of users

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.2.5 Review of user access rights

Yes

No

Required by the standard and Vertic’s operational needs.

A.9.2.6 Removal or adjustment of access rights

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.3 User responsibilities

A.9.3.1 Use of secret authentication information

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.4 System and application access control

A.9.4.1 Information access restriction

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.4.2 Secure log-on procedures

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.4.3 Password management system

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.4.4 Use of privileged utility programs

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.9.4.5 Access control to program source code

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

12

11

A.10 Cryptography

A.10.1 Cryptographic controls

A.10.1.1 Policy on the use of cryptographic controls

No

No

Vertic is not involved in cryptography work at all and therefore these controls are not applicable to our operational needs.

A.10.1.2 Key management

No

No

Vertic is not involved in cryptography work at all and therefore these controls are not applicable to our operational needs.

Totals:

0

0

A.11 Physical and environmental security

A.11.1 Secure areas

A.11.1.1 Physical security perimeter

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.1.2 Physical entry controls

Yes

Yes

Required due to meeting room availability. No storage of any kind.

A.11.1.3 Securing offices, rooms and facilities

Yes

Yes

Required due to meeting room availability. No storage of any kind.

A.11.1.4 Protecting against external and environmental threats

Yes

Yes

This is primarily around the needs of the overseas team who are more exposed to civil unrest.

A.11.1.5 Working in secure areas

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.1.6 Delivery and loading areas

No

No

Vertic receives no deliveries to any physical locations.

A.11.2 Equipment

A.11.2.1 Equipment siting and protection

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.2.2 Supporting utilities

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.2.3 Cabling security

No

No

We use exclusive wireless networks so no cabling.

A.11.2.4 Equipment maintenance

Yes

Yes

Laptop security is important but all access is cloud-based with no local storage requirements.

A.11.2.5 Removal of assets

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.2.6 Security of equipment and assets off-premises

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.2.7 Secure disposal or reuse of equipment/media

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.2.8 Unattended user equipment

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.11.2.9 Clear desk and clear screen policy

Yes

Yes

Adhering to client’s privacy needs by not exposing sensitive information.

Totals:

7

7

A.12 Operations security

A.12.1 Operational procedures and responsibilities

A.12.1.1 Documented operating procedures

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.1.2 Change management

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.1.3 Capacity management

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.1.4 Separation of development, testing and operational environments

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.2 Protection from malware

A.12.2.1 Controls against malware

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.3 Backup

A.12.3.1 Information backup

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.4 Logging and monitoring

A.12.4.1 Event logging

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.4.2 Protection of log information

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.4.3 Administrator and operator logs

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.4.4 Clock synchronisation

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.5 Control of operational software

A.12.5.1 Installation of software on operational systems

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.6 Technical vulnerability management

A.12.6.1 Management of technical vulnerabilities

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.6.2 Restrictions on software installation

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.12.7 Information systems audit considerations

A.12.7.1 Information systems audit controls

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

11

9

A.13 Communications security

A.13.1 Network security management

A.13.1.1 Network controls

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.13.1.2 Security of network services

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.13.1.3 Segregation in networks

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.13.2 Information transfer

A.13.2.1 Information transfer policies and procedures

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.13.2.2 Agreements on information transfer

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.13.2.3 Electronic messaging

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.13.2.4 Confidentiality or nondisclosure agreements

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

3

3

A.14 System acquisition, development and maintenance

A.14.1 Security requirements of information systems

A.14.1.1 Information security requirements analysis and specification

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.1.2 Securing application services on public networks

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.1.3 Protecting application services transactions

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2 Security in development and support processes

A.14.2.1 Secure development policy

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.2 System change control procedures

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.3 Technical review of applications after operating platform changes

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.4 Restrictions on changes to software packages

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.5 Secure system engineering principles

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.6 Secure development environment

Yes

Yes

Required by the standard and Vertic’s operational needs.

/wiki/spaces/PD/pages/1816920072

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.8 System security testing

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.2.9 System acceptance testing

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.14.3 Test data

A.14.3.1 Protection of test data

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

11

11

A.15 Supplier relationships

A.15.1 Information security in supplier relationships

A.15.1.1 Information security policy for supplier relationships

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.15.1.2 Addressing security within supplier agreements

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.15.1.3 Information and communication technology supply chain

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.15.2 Supplier service delivery management

A.15.2.1 Monitoring and review of supplier services

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.15.2.2 Managing changes to supplier services

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

0

0

A.16 Information security incident management

A.16.1 Management of information security incidents and improvements

A.16.1.1 Responsibilities and procedures

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.16.1.2 Reporting information security events

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.16.1.3 Reporting information security weaknesses

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.16.1.4 Assessment of and decision on information security events

Yes

Yes

Required by the standard and Vertic’s operational needs.

/wiki/spaces/SCA/pages/445776488

Yes

Yes

Required by the standard and Vertic’s operational needs.

/wiki/spaces/SCA/pages/445776488

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.16.1.7 Collection of evidence

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

7

7

A.17 Information security aspects of business continuity management

A.17.1 Information security continuity

A.17.1.1 Planning information security continuity

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.17.1.2 Implementing information security continuity

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.17.1.3 Verify, review and evaluate information security continuity

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.17.2 Redundancies

A.17.2.1 Availability of information processing facilities

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

3

2

A.18 Compliance

A.18.1 Compliance with legal and contractual requirements

A.18.1.1 Identification of applicable legislation and contractual requirements

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.18.1.2 Intellectual property rights

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.18.1.3 Protection of records

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.18.1.4 Privacy and protection of personally identifiable information

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.18.1.5 Regulation of cryptographic controls

No

No

Vertic is not involved in cryptography work at all and therefore these controls are not applicable to our operational needs.

A.18.2 Information security reviews

A.18.2.1 Independent review of information security

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.18.2.2 Compliance with security policies and standards

Yes

Yes

Required by the standard and Vertic’s operational needs.

A.18.2.3 Technical compliance review

Yes

Yes

Required by the standard and Vertic’s operational needs.

Totals:

7

7

  • No labels