🛡️

ISO/IEC 27001

Information security management systems - Requirements

Organization: ISO/IEC Category: Information Security Management
5
Related Articles
28
Articles with Obligations
11
Key Sections
8
Coverage Areas

Overview

Specifies requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS). Provides a systematic approach to managing sensitive company information.

Applicability

Organizational security management and governance

Relevance to General Data Protection Regulation (GDPR)

Key Coverage Areas

1
Information security management system (ISMS)
2
Risk assessment and treatment
3
Security policies and procedures
4
Access control
5
Asset management
6
Incident management
7
Business continuity
8
Supplier relationships

Standard Sections & Chapters

A.5

Organizational controls

A.6

People controls

A.7

Physical controls

A.8

Technological controls

A.5.1

Policies for information security

A.5.7

Threat intelligence

A.5.23

Information security for use of cloud services

A.8.1

User endpoint devices

A.8.2

Privileged access rights

A.8.3

Information access restriction

A.8.8

Management of technical vulnerabilities

Related General Data Protection Regulation (GDPR) Articles

Article 24: Responsibility of the controller

View Article →
Sections: 4, 5, 6

ISMS foundation for security measures

Implementation Guidance:

Implement ISMS as foundation for security of processing

Article 28: Processor

View Article →
Sections: A.5.19, A.5.20

Supplier security agreements

Implementation Guidance:

Establish security requirements in processor agreements

Mapped Obligations:

  • Controllers must only use processors with sufficient guarantees for GDPR compliance
  • Processors need written authorization before engaging sub-processors
  • Processors must only process data on documented instructions from the controller
  • Processors must ensure confidentiality of personnel handling personal data
  • Processors must implement security measures per Article 32
  • Processors must assist controllers with data subject rights requests
  • Processors must delete or return all data after services end
  • Processors must allow and contribute to compliance audits
  • Sub-processors must be bound by the same data protection obligations

Article 32: Security of processing

View Article →
Sections: A.5, A.6, A.7, A.8

Comprehensive information security controls

Implementation Guidance:

Implement appropriate technical and organizational security measures: pseudonymization, encryption, confidentiality, integrity, availability, resilience

Mapped Obligations:

  • Implement technical and organizational security measures appropriate to the risk
  • Consider pseudonymization and encryption of personal data
  • Ensure ongoing confidentiality, integrity, availability and resilience of systems
  • Regularly test and evaluate security measures effectiveness
  • Ensure staff only process data on controller's instructions

Article 33: Notification of a personal data breach to the supervisory authority

View Article →
Sections: A.5.24, A.5.26

Information security incident management

Implementation Guidance:

Implement incident detection and response procedures

Mapped Obligations:

  • Controllers must notify supervisory authority within 72 hours of breach awareness
  • Processors must notify controllers without undue delay

Article 44: General principle for transfers

View Article →
Sections: A.5.14

Information transfer policies

Implementation Guidance:

Establish policies for cross-border data transfers

Mapped Obligations:

  • Both controllers and processors must comply with transfer requirements

Quick Information

Organization
ISO/IEC
Category
Information Security Management
Certification
✓ Available

🤝 Still Feeling Overwhelmed?

EU cybersecurity laws can be complex. Our free tools and guides work great for most people, but if you're dealing with something particularly challenging or have tight deadlines, we're here to help.