This table provides a loose mapping for those interested in the inter-play between ISO-27001 Controls and PCI 3-2-1. Clearly the scope of controls for 27K (2013) greatly exceeds PCI and as such offers an excellent framework within which to deliver PCI compliance
Control # | Control | DSS Req. # | Coverage | |
A.10.1.1 | Policy on the use of cryptographic controls | 1.5 | 3 | Moderately |
A.10.1.2 | Key management | 3.5, 3.6 | 5 | Fully |
A.11.1.1 | Physical security perimeter | 9.1 | 4 | Mostly |
A.11.1.2 | Physical entry controls | 9.1 | 5 | Fully |
A.11.1.3 | Securing offices, rooms and facilities | 0 | Not Addressed | |
A.11.1.4 | Protecting against external and environmental threats | 0 | Not Addressed | |
A.11.1.5 | Working in secure areas | 0 | Not Addressed | |
A.11.1.6 | Delivery and loading areas | 0 | Not Addressed | |
A.11.2.1 | Equipment siting and protection | 0 | Not Addressed | |
A.11.2.2 | Supporting utilities | 0 | Not Addressed | |
A.11.2.3 | Cabling security | 9.1.2 | 1 | Minimally |
A.11.2.4 | Equipment maintenance | 0 | Not Addressed | |
A.11.2.5 | Removal of assets | 9.4, 9.6 | 5 | Fully |
A.11.2.6 | Security of equipment and assets off-prem- ises | 9.5, 9.6 | 5 | Fully |
A.11.2.7 | Secure disposal or reuse of equipment | 9.8 | 1 | Minimally |
A.11.2.8 | Unattended user equipment | 0 | Not Addressed | |
A.11.2.9 | Clear desk and clear screen policy | Various | 0 | Not Addressed |
A.12.1.1 | Documented operating procedures | 4 | Mostly | |
A.12.1.2 | Change management | 6.4 | 2 | Partially |
A.12.1.3 | Capacity management | 0 | Not Addressed | |
A.12.1.4 | Separation of development, testing and operational environments | 6.4 | 5 | Fully |
A.12.2.1 | Controls against malware | 5.1 | 4 | Mostly |
A.12.3.1 | Information backup | 9.5 | 1 | Minimally |
A.12.4.1 | Event logging | 10.2 | 5 | Fully |
A.12.4.2 | Protection of log information | 10.5 | 5 | Fully |
A.12.4.3 | Administrator and operator logs | 10.2, 10.6, 10.7 | 5 | Fully |
A.12.4.4 | Clock synchronisation | 10.4 | 5 | Fully |
A.12.5.1 | Installation of software on operational systems | 0 | Not Addressed | |
A.12.6.1 | Management of technical vulnerabilities | 6.1 | 5 | Fully |
A.12.6.2 | Restrictions on software installation | 0 | Not Addressed | |
A.12.7.1 | Information systems audit controls | 0 | Not Addressed | |
A.13.1.1 | Network controls | 1 | 4 | Mostly |
A.13.1.2 | Security of network services | 1.1 | 3 | Moderately |
A.13.1.3 | Segregation in networks | 1.2, 1.3 | 2 | Partially |
A.13.2.1 | Information transfer policies and procedures | 12.8 | 1 | Minimally |
A.13.2.2 | Agreements on information transfer | 12.8 | 1 | Minimally |
A.13.2.3 | Electronic messaging | 4.2 | 3 | Moderately |
A.13.2.4 | Confidentiality or nondisclosure agreements | 12.8 | 1 | Minimally |
A.14.1.1 | Information security requirements analysis and specification | 2.2 | 2 | Partially |
A.14.1.2 | Securing application services on public networks | 4.1 | 3 | Moderately |
A.14.1.3 | Protecting application services transactions | 4.1 | 1 | Minimally |
A.14.2.1 | Secure development policy | 2.2, 6.3 | 5 | Fully |
A.14.2.2 | System change control procedures | 6.4 | 5 | Fully |
A.14.2.3 | Technical review of applications after operating platform changes | 6.4 | 5 | Fully |
A.14.2.4 | Restrictions on changes to software packages | 6.4 | 1 | Minimally |
A.14.2.5 | Secure system engineering principles | 2.2, 6.3 | 5 | Fully |
A.14.2.6 | Secure development environment | 0 | Not Addressed | |
A.14.2.7 | Outsourced development | 2.2, 6.3, 12.8 | 2 | Partially |
A.14.2.8 | System security testing | 11 | 3 | Moderately |
A.14.2.9 | System acceptance testing | 0 | Not Addressed | |
A.14.3.1 | Protection of test data | 1 | Minimally | |
A.15.1.1 | Information security policy for supplier relationships | 12.8.3 | 2 | Partially |
A.15.1.2 | Addressing security within supplier agreements | 12.8, 12.9 | 2 | Partially |
A.15.1.3 | Information and communication technology supply chain | 12.8, 12.9 | 2 | Partially |
A.15.2.1 | Monitoring and review of supplier services | 0 | Not Addressed | |
A.15.2.2 | Managing changes to supplier services | 0 | Not Addressed | |
A.16.1.1 | Responsibilities and procedures | 12.7, 12.10 | 5 | Fully |
A.16.1.2 | Reporting information security events | 12.10. | 2 | Partially |
A.16.1.3 | Reporting information security weaknesses | 12.10. | 1 | Minimally |
A.16.1.4 | Assessment of and decision on information security events | 12.10. | 1 | Minimally |
A.16.1.5 | Response to information security incidents | 12.10. | 1 | Minimally |
A.16.1.6 | Learning from information security incidents | 12.10. | 5 | Fully |
A.16.1.7 | Collection of evidence | 12.10. | 1 | Minimally |
A.17.1.1 | Planning information security continuity | 12.10. | 1 | Minimally |
A.17.1.2 | Implementing information security continuity | 12.10. | 1 | Minimally |
A.17.1.3 | Verify, review and evaluate information security continuity | 12.10. | 1 | Minimally |
A.17.2.1 | Availability of information processing facilities | 0 | Not Addressed | |
A.18.1.1 | Identification of applicable legislation and contractual requirements | 12.10. | 5 | Fully |
A.18.1.2 | Intellectual property rights | 0 | Not Addressed | |
A.18.1.3 | Protection of records | 3 | Moderately | |
A.18.1.4 | Privacy and protection of personally identifiable information | 0 | Not Addressed | |
A.18.1.5 | Regulation of cryptographic controls | 4, 12.8 | 1 | Minimally |
A.18.2.1 | Independent review of information security | All | 4 | Mostly |
A.18.2.2 | Compliance with security policies and standards | All | 2 | Partially |
A.18.2.3 | Technical compliance review | All | 2 | Partially |
A.5.1.1 | Policies for information security | 1.5, 12.1 | 5 | Fully |
A.5.1.2 | Review of the policies for information security | 1.5, 12.1. | 5 | Fully |
A.6.1.1 | Information security roles and responsibilities | 12.5 | 5 | Fully |
A.6.1.2 | Segregation of duties | 3.3, 7.1, 7.2, 7.3 | 3 | Moderately |
A.6.1.3 | Contact with authorities | 12.10.1 | 3 | Moderately |
A.6.1.4 | Contact with special interest groups | 6.1, 6.3 | 1 | Minimally |
A.6.1.5 | Information security in project management | 6.3 | 1 | Minimally |
A.6.2.1 | Mobile device policy | 1.4, 4, 11.1, 12.3 | 2 | Partially |
A.6.2.2 | Teleworking | 1.4, 4, 11.1, 12.3 | 2 | Minimally |
A.7.1.1 | Screening | 12.7 | 5 | Fully |
A.7.1.2 | Terms and conditions of employment | 0 | Not Addressed | |
A.7.2.1 | Management responsibilities | 12.1 | 2 | Partially |
A.7.2.2 | Information security awareness, education and training | 12.6 | 2 | Partially |
A.7.2.3 | Disciplinary process | 0 | Not Addressed | |
A.7.3.1 | Termination or change of employment responsibilities | 0 | Not Addressed | |
A.8.1.1 | Inventory of assets | 2.4 | 2 | Partially |
A.8.1.2 | Ownership of assets | 0 | Not Addressed | |
A.8.1.3 | Acceptable use of assets | 12.3 | 3 | Moderately |
A.8.1.4 | Return of assets | 0 | Not Addressed | |
A.8.2.1 | Classification of information | 0 | Not Addressed | |
A.8.2.2 | Labelling of information | 9.6 | 1 | Minimally |
A.8.2.3 | Handling of assets | 9.5, 9.6, 9.7, 9.8 | 1 | Minimally |
A.8.3.1 | Management of removable media | 9.6 | 3 | Moderately |
A.8.3.2 | Disposal of media | 9.8 | 5 | Fully |
A.8.3.3 | Physical media transfer | 9.6, 9.7 | 5 | Fully |
A.9.1.1 | Access control policy | 7.1 | 5 | Fully |
A.9.1.2 | Access to networks and network services | 7.1, 7.2 | 5 | Fully |
A.9.2.1 | User registration and de-registration | 7.2, 8 | 4 | Mostly |
A.9.2.2 | User access provisioning | 7.2, 8 | 4 | Mostly |
A.9.2.3 | Management of privileged access rights | 7.2, 8 | 4 | Mostly |
A.9.2.4 | Management of secret authentication information of users | 0 | Not Addressed | |
A.9.2.5 | Review of user access rights | 0 | Not Addressed | |
A.9.2.6 | Removal or adjustment of access rights | 7.2, | 1 | Minimally |
A.9.3.1 | Use of secret authentication information | 8.4 | 5 | Fully |
A.9.4.1 | Information access restriction | 7.1 | 5 | Fully |
A.9.4.2 | Secure log-on procedures | 7.1, 8.2 | 5 | Fully |
A.9.4.3 | Password management system | 8.2 | 4 | Mostly |
A.9.4.4 | Use of privileged utility programs | 0 | Not Addressed | |
A.9.4.5 | Access control to program source code | 6, 7.1 | 5 | Fully |
Leave a Reply