Privacy Versus Infosec

Briefing Note: GDPR-ISO-27001-PCI

The table below maps GDPR Security requirements against ISO-27001. The infosec aspect of GDPR Art.32 fully satisfied where certification is obtained (GDPR Art.42). As shown in the table below, achieving ISO-27001 certification, leads to a comprehensive level of information security protection that covers all the areas required by GDPR (Art.32).

The table below also maps ISO-2700 against the Payment Card Industry Standard (PCI). The quality of that mapping back from PCI to ISO27k in the range 1-5 (with 5 being best) is also provided for your convenience. ISO-27001 tends to exceed PCI requirements, as a result, the mapping is sometimes poor when reversed.

For help in achieving best practice privacy and information security in your business. Or to gain access to our whitepapers click here

GDPRISO-27001 ControlPCI
Article(s)SpecificsControl # DSS Req. #CoverageCoverage of ISO-27001 controls
Articles 32 & 4232(1)(a), 32(2)A.10.1.1Policy on the use of cryptographic controls1.53Moderately
Articles 32 & 4232(1)A.10.1.2Key management3.5, 3.65Fully
Articles 32 & 4232(4)A.11.1.1Physical security perimeter9.14Mostly
Articles 32 & 4232(4)A.11.1.2Physical entry controls9.15Fully
Articles 32 & 4232(4)A.11.1.3Securing offices, rooms and facilities 0Not Addressed
Articles 32 & 42 A.11.1.4Protecting against external and environmental threats 0Not Addressed
Articles 32 & 4232(4)A.11.1.5Working in secure areas 0Not Addressed
Articles 32 & 4232(4)A.11.1.6Delivery and loading areas 0Not Addressed
Articles 32 & 4232(4)A.11.2.1Equipment siting and protection 0Not Addressed
Articles 32 & 42 A.11.2.2Supporting utilities 0Not Addressed
Articles 32 & 42 A.11.2.3Cabling security9.1.21Minimally
Articles 32 & 4232(4)A.11.2.4Equipment maintenance 0Not Addressed
Articles 32 & 4232(4)A.11.2.5Removal of assets9.4, 9.65Fully
Articles 32 & 42 A.11.2.6Security of equipment and assets off-premises9.5, 9.65Fully
Articles 32 & 4232(4)A.11.2.7Secure disposal or reuse of equipment9.81Minimally
Articles 32 & 4232(4)A.11.2.8Unattended user equipment 0Not Addressed
Articles 32 & 4232(4)A.11.2.9Clear desk and clear screen policyVarious0Not Addressed
Articles 32 & 4232(4)A.12.1.1Documented operating procedures 4Mostly
Articles 32 & 4232(1)(b)A.12.1.2Change management6.42Partially
Articles 32 & 42 A.12.1.3Capacity management 0Not Addressed
Articles 32 & 42 A.12.1.4Separation of development, testing and operational environments6.45Fully
Articles 32 & 4232(4)A.12.2.1Controls against malware5.14Mostly
Articles 32 & 4232(1)(c), 32(2)A.12.3.1Information backup9.51Minimally
Articles 32 & 42 A.12.4.1Event logging10.25Fully
Articles 32 & 4232(4)A.12.4.2Protection of log information10.55Fully
Articles 32 & 4232(4)A.12.4.3Administrator and operator logs10.2, 10.6, 10.75Fully
Articles 32 & 42 A.12.4.4Clock synchronisation10.45Fully
Articles 32 & 4232(4)A.12.5.1Installation of software on operational systems 0Not Addressed
Articles 32 & 42 A.12.6.1Management of technical vulnerabilities6.15Fully
Articles 32 & 4232(4)A.12.6.2Restrictions on software installation 0Not Addressed
Articles 32 & 4232(2)A.12.7.1Information systems audit controls 0Not Addressed
Articles 32 & 42 A.13.1.1Network controls14Mostly
Articles 32 & 42 A.13.1.2Security of network services1.13Moderately
Articles 32 & 42 A.13.1.3Segregation in networks1.2, 1.32Partially
Articles 32 & 42 A.13.2.1Information transfer policies and procedures12.81Minimally
Articles 32 & 4232(4)A.13.2.2Agreements on information transfer12.81Minimally
Articles 32 & 42 A.13.2.3Electronic messaging4.23Moderately
Articles 32 & 4232(4)A.13.2.4Confidentiality or nondisclosure agreements12.81Minimally
Articles 32 & 4232(2)A.14.1.1Information security requirements analysis and specification2.22Partially
Articles 32 & 42 A.14.1.2Securing application services on public networks4.13Moderately
Articles 32 & 42 A.14.1.3Protecting application services transactions4.11Minimally
Articles 32 & 4232(4)A.14.2.1Secure development policy2.2, 6.35Fully
Articles 32 & 4232(1)(b)A.14.2.2System change control procedures6.45Fully
Articles 32 & 4232(1)(b)A.14.2.3Technical review of applications after operating platform changes6.45Fully
Articles 32 & 4232(1)(b)A.14.2.4Restrictions on changes to software packages6.41Minimally
Articles 32 & 4232(4)A.14.2.5Secure system engineering principles2.2, 6.35Fully
Articles 32 & 42 A.14.2.6Secure development environment 0Not Addressed
Articles 32 & 42 A.14.2.7Outsourced development2.2, 6.3, 12.82Partially
Articles 32 & 4232(4)A.14.2.8System security testing113Moderately
Articles 32 & 4232(4)A.14.2.9System acceptance testing 0Not Addressed
Articles 32 & 4232(4)A.14.3.1Protection of test data 1Minimally
Articles 32 & 4232(4)A.15.1.1Information security policy for supplier relationships12.8.32Partially
Articles 32 & 4232(4)A.15.1.2Addressing security within supplier agreements12.8, 12.92Partially
Articles 32 & 4232(4)A.15.1.3Information and communication technology supply chain12.8, 12.92Partially
Articles 32 & 4232(4)A.15.2.1Monitoring and review of supplier services 0Not Addressed
Articles 32 & 4232(1)(b)A.15.2.2Managing changes to supplier services 0Not Addressed
Articles 32 & 4232(4)A.16.1.1Responsibilities and procedures12.7, 12.105Fully
Articles 32 & 42 A.16.1.2Reporting information security events12.10.2Partially
Articles 32 & 42 A.16.1.3Reporting information security weaknesses12.10.1Minimally
Articles 32 & 42 A.16.1.4Assessment of and decision on information security events12.10.1Minimally
Articles 32 & 4232(4)A.16.1.5Response to information security incidents12.10.1Minimally
Articles 32 & 4232(4)A.16.1.6Learning from information security incidents12.10.5Fully
Articles 32 & 4232(4)A.16.1.7Collection of evidence12.10.1Minimally
Articles 32 & 42 A.17.1.1Planning information security continuity12.10.1Minimally
Articles 32 & 42 A.17.1.2Implementing information security continuity12.10.1Minimally
Articles 32 & 42 A.17.1.3Verify, review and evaluate information security continuity12.10.1Minimally
Articles 32 & 42 A.17.2.1Availability of information processing facilities 0Not Addressed
Articles 32 & 42 A.18.1.1Identification of applicable legislation and contractual requirements12.10.5Fully
Articles 32 & 42 A.18.1.2Intellectual property rights 0Not Addressed
Articles 32 & 4232(4)A.18.1.3Protection of records 3Moderately
Articles 32 & 4232(4)A.18.1.4Privacy and protection of personally identifiable information 0Not Addressed
Articles 32 & 4232(1)(a), 32(2)A.18.1.5Regulation of cryptographic controls4, 12.81Minimally
Articles 32 & 4232(4)A.18.2.1Independent review of information securityAll4Mostly
Articles 32 & 4232(4)A.18.2.2Compliance with security policies and standardsAll2Partially
Articles 32 & 42 A.18.2.3Technical compliance reviewAll2Partially
Articles 32 & 4232(4)A.5.1.1Policies for information security1.5, 12.15Fully
Articles 32 & 42 A.5.1.2Review of the policies for information security1.5, 12.1.5Fully
Articles 32 & 4232(4)A.6.1.1Information security roles and responsibilities12.55Fully
Articles 32 & 4232(4)A.6.1.2Segregation of duties3.3, 7.1, 7.2, 7.33Moderately
Articles 32 & 42 A.6.1.3Contact with authorities12.10.13Moderately
Articles 32 & 42 A.6.1.4Contact with special interest groups6.1, 6.31Minimally
Articles 32 & 42 A.6.1.5Information security in project management6.31Minimally
Articles 32 & 42 A.6.2.1Mobile device policy1.4, 4, 11.1, 12.32Partially
Articles 32 & 4232(4)A.6.2.2Teleworking1.4, 4, 11.1, 12.32Minimally
Articles 32 & 4232(4)A.7.1.1Screening12.75Fully
Articles 32 & 4232(4)A.7.1.2Terms and conditions of employment 0Not Addressed
Articles 32 & 4232(4)A.7.2.1Management responsibilities12.12Partially
Articles 32 & 4232(4)A.7.2.2Information security awareness, education and training12.62Partially
Articles 32 & 4232(4)A.7.2.3Disciplinary process 0Not Addressed
Articles 32 & 4232(4)A.7.3.1Termination or change of employment responsibilities 0Not Addressed
Articles 32 & 4232(4)A.8.1.1Inventory of assets2.42Partially
Articles 32 & 4232(4)A.8.1.2Ownership of assets 0Not Addressed
Articles 32 & 4232(4)A.8.1.3Acceptable use of assets12.33Moderately
Articles 32 & 4232(4)A.8.1.4Return of assets 0Not Addressed
Articles 32 & 4232(4)A.8.2.1Classification of information 0Not Addressed
Articles 32 & 4232(4)A.8.2.2Labelling of information9.61Minimally
Articles 32 & 4232(4)A.8.2.3Handling of assets9.5, 9.6, 9.7, 9.81Minimally
Articles 32 & 4232(4)A.8.3.1Management of removable media9.63Moderately
Articles 32 & 4232(4)A.8.3.2Disposal of media9.85Fully
Articles 32 & 4232(4)A.8.3.3Physical media transfer9.6, 9.75Fully
Articles 32 & 4232(4)A.9.1.1Access control policy7.15Fully
Articles 32 & 4232(4)A.9.1.2Access to networks and network services7.1, 7.25Fully
Articles 32 & 4232(4)A.9.2.1User registration and de-registration7.2, 84Mostly
Articles 32 & 4232(4)A.9.2.2User access provisioning7.2, 84Mostly
Articles 32 & 4232(4)A.9.2.3Management of privileged access rights7.2, 84Mostly
Articles 32 & 4232(4)A.9.2.4Management of secret authentication information of users 0Not Addressed
Articles 32 & 4232(4)A.9.2.5Review of user access rights 0Not Addressed
Articles 32 & 4232(4)A.9.2.6Removal or adjustment of access rights7.2,1Minimally
Articles 32 & 4232(4)A.9.3.1Use of secret authentication information8.45Fully
Articles 32 & 4232(4)A.9.4.1Information access restriction7.15Fully
Articles 32 & 4232(4)A.9.4.2Secure log-on procedures7.1, 8.25Fully
Articles 32 & 4232(4)A.9.4.3Password management system8.24Mostly
Articles 32 & 4232(4)A.9.4.4Use of privileged utility programs 0Not Addressed
Articles 32 & 4232(4)A.9.4.5Access control to program source code6, 7.15Fully

Copyright The AI, Privacy and Security Agency 2023 all rights reserved.


Posted

in

, , ,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *