Skip to content
AuditFront
ISO 27001

Technological Controls

34 controls in this category. Click any control to see implementation guidance, evidence requirements, and common audit failures.

A.8.1 critical

User endpoint devices

Technological Controls
A.8.10 high

Information deletion

Technological Controls
A.8.12 high

Data leakage prevention

Technological Controls
A.8.11 high

Data masking

Technological Controls
A.8.13 critical

Information backup

Technological Controls
A.8.15 critical

Logging

Technological Controls
A.8.14 high

Redundancy of information processing facilities

Technological Controls
A.8.16 critical

Monitoring activities

Technological Controls
A.8.17 medium

Clock synchronization

Technological Controls
A.8.18 medium

Use of privileged utility programs

Technological Controls
A.8.19 high

Installation of software on operational systems

Technological Controls
A.8.2 critical

Privileged access rights

Technological Controls
A.8.20 critical

Networks security

Technological Controls
A.8.22 high

Segregation of networks

Technological Controls
A.8.21 medium

Security of network services

Technological Controls
A.8.23 high

Web filtering

Technological Controls
A.8.24 critical

Use of cryptography

Technological Controls
A.8.25 high

Secure development life cycle

Technological Controls
A.8.26 high

Application security requirements

Technological Controls
A.8.27 high

Secure system architecture and engineering principles

Technological Controls
A.8.28 high

Secure coding

Technological Controls
A.8.29 high

Security testing in development and acceptance

Technological Controls
A.8.3 high

Information access restriction

Technological Controls
A.8.30 high

Outsourced development

Technological Controls
A.8.31 high

Separation of development, test and production environments

Technological Controls
A.8.32 high

Change management

Technological Controls
A.8.33 medium

Test information

Technological Controls
A.8.34 medium

Protection of information systems during audit testing

Technological Controls
A.8.4 high

Access to source code

Technological Controls
A.8.5 critical

Secure authentication

Technological Controls
A.8.6 medium

Capacity management

Technological Controls
A.8.8 critical

Management of technical vulnerabilities

Technological Controls
A.8.9 high

Configuration management

Technological Controls
A.8.7 critical

Protection against malware

Technological Controls

Assess ISO 27001 Technological Controls

Track every control, collect evidence, and generate audit-ready reports with AuditFront.

Start Free Assessment