ISO 27001
Technological Controls
34 controls in this category. Click any control to see implementation guidance, evidence requirements, and common audit failures.
A.8.1 critical
User endpoint devices
Technological Controls
A.8.10 high
Information deletion
Technological Controls
A.8.12 high
Data leakage prevention
Technological Controls
A.8.11 high
Data masking
Technological Controls
A.8.13 critical
Information backup
Technological Controls
A.8.15 critical
Logging
Technological Controls
A.8.14 high
Redundancy of information processing facilities
Technological Controls
A.8.16 critical
Monitoring activities
Technological Controls
A.8.17 medium
Clock synchronization
Technological Controls
A.8.18 medium
Use of privileged utility programs
Technological Controls
A.8.19 high
Installation of software on operational systems
Technological Controls
A.8.2 critical
Privileged access rights
Technological Controls
A.8.20 critical
Networks security
Technological Controls
A.8.22 high
Segregation of networks
Technological Controls
A.8.21 medium
Security of network services
Technological Controls
A.8.23 high
Web filtering
Technological Controls
A.8.24 critical
Use of cryptography
Technological Controls
A.8.25 high
Secure development life cycle
Technological Controls
A.8.26 high
Application security requirements
Technological Controls
A.8.27 high
Secure system architecture and engineering principles
Technological Controls
A.8.28 high
Secure coding
Technological Controls
A.8.29 high
Security testing in development and acceptance
Technological Controls
A.8.3 high
Information access restriction
Technological Controls
A.8.30 high
Outsourced development
Technological Controls
A.8.31 high
Separation of development, test and production environments
Technological Controls
A.8.32 high
Change management
Technological Controls
A.8.33 medium
Test information
Technological Controls
A.8.34 medium
Protection of information systems during audit testing
Technological Controls
A.8.4 high
Access to source code
Technological Controls
A.8.5 critical
Secure authentication
Technological Controls
A.8.6 medium
Capacity management
Technological Controls
A.8.8 critical
Management of technical vulnerabilities
Technological Controls
A.8.9 high
Configuration management
Technological Controls
A.8.7 critical
Protection against malware
Technological Controls
Assess ISO 27001 Technological Controls
Track every control, collect evidence, and generate audit-ready reports with AuditFront.
Start Free Assessment