ISMS Compliance
Compliance Checklist

ISO 27001 Compliance Status

ISO 27001:2022 Annex A control mapping (future)

ISO 27001:2022 — Annex A Mapping

This section is planned for future implementation. ISO 27001 Annex A controls will be mapped through CyFun Basic controls as the backbone pivot.

Current Coverage via CyFun Basic

The following ISO 27001 Annex A controls are already addressed through our CyFun Basic implementation:

ISO 27001 ControlDescriptionCyFun Mapping
A.5.1Policies for information securityID.GV-1, ID.GV-4
A.5.9Inventory of information assetsID.AM-1, ID.AM-2, ID.AM-3, ID.AM-4
A.5.12Classification of informationID.AM-5, ID.RA-5
A.5.15Access controlPR.AC-4
A.5.16Identity managementPR.AC-1
A.5.17Authentication informationPR.AC-1
A.5.18Access rightsPR.AC-4
A.5.26Response to incidentsRS.RP-1, RS.CO-3
A.5.27Learning from incidentsRS.IM-1
A.5.29ICT readiness for business continuityRC.RP-1
A.5.31Legal requirementsID.GV-3
A.6.1ScreeningPR.IP-11
A.6.3Awareness and trainingPR.AT-1
A.7.1Physical security perimetersPR.AC-2
A.8.7Protection against malwareDE.CM-4
A.8.9Configuration managementPR.MA-1
A.8.13Information backupPR.IP-4
A.8.15LoggingPR.PT-1, DE.AE-3
A.8.16Monitoring activitiesDE.CM-1, DE.CM-3
A.8.20Networks securityPR.AC-3
A.8.22Segregation of networksPR.AC-5
A.8.23Web filteringPR.PT-4
A.8.24Use of cryptographyPR.DS-1, PR.DS-2
A.8.31Separation of environmentsPR.DS-7

On this page