information-security-manager-iso27001

Information Security Manager - ISO 27001

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "information-security-manager-iso27001" with this command: npx skills add borghei/claude-skills/borghei-claude-skills-information-security-manager-iso27001

Information Security Manager - ISO 27001

Implement and manage Information Security Management Systems (ISMS) aligned with ISO 27001:2022 and healthcare regulatory requirements.

Table of Contents

  • Trigger Phrases

  • Quick Start

  • Tools

  • Workflows

  • Reference Guides

  • Validation Checkpoints

Trigger Phrases

Use this skill when you hear:

  • "implement ISO 27001"

  • "ISMS implementation"

  • "security risk assessment"

  • "information security policy"

  • "ISO 27001 certification"

  • "security controls implementation"

  • "incident response plan"

  • "healthcare data security"

  • "medical device cybersecurity"

  • "security compliance audit"

Quick Start

Run Security Risk Assessment

python scripts/risk_assessment.py --scope "patient-data-system" --output risk_register.json

Check Compliance Status

python scripts/compliance_checker.py --standard iso27001 --controls-file controls.csv

Generate Gap Analysis Report

python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output gaps.md

Tools

risk_assessment.py

Automated security risk assessment following ISO 27001 Clause 6.1.2 methodology.

Usage:

Full risk assessment

python scripts/risk_assessment.py --scope "cloud-infrastructure" --output risks.json

Healthcare-specific assessment

python scripts/risk_assessment.py --scope "ehr-system" --template healthcare --output risks.json

Quick asset-based assessment

python scripts/risk_assessment.py --assets assets.csv --output risks.json

Parameters:

Parameter Required Description

--scope

Yes System or area to assess

--template

No Assessment template: general , healthcare , cloud

--assets

No CSV file with asset inventory

--output

No Output file (default: stdout)

--format

No Output format: json , csv , markdown

Output:

  • Asset inventory with classification

  • Threat and vulnerability mapping

  • Risk scores (likelihood × impact)

  • Treatment recommendations

  • Residual risk calculations

compliance_checker.py

Verify ISO 27001/27002 control implementation status.

Usage:

Check all ISO 27001 controls

python scripts/compliance_checker.py --standard iso27001

Gap analysis with recommendations

python scripts/compliance_checker.py --standard iso27001 --gap-analysis

Check specific control domains

python scripts/compliance_checker.py --standard iso27001 --domains "access-control,cryptography"

Export compliance report

python scripts/compliance_checker.py --standard iso27001 --output compliance_report.md

Parameters:

Parameter Required Description

--standard

Yes Standard to check: iso27001 , iso27002 , hipaa

--controls-file

No CSV with current control status

--gap-analysis

No Include remediation recommendations

--domains

No Specific control domains to check

--output

No Output file path

Output:

  • Control implementation status

  • Compliance percentage by domain

  • Gap analysis with priorities

  • Remediation recommendations

Workflows

Workflow 1: ISMS Implementation

Step 1: Define Scope and Context

Document organizational context and ISMS boundaries:

  • Identify interested parties and requirements

  • Define ISMS scope and boundaries

  • Document internal/external issues

Validation: Scope statement reviewed and approved by management.

Step 2: Conduct Risk Assessment

python scripts/risk_assessment.py --scope "full-organization" --template general --output initial_risks.json

  • Identify information assets

  • Assess threats and vulnerabilities

  • Calculate risk levels

  • Determine risk treatment options

Validation: Risk register contains all critical assets with assigned owners.

Step 3: Select and Implement Controls

Map risks to ISO 27002 controls:

python scripts/compliance_checker.py --standard iso27002 --gap-analysis --output control_gaps.md

Control categories:

  • Organizational (policies, roles, responsibilities)

  • People (screening, awareness, training)

  • Physical (perimeters, equipment, media)

  • Technological (access, crypto, network, application)

Validation: Statement of Applicability (SoA) documents all controls with justification.

Step 4: Establish Monitoring

Define security metrics:

  • Incident count and severity trends

  • Control effectiveness scores

  • Training completion rates

  • Audit findings closure rate

Validation: Dashboard shows real-time compliance status.

Workflow 2: Security Risk Assessment

Step 1: Asset Identification

Create asset inventory:

Asset Type Examples Classification

Information Patient records, source code Confidential

Software EHR system, APIs Critical

Hardware Servers, medical devices High

Services Cloud hosting, backup High

People Admin accounts, developers Varies

Validation: All assets have assigned owners and classifications.

Step 2: Threat Analysis

Identify threats per asset category:

Asset Threats Likelihood

Patient data Unauthorized access, breach High

Medical devices Malware, tampering Medium

Cloud services Misconfiguration, outage Medium

Credentials Phishing, brute force High

Validation: Threat model covers top-10 industry threats.

Step 3: Vulnerability Assessment

python scripts/risk_assessment.py --scope "network-infrastructure" --output vuln_risks.json

Document vulnerabilities:

  • Technical (unpatched systems, weak configs)

  • Process (missing procedures, gaps)

  • People (lack of training, insider risk)

Validation: Vulnerability scan results mapped to risk register.

Step 4: Risk Evaluation and Treatment

Calculate risk: Risk = Likelihood × Impact

Risk Level Score Treatment

Critical 20-25 Immediate action required

High 15-19 Treatment plan within 30 days

Medium 10-14 Treatment plan within 90 days

Low 5-9 Accept or monitor

Minimal 1-4 Accept

Validation: All high/critical risks have approved treatment plans.

Workflow 3: Incident Response

Step 1: Detection and Reporting

Incident categories:

  • Security breach (unauthorized access)

  • Malware infection

  • Data leakage

  • System compromise

  • Policy violation

Validation: Incident logged within 15 minutes of detection.

Step 2: Triage and Classification

Severity Criteria Response Time

Critical Data breach, system down Immediate

High Active threat, significant risk 1 hour

Medium Contained threat, limited impact 4 hours

Low Minor violation, no impact 24 hours

Validation: Severity assigned and escalation triggered if needed.

Step 3: Containment and Eradication

Immediate actions:

  • Isolate affected systems

  • Preserve evidence

  • Block threat vectors

  • Remove malicious artifacts

Validation: Containment confirmed, no ongoing compromise.

Step 4: Recovery and Lessons Learned

Post-incident activities:

  • Restore systems from clean backups

  • Verify integrity before reconnection

  • Document timeline and actions

  • Conduct post-incident review

  • Update controls and procedures

Validation: Post-incident report completed within 5 business days.

Reference Guides

When to Use Each Reference

references/iso27001-controls.md

  • Control selection for SoA

  • Implementation guidance

  • Evidence requirements

  • Audit preparation

references/risk-assessment-guide.md

  • Risk methodology selection

  • Asset classification criteria

  • Threat modeling approaches

  • Risk calculation methods

references/incident-response.md

  • Response procedures

  • Escalation matrices

  • Communication templates

  • Recovery checklists

Validation Checkpoints

ISMS Implementation Validation

Phase Checkpoint Evidence Required

Scope Scope approved Signed scope document

Risk Register complete Risk register with owners

Controls SoA approved Statement of Applicability

Operation Metrics active Dashboard screenshots

Audit Internal audit done Audit report

Certification Readiness

Before Stage 1 audit:

  • ISMS scope documented and approved

  • Information security policy published

  • Risk assessment completed

  • Statement of Applicability finalized

  • Internal audit conducted

  • Management review completed

  • Nonconformities addressed

Before Stage 2 audit:

  • Controls implemented and operational

  • Evidence of effectiveness available

  • Staff trained and aware

  • Incidents logged and managed

  • Metrics collected for 3+ months

Compliance Verification

Run periodic checks:

Monthly compliance check

python scripts/compliance_checker.py --standard iso27001 --output monthly_$(date +%Y%m).md

Quarterly gap analysis

python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output quarterly_gaps.md

Worked Example: Healthcare Risk Assessment

Scenario: Assess security risks for a patient data management system.

Step 1: Define Assets

python scripts/risk_assessment.py --scope "patient-data-system" --template healthcare

Asset inventory output:

Asset ID Asset Type Owner Classification

A001 Patient database Information DBA Team Confidential

A002 EHR application Software App Team Critical

A003 Database server Hardware Infra Team High

A004 Admin credentials Access Security Critical

Step 2: Identify Risks

Risk register output:

Risk ID Asset Threat Vulnerability L I Score

R001 A001 Data breach Weak encryption 3 5 15

R002 A002 SQL injection Input validation 4 4 16

R003 A004 Credential theft No MFA 4 5 20

Step 3: Determine Treatment

Risk Treatment Control Timeline

R001 Mitigate Implement AES-256 encryption 30 days

R002 Mitigate Add input validation, WAF 14 days

R003 Mitigate Enforce MFA for all admins 7 days

Step 4: Verify Implementation

python scripts/compliance_checker.py --controls-file implemented_controls.csv

Verification output:

Control Implementation Status

Cryptography (A.8.24): IMPLEMENTED

  • AES-256 at rest: YES
  • TLS 1.3 in transit: YES

Access Control (A.8.5): IMPLEMENTED

  • MFA enabled: YES
  • Admin accounts: 100% coverage

Application Security (A.8.26): PARTIAL

  • Input validation: YES
  • WAF deployed: PENDING

Overall Compliance: 87%

ISO 27001:2022 Annex A Controls — Complete Reference

The 2022 revision restructured controls from 14 domains (114 controls) to 4 themes (93 controls). All organizations must update their Statement of Applicability (SoA) accordingly.

Theme 1: Organizational Controls (37 controls)

Control Title Priority

A.5.1 Policies for information security High

A.5.2 Information security roles and responsibilities High

A.5.3 Segregation of duties High

A.5.4 Management responsibilities Medium

A.5.5 Contact with authorities Medium

A.5.6 Contact with special interest groups Low

A.5.7 Threat intelligence High

A.5.8 Information security in project management Medium

A.5.9 Inventory of information and other associated assets High

A.5.10 Acceptable use of information and other associated assets Medium

A.5.11 Return of assets Low

A.5.12 Classification of information High

A.5.13 Labelling of information Medium

A.5.14 Information transfer High

A.5.15 Access control High

A.5.16 Identity management High

A.5.17 Authentication information High

A.5.18 Access rights High

A.5.19 Information security in supplier relationships High

A.5.20 Addressing information security within supplier agreements High

A.5.21 Managing information security in the ICT supply chain High

A.5.22 Monitoring, review and change management of supplier services Medium

A.5.23 Information security for use of cloud services High

A.5.24 Information security incident management planning and preparation High

A.5.25 Assessment and decision on information security events Medium

A.5.26 Response to information security incidents High

A.5.27 Learning from information security incidents Medium

A.5.28 Collection of evidence Medium

A.5.29 Information security during disruption High

A.5.30 ICT readiness for business continuity High

A.5.31 Legal, statutory, regulatory and contractual requirements High

A.5.32 Intellectual property rights Medium

A.5.33 Protection of records Medium

A.5.34 Privacy and protection of PII High

A.5.35 Independent review of information security Medium

A.5.36 Compliance with policies, rules and standards for information security Medium

A.5.37 Documented operating procedures Medium

Theme 2: People Controls (8 controls)

Control Title Priority

A.6.1 Screening High

A.6.2 Terms and conditions of employment High

A.6.3 Information security awareness, education and training High

A.6.4 Disciplinary process Medium

A.6.5 Responsibilities after termination or change of employment Medium

A.6.6 Confidentiality or non-disclosure agreements High

A.6.7 Remote working High

A.6.8 Information security event reporting High

Theme 3: Physical Controls (14 controls)

Control Title Priority

A.7.1 Physical security perimeters High

A.7.2 Physical entry High

A.7.3 Securing offices, rooms and facilities Medium

A.7.4 Physical security monitoring Medium

A.7.5 Protecting against physical and environmental threats Medium

A.7.6 Working in secure areas Medium

A.7.7 Clear desk and clear screen Medium

A.7.8 Equipment siting and protection Medium

A.7.9 Security of assets off-premises Medium

A.7.10 Storage media High

A.7.11 Supporting utilities Medium

A.7.12 Cabling security Low

A.7.13 Equipment maintenance Medium

A.7.14 Secure disposal or re-use of equipment High

Theme 4: Technological Controls (34 controls)

Control Title Priority

A.8.1 User endpoint devices High

A.8.2 Privileged access rights High

A.8.3 Information access restriction High

A.8.4 Access to source code Medium

A.8.5 Secure authentication High

A.8.6 Capacity management Medium

A.8.7 Protection against malware High

A.8.8 Management of technical vulnerabilities High

A.8.9 Configuration management High

A.8.10 Information deletion Medium

A.8.11 Data masking Medium

A.8.12 Data leakage prevention High

A.8.13 Information backup High

A.8.14 Redundancy of information processing facilities Medium

A.8.15 Logging High

A.8.16 Monitoring activities High

A.8.17 Clock synchronization Low

A.8.18 Use of privileged utility programs Medium

A.8.19 Installation of software on operational systems Medium

A.8.20 Networks security High

A.8.21 Security of network services High

A.8.22 Segregation of networks High

A.8.23 Web filtering Medium

A.8.24 Use of cryptography High

A.8.25 Secure development life cycle High

A.8.26 Application security requirements High

A.8.27 Secure system architecture and engineering principles High

A.8.28 Secure coding High

A.8.29 Security testing in development and acceptance High

A.8.30 Outsourced development Medium

A.8.31 Separation of development, test and production environments High

A.8.32 Change management High

A.8.33 Test information Medium

A.8.34 Protection of information systems during audit testing Low

New Controls in ISO 27001:2022

11 controls are entirely new in the 2022 revision:

Control Title Why It Was Added

A.5.7 Threat intelligence Proactive threat awareness

A.5.23 Information security for use of cloud services Cloud adoption governance

A.5.30 ICT readiness for business continuity IT-specific continuity planning

A.7.4 Physical security monitoring Enhanced surveillance requirements

A.8.9 Configuration management Baseline security configurations

A.8.10 Information deletion Data lifecycle and privacy

A.8.11 Data masking Privacy-preserving techniques

A.8.12 Data leakage prevention DLP as explicit requirement

A.8.16 Monitoring activities Active security monitoring

A.8.23 Web filtering Web-based threat mitigation

A.8.28 Secure coding Development security practices

Cross-Reference: SOC 2 Control Mapping

Map ISO 27001:2022 controls to SOC 2 Trust Services Criteria for organizations requiring both certifications:

SOC 2 Trust Criteria ISO 27001:2022 Controls Notes

CC1 — Control Environment A.5.1, A.5.2, A.5.4, A.6.2 Governance and organizational structure

CC2 — Communication and Information A.5.14, A.6.3, A.6.8, A.5.37 Internal/external communication

CC3 — Risk Assessment A.5.7, Clause 6.1.2 (risk assessment) Threat identification and analysis

CC4 — Monitoring Activities A.8.15, A.8.16, A.5.35, A.5.36 Logging, monitoring, compliance

CC5 — Control Activities A.5.15-A.5.18, A.8.1-A.8.5 Access control and authentication

CC6 — Logical and Physical Access A.5.15, A.7.1, A.7.2, A.8.2, A.8.3 Access management

CC7 — System Operations A.8.7, A.8.8, A.8.9, A.8.32 Change management, malware, vulnerability management

CC8 — Change Management A.8.25, A.8.32, A.8.31 SDLC, change control, environment separation

CC9 — Risk Mitigation A.5.19-A.5.22, A.8.30 Vendor/supplier risk management

Availability A.5.29, A.5.30, A.8.6, A.8.14 Business continuity, capacity, redundancy

Confidentiality A.5.12, A.5.13, A.8.11, A.8.12, A.8.24 Classification, DLP, encryption

Processing Integrity A.8.25-A.8.29, A.8.33 Secure development, testing

Privacy A.5.34, A.8.10, A.8.11 PII protection, deletion, masking

See also: ../soc2-compliance-specialist/SKILL.md for full SOC 2 compliance workflows.

Cross-Reference: NIS2 Directive Alignment

The NIS2 Directive (EU 2022/2555) mandates cybersecurity measures for essential and important entities, including healthcare organizations. ISO 27001 provides a strong foundation for NIS2 compliance:

NIS2 Requirement (Art. 21) ISO 27001:2022 Controls Gap Analysis

(a) Risk analysis and IS policies Clause 6.1.2, A.5.1 Fully covered

(b) Incident handling A.5.24-A.5.28 Add NIS2 reporting timelines (24h/72h)

(c) Business continuity and crisis management A.5.29, A.5.30 Add crisis management procedures

(d) Supply chain security A.5.19-A.5.22 Strengthen ICT supply chain assessment

(e) Security in network and IS acquisition A.8.25-A.8.29 Add vulnerability handling and disclosure

(f) Policies for assessing cybersecurity effectiveness A.5.35, A.5.36 Add metrics-based effectiveness measurement

(g) Basic cyber hygiene and training A.6.3, A.6.8 Covered

(h) Policies on use of cryptography and encryption A.8.24 Covered

(i) Human resources security and access control A.5.15-A.5.18, A.6.1-A.6.8 Covered

(j) Multi-factor authentication and secure communications A.8.5, A.8.20-A.8.22 Ensure MFA enforced for all critical systems

NIS2-specific additions beyond ISO 27001:

  • Incident reporting: 24-hour early warning to CSIRT, 72-hour incident notification, 1-month final report

  • Management accountability: Senior management must approve cybersecurity measures and undergo training

  • Penalties: Up to EUR 10M or 2% of global turnover for essential entities

  • Supply chain: Must assess each direct supplier's cybersecurity practices

See also: ../nis2-compliance-specialist/SKILL.md for complete NIS2 implementation workflows.

Cloud Security Controls

AWS-Specific Controls

ISO 27001 Control AWS Implementation Service

A.5.23 Cloud services AWS Organizations, SCPs AWS Organizations

A.8.2 Privileged access IAM roles, permission boundaries AWS IAM

A.8.3 Access restriction Resource policies, VPC endpoints IAM, VPC

A.8.5 Secure authentication IAM Identity Center, MFA IAM

A.8.9 Configuration management AWS Config rules, conformance packs AWS Config

A.8.12 Data leakage prevention Macie, S3 Block Public Access Macie

A.8.13 Information backup AWS Backup, cross-region replication AWS Backup

A.8.15 Logging CloudTrail, CloudWatch Logs CloudTrail

A.8.16 Monitoring GuardDuty, Security Hub GuardDuty

A.8.20 Network security Security Groups, NACLs, WAF VPC, WAF

A.8.22 Network segregation VPC subnets, Transit Gateway VPC

A.8.24 Cryptography KMS, CloudHSM, ACM KMS

Azure-Specific Controls

ISO 27001 Control Azure Implementation Service

A.5.23 Cloud services Management Groups, Azure Policy Azure Policy

A.8.2 Privileged access PIM, RBAC, Conditional Access Entra ID

A.8.5 Secure authentication Entra ID MFA, passwordless Entra ID

A.8.9 Configuration management Azure Policy, Blueprints Azure Policy

A.8.12 Data leakage prevention Microsoft Purview DLP Purview

A.8.15 Logging Azure Monitor, Log Analytics Monitor

A.8.16 Monitoring Microsoft Defender for Cloud Defender

A.8.20 Network security NSGs, Azure Firewall, Front Door WAF Network

A.8.24 Cryptography Azure Key Vault, Managed HSM Key Vault

GCP-Specific Controls

ISO 27001 Control GCP Implementation Service

A.5.23 Cloud services Organization policies, Resource Manager Resource Manager

A.8.2 Privileged access IAM, Workload Identity Cloud IAM

A.8.5 Secure authentication Identity Platform, 2-Step Verification Identity

A.8.9 Configuration management Security Health Analytics, Assured Workloads SCC

A.8.12 Data leakage prevention Cloud DLP (Sensitive Data Protection) DLP

A.8.15 Logging Cloud Audit Logs, Cloud Logging Logging

A.8.16 Monitoring Security Command Center, Chronicle SIEM SCC

A.8.20 Network security VPC firewall rules, Cloud Armor VPC, Cloud Armor

A.8.24 Cryptography Cloud KMS, Cloud HSM, CMEK Cloud KMS

Zero Trust Architecture Integration

Align ISO 27001 controls with Zero Trust principles (NIST SP 800-207):

Zero Trust Pillars Mapped to ISO 27001

Zero Trust Pillar Principle ISO 27001 Controls Implementation

Identity Verify explicitly A.5.16, A.5.17, A.8.5 MFA everywhere, continuous authentication, identity governance

Devices Validate device health A.8.1, A.8.7, A.8.9 Endpoint detection and response (EDR), device compliance checks

Networks Segment and encrypt A.8.20-A.8.22, A.8.24 Microsegmentation, mTLS, encrypted tunnels

Applications Secure by design A.8.25-A.8.29 SAST/DAST, runtime protection, API security

Data Classify and protect A.5.12, A.5.13, A.8.11, A.8.12 Data classification, DLP, rights management

Visibility Monitor and analyze A.8.15, A.8.16, A.5.7 SIEM/SOAR, threat intelligence, behavioral analytics

Zero Trust Implementation Roadmap

Phase 1: Foundation (0-6 months) ├── Implement identity provider with MFA for all users ├── Deploy EDR on all endpoints ├── Enable centralized logging and SIEM └── Classify critical data assets

Phase 2: Enhancement (6-12 months) ├── Implement network microsegmentation ├── Deploy conditional access policies ├── Enable continuous device compliance monitoring └── Implement DLP for classified data

Phase 3: Maturation (12-18 months) ├── Deploy zero-trust network access (ZTNA) replacing VPN ├── Implement just-in-time (JIT) privileged access ├── Enable automated threat response (SOAR) └── Continuous verification with behavioral analytics

Hardware Security Key Requirements

FIDO2/WebAuthn Implementation

For high-assurance authentication per A.5.17 and A.8.5:

Requirement Specification Priority

Admin accounts Hardware security key (YubiKey 5, Titan) mandatory Critical

Developer accounts Hardware key or platform authenticator High

All employees Hardware key recommended; MFA minimum Medium

Service accounts Certificate-based or workload identity High

Supported standards:

  • FIDO2 / WebAuthn (passwordless primary authentication)

  • FIDO U2F (second-factor authentication)

  • PIV/Smart Card (legacy enterprise systems)

  • TOTP (fallback only — hardware keys preferred)

Deployment checklist:

  • Procure minimum 2 hardware keys per critical user (primary + backup)

  • Register keys with identity provider (Entra ID, Okta, Google Workspace)

  • Enforce phishing-resistant MFA policy for privileged access

  • Disable SMS/voice MFA for admin accounts

  • Document key recovery procedures

  • Test break-glass procedures with backup keys

Supply Chain Security Controls

ICT Supply Chain Risk Management (A.5.19-A.5.22)

Control Area Requirements Evidence

Supplier assessment Security questionnaire + evidence review Completed assessment scorecard

Contractual requirements Security clauses in all vendor agreements Signed agreements with security schedule

Software supply chain SBOM requirements, dependency scanning SBOM in CycloneDX/SPDX format

Continuous monitoring Monitor supplier security posture changes Quarterly supplier security reviews

Incident notification Require supplier breach notification within 24 hours Contractual clause + test exercises

Software Bill of Materials (SBOM) Requirements

Element Description Standard

Component inventory All direct and transitive dependencies CycloneDX or SPDX

Vulnerability tracking Map components to known CVEs OSV, NVD integration

License compliance Track all open-source licenses SPDX license identifiers

Update cadence Regenerate SBOM on every release CI/CD integration

Sharing Provide SBOM to customers on request Machine-readable format

Third-Party Risk Tiers

Tier Access Level Assessment Frequency Assessment Depth

Critical Processes/stores sensitive data, system access Annual on-site + continuous monitoring Full security audit, penetration test review

High Access to internal systems or non-sensitive data Annual questionnaire + evidence Security questionnaire + SOC 2 report review

Medium Limited access, SaaS tools Biennial questionnaire Security questionnaire

Low No data access, no system access On onboarding Basic due diligence

Cross-Framework Mapping Table

Requirement Area ISO 27001:2022 SOC 2 TSC NIST CSF 2.0 NIS2 (Art. 21)

Governance A.5.1-A.5.4 CC1.1-CC1.5 GV.OC, GV.RM Art. 20

Risk management Clause 6.1.2, A.5.7 CC3.1-CC3.4 ID.RA Art. 21(2)(a)

Access control A.5.15-A.5.18, A.8.2-A.8.5 CC6.1-CC6.8 PR.AA Art. 21(2)(i)

Incident management A.5.24-A.5.28 CC7.3-CC7.5 RS.MA, RS.AN Art. 21(2)(b), Art. 23

Business continuity A.5.29-A.5.30 A1.1-A1.3 RC.RP Art. 21(2)(c)

Supply chain A.5.19-A.5.22 CC9.1-CC9.2 GV.SC Art. 21(2)(d)

Cryptography A.8.24 CC6.1, CC6.7 PR.DS Art. 21(2)(h)

Network security A.8.20-A.8.22 CC6.6 PR.IR Art. 21(2)(e)

Vulnerability management A.8.8 CC7.1 ID.RA-01 Art. 21(2)(e)

Awareness and training A.6.3 CC1.4 PR.AT Art. 21(2)(g)

Logging and monitoring A.8.15-A.8.16 CC7.2 DE.CM, DE.AE Art. 21(2)(f)

Data protection A.5.34, A.8.10-A.8.12 P1-P8 PR.DS Art. 21(2)(e)

Secure development A.8.25-A.8.29 CC8.1 PR.DS Art. 21(2)(e)

Asset management A.5.9-A.5.11 CC6.1 ID.AM Art. 21(2)(a)

Cross-references: See ../gdpr-dsgvo-expert/SKILL.md for GDPR privacy controls mapping, and ../risk-management-specialist/SKILL.md for ISO 14971 risk management integration with ISO 27001.

ISO 27001:2022 Enhanced Controls & Cross-Framework Integration

Annex A Control Themes (93 Controls)

Theme Controls Key Areas

Organizational (37) A.5.1-A.5.37 Policies, roles, threat intelligence, asset management, access, supplier security

People (8) A.6.1-A.6.8 Screening, T&C, awareness, disciplinary, termination, remote work, reporting

Physical (14) A.7.1-A.7.14 Perimeters, entry, offices, monitoring, utilities, cabling, equipment, storage media

Technological (34) A.8.1-A.8.34 Endpoints, access, authentication, code, config, data, backup, logging, networks, web

Hardware Security Key Requirements

  • YubiKey 5 Series: Required for admin accounts, cloud console access, VPN, code signing

  • FIDO2/WebAuthn: Phishing-resistant MFA for all users within 90 days of ISMS deployment

  • Policy: SMS/voice MFA PROHIBITED (SIM swapping risk). TOTP acceptable as interim for non-admin

  • Backup Keys: Minimum 2 hardware keys per user (primary + backup stored securely)

  • Recovery: Manager approval + identity verification required for key replacement

Zero Trust Architecture Integration

  • Never Trust, Always Verify: All access decisions based on identity, device, and context

  • Microsegmentation: Network segmentation at workload level, not just network perimeter

  • Least Privilege: Just-in-time access, time-bounded permissions, automated deprovisioning

  • Continuous Verification: Session-level authentication, device health checks, behavioral analytics

Cross-Framework Mapping (ISO 27001 ↔ SOC 2 ↔ NIST CSF ↔ NIS2)

ISO 27001 SOC 2 TSC NIST CSF 2.0 NIS2 Art.21

A.5.1 Policies CC1.1 GV.PO Art.21.2.a

A.5.23 Cloud security CC6.7 PR.DS Art.21.2.e

A.5.24 Incident mgmt CC7.4 RS.MA Art.21.2.b

A.6.3 Awareness CC1.4 PR.AT Art.21.2.g

A.8.5 Authentication CC6.1 PR.AA Art.21.2.j

A.8.9 Config mgmt CC8.1 PR.PS Art.21.2.e

A.8.15 Logging CC7.2 DE.CM Art.21.2.b

A.8.24 Cryptography CC6.7 PR.DS Art.21.2.h

Supply Chain Security Controls

  • Supplier Risk Assessment: Due diligence before onboarding, annual reassessment

  • Contractual Security Clauses: Data protection, incident reporting, audit rights, exit terms

  • Continuous Monitoring: Vendor security ratings, certificate expiry alerts, breach notifications

  • SBOM Requirements: Software Bill of Materials for all third-party software components

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

information-security-manager-iso27001

No summary provided by upstream source.

Repository SourceNeeds Review
Security

senior-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

isms-audit-expert

No summary provided by upstream source.

Repository SourceNeeds Review
Security

qms-audit-expert

No summary provided by upstream source.

Repository SourceNeeds Review