All data is fictional

Statement of Applicability

ISO 27001:2022 — 93 Controls  ·  Version 2.4

93

Total Controls

68

In Scope & Implemented

18

In Scope — Partial / Planned

7

Out of Scope
ISO 27001:2022 Annex A — All Controls
Control RefTitleDomainIn ScopeJustificationImplementationResponsibleAccountable
A.5 — Organisational Controls (37)
A.5.1Policies for information securityOrganisationalIn ScopeCore ISMS requirementCompletedCISOCEO
A.5.2Information security rolesOrganisationalIn ScopeCore ISMS requirementCompletedHR DirectorCISO
A.5.3Segregation of dutiesOrganisationalIn ScopeSOC 2 and client requirementsCompletedIT OpsCISO
A.5.4Management responsibilitiesOrganisationalIn ScopeCore ISMS requirementCompletedHR DirectorCEO
A.5.5Contact with authoritiesOrganisationalIn ScopeNIS 2 and GDPR requirementIn ProgressCISOCEO
A.5.12Classification of informationOrganisationalIn ScopeCustomer data protectionCompletedDPOCISO
A.5.15Access controlOrganisationalIn ScopeCritical for platform securityCompletedIT OpsCISO
A.5.23Information security for use of cloud servicesOrganisationalIn ScopeAWS primary infrastructureCompletedCTOCISO
A.5.26Response to information security incidentsOrganisationalIn ScopeGDPR 72h notification obligationCompletedCISOCEO
A.5.29Information security during disruptionOrganisationalIn ScopeBCP / DR coveragePlanningCOOCEO
A.6 — People Controls (8)
A.6.1ScreeningPeopleIn ScopePre-employment vettingCompletedHR DirectorCEO
A.6.3Information security awareness, education and trainingPeopleIn ScopeAnnual mandatory requirementCompletedHR DirectorCISO
A.6.5Responsibilities after terminationPeopleIn ScopeLeaver proceduresCompletedHR DirectorCISO
A.7 — Physical Controls (14)
A.7.1Physical security perimetersPhysicalIn ScopeOffice and DC perimetersCompletedFacilitiesCOO
A.7.4Physical security monitoringPhysicalIn ScopeCCTV and badge accessPlanningFacilitiesCOO
A.7.9Security of assets off-premisesPhysicalOut of ScopeRemote work classified separatelyN/A
A.8 — Technological Controls (34)
A.8.2Privileged access rightsTechnologicalIn ScopeAdmin account controlsIn ProgressIT OpsCISO
A.8.5Secure authenticationTechnologicalIn ScopeMFA enforcement on all systemsCompletedIT OpsCISO
A.8.8Management of technical vulnerabilitiesTechnologicalIn ScopeAnnual pen test + patching scheduleCompletedCTOCISO
A.8.16Monitoring activitiesTechnologicalIn ScopeDatadog SIEM and alertingIn ProgressIT OpsCISO
A.8.24Use of cryptographyTechnologicalIn ScopeData at rest and in transitCompletedCTOCISO