Controls Detail
A.5: Information security policies (2 controls)
A.6: Organization of information security (7 controls)
A.7: Human resource security – 6 controls that are applied before, during, or after employment
A.8: Asset management (10 controls)
A.9: Access control (14 controls)
” A.10: Cryptography (2 controls) “
A.10.1 Cryptographic controls |
Objective: To ensure proper and effective use of cryptography to protect the confidentiality, authen- ticity and/or integrity of information. |
A.10.1.1 |
Policy on the use of cryptographic controls |
Control
A policy on the use of cryptographic controls for protection of information shall be developed and implemented. |
A.10.1.2 |
Key management |
Control
A policy on the use, protection and lifetime of cryptographic keys shall be developed and implemented through their whole lifecycle. |
A.11: Physical and environmental security (15 controls)
A.12: Operations security (14 controls)
A.13: Communications security (7 controls)
A.14: System acquisition, development and maintenance (13 controls)
A.15: Supplier relationships (5 controls)
A.16: Information security incident management (7 controls)
A.17: Information security aspects of business continuity management (4 controls)
A.18: Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls)
” Flipscloud Solution for ISO/IEC 27001:2013 Reversion “
Flipscloud assists companies to achieve the requirements of ” information safety control ” from ISO/ IEC 27001: 2013 by 4 main functions which track the users path of the data, assign the access right for each file and build strong defense ” AES-256 ” encryption for files in public space.
1. Encryption
2. Watermark
3. Cryptography
4. Key Management