- 5.01 - Policies for Information Security - OnePager
- 5.02 - Information security roles and responsibilities - OnePager
- 5.03 - Segregation of duties - OnePager
- 5.04 - Management responsibilities - OnePager
- 5.05 - Contact with authorities - OnePager
- 5.06 - Contact with special interest groups - OnePager
- 5.07 - Threat Intelligence - OnePager
- 5.08 - Information security in project management - OnePager
- 5.09 - Inventory of information and other associated assets - OnePager
- 5.10 - Acceptable use of information and other associated assets - OnePager
- 5.11 - Return of assets - OnePager
- 5.12 - Classification of information - OnePager
- 5.13 - Labelling of information - OnePager
- 5.14 - Information transfer - OnePager
- 5.15 - Access control - OnePager
- 5.16 - Identity management - OnePager
- 5.17 - Authentication information - OnePager
- 5.18 - Access rights - OnePager
- 5.19 - Information security in supplier relationships - OnePager
- 5.20 - Addressing information security within supplier agreements - OnePager
- 5.21 - Managing information security in the ICT supply chain - OnePager
- 5.22 - Monitoring, review and change management of supplier services - OnePager
- 5.23 - Information security for use of cloud services - OnePager
- 5.24 - Information security incident management planning and preparation - OnePager
- 5.25 - Assessment and decision on information security events - OnePager
- 5.26 - Response to information security incidents - OnePager
- 5.27 - Learning from information security incidents - OnePager
- 5.28 - Collection of evidence - OnePager
- 5.29 - Information security during disruption - OnePager
- 5.30 - ICT readiness for business continuity - OnePager
- 5.31 - Legal, statutory, regulatory and contractual requirements - OnePager
- 5.32 - Intellectual property rights - OnePager
- 5.33 - Protection of records - OnePager
- 5.34 - Privacy and protection of PII - OnePager
- 5.35 - Independent review of information security - OnePager
- 5.36 - Compliance with policies, rules and standards for information security - OnePager
- 5.37 - Documented operating procedures - OnePager
- 6.01 - Screening - OnePager
- 6.02 - Terms and conditions of employment - OnePager
- 6.03 - Information security awareness, education and training - OnePager
- 6.04 - Disciplinary process - OnePager
- 6.05 - Responsibilities after termination or change of employment - OnePager
- 6.06 - Confidentiality or non-disclosure agreements - OnePager
- 6.07 - Remote working - OnePager
- 6.08 - Information security event reporting - OnePager
- 7.01 - Physical security perimeters - OnePager
- 7.02 - Physical entry - OnePager
- 7.03 - Securing offices, rooms and facilities - OnePager
- 7.04 - Physical security monitoring - OnePager
- 7.05 - Protecting against physical and environmental threats - OnePager
- 7.06 - Working in secure areas - OnePager
- 7.07 - Clear desk and clear screen - OnePager
- 7.08 - Equipment siting and protection - OnePager
- 7.09 - Security of assets off-premises - OnePager
- 7.10 - Storage media - OnePager
- 7.11 - Supporting utilities - OnePager
- 7.12 - Cabling security - OnePager
- 7.13 - Equipment maintenance - OnePager
- 7.14 - Secure disposal or re-use of equipment - OnePager
- 8.01 - Secure disposal or re-use of equipment - OnePager
- 8.02 - Privileged access rights - OnePager
- 8.03 - Information access restriction - OnePager
- 8.04 - Access to source code - OnePager
- 8.05 - Secure authentication - OnePager
- 8.06 - Capacity management - OnePager
- 8.07 - Protection against malware - OnePager
- 8.08 - Management of technical vulnerabilities - OnePager
- 8.09 - Configuration management - OnePager
- 8.10 - Information deletion - OnePager
- 8.11 - Data masking - OnePager
- 8.12 - Data leakage prevention - OnePager
- 8.13 - Information backup - OnePager
- 8.14 - Redundancy of information processing facilities - OnePager
- 8.15 - Logging - OnePager
- 8.16 - Monitoring activities - OnePager
- 8.17 - Clock synchronization - OnePager
- 8.18 - Use of privileged utility programs - OnePager
- 8.19 - Installation of software on operational systems - OnePager
- 8.20 - Networks security - OnePager
- 8.21 - Security of network services - OnePager
- 8.22 - Segregation of networks - OnePager
- 8.23 - Web filtering - OnePager
- 8.24 - Use of cryptography - OnePager
- 8.25 - Secure development life cycle - OnePager
- 8.26 - Application security requirements - OnePager
- 8.27 - Secure system architecture and engineering principles - OnePager
- 8.28 - Secure coding - OnePager
- 8.29 - Security testing in development and acceptance - OnePager
- 8.30 - Outsourced development - OnePager
- 8.31 - Separation of development, test and production environments - OnePager
- 8.32 - Change management - OnePager
- 8.33 - Test information - OnePager
- 8.34 - Protection of information systems during audit testing - OnePager
- CRA Scope Assessment Tool — Promotional Post Outlines
- Cyber Security Act 2
- NIS2 2026 Amendments
- NIS2 2026 Updates
- Use Case 1
- Use Case 2
- Use Case 3
- Use Case 4
