Співставлення контролів з безпеки стандарту ISO 27001:2022 до стандарту OWASP ASVS та моделі OWASP SAMM

ISO control ISO control # ASVS SAMM

Organizational controls

Policies for information security

5.1

-

  • Governance:Policy&Compliance:Policy&Standarts:L1,L2

  • Governance:Policy&Compliance:Compliance Management:L1,L2

Information security roles and responsibilities

5.2

-

  • Governance:Education&Guidance:Organization&Culture

  • Operations:Incident Management:Incident response:L1

Segregation of duties

5.3

-

-

Management responsibilities

5.4

-

Governance:Education&Guidance:Trainning&Awareness:

Contact with authorities

5.5

-

-

Contact with special interest groups

5.6

-

-

Threat intelligence

5.7

-

-

Information security in project management

5.8

-

-

Inventory of information and other associated assets

5.9

14.2.5

  • Verification:Architecture Assessment:Architecture Validation:L1

  • Operations:Operational Management:Data Protection:L2

Acceptable use of information and other associated assets

5.10

-

Operations:Operational Management:Data Protection

Return of assets

5.11

-

Operations:Operational Management:System Decommissioning / Legacy Management

Classification of information

5.12

8.3.4

Operations:Operational Management:Data Protection

Labelling of information

5.13

-

-

Information transfer

5.14

-

-

Access control

5.15

  • 4.1.1

  • 4.1.2

  • 4.1.3

  • 4.1.4

  • 4.1.5

  • 4.2.1

  • 4.2.2

  • 4.3.1

  • 4.3.2

  • 4.3.3

  • Design:Security Architecture:Architecture

  • Design Verification:Requirements-driven Testing:Control Verification

  • Operations:Operational Management:Data Protection

Identity management

5.16

-

-

Authentication information

5.17

-

Verification:Architecture Assessmen

Access rights

5.18

-

-

Information security in supplier relationships

5.19

-

Design:Security Requirements:Supplier Security

Addressing information security within supplier agreements

5.20

-

Design:Security Requirements:Supplier Security

Managing information security in the information and communication technology (ICT) supply chain

5.21

-

Design:Security Requirements:Supplier Security

Monitoring, review and change management of supplier services

5.22

-

-

Information security for use of cloud services

5.23

-

-

Information security incident management planning and preparation

5.24

-

Operations:Incident Management

Assessment and decision on information security events

5.25

-

Operations:Incident Management

Response to information security incidents

5.26

-

Operations:Incident Management

Learning from information security incidents

5.27

-

Operations:Incident Management

Collection of evidence

5.28

-

Operations:Incident Management

Information security during disruption

5.29

-

-

ICT readiness for business continuity

5.30

8.1.5

-

Legal, statutory, regulatory and contractual requirements

5.31

  • 1.1.7

  • 1.5.1

  • 1.8.2

  • Governance:Policy & Compliance

  • Design:Security Requirements

Intellectual property rights

5.32

-

-

Protection of records

5.33

-

-

Privacy and protection of personal identifiable information (PII)

5.34

  • 8.3.4

  • 6.1.1

  • 8.3.5

  • 8.3.7

  • Governance:Policy & Compliance

  • Design:Security Requirements

Independent review of information security

5.35

-

-

Compliance with policies, rules and standarts for information security

5.36

1.5.1

Governance:Policy & Compliance

Design:Security Requirements

Documented operating procedures

5.37

-

Operations:Operational Management

People controls

Screening

6.1

-

-

Terms and conditions of employment

6.2

-

-

Information security awareness, education and training

6.3

-

Governance:Education & Guidance

Disciplinary process

6.4

-

-

Responsibilities after termination or change of employment

6.5

-

-

Confidentiality or non-disclosure agreements

6.6

-

-

Remote working

6.7

-

-

Information security event reporting

6.8

-

-

Physical controls

Physical security perimeters

7.1

-

-

Physical entry

7.2

-

-

Securing offices, rooms and fa- cilities

7.3

-

-

Physical security monitoring

7.4

-

-

Protecting against physical and environmental threats

7.5

-

-

Working in secure areas

7.6

-

-

Clear desk and clear screen

7.7

-

-

Equipment siting and protection

7.8

-

-

Security of assets off-premises

7.9

-

-

Storage media

7.10

-

-

Supporting utilities

7.11

-

-

Cabling security

7.12

-

-

Equipment maintenance

7.13

-

-

Secure disposal or re-use of equipment

7.14

-

-

Technological controls

User end point devices

8.1

-

-

Privileged access rights

8.2

-

-

Information access restriction

8.3

  • Access Control

  • Architectural Requirements

Access control section

-

Access to source code

8.4

-

-

Secure authentication

8.5

  • 1.2.1

  • 1.2.2

  • 1.2.3

  • 1.4.5

  • Authentication section

  • Access control section

Capacity management

8.6

-

-

Protection against malware

8.7

12.4.2

-

Management of technical vulnerabilities

8.8

-

  • Implementation:Defect Management

  • Implementation:Secure Build:Software Dependencies

Configuration management

8.9

  • 14.1.1

  • 14.1.2

  • 14.1.3

  • 14.1.4

  • 14.1.5

  • 14.2.1

  • 14.2.2

  • 14.2.3

  • 14.2.4

  • 14.2.5

  • 14.2.6

  • 14.3.1

  • 14.3.2

  • 14.3.3

  • Implementation:Secure Deployment

  • Operations:Environment Management

Information deletion

8.10

  • 8.3.2

  • 1.8.2

  • Operations:Operational Management:System Decommissioning / Legacy Management

Data masking

8.11

Data Protection

Operations:Operational Management:Data Protection

Data leakage prevention

8.12

-

-

Information backup

8.13

  • 8.1.5

  • 8.1.6

  • 14.1.4

-

Redundancy of information processing facilities

8.14

-

-

Logging

8.15

  • 1.2.3

  • 1.7.1

  • 1.7.2

  • 7.1.1

  • 7.1.2

  • 7.1.3

  • 7.1.4

  • 7.2.1

  • 7.2.2

  • 7.3.1

  • 7.3.2

  • 7.3.3

  • 7.3.4

  • 7.4.1

  • 7.4.2

  • 7.4.3

Operations:Incident Management:Incident Detection

Monitoring activities

8.16

  • 11.1.7

  • 1.2.3

  • bad coverage

Operations:Incident Management:Incident Detection

Clock synchronization

8.17

7.3.4

-

Use of privileged utility programs

8.18

-

-

Installation of software on operational systems

8.19

-

Implementation:Secure Deployment:Deployment Process

Networks security

8.20

-

-

Security of network services

8.21

-

-

Segregation of networks

8.22

-

-

Web filtering

8.23

-

-

Use of cryptography

8.24

  • 1.6.1

  • 1.6.3

  • 2.9.1

  • 2.9.2

  • 2.9.3

  • 3.2.4

  • 6.1.1

  • 6.2.1

  • 6.2.2

  • 6.2.3

  • 6.2.4

  • 6.2.5

  • 6.2.6

  • 6.2.7

  • 6.3.1

  • 6.3.2

  • 6.3.3

  • 6.4.1

  • 6.4.2

  • 9.1.1

  • 9.1.2

  • 9.1.3

  • 9.2.1

  • 9.2.2

  • 9.2.3

  • 9.2.5

-

Secure development life cycle

8.25

  • 1.1.2

  • 1.1.3

  • 1.1.4

  • 1.1.5

  • 1.1.7

  • 14.1.1

  • 1.14.2

  • 1.14.4

  • Implementation:Secure Build

  • Implementation:Secure Deployment

Application security requirements

8.26

  • 1.1.7

  • 1.5.1

  • 1.8.2

Design:Security Requirements

Secure system architecture and engineering principles

8.27

  • 1.2.1

  • 1.2.2

  • 1.2.3

  • 1.4.5

  • 1.5.1

  • 1.6.1

  • 1.6.3

  • 1.7.1

  • 1.7.2

  • 1.8.2

  • 1.11.3

  • 1.12.2

  • 1.14.2

  • 1.14.4

-Design:Security Architecture - Verification:Architecture Assessment

Secure coding

8.28

  • 1.1.7

  • 10.1.1

  • 10.2.1

  • 10.2.2

  • 10.2.3

  • 10.2.4

  • 10.2.5

  • 10.2.6

Governance:Education & Guidance

Security testing in development and acceptance

8.29

10.1.1

Verification: Requirements-driven Testing

Verification:Security Testing

Outsourced development

8.30

-

-

Separation of development, test and production environments

8.31

-

-

Change management

8.32

-

-

Test information

8.33

-

-

Protection of information systems during audit testing

8.34

-

Verification:Security Testing:Deep Understanding