This section describes 34 controls that are mainly related to the security of IT:
- Control 8.1 – User endpoint devices
- Control 8.2 – Privileged access rights
- Control 8.3 – Information access restriction
- Control 8.4 – Access to source code
- Control 8.5 – Secure authentication
- Control 8.6 – Capacity management
- Control 8.7 – Protection against malware
- Control 8.8 – Management of technical vulnerabilities
- Control 8.9 – Configuration management
- Control 8.10 – Information deletion
- Control 8.11 – Data masking
- Control 8.12 – Data leakage prevention
- Control 8.13 – Information backup
- Control 8.14 – Redundancy of information processing facilities
- Control 8.15 – Logging
- Control 8.16 – Monitoring activities
- Control 8.17 – Clock synchronization
- Control 8.18 – Use of privileged utility programs
- Control 8.19 – Installation of software on operational systems
- Control 8.20 – Networks security
- Control 8.21 – Security of network services
- Control 8.22 – Segregation of networks
- Control 8.23 – Web filtering
- Control 8.24 – Use of cryptography
- Control 8.25 – Secure development life cycle
- Control 8.26 – Application security requirements
- Control 8.27 – Secure system architecture and engineering principles
- Control 8.28 – Secure coding
- Control 8.29 – Security testing in development and acceptance
- Control 8.30 – Outsourced development
- Control 8.31 – Separation of development, test and production environments
- Control 8.32 – Change management
- Control 8.33 – Test information
- Control 8.34 – Protection of information systems during audit testing