Compliance Assessment Results: A.5 Information Security Policies
Compliance Assessment Results: A.5 Information Security Policies
Compliance Assessment Results: A.5 Information Security Policies
A.6.2 Teleworking
Is there a policy for teleworking?
Does this have management approval?
Is there a set process for remote workers
to get access?
Are teleworkers given the advice and
equipment to protect their assets?
A.7 Human Resources Security
A.7.1 Prior to employment
A.7.1.1 Screening
Are background verification checks carried
out on all new candidates for employment?
Are these checks approved by appropriate
management authority?
Are the checks compliant with relevant
laws, regulations and ethics?
Are the level of checks required supported
by business risk assessments?
A.10 Cryptography
A.10.1 Cryptographic controls
A.10.1. Policy on the use of cryptographic
Is there a policy on the use of
A.12.3 Backup
A.12.3. Information backup
Is there an agreed backup policy?
Does the organisation's backup policy
comply with relevant legal frameworks?
Are backups made in accordance with the
Are backups tested?
A.17.2 Redundancies
A.17.2. Availability of information processing
Do information processing facilities have
sufficient redundancy to meet the
organisations availability requirements?
A.18 Compliance
A.18.1 Compliance with legal and contractual
requirements
A.18.1. Identification of applicable legislation and
1 contractual requirements
Has the organisation identified and
documented all relevant legislative,
regulatory or contractual requirements
Is compliance documented?