Back to Framework

Security

Control statements and requirements for security.

Security Governance, Architecture and EngineeringSE-1

The organisation shall establish and maintain a comprehensive security governance framework that encompasses security risk management, security policies, standards, and architectures that guide the implementation of security controls across the organisation. The organisation shall ensure continuous monitoring of control effectiveness, manages security incidents, and maintains business continuity capabilities while overseeing third-party security requirements.

ISO27001:A.5.1-A.5.2 A.6.1-A.6.2 A.6.5 A.7.1-A.7.4 A.12.1-A.12.3 A.17.1-A.17.2 A.18.1-A.18.2
ISO27701:14.2.1 14.2.2
SOC2:CC2.3 CC3.1 CC3.2 CC5.2 CC7.2 CC7.3 CC9.3

Identity & Access ManagementSE-2

The organisation shall implement and maintains comprehensive identity and access management controls governing authentication, authorisation, and access monitoring across all systems and applications. This includes the complete lifecycle of identity management from screening to provisioning through deprovisioning, ensuring appropriate access levels are maintained and regularly reviewed. The organisation shall implement strong authentication mechanisms and maintains detailed access logs for all critical systems.

ISO27001:A.9.1 A.9.2 A.9.3 A.9.4
ISO27701:9.2.1 9.2.2 9.2.4
SOC2:CC6.1 CC6.2 CC6.3

Software SecuritySE-3

The organisation shall ensure all software development and deployment activities follow secure development practices throughout the system development lifecycle. This includes implementing secure coding standards, conducting security testing, managing secure configurations, and maintaining robust change management procedures for all production systems. The organisation shall regularly assess applications for security vulnerabilities, including AI-specific threats such as model poisoning and adversarial attacks, and maintain secure development environments.

ISO27001:A.14.1 A.14.2 A.12.2
ISO27701:14.2.1 14.2.2
EU AI ACT:15.5
SOC2:CC5.2 CC7.1

Data SecuritySE-4

The organisation shall protect data throughout its lifecycle using appropriate technical and procedural controls, including classification, encryption, and secure handling procedures. This encompasses structured and unstructured data across all storage locations and transmission paths. The organisation shall maintain comprehensive data protection mechanisms, including backup systems, encryption standards, and secure disposal procedures, while ensuring appropriate data classification and handling requirements are enforced.

ISO27001:A.8.1-A.8.7 A.10.1 A.10.2 A.12.4 A.12.5 A.14.3
ISO27701:8.2.4 8.3.1 8.3.2 8.3.3 10.2.1 10.2.2 11.2.2
SOC2:CC6.4-CC6.7 C1.1 C1.2 P5.1-P5.4 P5.6

Network SecuritySE-5

The organisation shall implement and maintain comprehensive network security controls to protect against unauthorised access, ensure secure communications, and maintain the confidentiality and integrity of data in transit. This includes implementing secure network architectures, maintaining network monitoring capabilities, and ensuring appropriate network segmentation. The organisation shall regularly assess network security controls and maintain comprehensive network logging and monitoring capabilities.

ISO27001:A.13.1-A.13.3 A.12.4 A.12.6 A.10.1 A.10.2
ISO27701:13.2.1
SOC2:CC6.6 CC7.1 CC7.2