Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Descriptions of used cryptography in relation to offered cloud services

Critical
High
Normal
Low

When offering cloud services, the organisation should provide descriptions of the cryptographic controls implemented to the cloud service customer for reviewing compliance with applicable agreements, legislation and regulations.

Connected other frameworks and requirements:
18.1.5: Regulation of cryptographic controls
ISO 27017

Compliance of used cryptographic controls in relation to applicable requirements

Critical
High
Normal
Low

Organisation should verify that the set of cryptographic controls that apply to the use of data systems comply with relevant agreements, legislation and regulations.

Connected other frameworks and requirements:
18.1.5: Regulation of cryptographic controls
ISO 27001
18.1.5: Regulation of cryptographic controls
ISO 27017
5.31: Legal, statutory, regulatory and contractual requirements
ISO 27001

Procedure for identifying software licensing requirements

Critical
High
Normal
Low

Installing commercially licensed software can cause a breach of the licence terms for the software. Organisation should have a procedure for identifying licensing requirements for before permitting any licensed software to be installed.

Particular attention should be paid to cases where the data system is elastic and scalable and can be run on more systems or processor cores than is permitted by the licence terms.

Connected other frameworks and requirements:
18.1.2: Intellectual property rights
ISO 27001
18: Compliance
ISO 27017
18.1: Compliance with legal and contractual requirements
ISO 27017
18.1.2: Intellectual property rights
ISO 27017
18.1.5: Regulation of cryptographic controls
ISO 27017
No items found.