5.7 Threat Intelligence
Organizations must now collect and analyze threat intelligence relevant to their information security. This formalizes what mature organizations already do informally.
Implementation: Subscribe to threat feeds, monitor security advisories, track vulnerabilities affecting your technology stack.
5.23 Information Security for Cloud Services
Explicit requirements for using, acquiring, and managing cloud services securely. Addresses cloud-specific risks.
Implementation: Cloud provider security assessments, shared responsibility model documentation, cloud configuration reviews.
5.30 ICT Readiness for Business Continuity
Ensures ICT systems are ready to support business continuity requirements. Strengthens resilience focus.
Implementation: Test disaster recovery procedures, verify backup restoration, ensure redundancy.
8.9 Configuration Management
Requires documented configuration management for security-relevant systems. Prevents configuration drift.
Implementation: Infrastructure as Code, configuration baselines, change tracking.
8.10 Information Deletion
Ensures information is deleted securely when no longer required. Supports data minimization.
Implementation: Data retention policies, secure deletion procedures, verification processes.
8.11 Data Masking
Requires masking of sensitive data where appropriate. Supports privacy and testing needs.
Implementation: Anonymization for test data, redaction in logs, tokenization where appropriate.
8.12 Data Leakage Prevention
Addresses preventing data exfiltration and unauthorized disclosure.
Implementation: DLP tools, egress filtering, USB restrictions, email controls.
8.16 Monitoring Activities
Formalizes requirements for monitoring user and system activities.
Implementation: SIEM, log aggregation, user behavior analytics.
8.23 Web Filtering
Requires web filtering to prevent access to malicious content.
Implementation: DNS filtering, proxy servers, URL categorization.
8.28 Secure Coding
Explicit requirements for secure coding principles in software development.
Implementation: OWASP guidelines, code reviews, SAST/DAST, security training.