ISO-A.8.1
User Endpoint Devices
ISO-A.8.2
Privileged Access Rights
ISO-A.8.3
Information Access Restriction
ISO-A.8.4
Access to Source Code
ISO-A.8.5
Secure Authentication
ISO-A.8.6
Capacity Management
ISO-A.8.7
Protection Against Malware
ISO-A.8.8
Management of Technical Vulnerabilities
ISO-A.8.9
Configuration Management
ISO-A.8.10
Information Deletion
ISO-A.8.11
Data Masking
ISO-A.8.12
Data Leakage Prevention
ISO-A.8.13
Information Backup
ISO-A.8.14
Redundancy of Information Processing
ISO-A.8.15
Logging
ISO-A.8.16
Monitoring Activities
ISO-A.8.17
Clock Synchronization
ISO-A.8.18
Use of Privileged Utility Programs
ISO-A.8.19
Installation of Software on Operational Systems
ISO-A.8.20
Networks Security
ISO-A.8.21
Security of Network Services
ISO-A.8.22
Segregation of Networks
ISO-A.8.23
Web Filtering
ISO-A.8.24
Use of Cryptography
ISO-A.8.25
Secure Development Life Cycle
ISO-A.8.26
Application Security Requirements
ISO-A.8.27
Secure System Architecture and Engineering
ISO-A.8.28
Secure Coding
ISO-A.8.29
Security Testing in Development and Acceptance
ISO-A.8.30
Outsourced Development
ISO-A.8.31
Separation of Development, Test and Production Environments
ISO-A.8.32
Change Management
ISO-A.8.33
Test Information
ISO-A.8.34
Protection of Information Systems During Audit Testing