iso-27001
ISO 27001 Compliance Skill
Purpose
Ensures systems and processes comply with ISO 27001:2022 Information Security Management System (ISMS) requirements.
Rules
Key Controls for Web Applications
A.8.24 Use of Cryptography:
- TLS 1.2+ for all communications
- AES-256 for data at rest
- Secure key management
A.8.25 Secure Development Life Cycle:
- Security requirements in design
- Code review processes
- Security testing (SAST/DAST)
A.8.26 Application Security Requirements:
- Input validation
- Output encoding
- Authentication and authorization
- Session management
A.8.16 Monitoring Activities:
- Security event logging
- Log retention (90 days minimum)
- Monitoring for anomalies
A.5.7 Threat Intelligence:
- Vulnerability scanning
- Threat intelligence feeds
- Incident tracking
Documentation Requirements
MUST MAINTAIN:
- Information Security Policy
- Risk Assessment and Treatment Plan
- Statement of Applicability (SoA)
- Access Control Policy
- Cryptographic Controls Policy
- Incident Response Plan
- Business Continuity Plan
- Acceptable Use Policy
- Data Classification Policy
Audit Preparation
MUST PROVIDE:
- Evidence of control implementation
- Logs and monitoring records
- Incident records
- Change management records
- Risk assessments
- Management review minutes
Related Policies
All ISMS policies at: https://github.com/Hack23/ISMS-PUBLIC
More from hack23/homepage
github-actions-cicd
GitHub Actions workflow structure, security scanning integration (CodeQL, ZAP), Lighthouse audits, minification, and deployment automation
100html-css-best-practices
Semantic HTML5, CSS custom properties, responsive design, and performance optimization for web development
86agentic-workflow-orchestration
Multi-agent coordination, orchestrator-worker patterns, /plan decomposition, and project coordination for GitHub Agentic Workflows
58product-documentation
Product documentation standards covering user guides, feature documentation, release notes, and end-user communication
49c4-modeling
C4 model (Context, Container, Component, Code) diagram patterns with Mermaid syntax for architecture documentation
30aws-s3-cloudfront
AWS S3 bucket configuration, CloudFront distribution setup, security headers (CSP, HSTS), cache policies, and SSL/TLS configuration
29