Skip to main content

ISO 2700 1 & 2 to Unified Control Map

Use this guide to identify a Unified Control by its corresponding ISO 2700 1 & 2 framework control.

D
Written by Drew Salisbury
Updated over a year ago

If you’re used to working with a specific ISO 2700 framework control, you can use this guide to identify its corresponding Unified Control.

For more information, and to view other framework control maps, visit Unified Controls FAQ.

ISO 2700 1 & 2 Control

Unified Control

AC-01-ISO Access Control Policy and Procedures

CTRL-1 Access Control Policy and Procedures

AC-02-ISO User Account Management

CTRL-1 Access Control Policy and Procedures

AC-03-ISO Role-based Access Controls (RBAC)

CTRL-23 Role-Based Access Control

AC-04-ISO Information Flow Enforcement

CTRL-198 Network Segmentation

AC-05-ISO Separation of Duties

CTRL-65 Separation of Duties

AC-06-ISO Least Privilege Access

CTRL-23 Role-Based Access Control

AC-06(02)-ISO Non-privileged Access for Non-security Functions

CTRL-9 Privileged User Accounts

AC-06(07)-ISO Review of Access Privileges

CTRL-73 Review of User Privileges

AC-07-ISO Unsuccessful Logon Attempts

CTRL-349 Password-Based Authentication

AC-08-ISO System Use Notification

CTRL-1130 Guidelines and Support Resources

AC-09-ISO Previous Logon Notification

CTRL-1130 Guidelines and Support Resources

AC-11-ISO Device Lock and Session Timeouts

CTRL-91 Session Termination

AC-17-ISO Remote Access

CTRL-110 Remote Access

AC-17(02)-ISO Protecting Remote Access

CTRL-190 Change Management and Software Development Life Cycle

AC-17(02)-ISO Protecting Remote Access

CTRL-110 Remote Access

AC-18-ISO Wireless Access

CTRL-121 Wireless Network

AC-19-ISO Access Control for Mobile Devices

CTRL-79 Mobile Device Management

AC-24-ISO Access Control Decisions

CTRL-16 Access Provisioning

AT-01-ISO Awareness and Training Policy and Procedures

CTRL-528 Personnel Security Policy and Procedures

AT-02-ISO Security Awareness and Privacy Training

CTRL-245 Security and Privacy Awareness Training

AT-03-ISO Role-based Training

CTRL-245 Security and Privacy Awareness Training

AT-04-ISO Training Records

CTRL-245 Security and Privacy Awareness Training

AU-01-ISO Audit and Accountability Policy and Procedures

CTRL-814 System Integrity Policy and Procedures

AU-02-ISO Event Logging in IT Systems

CTRL-833 Logging and Monitoring

AU-03-ISO Informative Log Content

CTRL-833 Logging and Monitoring

AU-06-ISO Log Review and Reporting

CTRL-833 Logging and Monitoring

AU-09-ISO Protection of Audit Information

CTRL-833 Logging and Monitoring

AU-11-ISO Audit Record Retention

CTRL-896 Information Management and Retention

CA-01-ISO Assessment, Authorization, and Monitoring Policy and Procedures

CTRL-814 System Integrity Policy and Procedures

CA-02-ISO Control Assessments

CTRL-149 Control Assessments

CA-02(01)-ISO Independent Assessment

CTRL-149 Control Assessments

CA-03-ISO Third-Party Agreements

CTRL-1129 Third-Party Agreements

CA-05-ISO Plan of Action and Milestones

CTRL-434 Plan of Action and Milestones Process

CA-06-ISO Authorization

CTRL-432 Information Security Program Leadership Role

CA-07-ISO Continuous Monitoring

CTRL-167 Continuous Monitoring

CA-08-ISO Penetration Testing

CTRL-174 Penetration Testing

CM-01-ISO Configuration and Change Management Policy and Procedures

CTRL-262 Change Management and Software Development Policy and Procedures

CM-03-ISO Configuration Change Control

CTRL-190 Change Management and Software Development Life Cycle

CM-03(02)-ISO Testing, Validation, and Documentation of Changes

CTRL-190 Change Management and Software Development Life Cycle

CM-04(01)-ISO Separate Test Environments

CTRL-190 Change Management and Software Development Life Cycle

CM-05-ISO Access Restrictions for Change

CTRL-65 Separation of Duties

CM-05-ISO Access Restrictions for Change

CTRL-16 Access Provisioning

CM-06-ISO System Hardening Through Baseline Configurations

CTRL-208 Configuration Management

CM-07-ISO Least Functionality

CTRL-822 Malicious Code Protection

CM-08-ISO Asset Inventory

CTRL-435 System Inventory

CM-10-ISO Software Usage Restrictions

CTRL-235 Software Usage Restrictions

CP-01-ISO Contingency Planning Policy and Procedures

CTRL-263 Contingency Planning Policy and Procedures

CP-02-ISO Contingency Plan (BCP/DR)

CTRL-264 Contingency Plan

CP-02(02)-ISO Capacity Planning

CTRL-266 Capacity Planning

CP-03-ISO Contingency Training

CTRL-253 Role-Based Training

CP-04-ISO Contingency Plan (BCP/DR) Testing

CTRL-276 Contingency Plan Testing

CP-06-ISO Alternate Storage Site

CTRL-283 Alternate Storage Site

CP-07-ISO Alternate Processing Site

CTRL-306 Redundant Secondary System

CP-09-ISO Data Backup

CTRL-300 System Backup

CP-09(01)-ISO System Backup Testing

CTRL-301 System Backup Test

CP-09(06)-ISO Redundant Secondary System

CTRL-306 Redundant Secondary System

IA-01-ISO Identification and Authentication Policy and Procedures

CTRL-1 Access Control Policy and Procedures

IA-02-ISO Internal Users Identification and Authentication

CTRL-319 Identification and Authentication

IA-03-ISO Device Identification and Authentication

CTRL-319 Identification and Authentication

IA-04-ISO Identifier Management

CTRL-319 Identification and Authentication

IA-05-ISO Password Management

CTRL-349 Password-Based Authentication

IA-06-ISO Authentication Feedback

CTRL-319 Identification and Authentication

IA-08-ISO External Users Identification and Authentication

CTRL-319 Identification and Authentication

IR-01-ISO Incident Response Policy and Procedures

CTRL-423 Incident Response Plan

IR-02-ISO Incident Response Training

CTRL-23 Role-Based Access Control

IR-04-ISO Incident Handling and Reporting

CTRL-423 Incident Response Plan

IR-06-ISO Incident Reporting

CTRL-416 Incident Reporting

IR-08-ISO Incident Response Plan

CTRL-423 Incident Response Plan

ISO-01-ISO Information Security Management System (ISMS)

CTRL-431 Information Security Policy and Procedures

ISO-02-ISO Statement of Applicability

CTRL-149 Control Assessments

ISO-03-ISO Internal Audit

CTRL-149 Control Assessments

ISO-04-ISO Management Review

CTRL-149 Control Assessments

MA-01-ISO Maintenance Policy and Procedures

CTRL-468 Maintenance Policy and Procedures

MA-02-ISO Controlled Maintenance

CTRL-472 Maintenance Tools

MP-01-ISO Media Protection Policy and Procedures

CTRL-498 Media Protection Policy and Procedures

MP-02-ISO Media Access

CTRL-499 Media Access

MP-03-ISO Media Labeling

CTRL-896 Information Management and Retention

MP-04-ISO Media Storage

CTRL-503 Media Storage

MP-05-ISO Media Transport

CTRL-506 Media Transport

MP-06-ISO Media Sanitization

CTRL-511 Media Sanitization and Disposal

PE-01-ISO Physical and Environmental Policy and Procedures

CTRL-546 Physical and Environmental Protection Policy and Procedures

PE-02-ISO Physical Access Authorizations

CTRL-551 Physical Access Control

PE-03-ISO Physical Access Control

CTRL-255 Physical Security Controls

PE-04-ISO Access Control for Transmission

CTRL-551 Physical Access Control

PE-05-ISO Access Control for Output Devices

CTRL-551 Physical Access Control

PE-17-ISO Alternate Work Site

CTRL-596 Alternate Work Site

PL-01-ISO Planning Policy and Procedures

CTRL-263 Contingency Planning Policy and Procedures

PL-02-ISO System Security and Privacy Plans

CTRL-431 Information Security Policy and Procedures

PL-04-ISO Rules of Behavior

CTRL-539 Access Agreements

PL-07-ISO Concept of Operations

CTRL-643 Risk Assessment Policy and Procedures

PM-01-ISO Information Security Program Management Policy and Procedures

CTRL-431 Information Security Policy and Procedures

PM-02-ISO Information Security Program Leadership Role

CTRL-432 Information Security Program Leadership Role

PM-10-ISO Authorization Process

CTRL-434 Plan of Action and Milestones Process

PM-13-ISO Security and Privacy Workforce

CTRL-434 Plan of Action and Milestones Process

PM-14-ISO Testing, Training, and Monitoring

CTRL-245 Security and Privacy Awareness Training

PM-15-ISO Security and Privacy Groups and Associations

CTRL-447 Security and Privacy Groups and Associations

PM-31-ISO Continuous Monitoring Strategy

CTRL-167 Continuous Monitoring

PM-33-ISO Information Security Program Plan

CTRL-431 Information Security Policy and Procedures

PM-34-ISO Information Security Program Documents

CTRL-431 Information Security Policy and Procedures

PS-01-ISO Personnel Security Policy and Procedures

CTRL-528 Personnel Security Policy and Procedures

PS-03-ISO Personnel Screening

CTRL-530 Personnel Screening

PS-04-ISO Personnel Termination

CTRL-535 Access Termination

PS-05-ISO Personnel Transfer

CTRL-535 Access Termination

PS-06-ISO Confidentiality Agreements for Company Personnel

CTRL-539 Access Agreements

PS-07-ISO External Personnel Security

CTRL-1109 Supplier Assessments and Reviews

PS-08-ISO Personnel Sanctions

CTRL-544 Personnel Sanctions

PS-09-ISO Position Descriptions

CTRL-545 Position Descriptions

PT-01-ISO Privacy Policy and Procedures

CTRL-622 Privacy Policy and Procedures

PT-02-ISO Authority to Process PII

CTRL-622 Privacy Policy and Procedures

RA-01-ISO Risk Assessment Policy and Procedures

CTRL-646 Risk Assessment

RA-01-ISO Risk Assessment Policy and Procedures

CTRL-643 Risk Assessment Policy and Procedures

RA-02-ISO Security Categorization

CTRL-435 System Inventory

RA-03-ISO Risk Assessment

CTRL-646 Risk Assessment

RA-05-ISO Vulnerability Monitoring and Scanning

CTRL-652 Vulnerability Management

RA-05-ISO Vulnerability Monitoring and Scanning

CTRL-814 System Integrity Policy and Procedures

RA-07-ISO Risk Response and Remediation

CTRL-646 Risk Assessment

RA-07-ISO Risk Response and Remediation

CTRL-652 Vulnerability Management

RA-09-ISO Criticality Analysis

CTRL-190 Change Management and Software Development Life Cycle

SA-01-ISO System Development Life Cycle (SDLC) Policy and Procedures

CTRL-190 Change Management and Software Development Life Cycle

SA-01-ISO System Development Life Cycle (SDLC) Policy and Procedures

CTRL-262 Change Management and Software Development Policy and Procedures

SA-03-ISO System Development Life Cycle

CTRL-190 Change Management and Software Development Life Cycle

SA-03-ISO System Development Life Cycle

CTRL-262 Change Management and Software Development Policy and Procedures

SA-03(02)-ISO Use of Live or Operational Data

CTRL-1186 Sensitive Data in Non-Production Environments

SA-04-ISO Acquisition Process

CTRL-190 Change Management and Software Development Life Cycle

SA-05-ISO System Documentation

CTRL-431 Information Security Policy and Procedures

SA-08-ISO Security and Privacy Engineering Principles

CTRL-190 Change Management and Software Development Life Cycle

SA-09-ISO External System Services

CTRL-1109 Supplier Assessments and Reviews

SA-10-ISO Developer Configuration Management

CTRL-190 Change Management and Software Development Life Cycle

SA-11-ISO Developer Testing and Evaluation

CTRL-190 Change Management and Software Development Life Cycle

SA-15-ISO Development Process, Standards, and Tools

CTRL-190 Change Management and Software Development Life Cycle

SC-01-ISO System Protection Policy and Procedures

CTRL-932 System Protection Policy and Procedures

SC-07-ISO Boundary Protection and Firewalls

CTRL-950 Boundary Protection

SC-07(12)-ISO Host-based Protection

CTRL-950 Boundary Protection

SC-08-ISO Transmission Confidentiality and Integrity

CTRL-112 Encryption of Data at Rest and in Transit

SC-12-ISO Cryptographic Key Establishment and Management

CTRL-194 Cryptography Management

SC-13-ISO Cryptographic Protection

CTRL-194 Cryptography Management

SC-38-ISO Operations Security

CTRL-190 Change Management and Software Development Life Cycle

SC-45-ISO System Time Synchronization

CTRL-1063 Synchronization

SI-01-ISO System Integrity Policy and Procedures

CTRL-814 System Integrity Policy and Procedures

SI-02-ISO Flaw Remediation and Patch Management

CTRL-652 Vulnerability Management

SI-03-ISO Malware and Endpoint Protection

CTRL-822 Malicious Code Protection

SI-05-ISO Security Alerts, Advisories, and Directives

CTRL-447 Security and Privacy Groups and Associations

SI-12-ISO Data Handling, Retention, and Disposal

CTRL-896 Information Management and Retention

SI-19-ISO De-identification

CTRL-923 Removal of Direct Identifiers

SR-01-ISO Third-Party Risk Management Policy and Procedures

CTRL-1094 Third-Party Risk Management Policy and Procedures

SR-02-ISO Third Party Management

CTRL-1094 Third-Party Risk Management Policy and Procedures

SR-06-ISO Third-Party Risk Assessments

CTRL-1109 Supplier Assessments and Reviews

Viewing Framework Controls in Thoropass

You can view the framework requirements satisfied by a Unified Control by clicking References on the side panel when viewing the Unified Control.

The IDs and names of all framework controls satisfied by the Unified Control are listed by framework. Click a framework control to view its description.

Did this answer your question?