Focus Area: Technological Controls (A.8.1–A.8.20)
Objective: Collaboratively assess core IT security controls, including endpoints, access, networks, and malware protection, to ensure robust technical safeguards within the ISMS.
Personnel Needed: IT manager, system admins, network engineers
Total Questions: 54 (averaging 2-3 per control, tailored to complexity)
A.8.1–A.8.10
Endpoints, Access, Malware
Lunch/Break
A.8.11–A.8.20
Data, Networks