Loading...
Loading...
Compare original and translation side by side
| Task | Output Format |
|---|---|
| Gap analysis | Table: Control ID |
| Policy generation | Full structured policy document |
| Control guidance | Structured guidance: Purpose → What to Do → Evidence → Audit Tips |
| Risk assessment | Risk register table or narrative |
| SoA generation | Spreadsheet-style table |
| General question | Clear, concise prose |
| 任务类型 | 输出格式 |
|---|---|
| 差距分析 | 表格:控制ID |
| 政策生成 | 完整结构化政策文档 |
| 控制措施指导 | 结构化指导:目的 → 落地要求 → 佐证材料 → 审计提示 |
| 风险评估 | 风险登记册表格或说明文本 |
| SoA生成 | 电子表格风格表格 |
| 通用问题 | 清晰简洁的文本说明 |
| Clause | Title | Key Deliverables |
|---|---|---|
| 4 | Context of the Organization | ISMS Scope document, stakeholder register |
| 5 | Leadership | IS Policy (signed by top mgmt), RACI/roles doc |
| 6 | Planning | Risk assessment, risk treatment plan, SoA, IS objectives |
| 7 | Support | Competence records, awareness training logs, documented info procedures |
| 8 | Operation | Executed risk assessments, risk treatment evidence, change records |
| 9 | Performance Evaluation | KPIs/metrics, internal audit reports, management review minutes |
| 10 | Improvement | Nonconformity records, corrective action log |
| 条款号 | 标题 | 核心交付物 |
|---|---|---|
| 4 | 组织环境 | ISMS范围文档、利益相关方登记册 |
| 5 | 领导力 | 信息安全政策(最高管理者签字)、RACI/职责分工文档 |
| 6 | 规划 | 风险评估、风险处置计划、SoA、信息安全目标 |
| 7 | 支持 | 能力证明记录、意识培训日志、文档化信息流程 |
| 8 | 运行 | 已执行的风险评估记录、风险处置佐证材料、变更记录 |
| 9 | 绩效评估 | KPI/指标、内部审计报告、管理评审会议纪要 |
| 10 | 改进 | 不符合项记录、纠正措施日志 |
references/annex-a-2022.mdreferences/annex-a-2013.mdreferences/control-mapping.mdreferences/annex-a-2022.mdreferences/annex-a-2013.mdreferences/control-mapping.md| Policy | Clause | Annex A (2022) |
|---|---|---|
| Information Security Policy | 5.2 | A.5.1 |
| Access Control Policy | 8.1 | A.5.15–5.18 |
| Risk Assessment & Treatment | 6.1–6.2 | — |
| Incident Response Policy | 8.1 | A.5.24–5.28 |
| Asset Management Policy | 8.1 | A.5.9–5.12 |
| Supplier Security Policy | 8.1 | A.5.19–5.22 |
| Business Continuity Policy | 8.1 | A.5.29–5.30 |
| Cryptography Policy | 8.1 | A.8.24 |
| Clear Desk / Clear Screen | 8.1 | A.7.7 |
| Acceptable Use Policy | 8.1 | A.5.10 |
| Human Resources Security | 7.2, 8.1 | A.6.1–6.8 |
| 政策 | 条款 | Annex A(2022版) |
|---|---|---|
| 信息安全政策 | 5.2 | A.5.1 |
| 访问控制政策 | 8.1 | A.5.15–5.18 |
| 风险评估与处置 | 6.1–6.2 | — |
| 事件响应政策 | 8.1 | A.5.24–5.28 |
| 资产管理政策 | 8.1 | A.5.9–5.12 |
| 供应商安全政策 | 8.1 | A.5.19–5.22 |
| 业务连续性政策 | 8.1 | A.5.29–5.30 |
| 密码学政策 | 8.1 | A.8.24 |
| 清桌/清屏政策 | 8.1 | A.7.7 |
| 可接受使用政策 | 8.1 | A.5.10 |
| 人力资源安全 | 7.2, 8.1 | A.6.1–6.8 |
references/annex-a-2022.mdreferences/annex-a-2022.md| Topic | 2013 | 2022 |
|---|---|---|
| Annex A controls | 114 controls, 14 domains | 93 controls, 4 themes |
| New controls | — | 11 new (cloud, threat intel, data masking, secure coding, etc.) |
| Clause 6 | 6.1, 6.2 | Added 6.3 (Planning of changes) |
| Clause 9.2 | Single clause | Split into 9.2.1 (General) + 9.2.2 (Audit programme) |
| Clause 9.3 | Single clause | Split into 9.3.1 + 9.3.2 (Inputs) + 9.3.3 (Results) |
| Transition deadline | — | October 2025 (all 2013 certs expired) |
| Control attributes | None | Each control has attribute taxonomy (type, properties, concepts, domains) |
| 对比项 | 2013版 | 2022版 |
|---|---|---|
| Annex A控制措施 | 114项,14个领域 | 93项,4个主题 |
| 新增控制措施 | — | 11项新控制(云安全、威胁情报、数据脱敏、安全编码等) |
| 条款6 | 6.1、6.2 | 新增6.3(变更规划) |
| 条款9.2 | 单一条款 | 拆分为9.2.1(总则)+9.2.2(审计方案) |
| 条款9.3 | 单一条款 | 拆分为9.3.1 +9.3.2(输入)+9.3.3(输出) |
| 过渡截止日期 | — | 2025年10月(所有2013版证书失效) |
| 控制属性 | 无 | 每个控制措施都有属性分类(类型、属性、概念、领域) |
references/annex-a-2022.mdreferences/annex-a-2013.mdreferences/control-mapping.mdreferences/annex-a-2022.mdreferences/annex-a-2013.mdreferences/control-mapping.md