Skip to main content

ISO/IEC 27001:2022 Annex A Coverage

93
Annex A Controls
81
Covered
12
Operator Only

Annex A Control Mapping

ISO ControlCoverageSID ControlsNotes
A.5.1 Policies for information securitynoneSID-ORG-01Operator must create and publish security policy.
A.5.2 Information security roles and responsibilitiesnoneSID-ORG-02
A.5.3 Segregation of dutiespartialSID-ORG-02, SID-ACCESS-01Platform enforces multi-tenant isolation; operator must segregate operational duties.
A.5.4 Management responsibilitiesnoneSID-ORG-01
A.5.5 Contact with authoritiesnoneSID-ORG-05
A.5.6 Contact with special interest groupsnoneSID-ORG-05
A.5.7 Threat intelligencepartialSID-ORG-03, SID-TRUST-02Platform provides trust registry intelligence; operator must monitor threat landscape.
A.5.8 Information security in project managementnoneSID-OPS-08
A.5.9 Inventory of information and other associated assetsnoneOperator must maintain asset inventory. Platform assets documented in setup_project.py.
A.5.10 Acceptable use of information and other associated assetsnoneSID-ORG-07
A.5.11 Return of assetsnone
A.5.12 Classification of informationpartialSID-DATA-01, SID-DATA-02Platform classifies credential sensitivity via selective disclosure; operator must classify opera...
A.5.13 Labelling of informationnone
A.5.14 Information transferfullSID-TRANS-01, SID-TRANS-02, SID-TRANS-03All transfers via TLS 1.2+, OID4VCI, OID4VP protocols.
A.5.15 Access controlfullSID-AUTH-01, SID-AUTH-02, SID-ACCESS-01, SID-ACCESS-02, SID-ACCESS-03FIDO2 auth, JWT sessions, multi-tenant isolation, rate limiting, consent.
A.5.16 Identity managementfullSID-AUTH-01, SID-AUTH-03WebAuthn identity binding + OIDC gate for external IdPs.
A.5.17 Authentication informationfullSID-AUTH-01, SID-CRYPTO-02, SID-CRYPTO-03FIDO2 credentials, PRF-derived keys, encrypted keystore.
A.5.18 Access rightspartialSID-ACCESS-01, SID-ACCESS-04Platform enforces tenant isolation + SPOCP; operator manages user provisioning.
A.5.19 Information security in supplier relationshipsnoneSID-ORG-04
A.5.20 Addressing information security within supplier agreementsnoneSID-ORG-04
A.5.21 Managing information security in the ICT supply chainpartialSID-ORG-04, SID-OPS-04Platform: SBOM monitoring, dependency scanning. Operator: supply chain risk management.
A.5.22 Monitor, review and change management of supplier servicesnoneSID-ORG-04
A.5.23 Information security for use of cloud servicesnoneOperator must assess cloud provider security if using cloud hosting.
A.5.24 Information security incident management planning and preparationnoneSID-OPS-01
A.5.25 Assessment and decision on information security eventspartialSID-OPS-01, SID-AUDIT-01Platform provides structured event logging; operator must classify and assess.
A.5.26 Response to information security incidentsnoneSID-OPS-01
A.5.27 Learning from information security incidentsnoneSID-OPS-01
A.5.28 Collection of evidencepartialSID-AUDIT-01Platform produces structured audit logs; operator must preserve and manage evidence.
A.5.29 Information security during disruptionnoneSID-OPS-02
A.5.30 ICT readiness for business continuitynoneSID-OPS-02
A.5.31 Legal, statutory, regulatory and contractual requirementsnoneSID-ORG-05
A.5.32 Intellectual property rightsnoneSID-ORG-05
A.5.33 Protection of recordspartialSID-CRYPTO-03, SID-OPS-03Platform encrypts credential records; operator must manage retention and backup.
A.5.34 Privacy and protection of PIIpartialSID-PRIV-01, SID-DATA-01, SID-DATA-02Platform provides selective disclosure and data minimization; operator handles DPIA, consent reco...
A.5.35 Independent review of information securitynone
A.5.36 Compliance with policies, rules and standards for information securitynone
A.5.37 Documented operating proceduresnoneSID-ORG-06
A.6.1 ScreeningnoneSID-PPL-01
A.6.2 Terms and conditions of employmentnoneSID-PPL-01
A.6.3 Information security awareness, education and trainingnoneSID-PPL-02
A.6.4 Disciplinary processnone
A.6.5 Responsibilities after termination or change of employmentnone
A.6.6 Confidentiality or non-disclosure agreementsnoneSID-PPL-03
A.6.7 Remote workingnone
A.6.8 Information security event reportingpartialSID-PPL-04, SID-AUDIT-01Platform provides event logging; operator must define reporting procedures.
A.7.1 Physical security perimetersnoneSID-PHY-01
A.7.2 Physical entrynoneSID-PHY-01
A.7.3 Securing offices, rooms and facilitiesnoneSID-PHY-01
A.7.4 Physical security monitoringnoneSID-PHY-01
A.7.5 Protecting against physical and environmental threatsnoneSID-PHY-01
A.7.6 Working In secure areasnoneSID-PHY-01
A.7.7 Clear desk and clear screennoneSID-PHY-02
A.7.8 Equipment siting and protectionnoneSID-PHY-02
A.7.9 Security of assets off-premisesnoneSID-PHY-02
A.7.10 Storage mediapartialSID-PHY-02, SID-CRYPTO-03Platform encrypts data at rest; operator manages media handling.
A.7.11 Supporting utilitiesnoneSID-PHY-01
A.7.12 Cabling securitynoneSID-PHY-01
A.7.13 Equipment maintenancenoneSID-PHY-02
A.7.14 Secure disposal or re-use of equipmentnoneSID-PHY-02
A.8.1 User end point devicespartialSID-HARD-05, SID-CRYPTO-02Platform secures browser endpoint; operator may need to manage mobile devices.
A.8.2 Privileged access rightspartialSID-AUTH-02, SID-HARD-03Platform separates admin API on dedicated port; operator manages admin user lifecycle.
A.8.3 Information access restrictionfullSID-ACCESS-01, SID-ACCESS-03, SID-ACCESS-04Multi-tenant isolation, SPOCP authorization, user consent.
A.8.4 Access to source codenoneSID-OPS-08Open-source repos with branch protection; operator must manage deployment pipeline access.
A.8.5 Secure authenticationfullSID-AUTH-01, SID-AUTH-02, SID-AUTH-03, SID-AUTH-04FIDO2/WebAuthn, JWT, OIDC, WebSocket auth.
A.8.6 Capacity managementnoneOperator must plan capacity for wallet service.
A.8.7 Protection against malwarepartialSID-OPS-04, SID-HARD-05Platform: CSP, SRI, SVG sanitization. Operator: endpoint protection on servers.
A.8.8 Management of technical vulnerabilitiespartialSID-OPS-04Platform: dependency scanning. Operator: vulnerability management process.
A.8.9 Configuration managementpartialSID-OPS-05Platform: confit configuration tool. Operator: production config management.
A.8.10 Information deletionnoneOperator must define data retention and deletion procedures per GDPR.
A.8.11 Data maskingfullSID-DATA-01, SID-DATA-02, SID-PRIV-01SD-JWT and mDOC selective disclosure provide cryptographic data masking.
A.8.12 Data leakage preventionpartialSID-HARD-01, SID-HARD-05, SID-PRIV-01Platform: error sanitization, CSP, minimal disclosure. Operator: DLP on infrastructure.
A.8.13 Information backupnoneSID-OPS-03
A.8.14 Redundancy of information processing facilitiesnoneSID-OPS-02
A.8.15 LoggingpartialSID-AUDIT-01, SID-OPS-06Platform: structured JSON logging. Operator: SIEM, retention, analysis.
A.8.16 Monitoring activitiespartialSID-AUDIT-01, SID-OPS-06
A.8.17 Clock synchronizationnoneOperator must configure NTP on all wallet service hosts.
A.8.18 Use of privileged utility programspartialSID-HARD-03Platform separates admin API; operator must restrict host-level utilities.
A.8.19 Installation of software on operational systemsnoneSID-OPS-05
A.8.20 Networks securitypartialSID-TRANS-01, SID-TRANS-04Platform: TLS, SSRF protection. Operator: network security architecture.
A.8.21 Security of network servicespartialSID-TRANS-01, SID-TRANS-04
A.8.22 Segregation of networkspartialSID-HARD-03Platform: separate admin/engine/public ports. Operator: network segmentation.
A.8.23 Web filteringpartialSID-TRANS-04Platform: SafeHTTPClient blocks private IPs. Operator: outbound web filtering.
A.8.24 Use of cryptographyfullSID-CRYPTO-01, SID-CRYPTO-02, SID-CRYPTO-03, SID-CRYPTO-04, SID-CRYPTO-05, SID-KEY-01, SID-KEY-02Comprehensive cryptographic controls: HSM, PRF, AES-GCM, COSE, secure RNG, WSCA, IACA.
A.8.25 Secure development life cyclenoneSID-OPS-08
A.8.26 Application security requirementsfullSID-HARD-02, SID-HARD-04, SID-HARD-05Input validation, secure registration, browser security controls.
A.8.27 Secure system architecture and engineering principlesfullSID-HARD-03, SID-ACCESS-01, SID-KEY-01Network segmentation, multi-tenant isolation, WSCA delegation architecture.
A.8.28 Secure codingfullSID-HARD-01, SID-HARD-02, SID-TRANS-04Error sanitization, input validation, SSRF protection.
A.8.29 Security testing in development and acceptancenoneSID-OPS-08
A.8.30 Outsourced developmentnoneSID-ORG-04
A.8.31 Separation of development, test and production environmentsnoneSID-OPS-08
A.8.32 Change managementnoneSID-OPS-05
A.8.33 Test informationnoneSID-OPS-08
A.8.34 Protection of information systems during audit testingnoneSID-OPS-08
FindingSeverityStatusOwnerControls
ISO-O-8 — Partial segregation of duties🟢 lowopenplatformSID-ORG-02, SID-ACCESS-01
ISO-O-9 — Partial threat intelligence coverage🟡 mediumopenplatformSID-ORG-03, SID-TRUST-02
ISO-O-10 — Partial information classification🟢 lowopenplatformSID-DATA-01, SID-DATA-02
ISO-O-11 — Partial access rights management🟢 lowopenplatformSID-ACCESS-01, SID-ACCESS-04
ISO-O-12 — Partial supply chain security🟡 mediumopenplatformSID-ORG-04, SID-OPS-04
ISO-O-13 — Partial incident assessment and evidence handling🟡 mediumopenplatformSID-OPS-01, SID-AUDIT-01
ISO-O-14 — Partial PII protection🟠 highopenplatformSID-PRIV-01, SID-DATA-01, SID-DATA-02
ISO-P-2 — Partial security event reporting🟢 lowopenplatformSID-PPL-04, SID-AUDIT-01
ISO-PH-2 — Partial storage media controls🟢 lowopenplatformSID-PHY-02, SID-CRYPTO-03
ISO-T-3 — Secure development lifecycle gaps🟡 mediumopenplatformSID-OPS-08
ISO-T-5 — Partial endpoint and privileged access controls🟡 mediumopenplatformSID-AUTH-02, SID-HARD-03, SID-HARD-05, SID-CRYPTO-02
ISO-T-6 — Partial vulnerability and malware protection🟡 mediumopenplatformSID-OPS-04, SID-HARD-05
ISO-T-7 — Partial logging and monitoring🟡 mediumopenplatformSID-AUDIT-01, SID-OPS-06
ISO-T-8 — Partial network security🟡 mediumopenplatformSID-TRANS-01, SID-TRANS-04, SID-HARD-03
ISO-T-9 — Partial data leakage prevention🟢 lowopenplatformSID-HARD-01, SID-HARD-05, SID-PRIV-01