-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathAll_ISO27001_NIS2_Controls - v2.rdf
More file actions
2225 lines (1985 loc) · 165 KB
/
All_ISO27001_NIS2_Controls - v2.rdf
File metadata and controls
2225 lines (1985 loc) · 165 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<?xml version="1.0"?>
<rdf:RDF xmlns="http://www.w3.org/2002/07/owl#"
xml:base="http://www.w3.org/2002/07/owl"
xmlns:dct="http://purl.org/dc/terms/"
xmlns:owl="http://www.w3.org/2002/07/owl#"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:xml="http://www.w3.org/XML/1998/namespace"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#"
xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#"
xmlns:skos="http://www.w3.org/2004/02/skos/core#"
xmlns:assessment="http://JP_ontology.org/assessment#"
xmlns:nis2v="http://JP_ontology.org/nis2v#"
xmlns:iso27001="http://JP_ontology.org/iso27001#">
<owl:Ontology rdf:about="http://JP_ontology.org/iso27001/">
<owl:imports rdf:resource="http://JP_ontology.org/nis2v/"/>
<owl:imports rdf:resource="http://JP_ontology.org/assessment/"/>
</owl:Ontology>
<!--
///////////////////////////////////////////////////////////////////////////////////////
//
// ISO Controls (270012022) Ontology - Metadata
//
///////////////////////////////////////////////////////////////////////////////////////
-->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001">
<rdf:type rdf:resource="http://www.w3.org/2002/07/owl#Ontology"/>
<dct:title>Controls Vocabulary</dct:title>
<dct:abstract>ISO 27001:2022 controls framework (89 controls) and ENISA Minimum Security Measures for Operators of Essentials Services (30 controls).</dct:abstract>
<dct:description>This ontology details each of the ISO 27001:2022 controls that are in scope for the NIS2 directive. In total there are 119 controls. Each of these controls are mapped to their corresponding NIS2 Article.</dct:description>
<dct:creator>Jenni Parry</dct:creator>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-08</dct:created>
<dct:modified rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-24</dct:modified>
<dct:identifier rdf:resource="http://JP_ontology.org/iso27001"/>
<dct:importedFrom rdf:resource="http://JP_ontology.org/assessment"/>
<dct:importedFrom rdf:resource="http://JP_ontology.org/nis2v"/>
</rdf:Description>
<!--
///////////////////////////////////////////////////////////////////////////////////////
//
// ISO Controls (270012022) - ISO Theme Sub-Classess and associated Controls
//
///////////////////////////////////////////////////////////////////////////////////////
-->
<!-- http://JP_ontology.org/iso27001/ISOControl270012022 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ISOControl270012022">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">ISO Control 27001:2022</skos:prefLabel>
<skos:definition xml:lang="en">Represents the set of controls within the ISO 27001:2022 framework.</skos:definition>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ISOTheme -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ISOTheme">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOControl270012022"/>
<skos:prefLabel xml:lang="en">ISO Theme</skos:prefLabel>
<skos:definition xml:lang="en">Represents a thematic grouping of controls within the ISO 27001:2022 framework.</skos:definition>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/OrganisationalControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/OrganisationalControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Organisational Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the organisational controls as outlined in Annex A of ISO standards.</skos:definition>
<rdfs:comment xml:lang="en">Organisational Controls (Annex A)</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/PeopleControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/PeopleControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">People Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to personnel and human resources as specified in Annex A of ISO standards.</skos:definition>
<rdfs:comment xml:lang="en">People Controls (Annex A)</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/PhysicalControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/PhysicalControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Physical Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to physical security measures as specified in Annex A of ISO standards.</skos:definition>
<rdfs:comment xml:lang="en">Physical Controls (Annex A)</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ImprovementControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ImprovementControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Improvement Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to continuous improvement measures as specified in Annex A of ISO standards.</skos:definition>
<rdfs:comment xml:lang="en">Improvement Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/SupportControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/SupportControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Support Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the support-related controls within an organisational structure, focusing on providing necessary services and infrastructure.</skos:definition>
<rdfs:comment xml:lang="en">Support Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/TechnologicalControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/TechnologicalControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Technological Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents controls related to technology and information systems within an organisation, as detailed in Annex A of ISO standards.</skos:definition>
<rdfs:comment xml:lang="en">Technological Controls (Annex A)</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ContextControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ContextControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Context Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to the context of the organization.</skos:definition>
<rdfs:comment xml:lang="en">Context Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-25</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/LeadershipControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/LeadershipControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Leadership Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to leadership and commitment, policy and organizational roles, responsibilities and authorities.</skos:definition>
<rdfs:comment xml:lang="en">Leadership Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-25</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/PlanningControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/PlanningControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Planning Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to the actions to address risks and opportunities, Information security risk assessment and risk treatment. Also information security objectives and planning to achieve them.</skos:definition>
<rdfs:comment xml:lang="en">Planning Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-25</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/OperationControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/OperationControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Operation Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to the operational planning and control, Information security risk assessment and risk treatment.</skos:definition>
<rdfs:comment xml:lang="en">Operation Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-25</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/PerformanceEvaluationControls -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/PerformanceEvaluationControls">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ISOTheme"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<skos:prefLabel xml:lang="en">Performance Evaluation Controls</skos:prefLabel>
<skos:definition xml:lang="en">Represents the controls related to the Monitoring, measurement, analysis and evaluation and Internal audit.</skos:definition>
<rdfs:comment xml:lang="en">Performance Evaluation Controls</rdfs:comment>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-25</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<Class rdf:about="http://www.w3.org/2004/02/skos/core#Concept"/>
<!-- ********************************** Controls (Start) ****************************************** -->
<!-- http://JP_ontology.org/iso27001/Control7.5 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control7.5">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/SupportControls"/>
<skos:prefLabel xml:lang="en">Documented information</skos:prefLabel>
<skos:altLabel xml:lang="en">Control7.5</skos:altLabel>
<skos:definition xml:lang="en">The organisation's information security management system must encompass: a) documented information mandated by this document; and b) documented information identified by the organisation as essential for the efficiency of the information security management system. (NOTE: The amount of documented information required for an information security management system may vary depending on factors such as: 1) the organisation's size and the nature of its activities, processes, products, and services; 2) the complexity of processes and their interrelations; and 3) the competency of personnel.)</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ISMSDocumentationRequirements"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.37 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.37">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2c"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2e"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2h"/>
<skos:prefLabel xml:lang="en">Documented operating procedures</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.37</skos:altLabel>
<skos:definition xml:lang="en">Documentation outlining operating procedures for information processing facilities must be created and accessible to personnel who require them.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/DocumentedOperatingProcedures"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.5 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.5">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Contact with authorities</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.5</skos:altLabel>
<skos:definition xml:lang="en">The organisation should establish and uphold communication channels with relevant authorities.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ContactWithAuthorities"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.6 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.6">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Contact with special interest groups</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.6</skos:altLabel>
<skos:definition xml:lang="en">The organisation should establish and sustain communication with special interest groups or other specialized security forums and professional associations.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ContactWithSpecialInterestGroups"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.7 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.7">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Threat intelligence</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.7</skos:altLabel>
<skos:definition xml:lang="en">Data concerning information security threats should be gathered and analyzed to generate threat intelligence.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ThreatIntelligence"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.7.11 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.7.11">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2c"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PhysicalControls"/>
<skos:prefLabel xml:lang="en">Supporting utilities</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.7.11</skos:altLabel>
<skos:definition xml:lang="en">Information processing facilities must be safeguarded against power failures and other disruptions stemming from failures in supporting utilities.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SupportingUtilities"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.14 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.14">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2c"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Redundancy of information processing facilities</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.14</skos:altLabel>
<skos:definition xml:lang="en">Information processing facilities should be equipped with redundancy adequate to fulfill availability requirements.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/RedundancyOfInformationProcessingFacilities"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.17 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.17">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2b"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Clock synchronization</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.17</skos:altLabel>
<skos:definition xml:lang="en">The clocks of information processing systems utilized by the organisation must be synchronized with approved time sources.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ClockSynchronization"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control7.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control7.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Competence</skos:prefLabel>
<skos:altLabel xml:lang="en">Control7.2</skos:altLabel>
<skos:definition xml:lang="en">The organisation must: a) ascertain the requisite competency of individuals carrying out tasks under its authority that influence its information security performance; b) confirm the competency of these individuals based on suitable education, training, or experience; c) when necessary, undertake measures to obtain the required competency and assess the efficacy of these measures; and d) maintain suitable documented evidence of competency. </skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/CompetenceManagementForInformationSecurityPersonnel"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.7.7 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.7.7">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PhysicalControls"/>
<skos:prefLabel xml:lang="en">Clear desk and clear screen</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.7.7</skos:altLabel>
<skos:definition xml:lang="en">Clear desk rules for papers and removable storage media, as well as clear screen rules for information processing facilities, should be established and enforced accordingly. </skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ClearDeskAndClearScreen"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.3 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.3">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Segregation of duties</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.3</skos:altLabel>
<skos:definition xml:lang="en">Conflicting duties and areas of responsibility must be segregated to avoid conflicts of interest.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SegregationOfDuties"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.6.1 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.6.1">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PeopleControls"/>
<skos:prefLabel xml:lang="en">Screening</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.6.1</skos:altLabel>
<skos:definition xml:lang="en">Background verification checks on all candidates seeking to become personnel should be conducted before joining the organisation and periodically thereafter, in line with applicable laws, regulations, and ethical considerations. These checks should be proportionate to the business requirements, the classification of the information to be accessed, and the perceived risks.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/Screening"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.6.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.6.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PeopleControls"/>
<skos:prefLabel xml:lang="en">Terms and conditions of employment</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.6.2</skos:altLabel>
<skos:definition xml:lang="en">Employment contractual agreements should clearly outline the responsibilities of both the personnel and the organisation regarding information security.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/TermsAndConditionsOfEmployment"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.6.5 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.6.5">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PeopleControls"/>
<skos:prefLabel xml:lang="en">Responsibilities after termination or change of employment</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.6.5</skos:altLabel>
<skos:definition xml:lang="en">Information security responsibilities and duties that remain applicable after termination or change of employment must be clearly defined, enforced, and communicated to relevant personnel and other interested parties. </skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ResponsibilitiesAfterTerminationOrChange"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.11 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.11">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Return of assets</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.11</skos:altLabel>
<skos:definition xml:lang="en">Personnel and other relevant parties, as applicable, should return all organisation assets in their possession upon the change or termination of their employment, contract, or agreement. </skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ReturnOfAssets"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.7.9 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.7.9">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PhysicalControls"/>
<skos:prefLabel xml:lang="en">Security of assets off-premises</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.7.9</skos:altLabel>
<skos:definition xml:lang="en">Off-site assets must be safeguarded. </skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SecurityOfAssetsOffPremises"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control7.4 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control7.4">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/SupportControls"/>
<skos:prefLabel xml:lang="en">Communication</skos:prefLabel>
<skos:altLabel xml:lang="en">Control7.4</skos:altLabel>
<skos:definition xml:lang="en">The organisation must assess the necessity for internal and external communications pertinent to the information security management system, which includes: a) determining the content of communications; b) establishing the timing of communications; c) identifying the recipients of communications; d) specifying the methods of communication. </skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/Communication"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Information security roles and responsibilities</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.2</skos:altLabel>
<skos:definition xml:lang="en">Roles and responsibilities related to information security must be clearly defined and assigned based on the organisation's requirements.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SecurityRolesResponsibilityAllocation"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.8 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.8">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2e"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Management of technical vulnerabilities</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.8</skos:altLabel>
<skos:definition xml:lang="en">The organisation must acquire information regarding technical vulnerabilities present in the information systems being utilized, assess the organisation's susceptibility to these vulnerabilities, and implement suitable measures to address them.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/TechnicalVulnerabilityManagement"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.9 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.9">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2e"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Configuration management</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.9</skos:altLabel>
<skos:definition xml:lang="en">Configurations, encompassing security configurations, for hardware, software, services, and networks, must be defined, documented, implemented, monitored, and periodically reviewed.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SecurityConfigurationOversight"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.22 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.22">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2e"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Segregation of networks</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.22</skos:altLabel>
<skos:definition xml:lang="en">The organisation's networks should segregate groups of information services, users, and information systems.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SegregationOfNetworks"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.25 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.25">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2b"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Assessment and decision on information security events</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.25</skos:altLabel>
<skos:definition xml:lang="en">The organisation should assess information security events and determine whether they meet the criteria for classification as information security incidents.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SecurityIncidentCategorisation"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-26</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.23 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.23">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2d"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Information security for use of cloud services</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.23</skos:altLabel>
<skos:definition xml:lang="en">Processes for the acquisition, utilization, management, and termination of cloud services must be established in accordance with the organisation's information security requirements.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/CloudServiceManagement"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-15</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.6.3 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.6.3">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PeopleControls"/>
<skos:prefLabel xml:lang="en">Information security awareness, education and training</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.6.3</skos:altLabel>
<skos:definition xml:lang="en">Personnel of the organisation and relevant stakeholders must receive adequate awareness, education, and training on information security, along with regular updates regarding the organisation's information security policy, topic-specific policies, and procedures relevant to their job roles.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/InformationSecurityAwarenessTraining"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.15 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.15">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Access control</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.15</skos:altLabel>
<skos:definition xml:lang="en">Guidelines for regulating physical and logical access to information and other related assets should be developed and enforced in accordance with business and information security needs.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/AccessControlRegulation"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.16 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.16">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2j"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Identity management</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.16</skos:altLabel>
<skos:definition xml:lang="en">The complete life cycle of identities must be effectively managed.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/IdentityLifecycleManagement"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.17 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.17">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2j"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Authentication information</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.17</skos:altLabel>
<skos:definition xml:lang="en">The allocation and administration of authentication information must be overseen by a management process, which includes instructing personnel on the proper handling of authentication information.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/AuthenticationInformationManagement"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.18 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.18">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/OrganisationalControls"/>
<skos:prefLabel xml:lang="en">Access rights</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.18</skos:altLabel>
<skos:definition xml:lang="en">Access rights to information and other related assets must be provisioned, reviewed, modified, and revoked in compliance with the organisation's topic-specific policy and regulations for access control.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/AccessRightsManagement"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.7 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.7">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Protection against malware</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.7</skos:altLabel>
<skos:definition xml:lang="en">Measures to safeguard against malware must be implemented, and user awareness should be appropriately supported to reinforce this protection.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ProtectionAgainstMalware"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.5 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.5">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2i"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2j"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Secure authentication</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.5</skos:altLabel>
<skos:definition xml:lang="en">Secure authentication technologies and procedures should be implemented in accordance with information access restrictions and the organisation's specific policy on access control.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SecureAuthenticationImplementation"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.8.19 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.8.19">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2e"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2g"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/TechnologicalControls"/>
<skos:prefLabel xml:lang="en">Installation of software on operational systems</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.8.19</skos:altLabel>
<skos:definition xml:lang="en">Procedures and measures must be put in place to securely handle software installation on operational systems.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/SecureSoftwareInstallationManagement"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control4 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control4">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ContextControls"/>
<skos:prefLabel xml:lang="en">Context of the organisation</skos:prefLabel>
<skos:altLabel xml:lang="en">Control4</skos:altLabel>
<skos:definition xml:lang="en">The organisation must identify both external and internal factors pertinent to its objectives and impacting its capability to attain the desired outcomes of its information security management system.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/ContextOfTheOrganisation"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control5.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control5.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/LeadershipControls"/>
<skos:prefLabel xml:lang="en">Policy</skos:prefLabel>
<skos:altLabel xml:lang="en">Control5.2</skos:altLabel>
<skos:definition xml:lang="en">Senior management must create an information security policy that: a) aligns with the organisation's purpose; b) incorporates information security objectives (refer to 6.2) or establishes the structure for defining information security objectives; c) demonstrates a pledge to fulfill relevant information security requirements; d) shows a dedication to continually enhance the information security management system. This information security policy should: e) exist as documented material; f) be disseminated throughout the organisation; g) be accessible to relevant stakeholders, as necessary.</skos:definition>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control5.3 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control5.3">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/LeadershipControls"/>
<skos:prefLabel xml:lang="en">Organisational roles, responsibilities and authorities</skos:prefLabel>
<skos:altLabel xml:lang="en">Control5.3</skos:altLabel>
<skos:definition xml:lang="en">Senior management must guarantee that roles pertaining to information security possess clearly defined responsibilities and authorities, which are assigned and communicated throughout the organisation. Senior management is responsible for designating the responsibility and authority for: a) ensuring compliance of the information security management system with the stipulations outlined in this document; b) providing reports on the performance of the information security management system to senior management.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/InformationSecurityRoleDelegation"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control6.1.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control6.1.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PlanningControls"/>
<skos:prefLabel xml:lang="en">Information security risk assessment</skos:prefLabel>
<skos:altLabel xml:lang="en">Control6.1.2</skos:altLabel>
<skos:definition xml:lang="en">The organisation must establish and implement an information security risk assessment process that:a) develops and upholds information security risk criteria encompassing: 1) criteria for accepting risks; and 2) criteria for conducting information security risk assessments; b) ensures that recurring information security risk assessments yield consistent, valid, and comparable outcomes; c) identifies information security risks by: 1) applying the information security risk assessment process to recognize risks related to the potential loss of confidentiality, integrity, and availability of information within the scope of the information security management system; 2) determining the owners of identified risks; d) analyzes information security risks by: 1) evaluating the potential consequences that would arise if the risks identified in 6.1.2 c) 1) were to occur; 2) assessing the likelihood of occurrence of the risks identified in 6.1.2 c) 1); 3) determining the levels of risk; e) evaluates information security risks by: 1) comparing the outcomes of risk analysis with the risk criteria established in 6.1.2 a); 2) prioritizing the analyzed risks for risk treatment. The organisation must maintain documented records of the information security risk assessment process.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/InformationSecurityRiskAssessmentProcess"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control6.1.3 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control6.1.3">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PlanningControls"/>
<skos:prefLabel xml:lang="en">Information security risk treatment</skos:prefLabel>
<skos:altLabel xml:lang="en">Control6.1.3</skos:altLabel>
<skos:definition xml:lang="en">The organisation must establish and implement an information security risk treatment process to: a) choose suitable information security risk treatment options, considering the outcomes of the risk assessment; b) identify all necessary controls required to enact the chosen information security risk treatment option(s); c) create a Statement of Applicability containing: — the requisite controls (refer to ISO27001)); — rationale for their inclusion; — whether the requisite controls are implemented or not; and — justification for excluding any controls from ISO27001 Annex A. e) develop an information security risk treatment plan; and f) obtain approval of the information security risk treatment plan from risk owners and acknowledgment of the residual information security risks. The organisation must maintain documented records of the information security risk treatment process.</skos:definition>
<skos:exactMatch rdf:resource="http://JP_ontology.org/iso27001/InformationSecurityRiskTreatmentProcess"/>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-04-18</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/ControlA.5.28 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/ControlA.5.28">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2b"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PlanningControls"/>
<skos:prefLabel xml:lang="en">Collection of evidence</skos:prefLabel>
<skos:altLabel xml:lang="en">ControlA.5.28</skos:altLabel>
<skos:definition xml:lang="en">Senior management must create an information security policy that:
a) aligns with the organisation's purpose;
b) incorporates information security objectives or establishes the framework for defining information security objectives;
c) demonstrates a pledge to fulfill applicable requirements related to information security;
d) expresses a dedication to continually improve the information security management system.
The information security policy should:
e) exist as documented material;
f) be disseminated throughout the organisation;
g) be accessible to relevant stakeholders, as needed.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control9.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control9.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2f"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PerformanceEvaluationControls"/>
<skos:prefLabel xml:lang="en">Internal audit</skos:prefLabel>
<skos:altLabel xml:lang="en">Control9.2</skos:altLabel>
<skos:definition xml:lang="en">The organisation should conduct internal audits at scheduled intervals to ascertain whether the information security management system:
a) aligns with:
1) the organisation’s internal requirements for its information security management system;
2) the requirements outlined in this document;
b) is effectively implemented and sustained.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control4.3 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control4.3">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ContextControls"/>
<skos:prefLabel xml:lang="en">Determining the scope of the information security management system</skos:prefLabel>
<skos:altLabel xml:lang="en">Control4.3</skos:altLabel>
<skos:definition xml:lang="en">The organisation is responsible for defining the boundaries and applicability of the information security management system to establish its scope. When determining this scope, the organisation should consider: a) external and internal factors; b) interfaces and dependencies between activities carried out by the organisation and those performed by other entities. The scope must be documented as documented information.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control4.4 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control4.4">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ContextControls"/>
<skos:prefLabel xml:lang="en">Information security management system</skos:prefLabel>
<skos:altLabel xml:lang="en">Control4.4</skos:altLabel>
<skos:definition xml:lang="en">The organisation must establish, implement, maintain, and continuously enhance an information security management system (ISMS), including the necessary processes and their interactions, in compliance with the ISO27001 framework.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control5.1 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control5.1">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/LeadershipControls"/>
<skos:prefLabel xml:lang="en">Leadership and commitment</skos:prefLabel>
<skos:altLabel xml:lang="en">Control5.1</skos:altLabel>
<skos:definition xml:lang="en">Senior management should exhibit leadership and commitment regarding the information security management system by: a) establishing the information security policy and objectives in alignment with the organisation's strategic direction; b) integrating ISMS requirements into organisational processes; c) ensuring the availability of resources for the ISMS; d) communicating the importance of effective information security management and compliance with ISMS requirements; e) ensuring the ISMS achieves its intended outcomes; f) guiding and supporting individuals to contribute to ISMS effectiveness; g) promoting continuous improvement; and h) supporting other relevant management roles in demonstrating leadership within their areas of responsibility.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control6.1 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control6.1">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/PlanningControls"/>
<skos:prefLabel xml:lang="en">Planning</skos:prefLabel>
<skos:altLabel xml:lang="en">Control6.1</skos:altLabel>
<skos:definition xml:lang="en">When planning for the information security management system, the organisation should take into account any issues and their requirements. It should determine the risks and opportunities that need to be addressed to: a) Ensure the ISMS can achieve its intended outcomes; b) Prevent or mitigate undesired effects; c) Facilitate continual improvement. The organisation must plan the actions to address these risks and opportunities; and how to integrate and implement these actions into its ISMS processes; and evaluate the effectiveness of these actions.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control7.1 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control7.1">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2a"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/SupportControls"/>
<skos:prefLabel xml:lang="en">Resources</skos:prefLabel>
<skos:altLabel xml:lang="en">Control7.1</skos:altLabel>
<skos:definition xml:lang="en">The organisation must identify and allocate the necessary resources for establishing, implementing, maintaining, and continually improving the information security management system.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control10.1 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control10.1">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2f"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ImprovementControls"/>
<skos:prefLabel xml:lang="en">Continual improvement</skos:prefLabel>
<skos:altLabel xml:lang="en">Control10.1</skos:altLabel>
<skos:definition xml:lang="en">The organisation continuously enhances the suitability, adequacy, and effectiveness of the information security management system.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control10.2 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control10.2">
<rdf:type rdf:resource="http://www.w3.org/2000/01/rdf-schema#Class"/>
<rdf:type rdf:resource="http://www.w3.org/2004/02/skos/core#Concept"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/nis2v/Article_21.2f"/>
<rdfs:subClassOf rdf:resource="http://JP_ontology.org/iso27001/ImprovementControls"/>
<skos:prefLabel xml:lang="en">Nonconformity and corrective action</skos:prefLabel>
<skos:altLabel xml:lang="en">Control10.2</skos:altLabel>
<skos:definition xml:lang="en">When a nonconformity arises, the organisation reacts accordingly, which may involve: a) Taking immediate action to control and correct it, and addressing any associated consequences; b) Evaluating the need for action to prevent recurrence by reviewing the nonconformity, determining its causes, and assessing the potential for similar occurrences; c) Implementing necessary actions; d) Reviewing the effectiveness of corrective actions taken; and e) Making adjustments to the information security management system as needed. Corrective actions are tailored to the impact of the encountered nonconformities. Documented information serves as evidence of the nature of the nonconformities, subsequent actions taken, and the results of any corrective action.</skos:definition>
<dct:source xml:lang="en">ISO 27001:2022 Control Framework</dct:source>
<dct:created rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2024-05-02</dct:created>
<dct:contributor>Jenni Parry</dct:contributor>
<rdfs:isDefinedBy rdf:resource="http://JP_ontology.org/iso27001"/>
</rdf:Description>
<!-- http://JP_ontology.org/iso27001/Control7.5.3 -->
<rdf:Description rdf:about="http://JP_ontology.org/iso27001/Control7.5.3">