| SoA Control (Rel) | Reference | Reference Type | Section / Details | Maintenance |
|---|
| A.5.9 | P8 Asset Management | Policy | §3 Asset categories; §4 Information Asset Register | Draft |
| A.5.31 | NZ/AU Privacy Act Compliance | External | NZ Privacy Act, AU Privacy Act regulatory compliance | Draft |
| A.8.18 | ADUE Compliance | Technical | Jailbreak/rooting detection | Draft |
| A.8.10 | BYOD-PROC-01 | Procedure | Offboarding data deletion procedure | Draft |
| A.8.2 | Entra ID PIM (Planned) | Technical | Privileged Identity Management — planned implementation | Draft |
| A.5.17 | Entra ID MFA | Technical | Security Defaults — MFA for all users | Draft |
| A.5.15 | P1 BYOD | Policy | §3 Zero Trust principles | Draft |
| A.7.7 | P1 BYOD | Policy | Screen lock policy section | Draft |
| A.8.27 | L1 ISP | Policy | §3 Zero Trust principles; Platform = Policy | Draft |
| A.8.24 | CA100 Redkey | Technical | Hardware-encrypted USB for secure data transport | Draft |
| A.8.15 | Intune Audit Logs | Technical | Intune audit trail | Draft |
| A.6.8 | BYOD-PROC-04 | Procedure | Incident reporting section | Draft |
| A.5.32 | Employment Contracts | Evidence | IP rights clauses in employment agreements | Draft |
| A.8.8 | Updatest | Evidence | Weekly patch evidence | Draft |
| A.8.33 | P7 ADG | Policy | §Test Data Management — restriction on use of production data in testing | Draft |
| A.8.1 | BYOD-PROC-01~04 | Procedure | Device lifecycle; patch management; access control & data protection; monitoring & incident response | Draft |
| A.8.25 | GitHub Security Features | Technical | GitHub security features (Dependabot, code scanning) | Draft |
| A.5.33 | Notion ISMS Document System | Evidence | ISMS documentation structure in Notion | Draft |
| A.6.4 | P3 HR | Policy | §4.4 Disciplinary process | Draft |
| A.8.10 | P1 BYOD | Policy | §6.5 Selective Wipe (offboarding/device change — corporate data deletion) | Draft |
| A.8.4 | P7 ADG | Policy | Source code management section | Draft |
| A.8.15 | P2 M365 | Policy | §8 Monitoring & Audit Evidence | Draft |
| A.5.27 | P9 Incident Management | Policy | SEC-POL-INC-009 §6 Post-Incident Review (Lessons Learned) — Severity 1/2 mandatory review, root cause analysis, improvement actions, quarterly aggregate review | Draft |
| A.8.15 | Entra ID Sign-in Logs | Technical | Sign-in log collection | Draft |
| A.5.28 | P2 M365 | Policy | §8 Monitoring (log sources for evidence collection) | Draft |
| A.8.26 | P8 Asset Management & Information Classification Policy | Policy | §3.5 SaaS Category Classification — defines A/B/C framework, classification criteria, and information classification linkage | Draft |
| A.7.3 | N/A | External | No offices/rooms/facilities — not applicable | Draft |
| A.5.3 | Audit Log Monitoring | Technical | Compensating control: audit log monitoring for segregation of duties | Draft |
| A.5.12 | P2 M365 | Policy | §3 Two-Level Classification (Confidential=Private Channel / General=Standard Channel); Platform = Policy principle | Draft |
| A.7.13 | BYOD-PROC-01 | Procedure | Device change section | Draft |
| A.5.25 | Microsoft Defender Alerts | Technical | Defender alerting for incident assessment | Draft |
| A.5.28 | P9 Incident Management | Policy | SEC-POL-INC-009 §5.4 Investigation & Evidence Collection — Entra ID/Defender/Intune/UAL/SaaS log collection, evidence preservation (Private Channel), Chain of Custody, timeline reconstruction | Draft |
| A.5.10 | L1 ISP | Policy | §3 Acceptable use principles | Draft |
| A.5.2 | P2 M365 | Policy | §7 Admin Roles | Draft |
| A.5.2 | L2 Domain Policies | Policy | All L2 policies — Roles & Responsibilities sections | Draft |
| A.8.22 | Zero Trust / CA Policy | Technical | Zero Trust (network segmentation unnecessary); CA policy-based logical separation | Draft |
| A.8.5 | P2 M365 | Policy | §6.1 Platform-specific Protection Method | Draft |
| A.5.37 | BYOD-PROC-04 | Procedure | Monitoring & Incident Response procedure | Draft |
| A.5.23 | P2 M365 | Policy | §6.3 CA Prerequisite for cloud service security | Draft |
| A.8.8 | Defender Vulnerability Management | Technical | Vulnerability scanning and management | Draft |
| A.6.1 | P3 HR | Policy | §4.1 Pre-employment screening | Draft |
| A.7.12 | N/A | External | No cabling infrastructure — not applicable | Draft |
| A.6.7 | Conditional Access | Technical | CA policies for remote working | Draft |
| A.5.17 | Conditional Access | Technical | Premium: Device Compliance; Basic+P1: SPO Block | Draft |
| A.8.7 | Updatest | Evidence | Update evidence for endpoint protection | Draft |
| A.5.37 | BYOD-PROC-02 | Procedure | Patch Management procedure | Draft |
| A.8.12 | P2 M365 | Policy | §5.3 Private Channel Isolation; CA Default Block; Purview DLP not used (proportionate control) | Draft |
| A.7.13 | Updatest Weekly Update Evidence | Evidence | Weekly update evidence from Updatest | Draft |
| A.8.13 | SharePoint versioning | Technical | SharePoint version history for document rollback | Draft |
| A.8.30 | P7 ADG | Policy | §Outsourced Development Security Requirements | Draft |
| A.5.17 | ADUE Compliance Policy | Technical | Apple User Enrollment compliance policy enforcement | Draft |
| A.8.32 | ISMS Document Version Control | Evidence | ISMS document version management records | Draft |
| A.8.27 | P7 ADG | Policy | §Architecture — Secure system architecture principles | Draft |
| A.8.9 | Intune Configuration Profiles | Technical | Device configuration management | Draft |
| A.5.9 | SaaS Service List | Evidence | Inventory of SaaS services in use | Draft |
| A.5.2 | P1 BYOD | Policy | §4 Roles | Draft |
| A.8.2 | Conditional Access | Technical | CA policies for admin accounts | Draft |
| A.5.16 | Entra ID | Technical | Identity management platform | Draft |
| A.7.9 | P1 BYOD | Policy | Full BYOD policy + encryption requirements | Draft |
| A.8.15 | M365 UAL | Technical | Unified Audit Log | Draft |
| A.5.29 | P5 BCP | Policy | Business continuity planning | Draft |
| A.5.36 | Defender/Intune Compliance Dashboard | Technical | Defender and Intune compliance dashboards for conformance monitoring | Draft |
| A.8.16 | Intune Compliance Dashboard | Technical | Intune compliance monitoring dashboard | Draft |
| A.8.20 | Zero Trust Architecture | Technical | No network trust; CA-based access; Cloud-only | Draft |
| A.5.17 | P1 BYOD | Policy | §5.3 User Consent | Draft |
| A.5.34 | P1 BYOD | Policy | §6 Privacy Boundary (§6.3 Data Ownership vs Management Jurisdiction; §6.4 MAM Control Scope; §6.5 Selective Wipe Notice) | Draft |
| A.5.10 | P1 BYOD | Policy | §5 Acceptable Use (§5.2 Prohibited Use); §7 Non-Managed App Security (MAM external app controls) | Draft |
| A.5.26 | P9 Incident Management | Policy | SEC-POL-INC-009 §5.3 Containment & Response (account block, Selective Wipe, session revocation, device isolation); §5.5 Recovery & Remediation | Draft |
| A.5.36 | P2 M365 | Policy | §8 Monitoring & Audit Evidence (weekly/monthly/quarterly reviews) | Draft |
| A.8.32 | P7 ADG | Policy | §Change Management | Draft |
| A.5.30 | P5 BCP | Policy | ICT readiness for business continuity | Draft |
| A.5.15 | BYOD-PROC-03 | Procedure | Access Control & Data Protection procedure | Draft |
| A.7.10 | CA100 Redkey | Technical | Redkey management + encryption requirements | Draft |
| A.5.22 | P4 Supplier & Third-Party Security | Policy | §4 Supplier Monitoring & Review | Draft |
| A.5.33 | M365 Retention Policies | Technical | M365 retention policies for records management | Draft |
| A.7.8 | P1 BYOD | Policy | Physical management guidelines — BYOD environment, no corporate-owned equipment | Draft |
| A.5.18 | P2 M365 | Policy | §5 Teams Membership Management; §7.3 Teams Governance (Team/Channel creation restrictions); CA Allow/Block | Draft |
| A.5.37 | BYOD-PROC-03 | Procedure | Access Control & Data Protection procedure | Draft |
| A.5.23 | P7 ADG | Policy | Application & Data Governance policy | Draft |
| A.5.14 | P2 M365 | Policy | §3.3 External Sharing; §5.4 L3 Collaboration Partner Channels | Draft |
| A.7.1 | N/A | External | No physical perimeter — not applicable | Draft |
| A.5.7 | Microsoft Defender Threat Intelligence | Technical | Platform-native threat intelligence feed | Draft |
| A.7.9 | MAM | Technical | Mobile Application Management | Draft |
| A.8.1 | Intune MDM/MAM | Technical | Mobile Device Management (MDM) + Mobile Application Management (MAM) enforcement for BYOD | Draft |
| A.8.9 | Conditional Access | Technical | CA policies for configuration enforcement | Draft |
| A.5.14 | P6 Communications & Media | Policy | Information transfer rules section | Draft |
| A.6.7 | P2 M365 | Policy | §5–6 Trust Model & Security Controls | Draft |
| A.5.6 | CISO/Security Director Industry Networks | External | Industry network engagement by CISO and Security Director for threat intelligence and contact with authorities | Draft |
| A.5.15 | P2 M365 | Policy | §5 Access Control Tiers (L1/L2/L3 Trust Model); §6 Security Controls by Tier; §6.3 CA Default Block/Allow | Draft |
| A.8.26 | SaaS Category Framework | Technical | SaaS Category A/B/C framework — classification criteria for application security controls | Draft |
| A.5.9 | CA100 Asset Register | Evidence | CA100 hardware appliance asset register | Draft |
| A.7.9 | CA100 Redkey USB | Technical | Hardware encrypted USB storage | Draft |
| A.6.5 | BYOD-PROC-01 | Procedure | Offboarding — Selective Wipe + account deactivation | Draft |
| A.5.26 | P1 BYOD | Policy | §6.5 Selective Wipe | Draft |
| A.8.26 | P7 ADG | Policy | §Application Security Requirements | Draft |
| A.7.11 | N/A | External | Relies on Cloud SLA — not applicable | Draft |
| A.5.23 | SaaS Category Framework | Technical | Enforced SAML + CA for cloud service controls | Draft |
| A.7.5 | N/A | External | Relies on M365/AWS SLA — not applicable | Draft |
| A.6.6 | P3 HR | Policy | NDA section | Draft |
| A.8.19 | MAM App Protection | Technical | App protection policies for software installation control | Draft |
| A.8.34 | Entra ID RBAC | Technical | Audit access controlled via least-privilege RBAC | Draft |
| A.5.1 | L1 ISP (SEC-POL-ISP-001) | Policy | ISMS overarching policy | Draft |
| A.7.9 | ADUE | Technical | Apple User Enrollment compliance | Draft |
| A.5.35 | Internal Audit Program (Planned) | Evidence | Not yet established; future independent review by CISO planned | Draft |
| A.5.23 | P1 BYOD | Policy | §7 Non-Managed App Security (MAM external app controls) | Draft |
| A.8.31 | P7 ADG | Policy | §Environment Separation — tenant/subscription separation in cloud | Draft |
| A.7.4 | N/A | External | No physical security monitoring — not applicable | Draft |
| A.5.7 | CISO Industry Intelligence | External | CISO industry intelligence network and sources | Draft |
| A.5.25 | P9 Incident Management | Policy | SEC-POL-INC-009 §4 Severity classification (4-level); §5.2 Triage & Assessment | Draft |
| A.7.7 | ADUE Compliance | Technical | Auto-lock enforcement via compliance policy | Draft |
| A.8.3 | P2 M365 | Policy | §5.3 Private Channel Isolation; §5.4 L3 Dedicated Channels; §6.3 CA Default Block | Draft |
| A.6.7 | MAM | Technical | Mobile Application Management for data protection | Draft |
| A.5.9 | Intune BYOD Enrollment List | Evidence | BYOD device registration inventory from Intune | Draft |
| A.8.1 | ADUE | Technical | Apple User Enrollment prerequisite / compliance controls | Draft |
| A.8.13 | AFI Backup | Technical | Third-party Microsoft 365 backup | Draft |
| A.8.16 | Defender Dashboard | Technical | Defender monitoring dashboard | Draft |
| A.5.20 | P2 M365 | Policy | §3.3 External Sharing policy linkage | Draft |
| A.5.21 | P4 Supplier & Third-Party Security | Policy | Supplier management across ICT supply chain | Draft |
| A.8.7 | ADUE Compliance | Technical | Device compliance enforcement | Draft |
| A.5.21 | P1 BYOD | Policy | §7 Non-Managed App Security (MAM external SaaS controls) | Draft |
| A.5.36 | L1 ISP | Policy | §5 Policy review cycle linkage | Draft |
| A.5.31 | L1 ISP | Policy | §2 Regulatory alignment | Draft |
| A.8.18 | Entra ID RBAC | Technical | Admin tool access via role-based access control | Draft |
| A.5.3 | P2 M365 | Policy | §7 Admin Roles — Global Admin minimization, role-based privilege separation | Draft |
| A.8.28 | GitHub Code Scanning | Technical | GitHub code scanning for secure coding enforcement | Draft |
| A.8.12 | P1 BYOD | Policy | §6.4 MAM Control Scope (Copy/Paste restriction); §3.1 Windows Edge-only | Draft |
| A.5.29 | 100% Cloud Architecture | Technical | Cloud-only structure minimizes physical disruption risk | Draft |
| A.5.16 | P2 M365 | Policy | §4 Licence Tiers (3-SKU: Premium/Basic+P1/Exchange); §7 Admin Roles; §4.2 Business Standard prohibition | Draft |
| A.8.6 | M365 License Management | Technical | M365 license management + Cloud SaaS auto-scaling; on-premises capacity N/A | Draft |
| A.5.32 | Context Brief | Policy | §1 Data Ownership Matrix | Draft |
| A.8.24 | ADUE Encryption Requirement | Technical | ADUE compliance requires device encryption (FileVault/BitLocker) | Draft |
| A.8.34 | Audit Procedure (TBD) | Procedure | Audit testing access control procedure — to be documented | Draft |
| A.5.4 | L1 ISP | Policy | §4.1 CEO: resource allocation; CISO: strategic oversight | Draft |
| A.6.3 | P3 HR | Policy | §4.3 Onboarding briefing + annual refresher training | Draft |
| A.8.9 | ADUE Compliance Policies | Technical | Compliance policy enforcement | Draft |
| A.5.10 | P2 M365 | Policy | §3 Data Classification | Draft |
| A.6.5 | P3 HR | Policy | §4.5 Post-termination/transfer security obligations | Draft |
| A.8.8 | BYOD-PROC-02 | Procedure | Patch Management procedure | Draft |
| A.5.33 | SharePoint Document Management | Technical | SharePoint document management system | Draft |
| A.5.25 | BYOD-PROC-04 | Procedure | Monitoring section | Draft |
| A.8.28 | P7 ADG | Policy | §Secure Coding Guidelines | Draft |
| A.5.34 | P3 HR | Policy | Privacy section | Draft |
| A.5.24 | P9 Incident Management | Policy | SEC-POL-INC-009 §3 Roles/Responsibilities; §4 Classification (4-level Severity); §5.1 Detection sources; §7 Incident Register | Draft |
| A.7.2 | N/A | External | No physical entry controls — not applicable | Draft |
| A.6.7 | ADUE | Technical | Apple User Enrollment for BYOD compliance | Draft |
| A.5.20 | P4 Supplier & Third-Party Security | Policy | §3 Supplier Security Requirements; §5 Contractual Clauses | Draft |
| A.5.19 | P1 BYOD | Policy | §7 Non-Managed App Security (SaaS supplementary controls) | Draft |
| A.7.10 | P1 BYOD | Policy | Storage media section | Draft |
| A.8.2 | P2 M365 | Policy | §7 Admin Roles (§7.2 Admin Account Separation) | Draft |
| A.5.23 | EXT-03a | External | External reference for cloud service security | Draft |
| A.5.19 | P4 Supplier & Third-Party Security | Policy | SEC-POL-STP-005 — Supplier security requirements | Draft |
| A.5.33 | P2 M365 | Policy | §8.2 Audit Evidence Repository | Draft |
| A.8.30 | P4 Supplier Policy | Policy | Supplier security requirements for outsourced development | Draft |
| A.8.3 | P1 BYOD | Policy | §6.4 MAM Control Scope | Draft |
| A.5.11 | BYOD-PROC-01 | Procedure | Device change / offboarding — Selective Wipe procedure | Draft |
| A.8.7 | Microsoft Defender for Endpoint | Technical | Endpoint protection platform | Draft |
| A.5.4 | P2 M365 | Policy | §7.1 CEO: Executive sponsor of ISMS | Draft |
| A.8.29 | P7 ADG | Policy | §Testing Procedures — proportionate application at current scale | Draft |
| A.5.30 | M365 SLA 99.9% | Technical | M365 built-in availability + data backup | Draft |
| A.8.19 | Updatest | Evidence | Software inventory evidence | Draft |
| A.8.15 | Microsoft Defender Alerts | Technical | Defender alert logging | Draft |
| A.8.4 | GitHub Access Control | Technical | GitHub access control + SAML SSO | Draft |
| A.8.17 | Cloud NTP Synchronization | Technical | Cloud services auto-NTP sync; no self-managed servers | Draft |
| A.8.5 | Conditional Access | Technical | Premium: Device Compliance; Basic+P1: SPO Block | Draft |
| A.5.11 | P1 BYOD | Policy | §6.5 Selective Wipe Notice | Draft |
| A.8.21 | M365/Cloud SLA | Technical | M365/Cloud SLA + CA-based network location policy (if needed) | Draft |
| A.5.37 | BYOD-PROC-01 | Procedure | Device Lifecycle procedure | Draft |
| A.8.13 | Microsoft 365 built-in backup/restore | Technical | Baseline Microsoft 365 backup/retention capabilities (as used in operations) | Draft |
| A.8.23 | Defender for Endpoint Web Protection | Technical | Web protection + limited BYOD applicability | Draft |
| A.8.16 | BYOD-PROC-04 | Procedure | Monitoring section | Draft |
| A.8.1 | Conditional Access (CA) | Technical | Access gating for BYOD conditions | Draft |
| A.5.8 | P7 ADG | Policy | Security review procedure section | Draft |
| A.8.24 | M365 TLS/BitLocker | Technical | M365 encryption at rest (BitLocker) and in transit (TLS 1.2+) | Draft |
| A.6.5 | P1 BYOD | Policy | §6.5 Selective Wipe Notice | Draft |
| A.8.32 | Intune Policy Change Logs | Technical | Intune policy change audit trail | Draft |
| A.8.19 | P1 BYOD | Policy | §7 Non-Managed App Security (MAM external app supplementary controls: account separation, 2FA, AI service controls) | Draft |
| A.5.1 | L2 Domain Policies (P1–P9) | Policy | P1–P7 complete; P8 Asset Management / P9 Incident Management in progress | Draft |
| A.8.14 | M365 SLA 99.9% | Technical | M365 SLA 99.9% + AWS availability zones; self-managed redundancy N/A | Draft |
| A.5.26 | BYOD-PROC-04 | Procedure | Incident response procedures | Draft |
| A.5.5 | P5 BCP | Policy | Incident reporting procedure section | Draft |
| A.5.5 | L1 ISP | Policy | §4 CISO: regulatory liaison role | Draft |
| A.6.6 | P4 Supplier & Third-Party Security | Policy | Third-party NDA requirements | Draft |
| A.7.14 | BYOD-PROC-01 | Procedure | Device change/disposal — Selective Wipe | Draft |
| A.5.2 | L1 ISP | Policy | §4 Governance Structure (CEO, CISO, Security Director) | Draft |
| A.5.21 | SaaS Category Framework | Technical | A/B/C category-based supplier control differentiation | Draft |
| A.8.5 | Entra ID MFA | Technical | Security Defaults — MFA enforced for all users | Draft |
| A.5.37 | Additional Operational Procedures (Planned) | Procedure | Audit, management review, and other operational procedures — to be developed | Draft |
| A.8.5 | ADUE Compliance | Technical | Apple User Enrollment compliance enforcement | Draft |
| A.6.7 | P1 BYOD | Policy | §3.1 Windows BYOD Edge-only restriction; §6 Privacy Boundary; §7 MAM external app controls — 100% WFA environment | Draft |
| A.5.25 | P2 M365 | Policy | §8 Monitoring | Draft |
| A.6.2 | P3 HR | Policy | §4.2 Employment agreements + NDA | Draft |
| A.7.14 | CA100 Redkey | Technical | Physical destruction guide for hardware encrypted USB | Draft |
| A.8.25 | P7 ADG | Policy | §SDLC — Secure Development Lifecycle requirements | Draft |
| A.5.22 | P1 BYOD | Policy | §7.2 SaaS Category-based security assessment | Draft |
| A.8.10 | M365 Retention Policies | Technical | Data retention and deletion policies | Draft |
| A.8.16 | P2 M365 | Policy | §8.1 Ongoing Monitoring (weekly/monthly/quarterly schedule) | Draft |
| A.5.13 | P2 M365 | Policy | §3.2 Classification Principles — channel-based classification (Platform = Policy); §3.2(3) Purview Sensitivity Labels non-use rationale documented | Draft |
| A.8.11 | Teams Channel Isolation | Technical | Data access restricted by Teams channel isolation; no separate masking tools used | Draft |
| A.5.3 | L1 ISP | Policy | §4 Segregation of duties (CEO↔CISO↔Security Director) | Draft |
| A.8.1 | P1 BYOD | Policy | §3 Zero Trust; §3.1 Windows Edge-only restriction; §3.2 Full MDM exception path; §6 Privacy Boundary; §7 MAM controls | Draft |
| A.5.11 | P3 HR | Policy | Offboarding procedure section | Draft |
| A.7.6 | N/A | External | No secure areas — not applicable | Draft |
| A.5.1 | BYOD-PROC-01~04 | Procedure | Device Lifecycle; Patch Management; Access Control & Data Protection; Monitoring & Incident Response | Draft |
| A.7.13 | P1 BYOD | Policy | Equipment management section | Draft |
| A.5.24 | BYOD-PROC-04 | Procedure | Incident response section | Draft |
| A.5.31 | P4 Supplier & Third-Party Security | Policy | Contract management section | Draft |
| A.5.19 | SaaS Category Framework | Technical | A/B/C/D category framework for SaaS risk classification | Draft |
| A.5.18 | BYOD-PROC-03 | Procedure | Access rights section | Draft |
| A.5.22 | SaaS Periodic Review | Evidence | Regular SaaS service review | Draft |
| A.6.8 | P3 HR | Policy | Security incident reporting obligation | Draft |