← Back to AnnexesCrosswalk Overview

ISO/IEC 27001 Crosswalk

Protective Computing complements ISO/IEC 27001 by turning high-level security and availability goals into user-protective behavior claims with explicit boundaries.

Protective controlISO 27001 areaTranslationEvidence
No master keys / operator non-possessionCryptography and access controlRequires public declaration that operators cannot decrypt user content through a hidden administrative path.reference packet
ReversibilityIntegrity and recoverabilityAdds user-facing restore and bounded destructive actions to standard recoverability posture.reversibility boundary table
Degraded FunctionalityAvailability and continuityNarrows availability to essential-path survival under bandwidth, power, and input constraints.degraded mode matrix