1. ISO/IEC 27001:2022 - Information security, cybersecurity and privacy protection — Information security management systems — Requirements.
Annex A, Clause 8 (Technological controls): This section lists controls implemented via technology. Control A.8.24 Use of cryptography directly corresponds to encryption.
Annex A, Clause 5 (Organizational controls): This section lists administrative controls. Control A.5.1 Policies for information security and A.5.15 Access control correspond to security policies and the definition of user roles, respectively.
Annex A, Clause 7 (Physical controls): This section lists physical controls. Control A.7.10 Storage media addresses the physical protection of media, which is central to the "safe storage of backups."
2. Peltier, T. R. (2013). Information Security Fundamentals (2nd ed.). CRC Press.
Chapter 4, "Security Management Concepts and Principles," pp. 55-57: This university-level textbook clearly distinguishes between three classes of security controls: administrative, technical (logical), and physical. It explicitly categorizes encryption as a technical control and policies/procedures as administrative controls.
3. Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson.
Chapter 1, "Overview," Section 1.4, "Computer Security Challenges": This text, widely used in university computer science curricula, classifies security controls. It places cryptography and access control mechanisms (the software part) under technical controls, while policies, procedures, and personnel management are classified as administrative or management controls.