šŸŽ New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

ISO 27001 Complete Guide: ISMS, Annex A Controls & Certification (2026)

ISO 27001 Complete Guide: ISMS, Annex A Controls & Certification (2026)

ISO 27001 is the internationally recognized standard for Information Security Management Systems (ISMS). Certification demonstrates to customers, partners, and regulators that your organization takes information security seriously and follows a systematic approach to managing sensitive data.

ISO 27001 Information Security Management

šŸ“„ Free Cloud Security Framework Cheat Sheet

Includes ISO 27001 clause structure, Annex A controls, certification process, and framework mapping.

Download Free PDF →

Table of Contents

ISO 27001 Overview

ISO 27001 is published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). It specifies requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).

Key characteristics:

  • Risk-based — Controls are selected based on risk assessment, not a one-size-fits-all checklist
  • Certifiable — Third-party auditors can certify your ISMS
  • Globally recognized — Accepted across industries and countries
  • Continuous improvement — Plan-Do-Check-Act (PDCA) cycle built in
  • Flexible scope — You define which parts of your organization are covered

2022 Revision Changes

ISO 27001:2022 introduced significant changes to the Annex A controls:

AspectISO 27001:2013ISO 27001:2022
Annex A Controls114 controls in 14 domains93 controls in 4 themes
New ControlsN/A11 new controls added
Themes14 domains (A.5-A.18)4 themes (Org, People, Physical, Tech)
AttributesNot available5 attributes per control (#tags)

11 New Controls in 2022

  • A.5.7 — Threat intelligence
  • A.5.23 — Information security for cloud services
  • A.5.30 — ICT readiness for business continuity
  • A.7.4 — Physical security monitoring
  • A.8.9 — Configuration management
  • A.8.10 — Information deletion
  • A.8.11 — Data masking
  • A.8.12 — Data leakage prevention
  • A.8.16 — Monitoring activities
  • A.8.23 — Web filtering
  • A.8.28 — Secure coding

ISMS Clauses (4-10)

ClauseTitleKey Requirements
4Context of the OrganizationUnderstand context, stakeholder needs, ISMS scope definition
5LeadershipManagement commitment, security policy, roles and responsibilities
6PlanningRisk assessment, risk treatment plan, security objectives
7SupportResources, competence, awareness, communication, documented information
8OperationExecute risk treatment plans, implement controls
9Performance EvaluationMonitoring, measurement, internal audits, management review
10ImprovementNonconformity, corrective actions, continual improvement

Annex A Control Themes (93 Controls)

ThemeControlsExamples
Organizational (A.5)37Policies, roles, threat intel, asset management, access control, supplier security
People (A.6)8Screening, terms & conditions, awareness, remote working, reporting
Physical (A.7)14Physical perimeters, entry control, securing offices, equipment protection
Technological (A.8)34Endpoint devices, access rights, cryptography, secure development, logging

Risk Assessment Process

ISO 27001 requires a systematic risk assessment process. The standard does not mandate a specific methodology, but most organizations follow:

  1. Identify assets — List all information assets within the ISMS scope
  2. Identify threats — What could harm each asset? (hackers, natural disasters, insider threats)
  3. Identify vulnerabilities — What weaknesses could be exploited?
  4. Assess likelihood — How likely is each threat-vulnerability combination?
  5. Assess impact — What would the business impact be?
  6. Calculate risk level — Likelihood x Impact = Risk Score
  7. Risk treatment — For each risk: Mitigate (apply controls), Accept (document), Transfer (insurance), or Avoid (stop activity)

Certification Process

  1. Gap Analysis (2-4 weeks) — Assess current state against ISO 27001
  2. ISMS Design (4-8 weeks) — Define scope, risk methodology, create SoA
  3. Implementation (8-16 weeks) — Deploy controls, train staff, establish processes
  4. Internal Audit (2-4 weeks) — Verify ISMS effectiveness
  5. Management Review (1 week) — Leadership reviews ISMS performance
  6. Stage 1 Audit (1-2 days) — Documentation review by certification body
  7. Stage 2 Audit (3-5 days) — On-site implementation verification
  8. Certification (3 years) — With annual surveillance audits

Costs & Timeline

Organization SizeTimelineEstimated CostAnnual Maintenance
Small (1-50 employees)3-6 months$15,000-$25,000$5,000-$10,000/year
Medium (50-250)6-12 months$25,000-$60,000$10,000-$20,000/year
Large (250+)12-18 months$60,000-$150,000+$15,000-$30,000/year

Statement of Applicability (SoA)

The Statement of Applicability is one of the most important documents in ISO 27001. It lists all 93 Annex A controls and for each one states:

  • Whether the control is applicable to your ISMS scope
  • If applicable: how it is implemented and its current status
  • If not applicable: justification for exclusion

ISO 27001 for Cloud Environments

For cloud-specific guidance, ISO 27017 (cloud security controls) and ISO 27018 (cloud privacy) extend ISO 27001:

  • ISO 27017 — Additional cloud-specific controls and guidance for both cloud service providers and customers
  • ISO 27018 — Protection of personally identifiable information (PII) in public clouds
  • A.5.23 (new in 2022) — Explicitly requires addressing information security for cloud services

Best Practices

  1. Get leadership commitment first — ISO 27001 requires demonstrated management support
  2. Start with a gap analysis — Know where you stand before planning implementation
  3. Keep scope manageable — Start with a focused scope, expand later
  4. Use the PDCA cycle — Plan, Do, Check, Act ensures continuous improvement
  5. Integrate with existing processes — Don't create a parallel management system
  6. Document pragmatically — Quality over quantity; auditors want evidence of effective controls
  7. Train everyone — Security awareness is a mandatory Annex A control (A.6.3)
  8. Prepare for surveillance audits — Maintain your ISMS year-round, not just before audits

šŸ“„ Download the Cloud Security Cheat Sheet

ISO 27001 clause structure, Annex A controls, certification process, and framework cross-reference.

Download Free PDF →

Related Articles

Share this article:
Dargslan Editorial Team (Dargslan)
About the Author

Dargslan Editorial Team (Dargslan)

Collective of Software Developers, System Administrators, DevOps Engineers, and IT Authors

Dargslan is an independent technology publishing collective formed by experienced software developers, system administrators, and IT specialists.

The Dargslan editorial team works collaboratively to create practical, hands-on technology books focused on real-world use cases. Each publication is developed, reviewed, and...

Programming Languages Linux Administration Web Development Cybersecurity Networking

Stay Updated

Subscribe to our newsletter for the latest tutorials, tips, and exclusive offers.