ISO 27001 is the internationally recognized standard for Information Security Management Systems (ISMS). Certification demonstrates to customers, partners, and regulators that your organization takes information security seriously and follows a systematic approach to managing sensitive data.
š„ Free Cloud Security Framework Cheat Sheet
Includes ISO 27001 clause structure, Annex A controls, certification process, and framework mapping.
Download Free PDF āTable of Contents
- ISO 27001 Overview
- 2022 Revision Changes
- ISMS Clauses (4-10)
- Annex A Controls
- Risk Assessment Process
- Certification Process
- Costs & Timeline
- Statement of Applicability
- ISO 27001 for Cloud
- Best Practices
ISO 27001 Overview
ISO 27001 is published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). It specifies requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).
Key characteristics:
- Risk-based ā Controls are selected based on risk assessment, not a one-size-fits-all checklist
- Certifiable ā Third-party auditors can certify your ISMS
- Globally recognized ā Accepted across industries and countries
- Continuous improvement ā Plan-Do-Check-Act (PDCA) cycle built in
- Flexible scope ā You define which parts of your organization are covered
2022 Revision Changes
ISO 27001:2022 introduced significant changes to the Annex A controls:
| Aspect | ISO 27001:2013 | ISO 27001:2022 |
|---|---|---|
| Annex A Controls | 114 controls in 14 domains | 93 controls in 4 themes |
| New Controls | N/A | 11 new controls added |
| Themes | 14 domains (A.5-A.18) | 4 themes (Org, People, Physical, Tech) |
| Attributes | Not available | 5 attributes per control (#tags) |
11 New Controls in 2022
- A.5.7 ā Threat intelligence
- A.5.23 ā Information security for cloud services
- A.5.30 ā ICT readiness for business continuity
- A.7.4 ā Physical security monitoring
- A.8.9 ā Configuration management
- A.8.10 ā Information deletion
- A.8.11 ā Data masking
- A.8.12 ā Data leakage prevention
- A.8.16 ā Monitoring activities
- A.8.23 ā Web filtering
- A.8.28 ā Secure coding
ISMS Clauses (4-10)
| Clause | Title | Key Requirements |
|---|---|---|
| 4 | Context of the Organization | Understand context, stakeholder needs, ISMS scope definition |
| 5 | Leadership | Management commitment, security policy, roles and responsibilities |
| 6 | Planning | Risk assessment, risk treatment plan, security objectives |
| 7 | Support | Resources, competence, awareness, communication, documented information |
| 8 | Operation | Execute risk treatment plans, implement controls |
| 9 | Performance Evaluation | Monitoring, measurement, internal audits, management review |
| 10 | Improvement | Nonconformity, corrective actions, continual improvement |
Annex A Control Themes (93 Controls)
| Theme | Controls | Examples |
|---|---|---|
| Organizational (A.5) | 37 | Policies, roles, threat intel, asset management, access control, supplier security |
| People (A.6) | 8 | Screening, terms & conditions, awareness, remote working, reporting |
| Physical (A.7) | 14 | Physical perimeters, entry control, securing offices, equipment protection |
| Technological (A.8) | 34 | Endpoint devices, access rights, cryptography, secure development, logging |
Risk Assessment Process
ISO 27001 requires a systematic risk assessment process. The standard does not mandate a specific methodology, but most organizations follow:
- Identify assets ā List all information assets within the ISMS scope
- Identify threats ā What could harm each asset? (hackers, natural disasters, insider threats)
- Identify vulnerabilities ā What weaknesses could be exploited?
- Assess likelihood ā How likely is each threat-vulnerability combination?
- Assess impact ā What would the business impact be?
- Calculate risk level ā Likelihood x Impact = Risk Score
- Risk treatment ā For each risk: Mitigate (apply controls), Accept (document), Transfer (insurance), or Avoid (stop activity)
Certification Process
- Gap Analysis (2-4 weeks) ā Assess current state against ISO 27001
- ISMS Design (4-8 weeks) ā Define scope, risk methodology, create SoA
- Implementation (8-16 weeks) ā Deploy controls, train staff, establish processes
- Internal Audit (2-4 weeks) ā Verify ISMS effectiveness
- Management Review (1 week) ā Leadership reviews ISMS performance
- Stage 1 Audit (1-2 days) ā Documentation review by certification body
- Stage 2 Audit (3-5 days) ā On-site implementation verification
- Certification (3 years) ā With annual surveillance audits
Costs & Timeline
| Organization Size | Timeline | Estimated Cost | Annual Maintenance |
|---|---|---|---|
| Small (1-50 employees) | 3-6 months | $15,000-$25,000 | $5,000-$10,000/year |
| Medium (50-250) | 6-12 months | $25,000-$60,000 | $10,000-$20,000/year |
| Large (250+) | 12-18 months | $60,000-$150,000+ | $15,000-$30,000/year |
Statement of Applicability (SoA)
The Statement of Applicability is one of the most important documents in ISO 27001. It lists all 93 Annex A controls and for each one states:
- Whether the control is applicable to your ISMS scope
- If applicable: how it is implemented and its current status
- If not applicable: justification for exclusion
ISO 27001 for Cloud Environments
For cloud-specific guidance, ISO 27017 (cloud security controls) and ISO 27018 (cloud privacy) extend ISO 27001:
- ISO 27017 ā Additional cloud-specific controls and guidance for both cloud service providers and customers
- ISO 27018 ā Protection of personally identifiable information (PII) in public clouds
- A.5.23 (new in 2022) ā Explicitly requires addressing information security for cloud services
Best Practices
- Get leadership commitment first ā ISO 27001 requires demonstrated management support
- Start with a gap analysis ā Know where you stand before planning implementation
- Keep scope manageable ā Start with a focused scope, expand later
- Use the PDCA cycle ā Plan, Do, Check, Act ensures continuous improvement
- Integrate with existing processes ā Don't create a parallel management system
- Document pragmatically ā Quality over quantity; auditors want evidence of effective controls
- Train everyone ā Security awareness is a mandatory Annex A control (A.6.3)
- Prepare for surveillance audits ā Maintain your ISMS year-round, not just before audits
š„ Download the Cloud Security Cheat Sheet
ISO 27001 clause structure, Annex A controls, certification process, and framework cross-reference.
Download Free PDF ā