The ISO 27001:2022 Manual, Complete Framework Guide

The ISO 27001 framework is flexible enough to adapt to your needs while maintaining a strong focus on risk management and compliance.

ISO 27001:2022 Structure

ISO 27001 2022 is split into two main parts:

  1. Clauses 4 to 10: These focus on the management system requirements, laying the foundation for how an ISMS should be implemented and maintained.
  2. Annex A Controls: This is the ISO 27001 controls list also known as the ISO 27002 2022, a set of security measures to address specific risks.

ISO 27001:2022 Clauses

The ISO 27001 framework is built around a series of clauses that outline the steps for implementing and maintaining an effective ISMS. Excluding any of the requirements specified in Clauses 4 to 10 is not acceptable when you are trying to achieve compliance for the ISO 27001:2022.

  • Clause 4: Context of the Organization
  • Clause 5: Leadership
  • Clause 6: Planning
  • Clause 7: Support
  • Clause 8: Operation
  • Clause 9: Performance Evaluation
  • Clause 10: Improvement

ISO 27002:2022 Controls

Annex A, the heart of ISO 27001, contains the ISO 27001 Controls List—a set of 93 specific security controls that your organization can implement to protect your assets. The ISO 27002 2022 Controls are organized into four themes:

  • 5.Organizational Controls (37): Policies, procedures, and governance strategies.
  • 6.People Controls (8): Measures to manage personnel-related risks.
  • 7.Technological Controls (14): Security features like encryption and secure configurations.
  • 8.Physical Controls (34): Strategies to protect physical assets and locations.

Resource: ISO 27002 2022 Controls Spreadsheet

ISO 27001:2022 Clauses List

4 Context of the organization
Clause 4.1  – Understanding the organization and its context
Clause 4.2 – Understanding the needs and expectations of interested parties
Clause 4.3 – Determining the scope of the information security management system
Clause 4.4 – Information security management system
Clause 5.1 – Leadership and commitment
Clause 5.2 – Policy
Clause 5.3 – Organizational roles, responsibilities and authorities
Clause 6.1 – Actions to address risks and opportunities
Clause 6.1.1 – General
Clause 6.1.2 – Information security risk assessment
Clause 6.1.3 – Information security risk treatment
Clause 6.2 – Information security objectives and planning to achieve them
Clause 6.3 – Planning of changes
Clause 7.1 – Resources
Clause 7.2 – Competence
Clause 7.3 – Awareness
Clause 7.4 – Communication
Clause 7.5 – Documented information
Clause 7.5.1 – General
Clause 7.5.2 – Creating and updating
Clause 7.5.3 – Control of documented information
Clause 8.1 – Operational planning and control
Clause 8.2 – Information security risk assessment
Clause 8.3 – Information security risk treatment

 

Clause 9.1 – Monitoring, measurement, analysis and evaluation
Clause 9.2 – Internal audit
Clause 9.2.1 – General
Clause 9.2.2 – Internal audit programme
Clause 9.3 – Management review
Clause 9.3.1 – General
Clause 9.3.2 – Management review inputs
Clause 9.3.3 – Management review results
Clause 10.1 – Continual improvement
Clause 10.2 – Nonconformity and corrective action

ISO 27002:2022 Controls List

5 Organizational Controls
Control 5.1 – Policies for Information Security
Control 5.2 – Information Security Roles and Responsibilities
Control 5.3 – Segregation of Duties
Control 5.4 – Management Responsibilities
Control 5.5– Contact with Authorities
Control 5.6 – Contact with Special Interest Groups
Control 5.7 – Threat Intelligence
Control 5.8 – Information Security in Project Management
Control 5.9 – Inventory of Information and other Associated Assets
Control 5.10 – Acceptable use of Information and Other Associated Assets
Control 5.11 – Return of Assets
Control 5.12 – Classification of Information
Control 5.13 – Labelling of Information
Control 5.14 – Information Transfer
Control 5.15 – Access Control
Control 5.16 – Identity Management
Control 5.17 – Authentication Information
Control 5.18 – Access Rights
Control 5.19 – Information security in supplier relationships
Control 5.20 – Addressing information security within supplier agreements
Control 5.21 – Managing information security in the ICT supply chain
Control 5.22 – Monitoring, review and change management of supplier services
Control 5.23 – Information security for use of cloud services
Control 5.24 – Information security incident management planning and preparation
Control 5.25 – Assessment and decision on information security events
Control 5.26 – Response to information security incidents
Control 5.27 – Learning from information security incidents
Control 5.28 – Collection of evidence
Control 5.29 – Information security during disruption
Control 5.30 – ICT readiness for business continuity
Control 5.31 – Legal, statutory, regulatory and contractual requirements
Control 5.32 – Intellectual property rights
Control 5.33 – Protection of records
Control 5.34 – Privacy and protection of PII
Control 5.35 – Independent review of information security
Control 5.36 – Compliance with policies, rules and standards for information security
Control 5.37 – Documented operating procedures
Control 6.1 – Screening
Control 6.2 – Terms and conditions of employment
Control 6.3 – Information security awareness, education and training
Control 6.4 – Disciplinary process
Control 6.5 – Responsibilities after termination or change of employment
Control 6.6 – Confidentiality or non-disclosure agreements
Control 6.7 – Remote working
Control 6.8 – Information security event reporting
Control 7.1 – Physical security perimeters
Control 7.2 – Physical entry
Control 7.3 – Securing offices, rooms and facilities
Control 7.4 – Physical security monitoring
Control 7.5 – Protecting against physical and environmental threats
Control 7.6 – Working in secure areas
Control 7.7 – Clear desk and clear screen
Control 7.8 – Equipment siting and protection
Control 7.9 – Security of assets off-premises
Control 7.10 – Storage media
Control 7.11 – Supporting utilities
Control 7.12 – Cabling security
Control 7.13 – Equipment maintenance
Control 7.14 – Secure disposal or re-use of equipment
Control 8.1 – User endpoint devices
Control 8.2 – Privileged access rights
Control 8.3 – Information access restriction
Control 8.4 – Access to source code
Control 8.5 – Secure authentication
Control 8.6 – Capacity management
Control 8.7 – Protection against malware
Control 8.8 – Management of technical vulnerabilities
Control 8.9 – Configuration management
Control 8.10 – Information deletion
Control 8.11 – Data masking
Control 8.12 – Data leakage prevention
Control 8.13 – Information backup
Control 8.14 – Redundancy of information processing facilities
Control 8.15 – Logging
Control 8.16 – Monitoring activities
Control 8.17 – Clock synchronization
Control 8.18 – Use of privileged utility programs
Control 8.19 – Installation of software on operational systems
Control 8.20 – Networks security
Control 8.21 – Security of network services
Control 8.22 – Segregation of networks
Control 8.23 – Web filtering
Control 8.24 – Use of cryptography
Control 8.25 – Secure development life cycle
Control 8.26 – Application security requirements
Control 8.27 – Secure system architecture and engineering principles
Control 8.28 – Secure coding
Control 8.29 – Security testing in development and acceptance
Control 8.30 – Outsourced development
Control 8.31 – Separation of development, test and production environments
Control 8.32 – Change management
Control 8.33 – Test information
Control 8.34 – Protection of information systems during audit testing

ISO 27001 Policies and Templates for Implementation

When it comes to achieving ISO 27001 compliance, having the right policies in place is mandatory. These policies form the core of your ISMS, enabling your organization to maintain effect and aligned with the ISO 27001 framework.

Creating these policies from zero will require a lot of resources from your organization. That’s why we create ISO 27001 Policy Templates. They simplify the process, providing your organization with ready-made, editable solutions that save you a lot of time

The Differences: ISO 27001:2022 - ISO 27002:2022

ISO 27001 are the Clauses” and the “What”—it specifies the requirements for an ISMS, detailing what needs to be done to establish, implement, maintain, and continually improve information security. ISO 27002 are the Controls and the “how”—it contains detailed controls which need to be implemented based on your Statement of Applicability.

Checkout our dedicated page on ISO 27002 VS 27001 for more details.


ISO 27001 27002: A Side-by-Side Comparison

Here’s a closer look at how ISO 27001 27002 work together:

AspectISO 27001 ClausesISO 27002 Controls
PurposeSpecifies requirements for an ISMSProvides implementation guidance for controls
FocusRisk management and compliance frameworkPractical advice and detailed control descriptions
Mandatory?Yes, for certificationYes, depending on SoA 
StructureClauses 4–10 and Annex A (controls list)Expanded descriptions of Annex A controls
Target AudienceOrganizations seeking certificationSecurity practitioners implementing controls
Updates in 2022Simplified controls list (93 controls)Extended information controls list (93 controls)

How They Fit-in Each Other

The two standards work together seamlessly:

  • ISO 27001:2022 Clauses: Outlining the requirements for establishing an ISMS.
  • ISO 27002:2022 Controls: Providing a deeper understanding of each control.

Building Your ISO 27001 Framework

 Creating an effective ISO 27001 framework is all about structure and planning. Here’s how you can get started:

1. Understand Your Organizational Context

Every organization is unique, so the first step is defining the scope of your ISMS. Consider:

  • Internal Factors: What are your business goals, processes, and key assets?
  • External Factors: What regulatory requirements or client expectations apply?

Tip: Use a Scope Statement Template to clearly define the boundaries of your ISMS. This document helps auditors understand what’s covered by your ISMS.


2. Gain Leadership Commitment

ISO 27001 success depends on top management support. Leadership must:

  • Allocate resources (budget, time, and staff).
  • Define an information security policy.
  • Promote a culture of information security throughout the organization.

3. Conduct a Risk Assessment

Risk assessment is at the core of ISO 27001. Identify and evaluate risks to your information assets, then decide how to treat them.

  • Steps to Perform Risk Assessment:
    1. Identify assets and their vulnerabilities.
    2. Analyze potential threats and their likelihood.
    3. Determine the impact of risks on your organization.
    4. Develop a risk treatment plan linked to Annex A controls.

Tip: Use our ISO 27001 Risk Assessment Spreadsheet to simplify the process and ensure consistency.


4. Develop Mandatory Policies and Procedures

ISO 27001 requires several policies to support your ISMS, such as:

  • Access Control Policy
  • Risk Management Policy
  • Information Security Policy

Resource Tip: Download our customizable ISO 27001 policy templates to save time and effort.


5. Implement Controls from Annex A

Once your risks are identified, it’s time to implement controls from the ISO 27002 Controls List in Annex A. These controls address everything from physical security to technical firewalls.

Example: If a risk involves unauthorized access to sensitive data, implement controls like multi-factor authentication and access logging.


6. Train Your Employees

Your ISMS is only as strong as the people managing it. Conduct regular training sessions to ensure employees understand their roles and responsibilities in protecting information.


7. Monitor, Measure, and Audit

ISO 27001 emphasizes continuous improvement. Set up a system to:

  • Monitor security incidents.
  • Measure the effectiveness of your controls.
  • Conduct regular internal audits to identify gaps.

Tip: Use a Statement of Applicability (SOA) Template to document which controls are implemented and why, making audits smoother.


Using the ISO 27001 Controls List to Mitigate Risks

The ISO 27001 Controls List in Annex A is your reference for managing risks. How to use it effectively:

1. Align Controls with Risks

Every control in Annex A is designed to address specific risks. For example:

  • Access Control: Mitigates risks related to unauthorized access.
  • Operational Security: Protects against system failures and malware.

2. Focus on the 4 Categories

The controls are divided into four categories in the 2022 version:

  • Organizational Controls: Policies, governance, and processes.
  • People Controls: Employee training and screening.
  • Technological Controls: Encryption, firewalls, and secure configurations.
  • Physical Controls: Secure facilities and equipment.

3. Use Templates and Tools

For more efficient implementation, use tools like:

  • SOA Templates: Clearly document your selected controls.
  • Risk Assessment Spreadsheets: Map risks to controls.
  • Policy Templates: Ensure your policies align with control requirements.

It makes a differents

Significance of ISO/IEC 27001

Framework

ISO 27001 structure provides a systematic approach to information security management.

Risk Management

Emphasizing a risk-based approach, ISO 27001 ensures that risks are assessed, treated, and monitored systematically.

Adaptability and Relevance

The flexible nature of ISO 27001 allows it to be applied across various organizational types.

Risk Assessment and Treatment

This component involves identifying and analyzing risks to your organization’s information security.

Organization-Specific Controls

Beyond the standard ISO 27001 controls list, the standard allows organizations to develop additional controls.

Continual Improvement

ISO 27001 demands ongoing review and adaptation of the ISMS to address new threats.

A Mature Security Posture

When you have successfully implements ISO/IEC 27001, it achieves a thorough and dynamic framework that significantly increases your information security management. The benefits of this implementation extend across various facets of your organization.

Trust with Stakeholders

In competitive markets, having an ISO/IEC 27001 certification can serve as a key differentiator, demonstrating a proven commitment to information security and risk management.

Operational Efficiency

The process of aligning with ISO/IEC 27001 often leads to more streamlined and efficient operational processes.

Cultural Shift Towards Security

This shift encourages your organizational culture that values security, with employees becoming more aware and proactive about protecting organizational assets.