ISO 27001 is a globally recognized standard for information security management systems (ISMS). It provides businesses of all sizes and public organizations with a structured framework for systematically managing and continuously improving information security—and for demonstrating this through independent certification.

Annex A of ISO 27001 provides a comprehensive list of 93 security-specific controls and their protection objectives. These help organizations address identified information security risks and effectively implement the standard’s requirements. The controls are based on the guidelines of ISO/IEC 27002 and form a central foundation for a risk-based ISMS.

Note: The statements referred to as “controls” in Annex A of ISO 27001 are actually individual objectives (controls). They describe what a standard-compliant outcome of appropriate (individual) controls should look like.

Why does ISO 27001 include Annex A?

ISO 27001 defines the structural and procedural framework for an information security management system. This means it sets out the requirements that a company or organization must meet to establish, operate, and continuously improve such a system. However, the standard does not provide specific guidance on how to implement these requirements.

This is where Annex A comes in: it lists a series of specific information security measures that organizations can implement to meet the requirements. The description in Annex A is intentionally kept at an abstract level, and the objectives of the security measures (controls) are also described only briefly.

Cover sheet for white paper ISO 27001 Annex A new controls with PDF
Loading...
Free White Paper

ISO 27001 – Controls in Annex A

With the revised ISO/IEC 27001:2022 and the new, up-to-date information security controls (controls) in the normative Annex A, you can ensure that your organization is optimally protected against modern threats.

Benefit from our experts’ know-how. Learn everything about the 11 new and 24 consolidated controls and what to consider during implementation.

The ISO 27002 standard goes into much greater detail: It builds on the measures outlined in Annex A, provides concrete implementation guidance, illustrative examples, and best practices, thereby offering a comprehensive guide for practical implementation.

 

What does Annex A contain?

As ISO 27001 continues to evolve, Annex A is also continuously revised and adapted to developments in the field of information security. In the current version of the standard, ISO/IEC 27001:2022, Annex A comprises 93 controls, organized into four subject areas:

  • Organizational controls
  • Personal controls
  • Physical controls
  • Technological controls

 

Which controls from Annex A are the most important?

ISO/IEC 27001 serves as a universal standard for a wide variety of organizations across numerous industries. It therefore addresses a very diverse target audience with a wide range of needs and requirements.

technical-measures-information-security-dqs-servers-cabinet-with-grid-door-and-lockable-door-handle
Loading...

ISO 27001 certification

How much effort should you expect to put into getting your information security management system certified to ISO 27001? Find out more.

Given this diversity, Annex A should not be viewed as a rigid, prescriptive set of measures, but rather as a comprehensive toolkit for information security. Depending on their needs and risk analysis, organizations can select precisely those measures that are relevant to their specific requirements.

The relevance of individual measures therefore varies depending on the industry, type, and infrastructure of organizations and companies.

 

How do companies identify relevant measures?

Organizations are not required to implement all measures listed in ISO 27001 Annex A. Rather, successful certification requires identifying and implementing measures tailored to their needs based on a risk analysis.

After conducting a comprehensive inventory of all physical and digital assets, companies must subject them to a careful risk assessment. Following the assessment, the appropriate measures for risk treatment can finally be selected.

Cover sheet for English White Paper ISO 27001 Process Orientation
Loading...
Free Whitepaper

Process orientation in ISO 27001

To support a process-oriented audit of your ISMS, we have consolidated the standard requirements and the 93 information security measures listed in Appendix A into a graphical process map featuring 18 ISMS processes (4 management processes, 14 operational processes).

Take advantage of our standards experts’ expertise today.

Expertise and Trust

Certified companies value management systems as tools for top management that create transparency, reduce complexity, and provide assurance. However, management systems do even more: When assessed and certified by a neutral and independent third party such as DQS, they build trust among stakeholders in your company’s performance.

Many organizations still view certification as merely a compliance check. Our clients, on the other hand, see it as an opportunity to focus specifically on factors critical to success and the results of your management system. Because: Our commitment begins where audit checklists end. Take us at our word.

Note: For the sake of readability, we use the generic masculine form. However, the directive generally includes persons of all gender identities, to the extent necessary for the statement.

Author

André Saeckel

Product manager at DQS for information security management. As a standards expert for the area of information security and IT security catalog (critical infrastructures), André Säckel is responsible for the following standards and industry-specific standards, among others: ISO 27001, ISIS12, ISO 20000-1, KRITIS and TISAX (information security in the automotive industry). He is also a member of the ISO/IEC JTC 1/SC 27/WG 1 working group as a national delegate of the German Institute for Standardization DIN.

Loading...

You Might Also Enjoy These Reads

Discover more articles that dive deep into related themes and ideas.
Blog
Loading...

AWS and Azure Are ISO 27001 Certified — But That Doesn't Mean Your Company Is

Blog
Loading...

NIS-2 for Managing Directors: Duties, Liability, and Implementation

Blog
Loading...

Why ISO 42001 is the Essential Strategic Upgrade to Your ISO 27001 Certification