ISO 27001 Annex A Controls
ISO 27001:2022 includes 93 controls across 4 themes. Here is what each control requires, with implementation priority guidance.
Updated 26 March 2026
93
Total controls in Annex A
37
Organisational controls (A.5)
8
People controls (A.6)
34
Technological controls (A.8)
Not all controls are mandatory
ISO 27001 does not require every Annex A control to be implemented. You must assess which controls are applicable to your organisation based on your risk assessment and document your justification in the Statement of Applicability (SoA). Controls that are not applicable must still be listed in the SoA with a justification for exclusion.
Organisational Controls
37 controlsPolicies, procedures, roles, and governance that define how the organisation manages information security.
Policies for information security
MandatoryA set of topic-specific information security policies must be defined, approved by management, published, communicated, and reviewed regularly.
Information security roles and responsibilities
MandatoryRoles and responsibilities for information security must be allocated and communicated.
Segregation of duties
HighConflicting duties and areas of responsibility must be segregated to reduce opportunities for unauthorised or unintentional modification or misuse of assets.
Management responsibilities
MandatoryManagement must require all personnel to apply information security in accordance with the established policies and procedures.
Contact with authorities
HighAppropriate contacts with relevant authorities (regulators, law enforcement, fire, NCSC) must be maintained.
Contact with special interest groups
MediumAppropriate contacts with special interest groups or specialist security forums must be maintained.
Threat intelligence
HighInformation relating to information security threats must be collected and analysed to produce threat intelligence.
Information security in project management
HighInformation security must be integrated into project management throughout the project lifecycle.
Inventory of information and other associated assets
MandatoryAn inventory of information and other associated assets, including owners, must be developed and maintained.
Acceptable use of information and associated assets
MandatoryRules for acceptable use and procedures for handling information and associated assets must be identified, documented, and implemented.
Return of assets
HighPersonnel and external party users must return all organisational assets in their possession upon change or termination of employment, contract, or agreement.
Classification of information
MandatoryInformation must be classified according to the information security needs of the organisation based on confidentiality, integrity, availability, and relevant stakeholder requirements.
Labelling of information
HighAn appropriate set of procedures for information labelling must be developed and implemented in accordance with the information classification scheme.
Information transfer
HighInformation transfer rules, procedures, or agreements must be in place for all transfer facilities within the organisation and between the organisation and other parties.
Access control
MandatoryRules to control physical and logical access to information and other associated assets must be established and implemented based on business and information security requirements.
Identity management
MandatoryThe full lifecycle of identities must be managed.
Authentication information
MandatoryAllocation and management of authentication information must be controlled by a management process, including advising personnel on appropriate handling of authentication information.
Access rights
MandatoryAccess rights to information and other associated assets must be provisioned, reviewed, modified, and removed in accordance with the organisation's topic-specific policy on and rules for access control.
Information security in supplier relationships
HighProcesses and procedures must be defined and implemented to manage the information security risks associated with the use of supplier's products or services.
Addressing information security within supplier agreements
HighRelevant information security requirements must be established and agreed with each supplier based on the type of supplier relationship.
Managing information security in the ICT supply chain
HighProcesses and procedures must be defined and implemented to manage information security risks associated with the ICT products and services supply chain.
Monitoring, review and change management of supplier services
HighThe organisation must regularly monitor, review, evaluate, and manage change in supplier information security practices and service delivery.
Information security for use of cloud services
HighProcesses for acquisition, use, management, and exit from cloud services must be established in accordance with the organisation's information security requirements.
Information security incident management planning and preparation
MandatoryThe organisation must plan and prepare for managing information security incidents by defining, establishing, and communicating processes, roles, and responsibilities.
Assessment and decision on information security events
HighThe organisation must assess information security events and decide if they are to be categorised as information security incidents.
Response to information security incidents
MandatoryInformation security incidents must be responded to in accordance with the documented procedures.
Learning from information security incidents
HighKnowledge gained from information security incidents must be used to strengthen and improve the information security controls.
Collection of evidence
HighThe organisation must establish and implement procedures for the identification, collection, acquisition, and preservation of evidence related to information security events.
Information security during disruption
HighThe organisation must plan how to maintain information security at an appropriate level during disruption.
ICT readiness for business continuity
HighICT readiness must be planned, implemented, maintained, and tested based on business continuity objectives and ICT continuity requirements.
Legal, statutory, regulatory and contractual requirements
MandatoryLegal, statutory, regulatory, and contractual requirements relevant to information security and the organisation's approach to meet these requirements must be explicitly identified, documented, and kept up to date.
Intellectual property rights
HighThe organisation must implement appropriate procedures to protect intellectual property rights.
Protection of records
HighRecords must be protected from loss, destruction, falsification, unauthorised access, and unauthorised release.
Privacy and protection of PII
HighThe organisation must identify and meet the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations.
Independent review of information security
HighThe organisation's approach to managing information security and its implementation must be reviewed independently at planned intervals or when significant changes occur.
Compliance with policies, rules and standards for information security
MandatoryCompliance with the organisation's information security policy, topic-specific policies, rules, and standards must be regularly reviewed.
Documented operating procedures
HighOperating procedures for information processing facilities must be documented and made available to personnel who need them.
People Controls
8 controlsControls relating to human resources, from pre-employment screening through to off-boarding.
Screening
HighBackground verification checks on all candidates for employment must be carried out prior to joining the organisation and on an ongoing basis.
Terms and conditions of employment
MandatoryEmployment contracts must state responsibilities for information security, including the employee's and the organisation's responsibilities.
Information security awareness, education and training
MandatoryAll personnel and, where relevant, contractors must receive appropriate information security awareness education and training, and regular updates of the organisation's policies and procedures.
Disciplinary process
HighA disciplinary process must be formalised and communicated to take action against personnel and other interested parties who have committed an information security violation.
Responsibilities after termination or change of employment
HighInformation security responsibilities and duties that remain valid after termination or change of employment must be defined, enforced, and communicated to relevant personnel and other interested parties.
Confidentiality or non-disclosure agreements
HighConfidentiality or non-disclosure agreements reflecting the organisation's needs for the protection of information must be identified, regularly reviewed, documented, and signed by personnel and other relevant interested parties.
Remote working
HighSecurity measures must be implemented when personnel are working remotely to protect information accessed, processed, or stored outside the organisation's premises.
Information security event reporting
MandatoryThe organisation must provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.
Physical Controls
14 controlsControls to protect physical spaces, equipment, and infrastructure from unauthorised access, damage, and interference.
Physical security perimeters
HighSecurity perimeters must be defined and used to protect areas that contain information and other associated assets.
Physical entry
HighSecure areas must be protected by appropriate entry controls and access points.
Securing offices, rooms and facilities
HighPhysical security for offices, rooms, and facilities must be designed and implemented.
Physical security monitoring
MediumPremises must be continuously monitored for unauthorised physical access.
Protecting against physical and environmental threats
HighProtection against physical and environmental threats, such as natural disasters, must be designed and implemented.
Working in secure areas
MediumSecurity measures for working in secure areas must be designed and implemented.
Clear desk and clear screen
MediumClear desk rules for papers and removable storage media and clear screen rules for information processing facilities must be defined and appropriately enforced.
Equipment siting and protection
HighEquipment must be sited securely and protected.
Security of assets off-premises
HighOff-site assets must be protected.
Storage media
HighStorage media must be managed through their lifecycle of acquisition, use, transportation, and disposal in accordance with the organisation's classification scheme and handling requirements.
Supporting utilities
HighInformation processing facilities must be protected from power failures and other disruptions caused by failures in supporting utilities.
Cabling security
MediumCables carrying power, data, or supporting information services must be protected from interception, interference, or damage.
Equipment maintenance
MediumEquipment must be maintained correctly to ensure availability, integrity, and confidentiality of information.
Secure disposal or re-use of equipment
HighItems of equipment containing storage media must be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.
Technological Controls
34 controlsTechnical controls covering endpoint security, access management, encryption, vulnerability management, and logging.
User endpoint devices
MandatoryInformation stored on, processed by, or accessible via user endpoint devices must be protected.
Privileged access rights
MandatoryThe allocation and use of privileged access rights must be restricted and managed.
Information access restriction
MandatoryAccess to information and other associated assets must be restricted in accordance with the established topic-specific policy on access control.
Access to source code
HighRead and write access to source code, development tools, and software libraries must be appropriately managed.
Secure authentication
MandatorySecure authentication technologies and procedures must be implemented based on information access restrictions and the topic-specific policy on access control.
Capacity management
MediumThe use of resources must be monitored and adjusted in line with current and expected capacity requirements.
Protection against malware
MandatoryProtection against malware must be implemented and supported by appropriate user awareness.
Management of technical vulnerabilities
MandatoryInformation about technical vulnerabilities of information systems in use must be obtained, the organisation's exposure to such vulnerabilities must be evaluated, and appropriate measures must be taken.
Configuration management
HighConfigurations, including security configurations, of hardware, software, services, and networks must be established, documented, implemented, monitored, and reviewed.
Information deletion
HighInformation stored in information systems, devices, or in any other storage media must be deleted when no longer required.
Data masking
MediumData masking must be used in accordance with the organisation's topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.
Data leakage prevention
HighData leakage prevention measures must be applied to systems, networks, and any other devices that process, store, or transmit sensitive information.
Information backup
MandatoryBackup copies of information, software, and systems must be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.
Redundancy of information processing facilities
HighInformation processing facilities must be implemented with redundancy sufficient to meet availability requirements.
Logging
MandatoryLogs that record activities, exceptions, faults, and other relevant events must be produced, stored, protected, and analysed.
Monitoring activities
HighNetworks, systems, and applications must be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.
Clock synchronisation
MediumThe clocks of information processing systems used by the organisation must be synchronised to approved time sources.
Use of privileged utility programs
HighThe use of utility programs that might be capable of overriding system and application controls must be restricted and tightly controlled.
Installation of software on operational systems
HighProcedures and measures must be implemented to securely manage software installation on operational systems.
Networks security
MandatoryNetworks and network devices must be secured, managed, and controlled to protect information in systems and applications.
Security of network services
HighSecurity mechanisms, service levels, and service requirements of network services must be identified, implemented, and monitored.
Segregation of networks
HighGroups of information services, users, and information systems must be segregated in the organisation's networks.
Web filtering
MediumAccess to external websites must be managed to reduce exposure to malicious content.
Use of cryptography
MandatoryRules for the effective use of cryptography, including cryptographic key management, must be defined and implemented.
Secure development lifecycle
HighRules for the secure development of software and systems must be established and applied.
Application security requirements
HighInformation security requirements must be identified, specified, and approved when developing or acquiring applications.
Secure system architecture and engineering principles
HighPrinciples for engineering secure systems must be established, documented, maintained, and applied to any information system development or integration activities.
Secure coding
HighSecure coding principles must be applied to software development.
Security testing in development and acceptance
HighSecurity testing processes must be defined and implemented in the development lifecycle.
Outsourced development
HighThe organisation must direct, monitor, and review the activities related to outsourced system development.
Separation of development, test and production environments
HighDevelopment, testing, and production environments must be separated and secured.
Change management
MandatoryChanges to information processing facilities and information systems must be subject to change management procedures.
Test information
HighTest information must be appropriately selected, protected, and managed.
Protection of information systems during audit testing
MediumAudit tests and other assurance activities involving assessment of operational systems must be planned and agreed between the tester and appropriate management.
What Changed in ISO 27001:2022?
ISO 27001:2022 (published October 2022) replaced the 2013 version. The main changes to Annex A controls:
New controls (11 added)
- 5.7 Threat intelligence
- 5.23 Information security for use of cloud services
- 5.30 ICT readiness for business continuity
- 7.4 Physical security monitoring
- 8.9 Configuration management
- 8.10 Information deletion
- 8.11 Data masking
- 8.12 Data leakage prevention
- 8.16 Monitoring activities
- 8.23 Web filtering
- 8.28 Secure coding
Structural changes
- Control count reduced from 114 to 93 (merging and consolidation)
- 14 control clauses collapsed into 4 themes
- New attributes added to each control (security concept, operational capability, etc.)
- Transition deadline for existing 2013 certificates: October 2025
- New certifications must use ISO 27001:2022 standard
Ready to implement these controls?
Calculate your implementation cost or book a free scoping call to assess which controls apply to your organisation.