ISO/IEC 27001:2022 is an internationally recognised standard for the implementation and maintenance of Information Security Management Systems (ISMS).

ISO 27001

An important update introduced in the latest 2022 revision of the standard includes Annex A, which provides a structured set of controls designed to effectively mitigate information security risks. Control selection is determined by the scope of ISO/IEC 27001 certification and the specific risks each organization faces.

What Is Annex A in ISO/IEC 27001?

Annex A offers a list of controls together with implementation guidance. It is more than a simple checklist to tick off, however — it provides references on how to apply the controls. Therefore, the actual implementation of Annex A controls will vary from organization to organization depending on their specific needs and risk environment.

What Is the Purpose of Annex A?

Annex A serves as a guidance framework to help organizations select the right controls to address the risks identified during the risk assessment process. These controls:

  • Act as preventive measures against potential threats.
  • Align seamlessly with the organization’s risk treatment strategy.

Structure of Annex A (2022 Revision)

The updated version of ISO/IEC 27001 and its controls reflects modern cybersecurity practices, making it more efficient and user-friendly. The main structural changes include:

  • Reduced number of controls: Down from 114 (2013 version) to 93, with several controls reorganized and merged.
  • New control structure: Controls are now organized into four main categories:
      1. Organizational Controls (37 controls):
        Designed to establish a structured ISMS, focusing on governance, risk management, and security policies. These controls integrate security into the organization’s culture and decision-making, ensuring a systematic and proactive approach to information security.
      2. People Controls (8 controls):
        Centered on the human factor, they emphasize training, awareness, and behavior management. These measures ensure that employees and stakeholders understand security policies, their responsibilities, and best practices to minimize human-related security risks.
      3. Physical Controls (14 controls):
        Protect the organization’s infrastructure, facilities, and assets against unauthorized access, theft, and environmental threats. These measures safeguard critical resources, minimizing the risk of physical intrusions and external hazards.
      4. Technological Controls (34 controls):
        Designed to protect digital assets, networks, and IT systems against cyber threats. These controls play a key role in preventing unauthorized access, data breaches, and other security incidents, ensuring the integrity, confidentiality, and availability of information.

Implementing Annex A Controls

To effectively implement Annex A controls, organizations should follow a structured approach:

  1. Conduct a Risk Assessment: Identify and evaluate risks to determine which controls are necessary.
  2. Select Relevant Controls: Choose the controls that best support the organization’s risk treatment plan.
  3. Develop Policies and Procedures: Establish the processes, technical safeguards, and documentation needed to implement the controls.
  4. Monitor and Improve: Continuously evaluate control effectiveness and update them as risks evolve.

Key Challenges in Implementing Annex A Controls — and How to Overcome Them

Some of the most common challenges in implementing Annex A controls include:

  • Lack of Staff Awareness: Improve understanding of Annex A controls through training and awareness programs tailored to different roles within the organization.
  • Resource Constraints: Prioritize the most critical controls based on the risk assessment, then gradually implement the rest.
  • Integration with Existing Systems: Incorporate Annex A controls within existing processes and technologies to minimize operational disruption and ensure alignment with current procedures.

Benefits of Annex A Controls in ISO/IEC 27001:2022

Implementing Annex A controls delivers numerous advantages:

✅ Risk Mitigation: Protects against a wide range of information security threats.
Regulatory Compliance: Helps meet legal, contractual, and regulatory requirements.
Greater Stakeholder Confidence: Demonstrates a strong commitment to protecting information assets.
Improved Operational Efficiency: Optimizes processes and minimizes the risk of costly security breaches.
Stronger Security Framework: Enables organizations to address risks through a well-structured, organized set of controls.

By understanding and applying Annex A controls, organizations can build a robust ISMS, ensuring they are prepared to face information security challenges and achieve ISO/IEC 27001 certification.

Annex A in ISO/IEC 27001:2022 — Frequently Asked Questions

Is it mandatory to implement all Annex A controls?

No, the Annex A controls are a reference. Organizations must conduct a risk assessment and apply only those controls that are relevant to mitigate the identified risks.

For example, at ServiceTonic we implement all controls except the one related to outsourcing software development, since we do not outsource development.

When a control is not implemented, it is important to be able to justify the reason.

How does the standard update affect organizations certified under ISO 27001:2013?

Organizations certified under the 2013 version have a transition period (typically 2 to 3 years) to adapt to the new version and update their Statement of Applicability.

What is the Statement of Applicability (SoA) and how does it relate to Annex A?

The Statement of Applicability (SoA) is a mandatory document in ISO 27001 that justifies the inclusion or exclusion of each Annex A control in the ISMS.

What new controls does the 2022 version of Annex A introduce?

Some of the new controls include Threat Intelligence, Cloud Security, Data Leakage Prevention, Web Filtering, and Security Monitoring.

How can an organization demonstrate compliance with Annex A controls?

Through internal audits, implementation records, documented evidence, and external certification audits.

How can ServiceTonic help you with Annex A controls?

At the time of certification, the auditor will request compliance evidence for each control.

ServiceTonic provides capabilities such as ticket management with incident management, asset inventory, and recurring task scheduling — all highly useful for planning activities like continuity plan reviews. These features help document compliance evidence for the controls, ensuring you have the right information available at the time of certification.

For more information on how ServiceTonic can support your ISO 27001 certification process, please contact us.