ISO 270018 min read

ISO 27001 Annex A Controls: Complete Guide

ISO 27001:2022 includes 93 security controls in Annex A. Understanding these controls is essential for building your Statement of Applicability and implementing your ISMS. This guide provides a comprehensive overview.

Key Takeaways

Point Summary
Total controls 93 controls in ISO 27001:2022 (reduced from 114 in 2013 version)
4 themes Organizational (37), People (8), Physical (14), Technological (34)
New in 2022 11 new controls including threat intelligence, cloud security, data masking, DLP
Statement of Applicability Must justify inclusion or exclusion of each control
Not all required Select controls based on your risk assessment; justify exclusions

Quick Answer: ISO 27001:2022 has 93 controls in 4 themes. You must review all controls and document which apply to your organization in the Statement of Applicability (SoA). Selection is based on your risk assessment, not a checklist.

Annex A Overview

Structure Changes in 2022

The 2022 version reorganized controls from 14 domains to 4 themes:

Version Structure
ISO 27001:2013 114 controls in 14 domains (A.5-A.18)
ISO 27001:2022 93 controls in 4 themes

The Four Themes

ISO 27001:2022 Annex A Structure (93 Total Controls):

1. Organizational (37):

  • Policies, roles, asset management
  • Access control, vendor management

2. People (8):

  • Screening, awareness, responsibilities
  • Remote working

3. Physical (14):

  • Perimeters, equipment, secure areas
  • Working in secure areas

4. Technological (34):

  • Endpoints, access, networks, applications
  • Data protection, monitoring

New Controls in 2022

11 new controls were added:

Control Theme Description
5.7 Organizational Threat intelligence
5.23 Organizational Information security for cloud services
5.30 Organizational ICT readiness for business continuity
7.4 Physical Physical security monitoring
8.9 Technological Configuration management
8.10 Technological Information deletion
8.11 Technological Data masking
8.12 Technological Data leakage prevention
8.16 Technological Monitoring activities
8.23 Technological Web filtering
8.28 Technological Secure coding

Theme 5: Organizational Controls (37)

Policies and Governance (5.1-5.8)

Control Title Purpose
5.1 Policies for information security Establish management direction
5.2 Information security roles Define responsibilities
5.3 Segregation of duties Prevent conflicts of interest
5.4 Management responsibilities Ensure adherence to policies
5.5 Contact with authorities Maintain appropriate contacts
5.6 Contact with special interest groups Stay informed on security
5.7 Threat intelligence Collect and analyze threat info
5.8 Information security in project management Include security in projects

Asset Management (5.9-5.14)

Control Title Purpose
5.9 Inventory of information and assets Know what you have
5.10 Acceptable use of assets Define proper usage
5.11 Return of assets Recover assets on termination
5.12 Classification of information Categorize data sensitivity
5.13 Labelling of information Mark sensitive information
5.14 Information transfer Secure data in transit

Access Control (5.15-5.18)

Control Title Purpose
5.15 Access control Limit access to authorized users
5.16 Identity management Manage user identities
5.17 Authentication information Secure authentication secrets
5.18 Access rights Manage access privileges

Vendor Management (5.19-5.23)

Control Title Purpose
5.19 Information security in supplier relationships Address security with suppliers
5.20 Addressing security in supplier agreements Contract requirements
5.21 Managing information security in ICT supply chain Supply chain security
5.22 Monitoring, review of supplier services Ongoing oversight
5.23 Information security for cloud services Cloud security management

Incident Management (5.24-5.28)

Control Title Purpose
5.24 Information security incident management planning Prepare for incidents
5.25 Assessment and decision on events Evaluate security events
5.26 Response to incidents Handle incidents appropriately
5.27 Learning from incidents Improve from experience
5.28 Collection of evidence Preserve forensic evidence

Business Continuity and Compliance (5.29-5.37)

Control Title Purpose
5.29 Information security during disruption Maintain security in crises
5.30 ICT readiness for business continuity IT recovery capabilities
5.31 Legal, statutory, regulatory requirements Identify legal requirements
5.32 Intellectual property rights Protect IP
5.33 Protection of records Maintain records properly
5.34 Privacy and protection of PII Protect personal data
5.35 Independent review of information security External assessment
5.36 Compliance with security policies Ensure policy adherence
5.37 Documented operating procedures Document operations

Theme 6: People Controls (8)

Human Resource Security

Control Title Purpose Key Requirements
6.1 Screening Verify backgrounds Background checks
6.2 Terms and conditions of employment Security in contracts Include security obligations
6.3 Information security awareness, education, training Build security knowledge Regular training programs
6.4 Disciplinary process Address violations Formal disciplinary procedure
6.5 Responsibilities after termination Ongoing obligations Confidentiality agreements
6.6 Confidentiality or non-disclosure agreements Protect information NDAs for sensitive access
6.7 Remote working Secure remote access Remote work security measures
6.8 Information security event reporting Enable reporting Incident reporting mechanism

Theme 7: Physical Controls (14)

Physical Security

Control Title Purpose
7.1 Physical security perimeters Define secure boundaries
7.2 Physical entry Control access to facilities
7.3 Securing offices, rooms and facilities Protect work areas
7.4 Physical security monitoring Detect unauthorized access
7.5 Protecting against physical and environmental threats Environmental controls
7.6 Working in secure areas Secure area procedures
7.7 Clear desk and clear screen Prevent information exposure
7.8 Equipment siting and protection Secure equipment placement
7.9 Security of assets off-premises Protect mobile equipment
7.10 Storage media Secure storage media
7.11 Supporting utilities Power, cooling, etc.
7.12 Cabling security Protect network cabling
7.13 Equipment maintenance Maintain securely
7.14 Secure disposal or re-use of equipment Prevent data leakage

Theme 8: Technological Controls (34)

Endpoint and Access Controls (8.1-8.8)

Control Title Purpose
8.1 User endpoint devices Secure end-user devices
8.2 Privileged access rights Control elevated privileges
8.3 Information access restriction Limit data access
8.4 Access to source code Protect source code
8.5 Secure authentication Strong authentication
8.6 Capacity management Ensure adequate capacity
8.7 Protection against malware Malware defenses
8.8 Management of technical vulnerabilities Vulnerability management

Configuration and Data Protection (8.9-8.14)

Control Title Purpose
8.9 Configuration management Control configurations
8.10 Information deletion Delete data when required
8.11 Data masking Protect sensitive data
8.12 Data leakage prevention Prevent unauthorized disclosure
8.13 Information backup Enable recovery
8.14 Redundancy of information processing facilities High availability

Logging and Monitoring (8.15-8.17)

Control Title Purpose
8.15 Logging Record security events
8.16 Monitoring activities Active security monitoring
8.17 Clock synchronization Accurate timestamps

Network and Communications (8.18-8.22)

Control Title Purpose
8.18 Use of privileged utility programs Control powerful utilities
8.19 Installation of software on operational systems Control software installation
8.20 Networks security Secure network infrastructure
8.21 Security of network services Secure network services
8.22 Segregation of networks Network segmentation

Web and Application Security (8.23-8.28)

Control Title Purpose
8.23 Web filtering Control web access
8.24 Use of cryptography Encrypt data
8.25 Secure development life cycle Security in SDLC
8.26 Application security requirements Define security requirements
8.27 Secure system architecture and engineering Security by design
8.28 Secure coding Prevent code vulnerabilities

Development and Testing (8.29-8.34)

Control Title Purpose
8.29 Security testing in development and acceptance Test security
8.30 Outsourced development Third-party development security
8.31 Separation of development, test and production Environment separation
8.32 Change management Control changes
8.33 Test information Protect test data
8.34 Protection of information systems during audit testing Secure audit tests

Control Selection Process

Step 1: Conduct Risk Assessment

Identify risks that need to be treated:

Risk to Control Mapping:

  • Unauthorized access → Controls: 5.15, 5.16, 8.2, 8.5
  • Malware infection → Controls: 8.7, 8.1, 6.3
  • Data breach → Controls: 8.12, 8.24, 5.12
  • Insider threat → Controls: 6.1, 5.3, 8.15
  • Supply chain compromise → Controls: 5.19-5.22, 8.30

Step 2: Evaluate Annex A Controls

For each control, determine:

Question Options
Is it applicable? Yes / No
If yes, is it implemented? Full / Partial / Not yet
If no, what's the justification? Document reason

Step 3: Create Statement of Applicability (SoA)

Document all 93 controls with:

  • Applicability status
  • Implementation status
  • Justification for exclusions

Control Implementation Priorities

High Priority (Implement First)

Control Reason
5.1 Policies foundation for ISMS
5.15-5.18 Access control fundamental
6.3 Awareness prevents incidents
8.5 Authentication critical
8.7 Malware protection essential
8.15 Logging enables detection
8.24 Encryption protects data

Medium Priority

Control Reason
5.9 Asset inventory supports other controls
5.24-5.27 Incident response for when things fail
8.8 Vulnerability management ongoing
8.32 Change management reduces risk

Lower Priority (Based on Risk)

Control Consideration
7.1-7.14 May be less relevant for cloud-native
8.4 Only if developing software
8.33 Only if using test data

Common Control Implementations

For SaaS Companies

Control Area Typical Implementation
Access Control (5.15-5.18) SSO, MFA, RBAC in applications
Asset Management (5.9-5.14) Cloud asset inventory tools
Vendor Management (5.19-5.23) Vendor assessment questionnaires, SOC 2 reviews
Incident Management (5.24-5.28) SIEM, incident response playbooks
Endpoint (8.1) MDM, endpoint security tools
Cryptography (8.24) TLS everywhere, encryption at rest
Secure Development (8.25-8.28) SAST/DAST, code review, secure SDLC

For Cloud-Native Organizations

Physical controls often addressed by:

  • Cloud provider certifications (AWS, GCP, Azure SOC 2/ISO 27001)
  • Documented reliance in SoA
  • Complementary controls where needed

Mapping to Other Frameworks

ISO 27001 to SOC 2 Mapping

ISO 27001 Theme SOC 2 Criteria
Organizational CC1, CC2, CC3, CC9
People CC1.4, CC1.5
Physical CC6.4, CC6.5
Technological CC6, CC7, CC8

ISO 27001 to NIST CSF Mapping

ISO 27001 Theme NIST CSF Functions
Organizational Govern, Identify
People Protect (PR.AT)
Physical Protect (PR.AC, PR.PT)
Technological Protect, Detect, Respond

The Bastion Approach

Control Implementation Made Simple

Bastion streamlines Annex A control implementation:

Challenge Bastion Solution
Understanding 93 controls Expert guidance on what applies
Prioritizing implementation Risk-based roadmap
Documenting controls Pre-built control documentation
Collecting evidence Automated evidence collection
Creating SoA Template with guided completion

Automated Evidence Mapping

Controls automatically mapped to evidence sources:

  • Access reviews → 5.18, 8.2
  • Training records → 6.3
  • Vulnerability scans → 8.8
  • Change records → 8.32
  • Encryption configurations → 8.24

Need help implementing Annex A controls? Talk to our team →