ISO/IEC 27001 Information Security Management System
Annex A Controls
ISO/IEC 27001 was revised in 2022 to ensure that Information Security Management Systems (ISMS) remain effective in addressing rapidly evolving security challenges. The update primarily focused on Annex A, where the controls were reorganised into four key themes and the total number of controls was reduced from 114 to 93, streamlining implementation while maintaining robust security standards. There are four themes of the security controls of ISO/IEC 27001:
Organisational
- Information Security Policies: Develop and implement comprehensive security policies.
- Incident Management: Have processes in place for reporting and responding to security incidents.
People
- Awareness and Training: Ensure employees understand security risks and practices
- Screening: Conduct background checks during recruitment.
Physical
- Secure Areas: Protect physical access to information processing facilities.
- Equipment Security: Prevent loss or damage to assets.
Technological
- Access Control: Restrict system access based on roles and responsibilities.
- Cryptography: Use encryption to protect sensitive data.
Key Requirements
ISO/IEC 27001 outlines several mandatory requirements that ensure a systematic approach to managing sensitive information. ISO/IEC 27001 establishes a structured framework for managing sensitive information, ensuring organisations systematically address information security risks. Key requirements include understanding the context of the organisation, identifying internal and external factors, and recognising stakeholder needs. Leadership and commitment are essential, with senior management responsible for defining policies, roles, and responsibilities, while risk assessment and treatment require identifying, analysing, and mitigating potential security risks.
The standard also emphasises support, operation, performance evaluation, and continual improvement. Organisations must provide sufficient resources, training, and communication to maintain an effective ISMS, plan and control processes, and respond to security incidents. Regular audits and management reviews ensure the system remains effective, while continual improvement helps organisations adapt to evolving threats and maintain robust information security practices.
The Main Changes Between ISO/IEC 27001:2013 & ISO/IEC 27001:2022
The transition from ISO/IEC 27001:2013 to ISO/IEC 27001:2022 brings significant updates to reflect evolving cybersecurity and privacy requirements. The standard’s scope has expanded, moving beyond “information security management systems” to encompass information security, cybersecurity, and privacy protection. Technical revisions also modernise the language, replacing terms such as “international standard” with “document” and “may” with “can,” creating a more flexible and practical framework.
Annex A has been streamlined, with the number of controls reduced from 114 across 14 categories in the 2013 version to 93 controls grouped into four key themes: organisational, people, physical, and technological. These changes simplify implementation while ensuring the standard remains highly relevant and practical for addressing contemporary information security challenges.
Benefits Of ISO/IEC 27001 Certification
Obtaining the PECB ISO/IEC 27001 Certificate demonstrates that you have developed the expertise required to support an organisation in implementing an Information Security Management System (ISMS) that complies with ISO/IEC 27001. You will gain a thorough understanding of the ISMS implementation process, including how to manage risks, apply controls, and meet compliance obligations effectively.
The certification also equips you with the skills to identify, prevent, and assess information security threats within an organisation, enhancing overall resilience. It positions you for career advancement in information security, increasing your chances of standing out to employers. Additionally, you will acquire the expertise to lead a team in implementing an ISMS, support continual improvement processes, and perform audits of an organisation’s information security management system, ensuring it remains robust and effective over time.



