
SO/IEC 27001:2022, which is the international standard for information security management systems (ISMS). The numbers are often confused because they belong to the same series of standards. ISO/IEC 27001:2022 is the latest version of the certifiable standard, superseding the 2013 version.
Information Security Policies
Defines the organizations overall approach, objectives, and principles for managing information security. Policies guide consistent application of controls and ensure management commitment to information protection.
Assigns specific information security tasks and accountability to roles within the organization to ensure clear governance and execution of the ISMS.
Prevents conflict of interest or fraud by dividing responsibilities so that no single person has control over all aspects of a critical process.
Ensures leadership demonstrates commitment to information security by promoting policy compliance, supporting resources, and fostering a culture of security awareness.
Maintains communication channels with regulatory, legal, and law enforcement bodies for incident coordination, reporting, and compliance purposes.
Establishes collaboration with industry associations, forums, and professional bodies to stay informed about emerging threats, vulnerabilities, and best practices.
Gathers, analyzes, and applies relevant threat information to anticipate, detect, and mitigate potential security incidents.
Integrates information security controls and risk assessments throughout all project life cycles to ensure security is considered from inception to completion.
Maintains an accurate inventory of information, systems, and related assets to enable effective risk management, ownership, and protection.
Defines acceptable behavior for the use of information and assets to prevent misuse, damage, or unauthorized disclosure.
Requires employees, contractors, and third parties to return all organization-owned assets upon termination or completion of engagement.
Categorizes information based on its value, sensitivity, and criticality to determine appropriate levels of protection.
Implements consistent labeling of classified information to ensure proper handling, storage, and distribution according to its sensitivity.
Secures information in transit using appropriate encryption and transfer methods to protect confidentiality and integrity.
Ensures that access to information and systems is granted based on business and security requirements, following the principle of least privilege.
Manages digital identities and ensures that users are uniquely identifiable and appropriately authorized before granting access.
Protects authentication mechanisms such as passwords, tokens, and biometrics to prevent unauthorized system and data access.
Regularly reviews and adjusts user access rights based on role changes, job responsibilities, and termination.
Ensures suppliers and third parties apply information security measures consistent with organizational requirements.
Includes information security clauses and controls in supplier contracts to safeguard shared or accessible information.
Ensures that information security is maintained throughout the entire ICT supply chain, including hardware, software, and services.
Regularly monitors supplier performance and manages changes to ensure continued compliance with security requirements.
Ensures cloud service usage aligns with organizational security requirements through risk assessment, contractual controls, and monitoring.
Develops incident response plans and resources to effectively detect, report, and respond to security incidents.
Assesses and categorizes events to determine whether they constitute security incidents requiring further action.
Implements documented procedures to respond, contain, and recover from incidents effectively and minimize impact.
Analyzes incidents post-resolution to identify root causes, lessons learned, and opportunities for control improvement.
Ensures that evidence related to security incidents is collected, handled, and preserved according to legal and forensic standards.
Maintains security controls during business disruptions to ensure confidentiality, integrity, and availability of critical information.
Ensures IT infrastructure and systems are prepared to support business continuity objectives during disruptions or crises.
Identifies and complies with all applicable laws, regulations, and contractual security obligations.
Protects intellectual property owned by or entrusted to the organization, ensuring legal compliance and ethical use.
Safeguards records against loss, unauthorized access, or alteration to ensure integrity and compliance with retention requirements.
Implements measures to protect personally identifiable information (PII) in compliance with privacy laws and organizational policies.
Conducts independent audits and reviews of the ISMS to ensure effectiveness and identify improvement opportunities.
Monitors and enforces adherence to established security policies and standards across the organization.
Documents and maintains standard operating procedures to ensure consistent, secure, and auditable information system operations.
Screening
Conducts background checks for personnel and contractors to verify trustworthiness and suitability for information access.
Includes clear information security responsibilities within employment terms to reinforce accountability.
Provides ongoing awareness and training programs to ensure all personnel understand and support information security.
Defines disciplinary actions for violations of information security policies to promote accountability and compliance.
Ensures that former employees access rights are revoked and confidentiality obligations continue post-employment.
Implements NDAs to protect sensitive and proprietary information shared internally or externally.
Applies specific controls to secure information assets when employees work remotely or offsite.
Establishes procedures for employees and contractors to promptly report observed or suspected security events.
Physical Security Perimeters
Defines physical boundaries to protect sensitive areas and assets from unauthorized access.
Controls and monitors access to facilities using authentication, logging, and visitor management systems.
Implements measures such as locks, alarms, and surveillance to protect office and facility environments.
Uses monitoring systems such as CCTV and alarms to detect and respond to unauthorized physical access.
Protects facilities and equipment against fire, flooding, temperature, and other environmental risks.
Restricts and monitors activities in secure zones to minimize the risk of data exposure or tampering.
Ensures desks and screens are free of sensitive information when unattended to prevent unauthorized viewing.
Positions and protects equipment to reduce risks from environmental hazards and unauthorized access.
Applies equivalent security measures to assets used or stored outside of organizational premises.
Manages and protects removable and fixed storage media to prevent unauthorized disclosure or loss of information.
Ensures reliable and secure supply of utilities such as power, water, and HVAC supporting critical information systems.
Protects power and network cables from interception, damage, or unauthorized access.
Performs secure maintenance on equipment to prevent compromise of information or systems.
Ensures all data is securely erased before disposal or reuse of hardware to prevent data leakage.
User Endpoint Devices
Applies controls to secure endpoints such as laptops and mobile devices against loss, theft, or compromise.
Restricts and monitors privileged access to systems and applications to prevent abuse or misuse.
Implements restrictions on access to data and systems based on roles and need-to-know principles.
Controls access to source code to prevent unauthorized modification, disclosure, or misuse.
Applies multi-factor and strong authentication mechanisms to verify user identities securely.
Monitors and manages system capacity to maintain performance and prevent disruptions.
Implements anti-malware controls to detect, prevent, and respond to malicious software threats.
Regularly identifies, evaluates, and remediates technical vulnerabilities in systems and applications.
Maintains secure baseline configurations and manages changes to system components in a controlled manner.
Ensures secure and irreversible deletion of data when no longer required or when requested.
Applies techniques to obscure sensitive data for use in testing or analytics while preserving confidentiality.
Implements technologies and policies to prevent unauthorized transmission or disclosure of sensitive data.
Ensures regular, secure, and tested backups of critical information to support recovery after incidents.
Implements redundant systems and components to ensure continued operation during failures.
Records system and user activities to support accountability, monitoring, and forensic investigations.
Continuously monitors systems and networks to detect anomalous behavior and potential security breaches.
Synchronizes system clocks to ensure accurate logging, monitoring, and correlation of events.
Restricts use of administrative tools that can override controls, ensuring they are monitored and authorized.
Controls and approves all software installations to prevent unauthorized or malicious software from entering systems.
Implements controls to protect networks against unauthorized access, misuse, or disruption.
Ensures that security features of network services such as firewalls and VPNs are correctly configured and managed.
Separates networks based on sensitivity or function to limit the impact of breaches and maintain performance.
Implements filtering mechanisms to restrict access to harmful or inappropriate web content.
Applies encryption and cryptographic controls to protect the confidentiality, integrity, and authenticity of data.
Integrates security into all stages of software development to reduce vulnerabilities and enhance reliability.
Defines and applies specific security requirements for all applications during design and development.
Designs systems following secure architecture principles to minimize attack surfaces and vulnerabilities.
Follows secure coding standards and practices to prevent common software vulnerabilities.
Conducts security testing throughout development and before release to verify effectiveness of controls.
Ensures that outsourced software development adheres to organizational security policies and requirements.
Isolates development, test, and production environments to reduce the risk of unauthorized access or changes.
Controls changes to systems and applications to ensure they are reviewed, tested, and approved before implementation.
Protects test data to prevent exposure of production or sensitive information during testing.
Ensures that audit testing does not compromise the confidentiality, integrity, or availability of operational systems.