The Annex A Controls – ISMS V2022 Series

ISO/IEC 27001: 2017 Annex A detail

ISO/IEC 27001:2022 is the updated version of the international standard for information security management systems (ISMS). Annex A of ISO/IEC 27001:2022 provides a set of reference control objectives and controls that organizations can implement to manage information security risks effectively. The controls in Annex A are designed to ensure the selection of adequate and proportionate security controls that protect information assets.

ISO/IEC 27001:2022 Annex A Overview

Annex A consists of 4 main sections, each containing multiple categories and controls that cover various aspects of information security.

A.5: Organizational Controls

A.5.1 Policies for information security: Establish information security policies that provide management direction and support.

A.5.2 Information security roles and responsibilities: Define and communicate information security roles and responsibilities.

A.5.3 Segregation of duties: Implement segregation of duties to reduce the risk of misuse of assets.

A.5.4 Management responsibilities: Ensure that management provides clear direction and demonstrates commitment to information security.

A.5.5 Contact with authorities: Establish and maintain contact with relevant authorities.

A.5.6 Contact with special interest groups: Establish and maintain contact with special interest groups or other specialist security forums and professional associations.

A.5.7 Threat intelligence: Collect and analyze threat intelligence to inform the risk management process.

A.5.8 Information security in project management: Ensure that information security is addressed in project management.

A.6: People Controls

A.6.1 Screening: Ensure that employees, contractors, and third-party users are subject to appropriate security screening.

A.6.2 Terms and conditions of employment: Ensure that employees, contractors, and third-party users understand their responsibilities.

A.6.3 Information security awareness, education, and training: Provide appropriate awareness, education, and training programs.

A.6.4 Disciplinary process: Ensure that there is a formal disciplinary process for employees who have committed security breaches.

A.6.5 Responsibilities after termination or change of employment: Ensure that responsibilities for information security remain clear and are carried out after termination or change of employment.

A.7: Physical Controls

A.7.1 Secure areas: Implement security perimeters and entry controls to protect areas containing information and information processing facilities.

A.7.2 Equipment security: Protect equipment from physical and environmental threats.

A.8: Technological Controls

A.8.1 Access control: Ensure authorized user access and prevent unauthorized access to systems and services.

A.8.2 User access management: Implement user access management controls, including registration, deregistration, and privileged access.

A.8.3 User responsibilities: Make users accountable for safeguarding their authentication information.

A.8.4 System and application access control: Implement access control for systems and applications.

A.8.5 Cryptography: Use cryptographic controls to protect the confidentiality, integrity, and availability of information.

A.8.6 Physical and environmental security: Protect information processing facilities from physical and environmental threats.

A.8.7 Operations security: Ensure correct and secure operations of information processing facilities.

A.8.8 Protection from malware: Implement controls to detect, prevent, and recover from malware.

A.8.9 Backup: Ensure that information and software are backed up and protected.

A.8.10 Logging and monitoring: Record events and generate evidence for monitoring and review.

A.8.11 Control of operational software: Ensure the integrity of operational software.

A.8.12 Technical vulnerability management: Identify, assess, and manage technical vulnerabilities.

A.8.13 Information systems audit considerations: Minimize the impact of audit activities on operational systems.

A.8.14 Network security management: Ensure the protection of information in networks.

A.8.15 Security requirements of information systems: Ensure security is built into information systems.

A.8.16 Security in development and support processes: Ensure information security is designed and implemented in development processes.

A.8.17 Test data: Protect data used for testing.