verified_user
Standardful
Homechevron_rightStandardschevron_rightISO/IEC 27001:2022
ActiveInternational Standardupdate Last Updated: Oct 2022

ISO/IEC 27001:2022

Information security, cybersecurity and privacy protection — Information security management systems — Requirements

apartmentPublishing Organization:International Organization for Standardization (ISO)

Standard Introduction

ISO/IEC 27001 is the world's best-known standard for information security management systems (ISMS). Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), it defines the requirements an ISMS must meet to protect sensitive information.

Adopting this standard demonstrates an organization's commitment to managing information security risks effectively. It helps protect assets, ensures compliance with legal obligations, and builds trust with stakeholders and customers globally.

security

Annex A Controls

Provides 93 reference controls across 4 themes — organizational, people, physical, and technological — to systematically reduce information security risks.

manage_search

Risk Assessment

Mandates a formal risk assessment process to identify threats, vulnerabilities, and impacts, then select proportionate controls.

verified_user

Continuous Monitoring

Requires ongoing measurement, analysis, and evaluation of ISMS performance through internal audits and management reviews.

list_alt Key Control Themes

  • Organizational controls (policies, roles, asset management)
  • People controls (screening, awareness, training)
  • Physical controls (perimeters, equipment, media)
  • Technological controls (access, cryptography, logging)
  • Risk assessment & treatment methodology
  • Statement of Applicability (SoA)
  • Incident management & business continuity

Who Needs to Comply?

groups

Organizations of any size that handle sensitive information — particularly technology companies, financial services, healthcare providers, and government contractors.

Key Requirements

1

Information Security Policy

Establish and maintain an information security policy approved by top management, communicated to all employees, and available to interested parties.

2

Risk Assessment & Treatment

Implement a repeatable risk assessment process. Produce a risk treatment plan and Statement of Applicability mapping selected Annex A controls to identified risks.

3

Access Control

Ensure only authorized users can access information and systems. Implement identity management, authentication, and access rights provisioning aligned with business needs.

4

Incident Response

Establish procedures to detect, report, assess, and respond to information security incidents. Learn from incidents to prevent recurrence.

5

Internal Audit Program

Conduct internal audits at planned intervals to verify the ISMS conforms to requirements and is effectively implemented and maintained.

Penalties & Enforcement

warning

No direct legal penalties for non-certification. However, many procurement processes and regulations (e.g., GDPR, NIS2) effectively require ISO 27001 or equivalent controls. Loss of certification can disqualify organizations from contracts.

Official Documentation

View All

Related Categories