verified_user
Standardful
首页chevron_right标准chevron_rightISO/IEC 27001:2022
有效国际标准update 最后更新:2022年10月

ISO/IEC 27001:2022

信息安全管理体系 要求

apartment发布组织:国际标准化组织 (ISO)

标准简介

ISO/IEC 27001 是全球最知名的信息安全管理体系(ISMS)标准。由国际标准化组织(ISO)和国际电工委员会(IEC)发布,定义了 ISMS 必须满足的保护敏感信息的要求。

采用此标准表明组织致力于有效管理信息安全风险。它有助于保护资产,确保遵守法律义务,并在全球范围内与利益相关者和客户建立信任。

security

Annex A Controls

Provides 93 reference controls across 4 themes — organizational, people, physical, and technological — to systematically reduce information security risks.

manage_search

Risk Assessment

Mandates a formal risk assessment process to identify threats, vulnerabilities, and impacts, then select proportionate controls.

verified_user

Continuous Monitoring

Requires ongoing measurement, analysis, and evaluation of ISMS performance through internal audits and management reviews.

list_alt Key Control Themes

  • Organizational controls (policies, roles, asset management)
  • People controls (screening, awareness, training)
  • Physical controls (perimeters, equipment, media)
  • Technological controls (access, cryptography, logging)
  • Risk assessment & treatment methodology
  • Statement of Applicability (SoA)
  • Incident management & business continuity

Who Needs to Comply?

groups

Organizations of any size that handle sensitive information — particularly technology companies, financial services, healthcare providers, and government contractors.

Key Requirements

1

Information Security Policy

Establish and maintain an information security policy approved by top management, communicated to all employees, and available to interested parties.

2

Risk Assessment & Treatment

Implement a repeatable risk assessment process. Produce a risk treatment plan and Statement of Applicability mapping selected Annex A controls to identified risks.

3

Access Control

Ensure only authorized users can access information and systems. Implement identity management, authentication, and access rights provisioning aligned with business needs.

4

Incident Response

Establish procedures to detect, report, assess, and respond to information security incidents. Learn from incidents to prevent recurrence.

5

Internal Audit Program

Conduct internal audits at planned intervals to verify the ISMS conforms to requirements and is effectively implemented and maintained.

Penalties & Enforcement

warning

No direct legal penalties for non-certification. However, many procurement processes and regulations (e.g., GDPR, NIS2) effectively require ISO 27001 or equivalent controls. Loss of certification can disqualify organizations from contracts.

官方文档

查看全部

相关分类