



ISO 27001 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).
This rigorous framework, developed jointly by ISO and IEC, provides a comprehensive set of controls for managing and mitigating information security risks.
ISO 27001 emphasizes a risk-based approach, encouraging organizations to tailor their security measures to their specific needs and threat landscape. Instead of dictating specific controls, it outlines a comprehensive checklist of potential measures and best practices, many of which are detailed in the complementary ISO 27002 standard.
Even if formal certification is not an immediate goal, understanding and implementing the principles of ISO 27001 is crucial for any organization serious about safeguarding its valuable information assets.
Systematically examine information security risks by identifying threats and vulnerabilities and quantifying impacts
Design and implement a comprehensive suite of security controls to address identified security risks
Adopt an ongoing management process that ensures controls meet information security needs as risks evolve over time
To build an effective Information Security Management System (ISMS), choosing appropriate controls is vital. ISO 27001 Annex A lists a set of 114 best practice ISO controls, divided across 14 clauses. Since ISO 27001 was updated in 2013, these controls have not been mandatory. They merely provide guidance for risk assessments, allowing organisations to select of the controls that they can identify and justify as being most relevant and meaningful for their organisation. The 14 control clauses of Annex A:
A.5 - Information security policies
A.6 - Organisation of information security
A.7 - Human resource security
A.8 - Asset management
A.9 - Access control
A.10 - Cryptography
A.11 - Physical and environmental security
A.12 - Operations security
A.13 - Communications security
A.14 - System development and maintenance
A.15 - Supplier relationships
A.16 - Information security incident management
A.17 - Business continuity management
A.18 - Compliance laws and policies
Stage 1 consists of a preliminary assessment of an organisation’s ISMS, including collation of security policy documentation. Two key documents are the Statement of Applicability (SoA) and Risk Treatment Plan (RTP).
Stage 2 includes a formal compliance audit where the ISMS is tested against ISO 27001 requirements. Organisations being assessed need to ensure they are able to produce documentation on the ISMS’s design and implementation, as well as evidence that it is being actively operated and maintained.
Organisations that pass Stage 2 are deemed ISO 27001 certified, but they must also go through a series of follow-up reviews and audits to confirm they remain compliant. This is recommended to happen at least annually, but typically takes place much more regularly while the ISMS is in its infancy.