Central Iso 27001 Controls
Central Iso 27001 Controls
to Annex A
What's Inside
ISO 27001:2022 controls are broken into four themes—people, organizational,
operational, and technological—that aim to strengthen your organization’s
information security defenses.
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Contents
Security controls are an essential part of the ISO 27001 standard. These ISO
27001 safeguards function as minimum baseline controls, offering guidance for
how organizations can adopt them as listed or tailor them to their specific
organization.
ISO 27001 was established in 2005 and has since been updated in 2013 and most
recently in 2022. The most recent version is referred to as ISO 27001:2022 and
comes with significant changes to how security controls are structured within
Annex A, which lists out each objective and security control.
Below, we dive into those structural changes as well as new control additions to
be aware of.
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Download Guide
The ISO 27001 controls outline the measures organizations must take by way of
policies, processes, and procedures to meet the document’s security
requirements. These security controls are grouped into four control themes—
people, organizational, technological, and physical—that aim to reduce risks to an
acceptable level.
The changes in the 2022 version aim to address the changing business
landscape, such as the rise of remote work and the evolving nature of
cybersecurity threats. The new version puts an emphasis on streamlining
controls under thematic topics to make the implementation process easier.
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Image depicting the changes from ISO 27001:2013 to ISO 27001:2022
There are 11 new controls that have been added to the ISO 27001 document,
which include:
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Image depicting a chart of the 11 new ISO 27001 controls
Learn More
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
What Are the Four Control Themes?
The previous version of ISO 27001 spread out the security controls into 14
categories. The newest version (ISO 27001:2022) has merged the original 14
categories into four themes.
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Image depicting the four ISO 27001 Annex A themes
Organizational (Section 5)
Organizational controls cover information security policies, use of assets, and
cloud service use. This category covers everything that doesn’t fit under the
people, technological, or physical themes such as identity management, the
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
responsibilities of management and information security professionals, and
evidence collection.
Threat intelligence is a noteworthy control addition under this theme. This control
goes beyond recognizing a malicious domain name to help organizations better
understand how they may be targeted and then using that threat intelligence
information to better inform their information security approach.
People (Section 6)
With only eight total controls, this theme deals with remote work, confidentiality,
nondisclosures, and screening to help manage the way employees interact with
sensitive information in their day-to-day roles. Controls include onboarding and
offboarding processes and responsibilities for incident reporting.
There weren’t any new controls introduced in ISO 27001:2022 to be aware of for
this theme.
Physical (Section 7)
Physical controls cover security monitoring, maintenance, facilities security, and
storage media. This category focuses on how you are protecting against physical
and environmental threats such as natural disasters, theft, and intentional
destruction.
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Technological (Section 8)
Technological controls deal with authentication, encryption, and data leakage
prevention. This category focuses on properly securing technology through
various approaches, including access rights, network security, and data
masking.
Data leakage prevention is one of the key new additions under this theme and will
likely require a large time and financial investment to put in place for the first
time. Web filtering is another notable net new control that outlines how
organizations should filter web traffic to prevent users from visiting malicious
sites.
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Get Audit-Ready Faster With Drata's ISO 27001
Compliance Solution
Book a demo of Drata’s ISO 27001 compliance solution to learn how to get audit-ready
faster.
Schedule a Demo
Keep Reading
ARTICLE
ISO 27001 Risk Assessment: 10 Step Guide to an Effective Assessment
ARTICLE
ISO 27001: How to Write a Statement of Applicability
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
ARTICLE
Understanding ISO 27001 Controls: A Guide to Annex A
ARTICLE
5 Key Learnings From Our Path to ISO 27001
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Drata is a security and compliance automation platform that continuously monitors and collects
evidence of a company’s security controls, while streamlining workflows to ensure audit-readiness.
Solutions
Startup Scale
Enhance Drata Platform
Integrations
Frameworks
Resources
Blog Events
Webinars Reports
SOC 2 Hub ISO 27001 Hub
Product Updates Compliance Glossary
API Documentation
Company
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF
Trust
Work Email*
First Name*
Submit
Explore our developer-friendly HTML to PDF API Printed using PDFCrowd HTML to PDF