ISO 27001:2022
International standard for establishing, implementing, maintaining and continually improving an information security management system (ISMS)
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (4)
A.5 Organizational Controls
Information security policies, roles, and organizational measures
| Code | Title |
|---|---|
| ISO27001-A.5.1 | Information security policy management |
| ISO27001-A.5.10 | Permitted use of organisational assets |
| ISO27001-A.5.11 | Asset retrieval upon role change or exit |
| ISO27001-A.5.12 | Data sensitivity classification scheme |
| ISO27001-A.5.13 | Sensitivity marking and labelling practices |
| ISO27001-A.5.14 | Secure data exchange procedures |
| ISO27001-A.5.15 | Logical access governance |
| ISO27001-A.5.16 | User identity lifecycle management |
| ISO27001-A.5.17 | Credential and secret management |
| ISO27001-A.5.18 | Access entitlement provisioning and review |
| ISO27001-A.5.19 | Third-party security risk management |
| ISO27001-A.5.2 | Security roles and accountability assignments |
| ISO27001-A.5.20 | Security clauses in supplier contracts |
| ISO27001-A.5.21 | ICT supply chain security oversight |
| ISO27001-A.5.22 | Supplier performance and change monitoring |
| ISO27001-A.5.23 | Cloud service security governance |
| ISO27001-A.5.24 | Incident response planning and readiness |
| ISO27001-A.5.25 | Security event triage and escalation |
| ISO27001-A.5.26 | Incident containment and remediation |
| ISO27001-A.5.27 | Post-incident review and improvement |
| ISO27001-A.5.28 | Digital evidence preservation |
| ISO27001-A.5.29 | Security continuity during disruptions |
| ISO27001-A.5.3 | Separation of conflicting duties |
| ISO27001-A.5.30 | Technology readiness for business recovery |
| ISO27001-A.5.31 | Legal and regulatory obligation tracking |
| ISO27001-A.5.32 | Intellectual property safeguards |
| ISO27001-A.5.33 | Records retention and integrity |
| ISO27001-A.5.34 | Personal data and privacy safeguards |
| ISO27001-A.5.35 | Independent security programme review |
| ISO27001-A.5.36 | Policy and standards conformance verification |
| ISO27001-A.5.37 | Operational procedure documentation |
| ISO27001-A.5.4 | Management accountability for security |
| ISO27001-A.5.5 | Engagement with regulatory and law enforcement bodies |
| ISO27001-A.5.6 | Participation in security communities and forums |
| ISO27001-A.5.7 | Cyber threat intelligence gathering |
| ISO27001-A.5.8 | Security integration in project delivery |
| ISO27001-A.5.9 | Asset register and ownership tracking |
| ISO27001-ISMS-6.1 | Cl. 6.1 Information security risk assessment — planning actions to address risks and opportunities in the ISMS |
| ISO27001-ISMS-7.1 | Cl. 7.1 Resources — determining and providing resources needed for the information security management system |
A.6 People Controls
Security measures related to human resources
| Code | Title |
|---|---|
| ISO27001-A.6.1 | Pre-employment background verification |
| ISO27001-A.6.2 | Security obligations in employment agreements |
| ISO27001-A.6.3 | Security awareness and competence programmes |
| ISO27001-A.6.4 | Formal response to policy violations |
| ISO27001-A.6.5 | Obligations upon departure or role change |
| ISO27001-A.6.6 | Non-disclosure and confidentiality commitments |
| ISO27001-A.6.7 | Secure remote and hybrid working |
| ISO27001-A.6.8 | Security event and weakness reporting |
A.7 Physical Controls
Physical and environmental security measures
| Code | Title |
|---|---|
| ISO27001-A.7.1 | Defined secure zones and boundaries |
| ISO27001-A.7.10 | Removable and portable media handling |
| ISO27001-A.7.11 | Power and infrastructure resilience |
| ISO27001-A.7.12 | Network and power cabling protection |
| ISO27001-A.7.13 | Preventive and corrective equipment upkeep |
| ISO27001-A.7.14 | Secure decommissioning and media sanitisation |
| ISO27001-A.7.2 | Controlled facility entry and authentication |
| ISO27001-A.7.3 | Workspace and facility hardening |
| ISO27001-A.7.4 | Physical surveillance and monitoring |
| ISO27001-A.7.5 | Environmental and natural hazard protection |
| ISO27001-A.7.6 | Conduct requirements in restricted areas |
| ISO27001-A.7.7 | Unattended workspace and screen hygiene |
| ISO27001-A.7.8 | Equipment placement and environmental safeguards |
| ISO27001-A.7.9 | Off-site asset protection |
A.8 Technological Controls
Technology-based security controls
| Code | Title |
|---|---|
| ISO27001-A.8.1 | Endpoint device security management |
| ISO27001-A.8.10 | Controlled data removal and purging |
| ISO27001-A.8.11 | Sensitive data obfuscation techniques |
| ISO27001-A.8.12 | Unauthorised data exfiltration prevention |
| ISO27001-A.8.13 | Backup strategy and recovery assurance |
| ISO27001-A.8.14 | Processing infrastructure high availability |
| ISO27001-A.8.15 | Audit trail and event logging |
| ISO27001-A.8.16 | Continuous activity and anomaly monitoring |
| ISO27001-A.8.17 | Time source synchronisation |
| ISO27001-A.8.18 | Restricted use of system-level utilities |
| ISO27001-A.8.19 | Controlled software deployment to production |
| ISO27001-A.8.2 | Elevated privilege governance |
| ISO27001-A.8.20 | Network infrastructure security |
| ISO27001-A.8.21 | Network service provider assurance |
| ISO27001-A.8.22 | Network segmentation and zoning |
| ISO27001-A.8.23 | Internet content filtering controls |
| ISO27001-A.8.24 | Cryptographic protection and key management |
| ISO27001-A.8.25 | Security-integrated development lifecycle |
| ISO27001-A.8.26 | Application-level security requirements |
| ISO27001-A.8.27 | Secure architecture and design principles |
| ISO27001-A.8.28 | Secure software coding standards |
| ISO27001-A.8.29 | Security validation in development and acceptance |
| ISO27001-A.8.3 | Data access restriction enforcement |
| ISO27001-A.8.30 | Third-party development oversight |
| ISO27001-A.8.31 | Environment separation for dev, test, and production |
| ISO27001-A.8.32 | Controlled change implementation |
| ISO27001-A.8.33 | Test data protection and management |
| ISO27001-A.8.34 | Audit-period system integrity safeguards |
| ISO27001-A.8.4 | Source code repository protection |
| ISO27001-A.8.5 | Strong authentication mechanisms |
| ISO27001-A.8.6 | Resource and capacity planning |
| ISO27001-A.8.7 | Malicious software defence |
| ISO27001-A.8.8 | Vulnerability identification and remediation |
| ISO27001-A.8.9 | Secure baseline configuration management |
Maps to 614 other frameworks
Frequently Asked Questions
What is ISO 27001:2022?
ISO 27001:2022 is a compliance framework from International with 4 domains and 95 controls. International standard for establishing, implementing, maintaining and continually improving an information security management system (ISMS) It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does ISO 27001:2022 have?
ISO 27001:2022 has 95 controls organised across 4 domains. The largest domains are A.5 Organizational Controls (39 controls), A.8 Technological Controls (34 controls), A.7 Physical Controls (14 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does ISO 27001:2022 map to?
ISO 27001:2022 maps to 614 other compliance frameworks. The top mapping partners are CSA CCM v4 (32% coverage), TISAX — Trusted Information Security Assessment Exchange (27% coverage), ASD Information Security Manual (ISM) (25% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with ISO 27001:2022 compliance?
Start your ISO 27001:2022 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ISO 27001:2022 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 95 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required