ISO 27019
Information security controls for the energy utility industry
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (5)
ISO 27019: Access Management
Controlling access to critical infrastructure systems (ISO 27019)
| Code | Title |
|---|---|
| ISO27019-06 | Physical and logical access controls |
| ISO27019-07 | Personnel risk assessment |
| ISO27019-08 | Electronic access perimeter management |
| ISO27019-09 | Interactive remote access security |
| ISO27019-10 | Revocation of access procedures |
ISO 27019: Asset Identification & Governance
Identifying and governing critical assets (ISO 27019)
| Code | Title |
|---|---|
| ISO27019-01 | Critical asset identification and inventory |
| ISO27019-02 | System security categorization |
| ISO27019-03 | Security governance structure |
| ISO27019-04 | Roles and responsibilities for critical systems |
| ISO27019-05 | Security policy for operational technology |
ISO 27019: Incident Response & Recovery
Responding to incidents in critical infrastructure (ISO 27019)
| Code | Title |
|---|---|
| ISO27019-16 | Incident response plan for operational disruptions |
| ISO27019-17 | Recovery plan for critical systems |
| ISO27019-18 | Reporting obligations to authorities |
| ISO27019-19 | Coordination with sector-specific agencies |
| ISO27019-20 | Exercises and drills for OT incidents |
ISO 27019: Supply Chain & Configuration
Managing supply chain and system configurations (ISO 27019)
| Code | Title |
|---|---|
| ISO27019-21 | Supply chain risk management for critical components |
| ISO27019-22 | Configuration management for OT systems |
| ISO27019-23 | Change management procedures |
| ISO27019-24 | Vulnerability assessment for critical systems |
ISO 27019: Systems Security
Securing operational technology systems (ISO 27019)
| Code | Title |
|---|---|
| ISO27019-11 | Security patch management for OT |
| ISO27019-12 | Malware prevention for operational systems |
| ISO27019-13 | Network security monitoring |
| ISO27019-14 | System security hardening |
| ISO27019-15 | Ports and services management |
Maps to 555 other frameworks
Frequently Asked Questions
What is ISO 27019?
ISO 27019 is a compliance framework from International with 5 domains and 24 controls. Information security controls for the energy utility industry It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does ISO 27019 have?
ISO 27019 has 24 controls organised across 5 domains. The largest domains are ISO 27019: Access Management (5 controls), ISO 27019: Asset Identification & Governance (5 controls), ISO 27019: Incident Response & Recovery (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does ISO 27019 map to?
ISO 27019 maps to 555 other compliance frameworks. The top mapping partners are IEEE 1686 (67% coverage), API 1164 (67% coverage), IEC 62443 (67% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with ISO 27019 compliance?
Start your ISO 27019 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ISO 27019 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 24 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required