ISO 27001 compliance guide
ISO 27001 is the international standard for information security management. Whether required by customers or pursued voluntarily, we help you implement all 93 Annex A controls and achieve certification.
What is ISO 27001?
ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining and continually improving an information security management system (ISMS). It provides a systematic approach to managing sensitive company information based on risk assessment.
Latest version: ISO 27001:2022 replaced the 2013 version in October 2022. Organizations certified to the 2013 version must transition by October 31, 2025. The 2022 version restructured Annex A from 114 controls in 14 categories to 93 controls in 4 themes.
PDCA cycle
Plan-Do-Check-Act continuous improvement
Certification
Third-party audited and recognized globally
Complements SOC 2 for US markets and ISO 42001 for AI systems.
Who needs ISO 27001 certification?
Organizations handling sensitive data
Customer data, financial records, health information
Cloud service providers
SaaS, PaaS, IaaS providers requiring security certification
Financial services
Banks, fintech, payment processors
Healthcare organizations
Hospitals, clinics, health tech companies
Government contractors
Organizations working with public sector data
Global enterprises
Demonstrating security commitment to customers and partners
How VerifyWise supports ISO 27001 compliance
Purpose-built capabilities for ISMS implementation and certification
Asset inventory and information classification
Register all information assets with structured metadata covering ownership, classification and handling requirements. The platform captures the asset context required by A.5.9 and maintains the inventory mandated by A.5.1.
Addresses: A.5.1 Inventory of information, A.5.9 Asset classification
Risk assessment and treatment
Identify security risks using structured assessment methods aligned with ISO 27001 requirements. The platform tracks risk sources, treatment decisions and generates the documentation required by Clauses 6.1.2 and 8.2.
Addresses: Clause 6.1.2 Information security risk assessment, Clause 8.2 Risk treatment
ISMS policy and procedure management
Establish information security policies, define roles and generate procedures aligned with ISO 27001. The platform maintains policy versioning and approval workflows that satisfy Clause 5.2 and A.5.1.
Addresses: Clause 5.2 Information security policy, A.5.1 Policies for information security
Control implementation tracking
Track implementation of all 93 Annex A controls with evidence collection. The platform documents control status, responsible parties and maintains the audit trail required by Clause 6.1.3.
Addresses: Clause 6.1.3 Statement of Applicability, Clause 8.1 Operational planning
Continuous monitoring and metrics
Track ISMS performance with KPIs aligned to security objectives. The platform consolidates monitoring data, incident patterns and control effectiveness for ongoing visibility required by Clause 9.1.
Addresses: Clause 9.1 Monitoring and measurement, A.5.7 Threat intelligence
Internal audit and management review
Manage audit programs with structured workflows and feed findings into improvement cycles. The platform supports the Plan-Do-Check-Act cycle central to ISO 27001 certification and maintenance.
Addresses: Clause 9.2 Internal audit, Clause 9.3 Management review, Clause 10 Continual improvement
All ISMS activities maintain comprehensive audit trails with timestamps, assigned responsibilities and approval workflows. This demonstrates systematic information security management for certification audits.
Complete ISO 27001 requirements coverage
VerifyWise addresses all mandatory clauses and Annex A controls
Annex A controls in ISO 27001:2022
Controls with dedicated tooling
Coverage across all 4 themes
ISMS mandatory clauses and PDCA cycle
Policies, roles, supplier relationships
Screening, awareness, disciplinary
Secure areas, equipment, disposal
Access control, cryptography, logging
Built for ISO 27001:2022 certification
Statement of Applicability
Auto-generate SoA with control justifications and exclusions
Risk treatment plan
Track risk treatment decisions and residual risk acceptance
Internal audit program
Manage audit schedules, findings and corrective actions
Multi-framework mapping
Crosswalk to ISO 42001, SOC 2 and NIST requirements
ISMS mandatory clauses (4-10)
ISO 27001 follows the Plan-Do-Check-Act cycle across seven mandatory clauses
Context of the organization
Understand organizational context, interested parties, and define ISMS scope.
- Internal and external issues
- Interested parties and requirements
- ISMS scope determination
- Information security management system establishment
Leadership
Demonstrate leadership commitment and establish information security policy.
- Leadership and commitment
- Information security policy
- Organizational roles and responsibilities
- Assignment of authorities
Planning
Address risks and opportunities, set objectives and plan to achieve them.
- Actions to address risks and opportunities
- Information security risk assessment
- Information security risk treatment
- Information security objectives and planning
Support
Ensure resources, competence, awareness and documented information.
- Resources provision
- Competence requirements
- Awareness training
- Communication protocols
- Documented information control
Operation
Implement and operate ISMS processes.
- Operational planning and control
- Information security risk assessment execution
- Information security risk treatment implementation
Performance evaluation
Monitor, measure, analyze and evaluate ISMS performance.
- Monitoring, measurement, analysis and evaluation
- Internal audit program
- Management review
Improvement
Address nonconformities and continually improve ISMS.
- Nonconformity and corrective action
- Continual improvement of ISMS
PDCA cycle
Continuous improvement model
Annex A: 93 security controls
ISO 27001:2022 organizes controls into 4 themes covering organizational, people, physical and technological security
Organizational controls
37 controlsPolicies, procedures, roles, and organizational security measures.
Key controls
- • A.5.1 Policies for information security
- • A.5.7 Threat intelligence
- • A.5.9 Inventory of information and other associated assets
- • A.5.10 Acceptable use of information
- • A.5.23 Information security for use of cloud services
- • A.5.24 Information security incident management planning
Examples
Information security policy, asset classification, supplier security, incident response planning
People controls
8 controlsHuman resource security throughout the employment lifecycle.
Key controls
- • A.6.1 Screening
- • A.6.2 Terms and conditions of employment
- • A.6.3 Information security awareness, education and training
- • A.6.4 Disciplinary process
- • A.6.5 Responsibilities after termination
- • A.6.6 Confidentiality agreements
Examples
Background checks, security awareness training, employment contracts, offboarding procedures
Physical controls
14 controlsProtection of physical areas, equipment and assets.
Key controls
- • A.7.1 Physical security perimeters
- • A.7.2 Physical entry
- • A.7.4 Physical security monitoring
- • A.7.7 Clear desk and clear screen
- • A.7.10 Storage media
- • A.7.14 Secure disposal of equipment
Examples
Access control to offices, visitor management, CCTV, equipment disposal, clean desk policy
Technological controls
34 controlsTechnical security measures for systems and networks.
Key controls
- • A.8.1 User endpoint devices
- • A.8.2 Privileged access rights
- • A.8.3 Information access restriction
- • A.8.5 Secure authentication
- • A.8.10 Information deletion
- • A.8.24 Use of cryptography
- • A.8.28 Secure coding
Examples
Access control, encryption, logging, vulnerability management, secure development, backup
Note: Not all 93 controls apply to every organization. Your Statement of Applicability documents which controls you implement and provides justification for any exclusions based on your risk assessment.
Start control assessmentISO 27001:2022 vs 2013
Key changes in the latest version and transition requirements
| Aspect | ISO 27001:2022 | ISO 27001:2013 |
|---|---|---|
Structure | 4 themes: Organizational, People, Physical, Technological | 14 categories organized by topic |
Control count | 93 controls (streamlined and consolidated) | 114 controls (more granular) |
Naming convention | Attributes: Preventive, Detective, Corrective | Categories only |
Cloud focus | A.5.23 Cloud services explicit control | Cloud covered implicitly |
Threat intelligence | A.5.7 Dedicated threat intelligence control | Part of incident management |
Transition deadline | October 31, 2025 (all certifications must transition) | No longer valid after October 2025 |
Transition deadline: October 31, 2025
Organizations certified to ISO 27001:2013 must transition to ISO 27001:2022 by this date. After October 31, 2025, ISO 27001:2013 certificates will no longer be valid.
What changed: 11 new controls added, 24 controls merged, 58 controls updated. Focus on emerging risks including cloud security, threat intelligence, and information security for cloud services.
ISO 27001 certification process
Two-stage audit conducted by accredited certification bodies
Documentation review
Auditor reviews ISMS documentation to verify completeness
Key activities
- Review ISMS scope and policies
- Evaluate Statement of Applicability
- Assess risk assessment methodology
- Check documented procedures
Implementation audit
On-site assessment of ISMS implementation and operation
Key activities
- Verify control implementation
- Interview personnel
- Review evidence and records
- Test control effectiveness
- Identify nonconformities
Stage 1 + Stage 2 audit
Certification valid 3 years
Surveillance audits
Years 1 and 2 after certification
Recertification audit
Full reassessment
26-week implementation roadmap
Structured path from gap analysis to certification audit
Scoping and gap analysis
- Define ISMS scope and boundaries
- Conduct initial gap assessment
- Identify key stakeholders
- Establish project governance
Risk assessment and treatment
- Identify information assets
- Conduct risk assessment
- Select Annex A controls
- Develop Statement of Applicability
- Create risk treatment plan
Implementation and documentation
- Implement selected controls
- Develop ISMS policies and procedures
- Conduct security awareness training
- Establish monitoring processes
Audit and certification
- Conduct internal audit
- Management review
- Address findings
- Stage 1 and Stage 2 certification audit
ISO 27001 policy and procedure templates
Access ready-to-use ISMS documentation aligned with ISO 27001:2022 requirements and compatible with ISO 42001 and SOC 2
Organizational
- • Information Security Policy
- • Asset Management Policy
- • Supplier Security Policy
- • Incident Response Plan
- • Business Continuity Plan
- • Cloud Security Policy
- + 8 more policies
People & physical
- • Security Awareness Training
- • Acceptable Use Policy
- • Access Control Policy
- • Physical Security Policy
- • Clear Desk Procedure
- • Visitor Management
- + 6 more policies
Technological
- • Encryption Policy
- • Backup & Recovery Policy
- • Vulnerability Management
- • Logging & Monitoring
- • Secure Development Policy
- • Network Security Policy
- + 9 more policies
Frequently asked questions
Common questions about ISO 27001 certification
Ready to achieve ISO 27001 certification?
Start your ISMS implementation with our guided assessment and certification preparation tools.