Skip to main content
ISO 27001:2022

Annex A Controls
Complete Reference

The 2022 update reorganized controls from 114 in 14 domains to 93 controls in 4 themes: Organizational, People, Physical, and Technological.

A.5

Organizational Controls

37 Controls

A.5.1

Policies for information security

Establish and communicate information security policies.

A.5.2

Information security roles and responsibilities

Define and allocate security responsibilities.

A.5.3

Segregation of duties

Separate conflicting duties to reduce risk of fraud or error.

A.5.4

Management responsibilities

Ensure management enforces security policies.

A.5.5

Contact with authorities

Maintain appropriate contact with relevant authorities.

A.5.6

Contact with special interest groups

Maintain contact with security forums and associations.

A.5.7

Threat intelligence

Collect and analyze information about security threats.

A.5.8

Information security in project management

Integrate security into project management.

A.5.9

Inventory of information and other associated assets

Identify and maintain an inventory of assets.

A.5.10

Acceptable use of information and other associated assets

Define rules for acceptable use of assets.

A.5.11

Return of assets

Ensure return of assets upon termination.

A.5.12

Classification of information

Classify information according to its value and sensitivity.

A.5.13

Labelling of information

Develop procedures for labelling information.

A.5.14

Information transfer

Protect information during transfer.

A.5.15

Access control

Establish access control policy based on business requirements.

A.5.16

Identity management

Manage the full lifecycle of identities.

A.5.17

Authentication information

Control allocation of authentication information.

A.5.18

Access rights

Provision and revoke access rights.

A.5.19

Information security in supplier relationships

Address security in supplier agreements.

A.5.20

Addressing information security within supplier agreements

Include security requirements in supplier contracts.

A.5.21

Managing information security in the ICT supply chain

Manage security risks in the supply chain.

A.5.22

Monitoring, review and change management of supplier services

Monitor and review supplier services.

A.5.23

Information security for use of cloud services

Manage security of cloud service usage.

A.5.24

Information security incident management planning and preparation

Plan and prepare for incident management.

A.5.25

Assessment and decision on information security events

Assess security events and decide on classification.

A.5.26

Response to information security incidents

Respond to incidents according to procedures.

A.5.27

Learning from information security incidents

Use incidents to improve security.

A.5.28

Collection of evidence

Collect and preserve evidence.

A.5.29

Information security during disruption

Maintain security during disruptions.

A.5.30

ICT readiness for business continuity

Plan for ICT continuity.

A.5.31

Legal, statutory, regulatory and contractual requirements

Identify applicable requirements.

A.5.32

Intellectual property rights

Protect intellectual property.

A.5.33

Protection of records

Protect records from loss and unauthorized access.

A.5.34

Privacy and protection of PII

Ensure privacy and PII protection.

A.5.35

Independent review of information security

Conduct independent security reviews.

A.5.36

Compliance with policies, rules and standards for information security

Ensure compliance with security policies.

A.5.37

Documented operating procedures

Document operating procedures.

A.6

People Controls

8 Controls

A.6.1

Screening

Verify backgrounds of personnel before employment.

A.6.2

Terms and conditions of employment

Include security responsibilities in employment contracts.

A.6.3

Information security awareness, education and training

Provide ongoing security training.

A.6.4

Disciplinary process

Establish formal disciplinary process for security violations.

A.6.5

Responsibilities after termination or change of employment

Define post-employment security responsibilities.

A.6.6

Confidentiality or non-disclosure agreements

Use NDAs to protect confidential information.

A.6.7

Remote working

Implement security measures for remote work.

A.6.8

Information security event reporting

Enable and encourage event reporting.

A.7

Physical Controls

14 Controls

A.7.1

Physical security perimeters

Define and secure physical perimeters.

A.7.2

Physical entry

Secure areas with appropriate entry controls.

A.7.3

Securing offices, rooms and facilities

Design and apply physical security.

A.7.4

Physical security monitoring

Monitor premises continuously.

A.7.5

Protecting against physical and environmental threats

Protect against environmental risks.

A.7.6

Working in secure areas

Define procedures for working in secure areas.

A.7.7

Clear desk and clear screen

Implement clear desk and screen policies.

A.7.8

Equipment siting and protection

Position equipment to reduce risks.

A.7.9

Security of assets off-premises

Protect assets used outside premises.

A.7.10

Storage media

Manage storage media throughout lifecycle.

A.7.11

Supporting utilities

Protect equipment from power failures.

A.7.12

Cabling security

Protect power and telecommunications cabling.

A.7.13

Equipment maintenance

Maintain equipment to ensure availability.

A.7.14

Secure disposal or re-use of equipment

Sanitize equipment before disposal or re-use.

A.8

Technological Controls

34 Controls

A.8.1

User endpoint devices

Protect information on endpoint devices.

A.8.2

Privileged access rights

Restrict and manage privileged access.

A.8.3

Information access restriction

Restrict access according to access control policy.

A.8.4

Access to source code

Restrict access to source code.

A.8.5

Secure authentication

Implement secure authentication mechanisms.

A.8.6

Capacity management

Monitor and manage resource capacity.

A.8.7

Protection against malware

Implement malware protection.

A.8.8

Management of technical vulnerabilities

Identify and address vulnerabilities.

A.8.9

Configuration management

Establish secure configurations.

A.8.10

Information deletion

Delete information when no longer required.

A.8.11

Data masking

Mask data according to access control policy.

A.8.12

Data leakage prevention

Apply DLP measures.

A.8.13

Information backup

Maintain and test backups.

A.8.14

Redundancy of information processing facilities

Implement redundancy for availability.

A.8.15

Logging

Produce, store, and protect logs.

A.8.16

Monitoring activities

Monitor networks and systems.

A.8.17

Clock synchronization

Synchronize clocks to reference time.

A.8.18

Use of privileged utility programs

Restrict and control utility program use.

A.8.19

Installation of software on operational systems

Control software installation.

A.8.20

Networks security

Secure and manage networks.

A.8.21

Security of network services

Identify security mechanisms for network services.

A.8.22

Segregation of networks

Segregate networks by function.

A.8.23

Web filtering

Manage access to external websites.

A.8.24

Use of cryptography

Define rules for cryptographic controls.

A.8.25

Secure development life cycle

Establish secure development rules.

A.8.26

Application security requirements

Identify security requirements.

A.8.27

Secure system architecture and engineering principles

Apply secure architecture principles.

A.8.28

Secure coding

Apply secure coding principles.

A.8.29

Security testing in development and acceptance

Define and implement security testing.

A.8.30

Outsourced development

Direct and monitor outsourced development.

A.8.31

Separation of development, test and production environments

Separate environments.

A.8.32

Change management

Control changes through change management.

A.8.33

Test information

Select and protect test information.

A.8.34

Protection of information systems during audit testing

Plan audit tests to minimize disruption.

Ready to Implement These Controls?

Get a gap assessment to understand which controls you already have in place and what needs to be implemented.

KA

Kevin A

CISSPCISMCCSPAWS Security Specialist

Principal Security & GRC Engineer

Kevin is a security engineer turned GRC specialist. He focuses on mapping cloud-native infrastructure (AWS/Azure/GCP) to modern compliance frameworks, ensuring that security controls are both robust and auditor-ready without slowing down development cycles.