InfoSec

What are ISO 27001 controls, and why do you need to know them?

ISO 27001:2022 is an updated version of the ISO 27001 standard. The previous version, ISO 27001:2013, included 114 controls, divided into 14 domains. The “Annex A” of ISO 27001:2022 contains many changes.

Autor
Dr. Kilian Schmidt
Datum
Aktualisiert am
28.2.2025
What are ISO 27001 controls, and why do you need to know them?

ISO 27001:2022 – What businesses need to know about the changes and their impact

On October 25, 2022, ISO/IEC published a new version of ISO 27001, reflecting the need to address ever-expanding threats to the information security management systems (ISMS) of organisations. While most changes are cosmetic—with existing requirements restructured and refined—the updates include objectives and controls for organisations to best arm themselves against emerging threats.

ISO 27001: 2022 is an updated version of the ISO 27001 standard. Its previous version, called ISO 27001:2013, contained 114 controls. These controls were divided across 14 domains. "Annex A" of ISO 27001: 2022 includes the following changes:

  • 11 new controls added,
  • 1 control separated into 2,
  • 57 controls merged into 24,
  • 23 controls renamed,
  • 3 controls removed, and
  • 35 controls remain unchanged.

Even the title of this Annex has been changed from "Reference control objectives and controls" to "Information security controls reference." In the latest version published in 2022, the number of controls has been reduced to a condensed set of 93 Annex A controls and grouped differently across four themes instead.

Annex A controls are grouped into four top-level categories.

ISO 27001: 2022 controls, 93 in total, under the updated standard have now been placed into the four themes. These four themes are the following:

1. Organisational controls

  • Number of controls: 37
  • Control numbers: ISO 27001 Annex A, 5.1 to 5.37

This theme encompasses the laws, regulations, and operations of the organisation in relation to its approach towards information security over a broad range of matters. Organisational controls are designed to address the issues focused on whether the organisation has a clear set of policies mapped out for keeping its ISMS secure, the security roles and responsibilities are clearly defined and effectively communicated, and proper access controls are in place.

  • Information security policies
  • Supplier relationships
  • Access controls
  • Asset management
  • Compliance

Other controls, including information security incident management and information security aspects of business continuity management, are newly added and are described under the 11 new controls section.

2. People controls

  • Number of controls: 8
  • Control numbers: ISO 27001 Annex A, 6.1 to 6.8

This theme focuses on how an organisation's personnel should interact with its data and information systems in order to alleviate risks pertaining to human factors. These controls cover secure human resource management, personnel security, and awareness and training. People controls require every employee in a company to be aware of their information security responsibilities, including security incident reporting and non-disclosure agreements.  

3. Physical controls

  • Number of controls: 14
  • Control numbers: ISO 27001 Annex A, 7.1 to 7.13

Physical controls are safeguards employed to ensure the security of tangible assets and, therefore, preserve confidential information. In general, an organisation should be protecting all the physical locations where it stores sensitive data, including offices, data centres, customer-facing premises, etc.  

  • Guidelines for clear desk policies,
  • guest access logs,
  • retention and disposal protocols,
  • entry and access control systems.

4. Technological controls

  • Number of controls: 34
  • Control numbers: ISO 27001 Annex A, 8.1 to 8.34

Technological controls are about measures that organisations should adopt to maintain a protected and compliant IT infrastructure. The measures include authentication and encryption of data and data loss prevention, which enable an organisation to secure data digitally and control access rights and network security.  

Key areas of technological controls:

  • Cryptography: The standard requires companies to document their encryption techniques and demonstrate that appropriate encryption is used according to business needs.
  • Operational Security: Protection of information processing facilities and ISMS systems.
  • Network Security: Protection against attacks through network configurations, firewalls, and detection systems.
  • System Acquisition, Development, and Maintenance: Security at every stage of information security systems.

11 new controls introduced in the ISO 27001: 2022 revision

  • A.5.7: Threat intelligence – Requires companies to collect threat information both internally and externally to protect against specific attacks and technologies.
  • A.5.23: Information security for the use of cloud services – Describes the management and protection of information in cloud services.
  • A.5.30: ICT-Readiness – Requires that ICT readiness for business continuity objectives is planned, implemented, maintained, and tested.
  • A.7.4: Physical security monitoring – Mandates the monitoring of sensitive areas such as offices and production facilities.
  • A.8.9: Configuration management – Ensures that IT configurations are defined, documented, monitored, and reviewed.
  • A.8.10: Information deletion – Requires companies to delete data once its purpose has been fulfilled.
  • A.8.11: Data masking – Utilizes data masking techniques like encryption to protect sensitive data.
  • A.8.12: Data leakage prevention – Implements measures to minimize the risk of unauthorized data disclosure.
  • A.8.16: Monitoring activities – Calls for continuous monitoring of networks, technological resources, and software applications.
  • A.8.23: Web filtering – Protects companies from websites containing potentially harmful code.
  • A.8.28: Secure coding – Requires security measures to minimize vulnerabilities in code.

Der Founder-Guide zur NIS2: Bereite dein Unternehmen jetzt vor

Schütze dein Startup: Entdecke, wie sich NIS2 auf dein Unternehmen auswirken kann und was du jetzt beachten musst. Lies jetzt das kostenlose Whitepaper!

Der Founder-Guide zur NIS2: Bereite dein Unternehmen jetzt vor

Schütze dein Startup: Entdecke, wie sich NIS2 auf dein Unternehmen auswirken kann und was du jetzt beachten musst. Lies jetzt das kostenlose Whitepaper!

What are ISO 27001 controls, and why do you need to know them?
Bereit, deine Compliance auf Autopilot zu setzen?
Dr Kilian Schmidt

Dr Kilian Schmidt

CEO & Co-Founder, Kertos GmbH

Dr. Kilian Schmidt entwickelte schon früh ein starkes Interesse an rechtlichen Prozessen. Nach seinem Studium der Rechtswissenschaften begann er seine Karriere als Senior Legal Counsel und Datenschutzbeauftragter bei der Home24 Gruppe. Nach einer Tätigkeit bei Freshfields Bruckhaus Deringer wechselte er zu TIER Mobility, wo er als General Counsel maßgeblich am Ausbau der Rechts- und Public Policy-Abteilung beteiligt war - und das Unternehmen von einer auf 65 Städte und von 50 auf 800 Mitarbeiter vergrößerte. Motiviert durch die begrenzten technologischen Fortschritte im Rechtsbereich und inspiriert durch seine beratende Tätigkeit bei Gorillas Technologies, war er Co-Founder von Kertos, um die nächste Generation der europäischen Datenschutztechnologie zu entwickeln.

Über Kertos

Kertos ist das moderne Rückgrat der Datenschutz- und Compliance-Aktivitäten von skalierenden Unternehmen. Wir befähigen unsere Kunden, integrale Datenschutz- und Informationssicherheitsprozesse nach DSGVO, ISO 27001, TISAX®, SOC2 und vielen weiteren Standards durch Automatisierung schnell und günstig zu implementieren.

Bereit für Entlastung in Sachen DSGVO?

CTA Image