Filter posts by category

ISO 27001 Annex A 6.6 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 6.6 – A certification bodies guide

Implementing ISO 27001 Annex A 6.6 Confidentiality or Non-disclosure Agreements Protecting your information is the heart of information security. While firewalls and passwords keep digital intruders out, legal frameworks ensure that the people you trust with your data actually keep it safe. This is where ISO 27001 Annex A 6.6 comes into play. It deals

How to implement ISO 27001 Annex A 6.6 – A certification bodies guide Read More »

ISO 27001 Annex A 6.5 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 6.5 – A certification bodies guide

Implementing ISO 27001 Annex A 6.5 Responsibilities After Termination or Change of Employment You are looking at Annex A 6.5 and wondering what it actually means for your business. As a certification body, we see many organisations overthink this control. It is actually quite straightforward. You need to ensure that information security does not stop

How to implement ISO 27001 Annex A 6.5 – A certification bodies guide Read More »

ISO 27001 Annex A 7.11 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 7.11 – A certification bodies guide

How to Implement ISO 27001 Annex A 7.11 Supporting Utilities When you start your journey toward information security, it is easy to focus entirely on digital threats. You think about hackers, malware, and phishing scams. However, as an ISO 27001 certification body, we often see organisations overlook the physical backbone of their security. This is

How to implement ISO 27001 Annex A 7.11 – A certification bodies guide Read More »

ISO 27001 Annex A 7.5 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 7.5 – A certification bodies guide

Implementing ISO 27001 Annex A 7.5: Protecting Against Physical and Environmental Threats You might spend weeks securing your network firewalls and encrypting your databases, but have you considered what happens if the building catches fire? At ISO27001.com, we often see organisations focus heavily on digital threats while overlooking the physical reality of where their data

How to implement ISO 27001 Annex A 7.5 – A certification bodies guide Read More »

ISO 27001 Annex A 8.4 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.4 – A certification bodies guide

How to Implement ISO 27001 Annex A 8.4 Access to Source Code When you begin your journey toward ISO 27001 certification, you will quickly realise that your information assets are not just physical files or customer databases. For many organisations, especially those developing software, the source code is the crown jewel. It holds your intellectual

How to implement ISO 27001 Annex A 8.4 – A certification bodies guide Read More »

ISO 27001 Annex A 8.14 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.14 – A certification bodies guide

Welcome to our guide on one of the most critical technical controls in the standard. We are ISO27001.com and we help organisations like yours navigate the complexities of certification. Today we are looking at Annex A 8.14 which is titled Redundancy of information processing facilities. This might sound technical but the concept is actually quite

How to implement ISO 27001 Annex A 8.14 – A certification bodies guide Read More »

ISO 27001 Annex A 8.17 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.17 – A certification bodies guide

Time is one of the most critical yet overlooked aspects of information security. When you are building your Information Security Management System (ISMS), you will eventually encounter Annex A 8.17. This control deals with clock synchronisation. At ISO27001.com, we often see organisations fail this control simply because they assume their computers handle time automatically. While

How to implement ISO 27001 Annex A 8.17 – A certification bodies guide Read More »

ISO 27001 Annex A 8.18 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.18 – A certification bodies guide

How to Implement ISO 27001 Annex A 8.18 Use of Privileged Utility Programs When you start your journey toward information security, you quickly realize that not all software is created equal. Some programs have the power to override your system controls and bypass security measures. These are known as privileged utility programs. In the ISO

How to implement ISO 27001 Annex A 8.18 – A certification bodies guide Read More »

ISO 27001 Annex A 8.20 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.20 – A certification bodies guide

Network security is often seen as the backbone of a robust information security management system. When you look at ISO 27001 Annex A 8.20, you are looking at the specific control designed to protect your network infrastructure. At ISO27001.com, we find that many beginners feel overwhelmed by the technical jargon associated with this control. However,

How to implement ISO 27001 Annex A 8.20 – A certification bodies guide Read More »

ISO 27001 Annex A 8.21 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.21 – A certification bodies guide

Implementing ISO 27001 Annex A 8.21 Security of Information in the ICT Supply Chain Welcome to this guide on one of the more critical controls in the modern information security landscape. If you are looking to achieve certification, you likely know that the way you handle your technology partners matters. We see many organisations struggle

How to implement ISO 27001 Annex A 8.21 – A certification bodies guide Read More »

ISO 27001 Annex A 8.22 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.22 – A certification bodies guide

Welcome to your guide on implementing one of the most technical yet vital controls in the ISO 27001 standard. At ISO27001.com, we often see clients struggle with network security because they overcomplicate the basics. Annex A 8.22, titled Segregation of Networks, is all about keeping your digital assets safe by dividing them into manageable pieces.

How to implement ISO 27001 Annex A 8.22 – A certification bodies guide Read More »

ISO 27001 Annex A 8.27 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.27 – A certification bodies guide

Welcome to your guide on tackling one of the more technical aspects of the standard. If you are reading this you are likely looking at Annex A 8.27 and wondering how to translate “Secure system architecture and engineering principles” into something practical. As an ISO 27001 certification body we see many organisations struggle here because

How to implement ISO 27001 Annex A 8.27 – A certification bodies guide Read More »

ISO 27001 Annex A 8.29 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.29 – A certification bodies guide

How to Implement ISO 27001 Annex A 8.29 Security testing in development and acceptance Welcome to this guide on implementing Annex A 8.29. At ISO27001.com, we often see organisations struggle with the bridge between writing code and securing it. This control, formally known as “Security testing in development and acceptance,” is vital for your information

How to implement ISO 27001 Annex A 8.29 – A certification bodies guide Read More »

How to implement ISO 27001 Annex A 8.31 – A certification bodies guide

Implementing ISO 27001 Annex A 8.31: Separation of Development, Test, and Production Environments Welcome to the specific control that keeps your IT operations from descending into chaos. If you are new to the standard, ISO 27001 Annex A 8.31 might sound like just another technical hurdle. However, it is actually one of the most practical

How to implement ISO 27001 Annex A 8.31 – A certification bodies guide Read More »

ISO 27001 Annex A 8.34 A Certification Bodies Official Guide to Implementing

How to implement ISO 27001 Annex A 8.34 – A certification bodies guide

Implementing ISO 27001 Annex A 8.34: Protection of Information Systems During Audit Testing Audits are a vital part of maintaining a healthy information security management system. However, the very act of auditing can sometimes pose a risk to your operations. Imagine a scenario where a penetration tester accidentally brings down your live website or an

How to implement ISO 27001 Annex A 8.34 – A certification bodies guide Read More »

ISO 27001 Annex A 8.33 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.33

If you are navigating the transition from the old ISO 27001:2013 standard to the shiny new ISO 27001:2022 version, you’ve probably noticed that things have been moved around quite a bit. The Annex A controls have been consolidated, renamed, and in many cases, sharpened to deal with modern digital risks. One specific area that has

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.33 Read More »

ISO 27001 Annex A 8.32 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.32

If you have been keeping up with the world of information security, you’ve likely noticed that the ISO 27001 standard recently underwent its first major refresh in nearly a decade. For those managing compliance, the transition from the 2013 version to the ISO 27001:2022 update felt like a significant shift, particularly regarding how the Annex

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.32 Read More »

ISO 27001 Annex A 8.31 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.31

If you have been working with information security standards for a while, you will know that the transition from ISO 27001:2013 to the ISO 27001:2022 update brought about some significant “housekeeping.” While the core requirements of the management system stayed largely the same, the Annex A controls underwent a massive facelift. One of the most

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.31 Read More »

ISO 27001 Annex A 8.30 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.30

When it comes to building software, many organisations choose to look outside their own walls for talent. Whether it is a specialist agency, a freelance developer, or an offshore team, outsourcing can speed up delivery and lower costs. However, from a security perspective, it often feels like handing over the keys to your house and

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.30 Read More »

ISO 27001 Annex A 8.29 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.29

If you are navigating the transition from the old ISO 27001:2013 standard to the updated 2022 version, you have likely noticed that things look quite different. The Annex A controls have been streamlined, reordered, and in many cases, strengthened. One area that has seen a significant shift in focus is how we validate our security

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.29 Read More »

ISO 27001 Annex A 8.28 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.28

If you have been working within the framework of information security for a while, you’ve likely noticed that the ISO 27001 standard recently had a major makeover. One of the most significant shifts occurred in how we handle software development. Specifically, we are looking at the transition from the 2013 controls to the 2022 version’s

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.28 Read More »

ISO 27001 Annex A 8.27 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.27

If you have been working with information security standards for a while, you know that the transition from ISO 27001:2013 to the 2022 update brought about some significant structural changes. One of the most talked-about additions is Control 8.27, which focuses on Secure System Architecture and Engineering. But if you are looking for this specific

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.27 Read More »

ISO 27001 Annex A 8.25 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.25

Transitioning from ISO 27001:2013 to the 2022 update is a significant milestone for any security-conscious organisation. It isn’t just about moving numbers around; it’s about modernising how we protect data in a world of rapid DevOps and cloud-native building. One of the most impactful changes for development teams is found in Annex A 8.25: Secure

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.25 Read More »

ISO 27001 Annex A 8.22 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.22

If you have been following the evolution of cybersecurity standards, you know that the leap from ISO 27001:2013 to the 2022 version was more than a simple rebrand. It was a tactical shift designed to address the complexities of modern infrastructure, think cloud-native environments, hybrid work, and zero-trust architectures. One of the most vital technical

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.22 Read More »

ISO 27001 Annex A 8.19 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.19

If you have been working with information security standards for any length of time, you know that the transition from ISO 27001:2013 to the ISO 27001:2022 update brought about some significant “housekeeping.” While many of the core principles stayed the same, the way they are organised and prioritised shifted to meet the demands of a

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.19 Read More »

ISO 27001 Annex A 8.18 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.18

If you have been navigating the transition from the old ISO 27001:2013 standard to the new ISO 27001:2022 version, you’ve likely noticed that the Annex A controls have had a significant makeover. One of the most critical shifts involves how we handle the “keys to the kingdom”, specifically, privileged access rights. In the new 2022

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.18 Read More »

ISO 27001 Annex A 8.16 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.16

When comparing the ISO 27001:2013 standard to the 2022 update, you might be searching for the old control that corresponds to Annex A 8.16: Monitoring Activities. The truth is, while the spirit of monitoring was present in the 2013 version (often tucked into incident management or logging), the 2022 update elevates it to a dedicated,

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.16 Read More »

ISO 27001 Annex A 8.15 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.15

In the transition from ISO 27001:2013 to the 2022 update, the way we handle system audit trails has become much more streamlined. If you are reviewing your old Statement of Applicability (SoA) and looking for the specific requirements for logs, you will find they have been unified under Annex A 8.15: Logging. While the fundamental

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.15 Read More »

ISO 27001 Annex A 8.14 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.14

In the transition from ISO 27001:2013 to the 2022 update, the way we talk about keeping the lights on has become much more sophisticated. If you are looking at your old Statement of Applicability (SoA) and trying to find where your redundancy requirements moved, they are now under Annex A 8.14: Redundancy of Information Processing

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.14 Read More »

ISO 27001 Annex A 8.9 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.9

One of the most significant shifts in the transition from ISO 27001:2013 to the 2022 update is the introduction of dedicated controls for modern technical challenges. While many older controls were simply merged or renamed, Annex A 8.9: Configuration Management is a standout addition. It marks a transition from “informal” setup practices to a mandatory,

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.9 Read More »

ISO 27001 Annex A 8.8 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.8

If you’ve been managing your information security using the 2013 version of ISO 27001, you’ll know that staying on top of software bugs and system weaknesses has always been a core requirement. However, in the 2022 update, the landscape of “Management of Technical Vulnerabilities” has shifted significantly. What used to be Control 12.6.1 is now

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.8 Read More »

ISO 27001 Annex A 8.7 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.7

Malware has evolved rapidly since the 2013 version of ISO 27001 was released. Back then, “antivirus” was often seen as a set-it-and-forget-it tool. Today, we face ransomware, fileless malware, and sophisticated phishing campaigns that can bypass traditional signatures. To address this, the 2022 update transformed the old Control 12.2.1 into Annex A 8.7: Protection Against

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.7 Read More »

ISO 27001 Annex A 8.5 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.5

If you have been managing an Information Security Management System (ISMS) based on the 2013 standard, you likely remember Control 9.4.2, which focused heavily on “Secure log-on procedures.” As we transition into the ISO 27001:2022 era, this has been refined and renamed to Annex A 8.5: Secure Authentication. The update reflects a major shift in

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 8.5 Read More »

ISO 27001 Annex A 7.14 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.14

When an organisation upgrades its IT hardware, the old equipment doesn’t just disappear. Whether you are donating old laptops to charity, returning leased servers, or sending decommissioned hard drives to a recycler, you are handling a potential “data goldmine” for attackers. This is where ISO 27001 comes in to ensure that your “trash” doesn’t become

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.14 Read More »

ISO 27001 Annex A 7.13 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.13

If you are navigating the transition from the old ISO 27001:2013 standard to the updated 2022 version, you have likely noticed that the Annex A controls have undergone a significant facelift. One of the specific areas that has moved is the control regarding equipment maintenance. In the 2013 version, this sat under the somewhat clunky

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.13 Read More »

ISO 27001 Annex A 7.10 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.10

When the ISO 27001 standard was updated in 2022, one of the primary goals was to simplify the complex web of 114 controls and make them more intuitive for modern businesses. One area that benefited significantly from this “clean-up” is the management of physical storage media. In the 2022 version, several older controls were consolidated

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.10 Read More »

ISO 27001 Annex A 7.9 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.9

Transitioning from ISO 27001:2013 to the 2022 update involves more than just renumbering controls. It represents a fundamental shift in how we view the “perimeter” of our businesses. In the 2013 era, assets usually stayed within the four walls of an office. Today, your assets are in coffee shops, home offices, and transit hubs. This

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.9 Read More »

ISO 27001 Annex A 7.6 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.6

When you are upgrading your Information Security Management System (ISMS) from the 2013 version to the 2022 update, you will notice that the “Physical” theme has been streamlined to reflect modern working environments. One of the most critical controls for any organization handling sensitive hardware or physical records is the management of secure areas. In

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.6 Read More »

ISO 27001 Annex A 7.5 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.5

When transitioning from the 2013 version of ISO 27001 to the 2022 update, many organisations focus heavily on the new digital controls. However, the physical environment remains a massive risk factor. In the 2022 version, the protection against external and environmental threats has been refined and moved to Annex A 7.5: Protecting against physical and

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.5 Read More »

ISO 27001 Annex A 7.4 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.4

If you are in the middle of transitioning your Information Security Management System (ISMS) from the 2013 version to the 2022 update, you have probably noticed that the physical security section has been given a significant upgrade. While the older version focused heavily on perimeters and entry points, the new standard introduces a more proactive

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.4 Read More »

ISO 27001 Annex A 7.3 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.3

When you are navigating the transition from ISO 27001:2013 to the 2022 update, it is easy to get caught up in the digital jargon of cloud security and threat intelligence. However, the physical environment remains a critical pillar of any robust Information Security Management System (ISMS). One of the most important shifts in the physical

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.3 Read More »

ISO 27001 Annex A 7.1 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.1

When most people think of ISO 27001, they immediately think of digital threats, hackers, firewalls, and encryption. But a significant portion of the standard has always been dedicated to the “real world.” In the transition from the 2013 version to the 2022 update, the rules for protecting your physical space were given a modern makeover.

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 7.1 Read More »

ISO 27001 Annex A 6.6 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 6.6

In the transition from ISO 27001:2013 to the 2022 update, the standard underwent a significant structural “clean up.” While many people focus on the brand-new technical controls, some of the most practical changes happened to the way we manage legal and people-centric risks. Annex A 6.6: Confidentiality or Non-Disclosure Agreements (NDAs) is a prime example.

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 6.6 Read More »

ISO 27001 Annex A 6.4 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 6.4

When an organisation undergoes the transition from ISO 27001:2013 to the 2022 update, much of the attention naturally goes to technical upgrades like cloud security or threat intelligence. However, some of the most critical changes involve how we manage our people. One such area is the disciplinary process, now found under Annex A 6.4. While

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 6.4 Read More »

ISO 27001 Annex A 5.37 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.37

If you have spent any time with the ISO 27001 standard, you know that documentation is the backbone of a successful Information Security Management System (ISMS). When the standard moved from the 2013 version to the 2022 update, many controls were shifted, merged, or expanded. One of the most essential “day-to-day” controls, Documented Operating Procedures,

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.37 Read More »

ISO 27001 Annex A 5.36 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.36

When ISO 27001 transitioned from the 2013 version to the 2022 update, many organisations felt a bit like they were learning a new language. While the “grammar” of the management system stayed the same, the “vocabulary” of the Annex A controls was completely rewritten. One of the most important consolidations in this new dictionary is

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.36 Read More »

ISO 27001 Annex A 5.35 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.35

When ISO 27001 was updated from the 2013 version to the 2022 iteration, many people focused on the shiny new controls like threat intelligence or cloud security. However, some of the most critical changes happened to the “governance” controls, the ones that ensure your security actually works. Annex A 5.35, which covers the Independent Review

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.35 Read More »

ISO 27001 Annex A 5.34 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.34

If you have been navigating the world of data protection recently, you know that privacy is no longer just a “bonus” feature of information security, it is a central requirement. When ISO 27001 transitioned from the 2013 version to the 2022 update, one of the most significant shifts occurred in how we handle Personally Identifiable

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.34 Read More »

ISO 27001 Annex A 5.33 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.33

If you have been managing an Information Security Management System (ISMS) for a few years, you are likely aware that the ISO 27001 standard recently had a major refresh. While the management system itself stayed mostly the same, the Annex A controls, the specific actions we take to secure data, were rearranged and modernised. One

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.33 Read More »

ISO 27001 Annex A 5.32 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.32

If you have been working with information security standards for a while, you’ll know that the transition from ISO 27001:2013 to the 2022 update brought about some significant housekeeping. One of the areas that saw a shift in placement, though its core mission remains vital is the protection of Intellectual Property Rights (IPR). In the

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.32 Read More »

ISO 27001 Annex A 5.31 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.31

If you have been working within the world of information security for a while, you probably know that ISO 27001 underwent a significant facelift recently. We moved from the familiar 2013 version to the more modern 2022 iteration. While the core management system requirements stayed relatively stable, the Annex A controls, the “bread and butter”

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.31 Read More »

ISO 27001 Annex A 5.27 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.27

In the world of information security, experience is the best teacher but only if you actually take the time to listen. The transition from ISO 27001:2013 to the 2022 update brought a significant refinement to how organizations should process their failures. This is found in Annex A 5.27: Learning from information security incidents. If you

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.27 Read More »

ISO 27001 Annex A 5.26 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.26

When a security incident hits, the difference between a minor hiccup and a business-ending catastrophe often comes down to one thing: the quality of your response. ISO 27001 has always mandated that organizations react to incidents, but the transition from the 2013 version to the 2022 update has refined how we handle the “heat of

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.26 Read More »

ISO 27001 Annex A 5.25 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.25

In the world of information security, not every digital “ping” or system anomaly is a catastrophe. However, the ability to quickly distinguish a routine event from a full-blown crisis is what separates resilient organisations from those that end up in the headlines. This is exactly what Annex A 5.25: Assessment and Decision on Information Security

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.25 Read More »

ISO 27001 Annex A 5.23 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.23

For nearly a decade, the ISO 27001:2013 standard served as the gold standard for information security. However, back in 2013, the “cloud” was often treated as just another type of outsourcing. Fast forward to the 2022 update, and the reality has shifted. Most businesses now live in the cloud. Recognising this, the updated standard introduced

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.23 Read More »

ISO 27001 Annex A 5.21 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.21

In the world of information security, your protection is only as strong as the weakest link in your chain. Increasingly, that link isn’t inside your office—it is somewhere deep within your Information and Communications Technology (ICT) supply chain. With the release of ISO 27001:2022, the standard has taken a much more aggressive stance on how

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.21 Read More »

ISO 27001 Annex A 5.20 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.20

In the transition from the 2013 version of ISO 27001 to the 2022 update, many organisations have found that the “Supplier Management” domain has received a significant level of attention. While the previous article in this series touched on the overarching relationship management (Annex A 5.19), Annex A 5.20 specifically zooms in on the legal

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.20 Read More »

ISO 27001 Annex A 5.19 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.19

In the modern business landscape, very few companies operate in a vacuum. We rely on cloud providers, software vendors, and specialized consultants to keep the wheels turning. This interconnectedness is a superpower, but from a security perspective, it is also a significant vulnerability. ISO 27001 has always recognized this, but the 2022 update brings a

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.19 Read More »

ISO 27001 Annex A 5.17 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.17

When you think about information security, “Authentication Information” is often the first line of defence that comes to mind. It is the secret handshake, the passwords, tokens, and biometrics, that proves you are who you say you are. In the transition from ISO 27001:2013 to the 2022 version, this area saw a significant structural facelift.

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.17 Read More »

ISO 27001 Annex A 5.15 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.15

If you have been navigating the world of information security for a while, you know that keeping up with ISO standards can feel like chasing a moving target. With the release of ISO 27001:2022, many professionals are scratching their heads wondering exactly how their existing controls have shifted. One of the most significant areas of

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.15 Read More »

ISO 27001 Annex A 5.11 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.11

Offboarding an employee used to be relatively simple: you’d collect their building pass, take back their laptop, and wish them well. But in today’s world of remote work, cloud accounts, and personal devices, “getting your stuff back” has become significantly more complex. This is where ISO 27001:2022 Annex A 5.11, “Return of Assets,” comes into

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.11 Read More »

ISO 27001 Annex A 5.9 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.9

Asset management has always been the bedrock of a solid Information Security Management System (ISMS). After all, you cannot protect what you don’t know you have. However, as our work environments have shifted from physical filing cabinets to complex cloud infrastructures and virtual machines, the standard had to evolve. This evolution is most evident in

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.9 Read More »

ISO 27001 Annex A 5.6 - what changed in the 2022 update

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.6

If you have been working with information security standards for a while, you know that ISO 27001 isn’t a static document. It evolves to keep pace with an increasingly complex digital landscape. One of the specific areas that often sparks questions during a transition is Annex A 5.6, which deals with “Contact with special interest

What Changed Between the 2013 and 2022 Versions? ISO 27001:2022 Annex A 5.6 Read More »

ISO 27001 Annex A 5.5 - what changed in the 2022 update

How to Audit What Changed Between the 2013 and 2022 Versions: ISO 27001 Annex A 5.5

If you are preparing for an internal audit or transitioning your Information Security Management System (ISMS) to the latest standards, you have likely noticed that the landscape has shifted. One specific area that requires a closer look is how your organisation interacts with the outside world—specifically, government bodies and regulators. This brings us to the

How to Audit What Changed Between the 2013 and 2022 Versions: ISO 27001 Annex A 5.5 Read More »

ISO 27001 Annex A 8.19

ISO 27001:2022 Annex A 8.19 Installation of software on operational systems

ISO 27001:2022 Annex A 8.19: Mastering Software Installation on Operational Systems We have all seen it happen. A well-meaning employee downloads a “free PDF converter” to get their job done faster, and suddenly your operational server is crawling with malware. Or perhaps a developer pushes a new library directly to production without testing, bringing the

ISO 27001:2022 Annex A 8.19 Installation of software on operational systems Read More »

ISO 27001 Annex A 8.27

ISO 27001:2022 Annex A 8.27 Secure systems architecture and engineering principles

ISO 27001:2022 Annex A 8.27: Building Secure Systems by Design We often hear the phrase “secure by design,” but what does it actually mean in practice? Too often, security is bolted on at the end of a project like an afterthought—a firewall here, an encryption key there. But if the underlying architecture is flawed, no

ISO 27001:2022 Annex A 8.27 Secure systems architecture and engineering principles Read More »

ISO 27001 Annex A 8.31

ISO 27001:2022 Annex A 8.31 Separation of development, test and production environments

Mastering ISO 27001 Annex A 8.31: How to Separate Your Environments Effectively If you have ever accidentally deleted a live database because you thought you were on the staging server, you already know why ISO 27001:2022 Annex A 8.31 exists. It is one of those controls that sounds purely technical, but it saves organisations from

ISO 27001:2022 Annex A 8.31 Separation of development, test and production environments Read More »

ISO 27001 Annex A 8.34

ISO 27001:2022 Annex A 8.34 – Protection of Information Systems During Audit Testing

If there is one irony in information security, it is this: the very process designed to find weaknesses in your systems—audit testing—can sometimes be the thing that breaks them. We have all heard horror stories of a vulnerability scan that accidentally flooded a network or a penetration test that knocked a critical database offline during

ISO 27001:2022 Annex A 8.34 – Protection of Information Systems During Audit Testing Read More »

ISO 27001 Annex A 6.5

ISO 27001 Annex A 6.5 Responsibilities After Termination Or Change Of Employment

ISO 27001 Annex A 6.5 asks you to make sure that security duties are still valid even after an employee stops working for you. You need to have these duties clearly stated, shared with people, and enforced. This term is generally a requirement in the contract that explains what you expect an employee to do when they leave the company or when they move

ISO 27001 Annex A 6.5 Responsibilities After Termination Or Change Of Employment Read More »

ISO 27001 Annex A 6.3

ISO 27001 Annex A 6.3 Information Security Awareness Education and Training

ISO 27001 Annex A 6.3 deals with Information Security Awareness, Education, and Training. This control requires you to teach people about information security. This includes everything from general security awareness training and education to giving regular updates on your information security policy, any specific policies you have on certain topics, and all your security procedures.

ISO 27001 Annex A 6.3 Information Security Awareness Education and Training Read More »

ISO 27001 Annex A 6.2

ISO 27001 Annex A 6.2 Terms and Conditions of Employment

For the ISO 27001 control Annex A 6.2, called Terms and Conditions Of Employment, you need to ensure your organization has agreements with employees. These agreements define your information security responsibilities. Terms of Employment are the specific conditions and agreements that establish the relationship between you as the employee and the employer. Usually, these terms explain the

ISO 27001 Annex A 6.2 Terms and Conditions of Employment Read More »

ISO 27001 Annex A 6.1

ISO 27001 Annex A 6.1 Screening

ISO 27001 Annex A 6.1 is about employee screening and performing background checks on people both before you hire them and while they are working for you. What is ISO 27001 Annex A 6.1? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “Screening”. What is the ISO

ISO 27001 Annex A 6.1 Screening Read More »

ISO 27001 Annex A 5.36

ISO 27001 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security

You need to follow the policies, rules, and standards you have set for information security, as this is required by ISO 27001 Annex A 5.36. You must make sure that you are compliant with your information security policy, as well as any specific policies, rules, and standards you have created. You should also check these

ISO 27001 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security Read More »

ISO 27001 Annex A 5.35

ISO 27001 Annex A 5.35 Independent Review Of Information Security

ISO 27001 Annex A 5.35 is about how a company should independently review its information security management system to ensure it is effective, meeting it’s objectives and operating as intended. What is ISO 27001 Annex A 5.35? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard

ISO 27001 Annex A 5.35 Independent Review Of Information Security Read More »

ISO 27001 Annex A 5.31

ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.31 Legal, Statutory, Regulatory and Contractual Requirements, asks you to know what outside rules and laws apply to your information security and then make sure you follow them. It specifically deals with the legal and contract rules that tell you exactly how you should handle and use information security. What is

ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements Read More »

ISO 27001 Annex A 5.30

ISO 27001 Annex A 5.30 ICT Readiness For Business Continuity

This rule is about ICT Readiness for Business Continuity, which means the IT team having business continuity planned, implemented and tested. What is ISO 27001 Annex A 5.30? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “ICT Readiness For Business Continuity”. What

ISO 27001 Annex A 5.30 ICT Readiness For Business Continuity Read More »

ISO 27001 Annex A 5.29

ISO 27001 Annex A 5.29 Information Security During Disruption

This rule is about ensuring that information security is maintained during a disruption, outage or business continuity event. What is ISO 27001 Annex A 5.29? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “Information Security During Disruption”. What is the ISO 27001

ISO 27001 Annex A 5.29 Information Security During Disruption Read More »

ISO 27001 Annex A 5.27

ISO 27001 Annex A 5.27 Learning From Information Security Incidents

This rule is about learning from information security incidents so that they do not happen again and so that information security is improved. What is ISO 27001 Annex A 5.27? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “Learning From Information Security

ISO 27001 Annex A 5.27 Learning From Information Security Incidents Read More »

ISO 27001 Annex A 5.26

ISO 27001 Annex A 5.26 Response To Information Security Incidents

This rule is about responding to information security incidents, which means a company must have a system to respond to information security incidents and events. What is ISO 27001 Annex A 5.26? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “Response

ISO 27001 Annex A 5.26 Response To Information Security Incidents Read More »

ISO 27001 Annex A 5.25

ISO 27001 Annex A 5.25 Assessment And Decision On Information Security Events

This rule is about assessing incidents and then deciding if they are an information security incident and prioritising them for action. What is ISO 27001 Annex A 5.25? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “Assessment And Decision On Information Security

ISO 27001 Annex A 5.25 Assessment And Decision On Information Security Events Read More »

ISO 27001 Annex A 5.24

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation

This rule is about information security incident management, which means a company must have a system and people to handle the information security incidents. What is ISO 27001 Annex A 5.24? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is titled “Information Security Incident

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation Read More »

ISO 27001 Annex A 5.23

ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services

This rule is about cloud supplier management, which means a company must have a system to handle the information security risks of its third party cloud systems, products and services. What is ISO 27001 Annex A 5.23? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the

ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services Read More »

ISO 27001 Annex A 5.22

ISO 27001 Annex A 5.22 Monitor, Review And Change Management Of Supplier Services

This rule is about ICT supplier management, which means a company must have a system to handle the management of its third party IT systems, products and services. What is ISO 27001 Annex A 5.22? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the control is

ISO 27001 Annex A 5.22 Monitor, Review And Change Management Of Supplier Services Read More »

ISO 27001 Annex A 5.21

ISO 27001 Annex A 5.21 Managing Information Security In The ICT Supply Chain

This rule is about ICT supplier management, which means a company must have a system to handle the information security risks of its third party IT systems, products and services. What is ISO 27001 Annex A 5.21? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the ISO/IEC 27001:2022 Standard the

ISO 27001 Annex A 5.21 Managing Information Security In The ICT Supply Chain Read More »

what is ISO 27001

What is ISO 27001?

What is ISO/IEC 27001? ISO/IEC 27001 is the world’s most famous rule for managing information security systems (known as an ISMS). Think of it as a set of instructions that tells you exactly what steps an ISMS must follow. This rule helps any company, big or small, in any industry, to set up, use, keep

What is ISO 27001? Read More »

ISO27001 Clauses

ISO 27001 Clauses

The Core Requirements of ISO 27001 Clauses 4-10 The ISO/IEC 27001:2022 standard is divided into several sections, known as clauses, and appendices, known as annexes. To understand the requirements for achieving ISO 27001 certification, focus on clauses 4 through 10. Clauses 4-10 outline the specific requirements that an Information Security Management System (ISMS) must fulfil

ISO 27001 Clauses Read More »

ISO 27001 Clause 7.4

ISO 27001 Clause 7.4 Communication

ISO 27001 Clause 7.4 is about communication. It focuses on sharing key parts of your Information Security Management System (ISMS) with the right people. This helps everyone know their role in keeping data safe. What is ISO 27001 Clause 7.4? The latest version of the ISO 27001 standard is ISO/IEC 27001:2022 (published in October 2022). In the

ISO 27001 Clause 7.4 Communication Read More »

ISO 27001 Clause 7.3

ISO 27001 Clause 7.3 Awareness

ISO 27001 Clause 7.3 is all about making sure people know about information security. It states that everyone working for the company must know about the security policy and how they help the security system work well. This also includes knowing what could happen if they don’t follow the rules. What Is Awareness? This rule

ISO 27001 Clause 7.3 Awareness Read More »

ISO 27001 Clause 7.2

ISO 27001 Clause 7.2 Competence

ISO 27001 Clause 7.2 is about making sure that people who work on your company’s information security are good at their jobs. This means they have the right skills and experience. The goal of this rule is to ensure that your security team has the knowledge and training they need to do their work well.

ISO 27001 Clause 7.2 Competence Read More »

ISO 27001 Clause 7.1

ISO 27001 Clause 7.1 Resources

ISO 27001 Clause 7.1 is about making sure a company has the right resources to manage its information security system. This includes people, money, and tools. The rule states that a company must figure out what it needs and then provide it. This helps a company build, use, and improve its security system. What is ISO 27001

ISO 27001 Clause 7.1 Resources Read More »

ISO 27001 Clause 4.3

ISO 27001 Clause 4.3 Determining The Scope Of The Information Security Management System (ISMS)

ISO 27001 is a rulebook for keeping info safe. Clause 4.3 is a key part. It helps you decide what parts of your company to protect. This is called setting the scope. It’s super important to get the scope right. If you don’t, you might waste time and money. It’s like building a fence. You need

ISO 27001 Clause 4.3 Determining The Scope Of The Information Security Management System (ISMS) Read More »

ISO 27001 Clause 4.2

ISO 27001 Clause 4.2 Understanding The Needs And Expectations of Interested Parties

To meet ISO 27001 Clause 4.2, a company must understand the needs and expectations of interested parties. These are people or groups that have a stake in the company’s information security management system (ISMS). This is a vital step to ensure the ISMS works for everyone. What is ISO 27001 Clause 4.2? The latest version of

ISO 27001 Clause 4.2 Understanding The Needs And Expectations of Interested Parties Read More »

Interested Parties ISO 27001

ISO 27001 Interested Parties are the stakeholders in the Information Security Management System. Interested parties can be people, groups, entities, customers, regulators and the law. Interested parties and the ISMS The role of interested parties in the information security management system (ISMS) is significant. In summary, they ensure that the ISMS is designed to meet

Interested Parties ISO 27001 Read More »