ISO 27001:2022

ISO 27001 Organisation Controls

ISO 27001 Annex A 5.1: Policies for information security

ISO 27001 Annex A 5.2: Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3: Segregation of duties

ISO 27001 Annex A 5.4: Management responsibilities

ISO 27001 Annex A 5.5: Contact with authorities

ISO 27001 Annex A 5.6: Contact with special interest groups

ISO 27001 Annex A 5.7: Threat intelligence

ISO 27001 Annex A 5.8: Information security in project management

ISO 27001 Annex A 5.9: Inventory of information and other associated assets

ISO 27001 Annex A 5.10: Acceptable use of information and other associated assets

ISO 27001 Annex A 5.11: Return of assets

ISO 27001 Annex A 5.12: Classification of information

ISO 27001 Annex A 5.13: Labelling of information

ISO 27001 Annex A 5.14: Information transfer

ISO 27001 Annex A 5.15: Access control

ISO 27001 Annex A 5.16: Identity management

ISO 27001 Annex A 5.17: Authentication information

ISO 27001 Annex A 5.18: Access rights

ISO 27001 Annex A 5.19: Information security in supplier relationships

ISO 27001 Annex A 5.20: Addressing information security within supplier agreements

ISO 27001 Annex A 5.21: Managing information security in the ICT supply chain

ISO 27001 Annex A 5.22: Monitoring, review and change management of supplier services

ISO 27001 Annex A 5.23: Information security for use of cloud services

ISO 27001 Annex A 5.24: Information security incident management planning and preparation

ISO 27001 Annex A 5.25: Assessment and decision on information security events

ISO 27001 Annex A 5.26: Response to information security incidents

ISO 27001 Annex A 5.27: Learning from information security incidents

ISO 27001 Annex A 5.28: Collection of evidence

ISO 27001 Annex A 5.29: Information security during disruption

ISO 27001 Annex A 5.30: ICT readiness for business continuity

ISO 27001 Annex A 5.31: Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32: Intellectual property rights

ISO 27001 Annex A 5.33: Protection of records

ISO 27001 Annex A 5.34: Privacy and protection of PII

ISO 27001 Annex A 5.35: Independent review of information security

ISO 27001 Annex A 5.36: Compliance with policies and standards for information security

ISO 27001 Annex A 5.37: Documented operating procedures

ISO 27001 Technical Controls

ISO 27001 Annex A 8.1: User Endpoint Devices

ISO 27001 Annex A 8.2: Privileged Access Rights

ISO 27001 Annex A 8.3: Information Access Restriction

ISO 27001 Annex A 8.4: Access To Source Code

ISO 27001 Annex A 8.5: Secure Authentication

ISO 27001 Annex A 8.6: Capacity Management

ISO 27001 Annex A 8.7: Protection Against Malware

ISO 27001 Annex A 8.8: Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9: Configuration Management 

ISO 27001 Annex A 8.10: Information Deletion

ISO 27001 Annex A 8.11: Data Masking

ISO 27001 Annex A 8.12: Data Leakage Prevention

ISO 27001 Annex A 8.13: Information Backup

ISO 27001 Annex A 8.14: Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15: Logging

ISO 27001 Annex A 8.16: Monitoring Activities

ISO 27001 Annex A 8.17: Clock Synchronisation

ISO 27001 Annex A 8.18: Use of Privileged Utility Programs

ISO 27001 Annex A 8.19: Installation of Software on Operational Systems

ISO 27001 Annex A 8.20: Network Security

ISO 27001 Annex A 8.21: Security of Network Services

ISO 27001 Annex A 8.22: Segregation of Networks

ISO 27001 Annex A 8.23: Web Filtering

ISO 27001 Annex A 8.24: Use of Cryptography

ISO 27001 Annex A 8.25: Secure Development Life Cycle

ISO 27001 Annex A 8.26: Application Security Requirements

ISO 27001 Annex A 8.27: Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28: Secure Coding

ISO 27001 Annex A 8.29: Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30: Outsourced Development

ISO 27001 Annex A 8.31: Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32: Change Management

ISO 27001 Annex A 8.33: Test Information

ISO 27001 Annex A 8.34: Protection of information systems during audit testing

Home / ISO 27001 Clauses / The Ultimate Guide to ISO 27001:2022 Clause 6.3 Planning Of Changes

The Ultimate Guide to ISO 27001:2022 Clause 6.3 Planning Of Changes

Last updated Sep 15, 2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

ISO 27001 Planning of Changes – New Control

The 2022 update to the ISO 27001 standard introduced a new control called ISO 27001:2022 Clause 6.3 planning of changes.

There is nothing to worry about here, so let us take a look at what it is and what you have to do.

First off, don’t panic.

What is ISO 27001 Clause 6.3 Planning of Changes?

The new control ISO 27001 clause 6.3 planning of changes relates directly to changes to the information security management system and that you will make the changes in a planned manner.

There is nothing at all to worry about here and you will have been doing this all along.

It is just now explicit in the standard.

ISO 27001 Clause 6.3 Definition

ISO 27001 defines ISO 27001 Clause 6.3 as:

When the organisation determines the need for changes to the information security management system, the changes shall be carried out in a planned manner.

ISO 27001:2022 Clause 6.3

How to implement ISO 27001 Clause 6.3

To meet the requirement all you have to do is plan your changes to your information security management system and evidence that you managed the change.

ISO27001 Clause 6.3 Planning of Changes

This is easy to do if you follow best practice and review and republish your documents annually. Make sure you have a documented plan that shows when you last did it and when you are going to do it again.

You will have a Documents and Records Policy and be following it.

You will use the management review team to sign off your changes and you will update your communication plan with evidence of the communications taking place to communicate those changes.

It is good practice to have version control in your documents but also to keep previous revisions of documents / the information security management system so that you can revert back if needed.

The fact that you will already have continual improvement, incident management, internal audit policies and processes in place already factor in your planning for changes to the information security management system and can be used as evidence of such.

ISO 27001 Clause 6.3 Implementation Checklist

Planning Of Changes ISO 27001 Clause 6.3 Implementation Checklist:

1. Establish a Change Management Process

Define a formal process for managing changes to the ISMS, including procedures for planning, approving, implementing, and reviewing changes.

Challenge:

Lack of a documented and consistently followed process. Resistance to adopting formal procedures.

Solution:

Develop a clear and concise change management policy and procedure. Provide training to all relevant personnel. Emphasise the benefits of a formal process (e.g., reduced risk, improved stability).

2. Assess the Impact of Changes

Before implementing any change, conduct a thorough assessment of its potential impact on the ISMS, including risks and opportunities.

Challenge:

Overlooking potential impacts. Difficulty in predicting the consequences of complex changes.

Solution:

Involve relevant interested parties in the impact assessment. Use risk assessment methodologies to identify potential risks. Consider both positive and negative impacts.

3. Plan Changes in a Controlled Manner

Plan changes carefully, considering factors such as resources, timelines, testing, and communication.

Challenge:

Inadequate planning leading to delays or disruptions. Difficulty in coordinating complex changes.

Solution:

Develop detailed implementation plans for each change. Assign clear responsibilities and timelines. Conduct thorough testing before implementing changes in production.

4. Authorise Changes

Obtain appropriate authorisation before implementing any change.

Challenge:

Lack of clear approval authority. Implementing changes without proper authorisation.

Solution:

Define clear approval levels for different types of changes. Establish a formal change approval process. Use a change management system to track approvals.

5. Implement Changes as Planned

Implement changes according to the documented plan.

Challenge:

Deviations from the plan leading to unexpected issues. Difficulty in managing changes during implementation.

Solution:

Closely monitor the implementation process. Use project management tools to track progress. Have rollback plans in place in case of unforeseen issues.

6. Test Changes

Thoroughly test changes before they are deployed.

Challenge:

Inadequate testing leading to problems.

Solution:

Develop test plans. Use different testing methods.

7. Communicate Changes

Communicate changes to relevant interested parties in a timely and effective manner.

Challenge:

Lack of communication leading to confusion and disruption. Difficulty in reaching all affected parties.

Solution:

Develop a communication plan for each change. Use different communication channels (e.g., email, intranet, meetings). Provide clear and concise information about the change.

8. Review Changes

After a change has been implemented, review its effectiveness and identify any lessons learned.

Challenge:

Forgetting to review changes. Not capturing lessons learned.

Solution:

Schedule post-implementation reviews for all significant changes. Document lessons learned and incorporate them into future change planning.

9. Document Changes

Maintain accurate records of all changes to the ISMS.

Challenge:

Difficulty in keeping change records up-to-date. Lack of integration with other ISMS documentation.

Solution:

Use a centralised change management system. Integrate change records with other ISMS documentation (e.g., risk register, asset inventory).

10. Manage Emergency Changes

Have a process in place for managing emergency changes that need to be implemented quickly.

Challenge:

Difficulty in balancing speed with control during emergency changes.

Solution:

Define clear criteria for emergency changes. Establish an expedited change approval process. Ensure that emergency changes are still documented and reviewed.

ISO 27001 Clause 6.3 Audit Checklist

How to audit ISO 27001 Clause 6.3 Planning Of Changes

1. Review the Change Management Process

Verify the existence and adequacy of a documented change management process.

  • Document review (policies, procedures)
  • interviews with IT and security personnel
  • walkthrough of the change management process
  • comparison against best practices (e.g., ITIL)

2. Assess Impact Assessment Procedures

Ensure the organization has procedures for assessing the impact of changes on the ISMS.

  • Review of impact assessment templates and guidelines
  • interviews with change management personnel
  • examination of past change requests and their impact assessments
  • testing the impact assessment process with a hypothetical change scenario

3. Evaluate Change Planning

Verify that changes are planned in a controlled manner, considering resources, timelines, testing, and communication.

  • Review of change implementation plans
  • interviews with project managers and change implementers
  • examination of resource allocation for changes
  • analysis of change schedules and timelines
  • review of test plans and results

4. Examine Change Authorisation

Ensure that changes are authorised by appropriate personnel before implementation.

  • Review of change approval workflows
  • interviews with approvers
  • examination of change authorisation records
  • verification of approval levels for different types of changes

5. Assess Change Implementation

Verify that changes are implemented as planned.

  • Observation of change implementation activities
  • review of change implementation records
  • interviews with change implementers
  • examination of system logs and configuration settings before and after changes
  • testing of implemented changes

6. Evaluate Change Testing

Ensure that changes are thoroughly tested before deployment to the production environment.

  • Review of test plans and test cases
  • examination of test results and reports
  • interviews with testers
  • observation of testing activities
  • independent testing of implemented changes

7. Assess Change Communication

Verify that changes are communicated to relevant interested parties in a timely and effective manner.

  • Review of communication plans and records
  • interviews with interested parties
  • analysis of communication effectiveness surveys
  • examination of communication channels used for different types of changes

8. Examine Change Review

Ensure that changes are reviewed after implementation to assess their effectiveness and identify lessons learned.

  • Review of post-implementation review reports
  • interviews with change management personnel
  • examination of lessons learned documentation
  • analysis of change success rates and incident rates

9. Evaluate Change Documentation

Verify that accurate records of all changes to the ISMS are maintained.

  • Review of change management system records
  • examination of change logs and audit trails
  • interviews with record keepers
  • verification of data integrity and completeness of change records

10. Assess Emergency Change Management

Verify the existence and effectiveness of a process for managing emergency changes.

  • Review of emergency change procedures
  • interviews with IT and security personnel
  • examination of past emergency change requests and their handling
  • testing the emergency change process with a simulated scenario

ISO 27001 Templates

Implementing ISO 27001 can be a significant undertaking and incur significant ISO 27001 Costs. To streamline the process and potentially save valuable time and resources, consider utilising pre-written ISO 27001 templates. This ISO 27001 Toolkit offers a comprehensive set of resources specifically designed for those seeking to achieve ISO 27001 certification independently. With this toolkit, you can potentially build your Information Security Management System (ISMS) within a week and be ready for certification within 30 days.

ISO 27001 Toolkit

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.