The complete guide to ISO/IEC 27002:2022

ISO 27002-2022 Ultimate Guide 2026

ISO 27002:2022 explained. ISO 27002 controls list and absolutely everything you need to know about the ISO 27002:2022 changes.

Absolutely everything you need to know about the ISO 27002:2022

When you go for your ISO 27001 Certification you will choose a set of information security controls.

The list of controls that you will need comes from ISO 27002.

In the ISO 27001 standard it actually refers to it as ISO 27001 Annex A.

So the terms ISO 27002 and ISO 27001 Annex A are, for all intents and purposes, interchangeable. They mean the same thing.

ISO 27002 changed in 2022 and is now formally ISO 27002:2022.

This is everything you need to know about ISO 27002:2022.

What is ISO 27002?

Formally it is called ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection — Information security controls.

It provides a reference set of generic information security controls including implementation guidance. It is designed to be used:

  • within the context of an information security management system (ISMS) based on ISO/IEC27001;
  • for implementing information security controls based on internationally recognised best practices;
  • for developing organisation specific information security management guidelines.

What are the main changes to ISO 27002?

  • They have removed the term ‘Code of Practice’
  • The structure of the document has changed
  • Some controls have been merged, some deleted and new controls have been introduced.

Structure

ISO 27002:2022 has 93 controls which have now been structured into 4 domains

  • Organisational Controls
  • People Controls
  • Physical Controls
  • Technological Controls

From the previous 14 sections, ISO 27002:2022 now has only four sections, along with two annexes.

New Controls

Here are the 11 controls that are new:

ISO 27002 Controls List

In this section we list all of the ISO 27002: 2022 controls and compare it to the previous control set. We show if it is a new control or the control has changed.

ISO 27002:2022 Organisational controls

ISO 27002:2022 Organizational Controls (Clause 5) Summary
ControlTitleStatusPurposeGuide
5.1Policies for information securityExistingEnsure suitability, adequacy and effectiveness of managements direction and support for information security.Read Guide
5.2Information security roles and responsibilitiesExistingEnsure a defined, approved and understood structure is in place for the implementation and operation of the information security management system.Read Guide
5.3Segregation of dutiesExistingReduce the risk of fraud, error and bypassing of information security controls.Read Guide
5.4Management responsibilitiesExistingRequire all personnel to apply information security in accordance with the established policy.Read Guide
5.5Contact with authoritiesExistingEstablish and maintain contact with relevant authorities.Read Guide
5.6Contact with special interest groupsExistingEnsure appropriate flow of information takes place with respect to information security.Read Guide
5.7Threat intelligenceNEWProvide awareness of the organisations threat environment so appropriate mitigation actions can be taken.Read Guide
5.8Information security in project managementExistingEnsure information security risks related to projects are effectively addressed.Read Guide
5.9Inventory of information and other associated assetsChangedIdentify the organisations information and associated assets to preserve security.Read Guide
5.10Acceptable use of information and other associated assetsChangedRules for the acceptable use and procedures for handling information should be identified.Read Guide
5.11Return of assetsExistingProtect the organisations assets during change or termination of employment.Read Guide
5.12Classification of informationExistingEnsure identification and understanding of protection needs of information.Read Guide
5.13Labelling of informationExistingFacilitate the communication of classification of information and support automation.Read Guide
5.14Information transferExistingMaintain the security of information transferred within an organisation and with external parties.Read Guide
5.15Access controlExistingEnsure authorised access and prevent unauthorised access to information.Read Guide
5.16Identity managementNEWAllow for the unique identification of individuals and systems accessing information.Read Guide
5.17Authentication informationNEWEnsure proper entity authentication and prevent failures of authentication processes.Read Guide
5.18Access rightsChangedEnsure access to information is defined and authorised according to business requirements.Read Guide
5.19Information security in supplier relationshipsExistingMaintain an agreed level of information security in supplier relationships.Read Guide
5.20Addressing information security within supplier agreementsExistingMaintain an agreed level of information security in supplier relationships.Read Guide
5.21Managing information security in the ICT supply chainNEWMaintain an agreed level of information security in supplier relationships.Read Guide
5.22Monitoring, review and change management of supplier servicesChangedMaintain an agreed level of information security and service delivery.Read Guide
5.23Information security for use of cloud servicesNEWSpecify and manage information security for the use of cloud services.Read Guide
5.24Information security incident management planning and preparationChangedEnsure quick, effective, consistent and orderly response to information security incidents.Read Guide
5.25Assessment and decision on information security eventsExistingEnsure effective categorisation and prioritisation of information security events.Read Guide
5.26Response to information security incidentsExistingEnsure efficient and effective response to information security incidents.Read Guide
5.27Learning from information security incidentsExistingReduce the likelihood or consequences of future incidents.Read Guide
5.28Collection of evidenceExistingEnsure consistent and effective management of evidence related to information security incidents.Read Guide
5.29Information security during disruptionChangedProtect information and other associated assets during disruption.Read Guide
5.30ICT readiness for business continuityNEWEnsure the availability of the organisations information and assets during disruption.Read Guide
5.31Legal, statutory, regulatory and contractual requirementsExistingEnsure compliance with legal, statutory, regulatory and contractual requirements.Read Guide
5.32Intellectual property rightsExistingEnsure compliance with requirements related to intellectual property rights.Read Guide
5.33Protection of recordsExistingEnsure compliance with requirements related to the protection and availability of records.Read Guide
5.34Privacy and protection of PIIExistingEnsure compliance with requirements related to the protection of PII.Read Guide
5.35Independent review of information securityExistingEnsure the continuing suitability, adequacy and effectiveness of the approach to managing information security.Read Guide
5.36Compliance with policies and standardsExistingEnsure information security is implemented in accordance with policy and rules.Read Guide
5.37Documented operating proceduresExistingEnsure the correct and secure operation of information processing facilities.Read Guide
ISO 27002:2022 People Controls (Clause 6) Summary
ControlTitleStatusPurposeGuide
6.1ScreeningExistingEnsure all personnel are eligible and suitable for the roles for which they are considered and remain eligible during employment.Read Guide
6.2Terms and conditions of employmentExistingEnsure personnel understand their information security responsibilities for the roles for which they are considered.Read Guide
6.3Information security awareness, education and trainingExistingEnsure personnel and relevant interested parties are aware of and fulfil their information security responsibilities.Read Guide
6.4Disciplinary processExistingEnsure personnel understand the consequences of information security policy violation and deter such violations.Read Guide
6.5Responsibilities after termination or change of employmentExistingProtect the organisations interests as part of the process of changing or terminating employment or contracts.Read Guide
6.6Confidentiality or non-disclosure agreementsExistingMaintain confidentiality of information accessible by personnel or external parties.Read Guide
6.7Remote workingNEWEnsure the security of information when personnel are working remotely.Read Guide
6.8Information security event reportingExistingSupport timely, consistent and effective reporting of information security events identified by personnel.Read Guide
ISO 27002:2022 Physical Controls (Clause 7) Summary
ControlTitleStatusPurposeGuide
7.1Physical security perimeterExistingEnsure physical security is in place to stop unauthorised people from gaining physical access to property and assets.Read Guide
7.2Physical entryExistingEnsure only authorised physical access to the organisations information and other associated assets occurs.Read Guide
7.3Securing offices, rooms and facilitiesExistingPrevent unauthorised physical access, damage and interference to information and assets in offices.Read Guide
7.4Physical security monitoringExistingEnsure you detect and deter unauthorised physical access.Read Guide
7.5Protecting against physical and environmental threatsExistingPrevent or reduce the consequences of events originating from physical and environmental threats.Read Guide
7.6Working in secure areasExistingProtect information and assets in secure areas from damage and unauthorised interference.Read Guide
7.7Clear desk and clear screenExistingAddress risks of unauthorised access, loss of and damage to information on desks and screens.Read Guide
7.8Equipment siting and protectionExistingReduce the risks from physical and environmental threats, and from unauthorised access and damage.Read Guide
7.9Security of assets off-premisesExistingPrevent loss, damage, theft or compromise of off-site devices and interruption to operations.Read Guide
7.10Storage mediaNEWEnsure only authorised disclosure, modification, removal or destruction of information on storage media.Read Guide
7.11Supporting utilitiesExistingPrevent loss, damage or compromise of information and assets due to failure of supporting utilities.Read Guide
7.12Cabling securityExistingPrevent loss, damage, or compromise of information and interruption related to power and communications cabling.Read Guide
7.13Equipment maintenanceExistingPrevent loss, damage, or interruption caused by lack of maintenance.Read Guide
7.14Secure disposal or re-use of equipmentExistingPrevent leakage of information from equipment to be disposed or re-used.Read Guide

ISO 27002:2022 Technological controls

ISO 27002:2022 Technological Controls (Clause 8) Summary
ControlTitleStatusPurposeGuide
8.1User endpoint devicesNEWProtect information against the risks introduced by using user endpoint devices.Read Guide
8.2Privileged access rightsExistingEnsure only authorised users, software components and services are provided with privileged access rights.Read Guide
8.3Information access restrictionExistingEnsure only authorised access and to prevent unauthorised access to information and other associated assets.Read Guide
8.4Access to source codeExistingPrevent the introduction of unauthorised functionality and maintain the confidentiality of valuable intellectual property.Read Guide
8.5Secure authenticationExistingEnsure a user or an entity is securely authenticated when access to systems is granted.Read Guide
8.6Capacity managementExistingEnsure the required capacity of information processing facilities, human resources, offices and other facilities.Read Guide
8.7Protection against malwareExistingEnsure information and other associated assets are protected against malware.Read Guide
8.8Management of technical vulnerabilitiesExistingEnsure information and other associated assets are protected from the exploitation of technical vulnerabilities.Read Guide
8.9Configuration managementExistingEnsure hardware, software, services and networks function correctly with required security settings.Read Guide
8.10Information deletionNEWPrevent unnecessary exposure of sensitive information and comply with deletion requirements.Read Guide
8.11Data maskingNEWLimit the exposure of sensitive data including PII and comply with legal and regulatory requirements.Read Guide
8.12Data leakage preventionNEWDetect and prevent the unauthorised disclosure and extraction of information by individuals or systems.Read Guide
8.13Information backupExistingEnable recovery from loss of data or systems.Read Guide
8.14Redundancy of information processing facilitiesExistingEnsure the continuous operation of information processing facilities.Read Guide
8.15LoggingExistingRecord events, generate evidence, ensure log integrity and support investigations.Read Guide
8.16Monitoring activitiesExistingDetect anomalous behaviour and potential information security incidents.Read Guide
8.17Clock synchronisationExistingEnable the correlation and analysis of security-related events and support investigations.Read Guide
8.18Use of privileged utility programsExistingEnsure the use of utility programs does not harm system and application controls.Read Guide
8.19Installation of software on operational systemsExistingEnsure the integrity of operational systems and prevent exploitation of technical vulnerabilities.Read Guide
8.20Network securityExistingProtect information in networks and supporting facilities from compromise via the network.Read Guide
8.21Security of network servicesExistingEnsure security in the use of network services.Read Guide
8.22Segregation of networksExistingSplit the network in security boundaries and control traffic between them based on business needs.Read Guide
8.23Web filteringNEWProtect systems from being compromised by malware and prevent access to unauthorised web resources.Read Guide
8.24Use of cryptographyExistingEnsure proper and effective use of cryptography to protect confidentiality, authenticity or integrity.Read Guide
8.25Secure development life cycleExistingEnsure information security is designed and implemented within the secure development life cycle.Read Guide
8.26Application security requirementsNEWEnsure all information security requirements are identified and addressed when developing or acquiring.Read Guide
8.27Secure systems architecture and engineering principlesNEWEnsure information systems are securely designed, implemented and operated within the development life cycle.Read Guide
8.28Secure codingExistingEnsure software is written securely reducing the number of potential vulnerabilities.Read Guide
8.29Security testing in development and acceptanceExistingValidate if information security requirements are met when applications are deployed to production.Read Guide
8.30Outsourced developmentExistingEnsure information security measures required by the organisation are implemented in outsourced development.Read Guide
8.31Separation of development, test and production environmentsExistingProtect the production environment and data from compromise by development and test activities.Read Guide
8.32Change managementExistingPreserve information security when executing changes.Read Guide
8.33Test informationExistingEnsure relevance of testing and protection of operational information used for testing.Read Guide
8.34Protection of information systems during audit testingNEWMinimise the impact of audit and other assurance activities on operational systems and business processes.Read Guide

ISO 27002:2022 FAQ

What are the main changes in ISO 27002:2022?

The ISO/IEC 27002:2022 standard consolidates the previous 114 controls into 93, introduces 11 completely new controls, and restructures the 14 domains into 4 logical themes. While the number of controls has decreased due to merging 57 redundant items, the rigorousness of the standard remains high. The update focuses on modernising information security practices, specifically introducing concepts like Threat Intelligence and Cloud Security to address the current threat landscape.

What are the 4 themes of ISO 27002:2022?

ISO 27002:2022 abandons the previous 14-domain structure in favour of 4 distinct themes designed to simplify categorisation and ownership. These themes are:

  • Organisational Controls (37 controls): Policies, rules, and structural frameworks found in Clause 5.
  • People Controls (8 controls): Human resources, screening, and awareness measures found in Clause 6.
  • Physical Controls (14 controls): Security perimeters, entry controls, and equipment protection found in Clause 7.
  • Technological Controls (34 controls): Secure coding, network security, and cryptography found in Clause 8.

What are the 11 new controls in ISO 27002:2022?

To address evolving digital risks, the 2022 update introduces 11 brand-new controls that organisations must include in their Statement of Applicability (SoA) or justify excluding:

  • 5.7 Threat intelligence
  • 5.23 Information security for use of cloud services
  • 5.30 ICT readiness for business continuity
  • 7.4 Physical security monitoring
  • 8.9 Configuration management
  • 8.10 Information deletion
  • 8.11 Data masking
  • 8.12 Data leakage prevention
  • 8.16 Monitoring activities
  • 8.23 Web filtering
  • 8.28 Secure coding

How does ISO 27002:2022 affect current ISO 27001 certification?

Organisations currently certified to ISO 27001:2013 generally have a 3-year transition period (ending October 2025) to align with the 2022 amendments. You do not need to recertify immediately; however, you must update your Statement of Applicability (SoA) to map your existing controls against the new 93 controls mandated by Annex A. Failure to transition by the deadline will result in a major non-conformity during your next surveillance or recertification audit.

What are attributes in ISO 27002:2022?

ISO 27002:2022 introduces “attributes,” which function like hashtags to help organisations create different views of their controls. Each control is tagged with five attribute types: Control Type (e.g., Preventive, Detective), Information Security Properties (Confidentiality, Integrity, Availability), Cybersecurity Concepts (Identify, Protect, Detect), Operational Capabilities, and Security Domains. This allows security managers to filter and report on controls more effectively for different stakeholders.

ISO 27001 Controls: The 2022 Framework Update Summary

ISO 2700 Controls - The 2022 Control Framework Update
ISO 2700 Controls – The 2022 Control Framework Update

You can download the new ISO 27002:2002 controls in the the Statement of Applicability.

As a bonus you get a copy of the 2013 version of the controls as well.

Allowing you to easily compare the two and assess the new requirements.

Source Material

This document is an opinion article based on the publicly available information provided here. It is noted the document is under preparation for final publication and is subject to changes.

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor ⚡ 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top