The complete guide to ISO/IEC 27002:2022

Home / ISO 27001 Annex A Controls / The complete guide to ISO/IEC 27002:2022

Absolutely everything you need to know about the ISO 27002:2022

When you go for your ISO 27001 Certification you will choose a set of information security controls.

The list of controls that you will need comes from ISO 27002.

In the ISO 27001 standard it actually refers to it as ISO 27001 Annex A.

So the terms ISO 27002 and ISO 27001 Annex A are, for all intents and purposes, interchangeable. They mean the same thing.

ISO 27002 changed in 2022 and is now formally ISO 27002:2022.

This is everything you need to know about ISO 27002:2022.

What is it?

Formally it is called ISO/IEC 27002:2022 Information security, cybersecurity and privacy protection — Information security controls.

It provides a reference set of generic information security controls including implementation guidance. It is designed to be used:

  • within the context of an information security management system (ISMS) based on ISO/IEC27001;
  • for implementing information security controls based on internationally recognised best practices;
  • for developing organisation specific information security management guidelines.

What are the main changes to ISO 27002?

  • They have removed the term ‘Code of Practice’
  • The structure of the document has changed
  • Some controls have been merged, some deleted and new controls have been introduced.

Structure

ISO/IEC 27002:2022 has 93 controls which have now been structured into 4 domains

  • Oraganisational Controls
  • People Controls
  • Physical Controls
  • Technological Controls

From the previous 14 sections, ISO 27002:2022 now has only four sections, along with two annexes.

New Controls

Here are the 11 controls that are new:

The new list of ISO 27002:2022 Controls

In this section we list all of the ISO 27002: 2022 controls and compare it to the previous control set. We show if it is a new control or the control has changed.

ISO 27002:2022 5 Organisational controls

ISO 27002 5.1 Policies for Information Security

Purpose: Annex A 5.1 is a preventive control that ensures the suitability, adequacy and effectiveness of managements direction and support for information security.

View the ultimate certification guide to: ISO 27002:2022 5.1 Policies for information security

ISO 27002 5.2 Information security roles and responsibilities

Purpose: Annex A 5.2 is a preventive control that ensures a defined, approved and understood structure is in place for the implementation and operation of the information security management system.

View the ultimate certification guide to: ISO 27002:2022 5.2 Information security roles and responsibilities

ISO 27002 5.3 Segregation of Duties

Purpose: To reduce the risk of fraud, error and bypassing of information security controls. 

View the ultimate certification guide to: ISO 27002:2022 5.3 Segregation of duties

ISO 27002 5.4 Management Responsibilities

Purpose: Management should require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organisation

View the ultimate certification guide to: ISO 27002:2022 5.4 Management responsibilities

ISO 27002 5.5 Contact with authorities

Purpose: The organisation should establish and maintain contact with relevant authorities.

View the ultimate certification guide to: ISO 27002:2022 5.5 Contact with authorities

ISO 27002 5.6 Contact with special interest groups

Purpose: To ensure appropriate flow of information takes place with respect to information security. 

View the ultimate certification guide to: ISO 27002:2022 5.6 Contact with special interest groups

ISO 27002 5.7 Threat Intelligence – NEW

Purpose: To provide awareness of the organisations threat environment so that the appropriate mitigation actions can be taken.

View the ultimate certification guide to: ISO 27002:2022 5.7 Threat intelligence

ISO 27002 5.8 Information security in project management

Purpose: To ensure information security risks related to projects and deliverables are effectively addressed in project management throughout the project life cycle.

View the ultimate certification guide to: ISO 27002:2022 5.8 Information security in project management

ISO 27002 5.9 Inventory of information and other associated assets – CHANGE

Purpose: To identify the organisations information and other associated assets in order to preserve their information security and assign appropriate ownership.

View the ultimate certification guide to: ISO 27002:2022 5.9 Inventory of information and other associated assets

ISO 27002 5.10 Acceptable use of information and other associated assets

Purpose: Rules for the acceptable use and procedures for handling information and other associated assets should be identified, documented and implemented.

View the ultimate certification guide to: ISO 27002:2022 5.10 Acceptable use of information and other associated assetsCHANGE

ISO 27002 5.11 Return of assets

Purpose: To protect the organisations assets as part of the process of changing or terminating employment, contract or agreement.

View the ultimate certification guide to: ISO 27002:2022 5.11 Return of assets

ISO 27002 5.12 Classification of information

Purpose: To ensure identification and understanding of protection needs of information in accordance with its importance to the organisation.

View the ultimate certification guide to: ISO 27002:2022 5.12 Classification of information

ISO 27002 5.13 Labelling of information

Purpose: To facilitate the communication of classification of information and support automation of information processing and management.

View the ultimate certification guide to: ISO 27002:2022 5.13 Labelling of information

ISO 27002 5.14 Information transfer

Purpose: To maintain the security of information transferred within an organisation and with any external interested party.

View the ultimate certification guide to: ISO 27002:2022 5.14 Information transfer

ISO 27002 5.15 Access Control

Purpose: To ensure authorised access and to prevent unauthorised access to information and other associated assets.

View the ultimate certification guide to: ISO 27002:2022 5.15 Access control

ISO 27002 5.16 Identity Management – NEW

Purpose: To allow for the unique identification of individuals and systems accessing the organisations information and other associated assets and to enable appropriate assignment of access rights.

View the ultimate certification guide to: ISO 27002:2022 5.16 Identity management

ISO 27002 5.17 Authentication Information – NEW

Purpose: To ensure proper entity authentication and prevent failures of authentication processes.

View the ultimate certification guide to: ISO 27002:2022 5.17 Authentication information

ISO 27002 5.18 Access rights – CHANGE

Purpose: To ensure access to information and other associated assets is defined and authorised according to the business requirements.

View the ultimate certification guide to: ISO 27002:2022 5.18 Access rights

ISO 27002 5.19 Information security in supplier relationships

Purpose: To maintain an agreed level of information security in supplier relationships.

View the ultimate certification guide to: ISO 27002:2022 5.19 Information security in supplier relationships

ISO 27002 5.29 Addressing information security within supplier agreements

Purpose: To maintain an agreed level of information security in supplier relationships.

View the ultimate certification guide to: ISO 27002:2022 5.20 Addressing information security within supplier agreements

ISO 27002 5.21 Managing information security in the ICT supply chain – NEW

Purpose: To maintain an agreed level of information security in supplier relationships.

View the ultimate certification guide to: ISO 27002:2022 5.21 Managing information security in the ICT supply chain

ISO 27002 5.22 Monitoring, review and change management of supplier services CHANGE

Purpose: To maintain an agreed level of information security and service delivery in line with supplier agreements.

View the ultimate certification guide to: ISO 27002:2022 5.22 Monitoring, review and change management of supplier services

ISO 27002 5.23 Information security for use of cloud services – NEW

Purpose: To specify and manage information security for the use of cloud services.

View the ultimate certification guide to: ISO 27002:2022 5.23 Information security for use of cloud services

ISO 27002 5.24 Information security incident management planning and preparation CHANGE

Purpose: To ensure quick, effective, consistent and orderly response to information security incidents, including communication on information security events.

View the ultimate certification guide to: ISO 27002:2022 5.24 Information security incident management planning and preparation

ISO 27002 5.25 Assessment and decision on information security events

Purpose: To ensure effective categorisation and prioritisation of information security events.

View the ultimate certification guide to: ISO 27002:2022 5.25 Assessment and decision on information security events

ISO 27002 5.26 Response to information security incidents

Purpose: To ensure efficient and effective response to information security incidents.

View the ultimate certification guide to: ISO 27002:2022 5.26 Response to information security incidents

ISO 27002 5.27 Learning from information security incidents

Purpose: To reduce the likelihood or consequences of future incidents.

View the ultimate certification guide to: ISO 27002:2022 5.27 Learning from information security incidents

ISO 27002 5.28 Collection of evidence

Purpose: To ensure a consistent and effective management of evidence related to information security incidents for the purposes of disciplinary and legal actions.

View the ultimate certification guide to: ISO 27002:2022 5.28 Collection of evidence

ISO 27002 5.29 Information security during disruption CHANGE

Purpose: To protect information and other associated assets during disruption.

View the ultimate certification guide to: ISO 27002:2022 5.29 Information security during disruption

ISO 27002 5.30 ICT readiness for business continuity – NEW

Purpose: To ensure the availability of the organisations information and other associated assets during disruption.

View the ultimate certification guide to: ISO 27002:2022 5.30 ICT readiness for business continuity

Purpose: To ensure compliance with legal, statutory, regulatory and contractual requirements related to information security.

View the ultimate certification guide to: ISO 27002:2022 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO 27002 5.32 Intellectual Property Rights

Purpose: To ensure compliance with legal, statutory, regulatory and contractual requirements related to intellectual property rights and use of proprietary products.

View the ultimate certification guide to: ISO 27002:2022 5.32 Intellectual property rights

ISO 27002 5.33 Protection of records

Purpose: To ensure compliance with legal, statutory, regulatory and contractual requirements, as well as community or societal expectations related to the protection and availability of records.

View the ultimate certification guide to: ISO 27002:2022 5.33 Protection of records

ISO 27002 5.32 Privacy and protection of PII

Purpose: To ensure compliance with legal, statutory, regulatory and contractual requirements related to the information security aspects of the protection of PII.

View the ultimate certification guide to: ISO 27002:2022 5.34 Privacy and protection of PII

ISO 27002 5.35 Independent review of information security

Purpose: To ensure the continuing suitability, adequacy and effectiveness of the organisations approach to managing information security.

View the ultimate certification guide to: ISO 27002:2022 5.35 Independent review of information security

ISO 27002 5.36 Compliance with policies and standards for information security

Purpose: To ensure that information security is implemented and operated in accordance with the organisation’s information security policy, topic-specific policies, rules and standards.

View the ultimate certification guide to: ISO 27002:2022 5.36 Compliance with policies and standards for information security

ISO 27002 5.37 Documented Operations Procedures

Purpose: To ensure the correct and secure operation of information processing facilities.

View the ultimate certification guide to: ISO 27002:2022 5.37 Documented operating procedures

ISO 27002:2022 6 People controls

ISO 27001:2022 6.1 Screening

Purpose: To ensure all personnel are eligible and suitable for the roles for which they are considered and remain eligible and suitable during their employment.

View the ultimate certification guide to: ISO 27002:2022 6.1 Screening

ISO 27001:2022 6.2 Terms and Condition of Employment

Purpose: To ensure personnel understand their information security responsibilities for the roles for which they are considered.

View the ultimate certification guide to: ISO 27002:2022 6.2 Terms and conditions of employment

ISO 27001:2022 6.3 Information security awareness, education and training

Purpose: To ensure personnel and relevant interested parties are aware of and fulfil their information security responsibilities.

View the ultimate certification guide to: ISO 27002:2022 6.3 Information security awareness, education and training

ISO 27001:2022 6.4 Disciplinary Process

Purpose: To ensure personnel and other relevant interested parties understand the consequences of information security policy violation, to deter and appropriately deal with personnel and other relevant interested parties who committed the violation.

View the ultimate certification guide to: ISO 27002:2022 6.4 Disciplinary process

ISO 27001:2022 6.5 Responsibilities after termination or change of employment

Purpose: To protect the organisations interests as part of the process of changing or terminating employment or contracts.

View the ultimate certification guide to: ISO 27002:2022 6.5 Responsibilities after termination or change of employment

ISO 27001:2022 6.6 Confidentiality or non disclosure agreements

Purpose: To maintain confidentiality of information accessible by personnel or external parties.

View the ultimate certification guide to: ISO 27002:2022 6.6 Confidentiality or non-disclosure agreements

ISO 27002:2022 6.7 Remote working – NEW

Purpose: To ensure the security of information when personnel are working remotely.

View the ultimate certification guide to: ISO 2002:2022 6.7 Remote Working

ISO 27002:2022 6.8 Information security event reporting

Purpose: To support timely, consistent and effective reporting of information security events that can be identified by personnel.

View the ultimate certification guide to: ISO 27002:2022 6.8 Information Security Event Reporting

ISO 27002:2022 7 Physical controls

ISO 27002:2022 7.1 Physical security perimeter

ISO 27002:2022 7.2 Physical entry controls

ISO 27002:2022 7.3 Securing offices, rooms and facilities

ISO 27002:2022 7.4 Physical security monitoring

ISO 27002:2022 7.5 Protecting against physical and environmental threats

ISO 27002:2022 7.6 Working in secure areas

ISO 27002:2022 7.7 Clear desk and clear screen

ISO 27002:2022 7.8 Equipment siting and protection

ISO 27002:2022 7.9 Security of assets off-premises

ISO 27002:2022 7.10 Storage media – NEW

ISO 27002:2022 7.11 Supporting utilities

ISO 27002:2022 7.12 Cabling security

ISO 27002:2022 7.13 Equipment maintenance

ISO 27002:2022 7.14 Secure disposal or re-use of equipment

ISO 27002:2022 8 Technological controls

ISO 27002:2022 8.1 User endpoint devices – NEW

ISO 27002:2022 8.2 Privileged access rights

ISO 27002:2022 8.3 Information access restriction

ISO 27002:2022 8.4 Access to source code

ISO 27002:2022 8.5 Secure authentication

ISO 27002:2022 8.6 Capacity management

ISO 27002:2022 8.7 Protection against malware

ISO 27002:2022 8.8 Management of technical vulnerabilities

ISO 27002:2022 8.9 Configuration management

ISO 27002 8.10:2022 Information deletion – NEW

ISO 27002:2022 8.11 Data masking – NEW

ISO 27002:2022 8.12 Data leakage prevention – NEW

ISO 27002:2022 8.13 Information backup

ISO 27002:2022 8.14 Redundancy of information processing facilities

ISO 27002:2022 8.15 Logging

ISO 27002:2022 8.16 Monitoring activities

ISO 27002:2022 8.17 Clock synchronisation

ISO 27002:2022 8.18 Use of privileged utility programs

ISO 27002:2022 8.19 Installation of software on operational systems

ISO 27002 8.20 Network controls

ISO 27002:2022:2022 8.21 Security of network services

ISO 27002:2022 8.22 Segregation in networks

ISO 27002:2022 8.23 Web filtering – NEW

ISO 27002:2022 8.24 Use of cryptography

ISO 27002:2022 8.25 Secure development lifecycle

ISO 27002:2022 8.26 Application security requirements – NEW

ISO 27002:2022 8.27 Secure system architecture and engineering principles – NEW

ISO 27002:2022 8.28 Secure coding

ISO 27002:2022 8.29 Security testing in development and acceptance

ISO 27002:2022 8.30 Outsourced development

ISO 27002:2022 8.31 Separation of development, test and production environments

ISO 27002:2022 8.32 Change management

ISO 27002:2022 8.33 Test information

ISO 27002:2022 8.34 Protection of information systems during audit and testing – NEW

ISO 27001:2022 FAQ

When did ISO 27002:2022 go live?

The new ISO 27002 2022 revision went live and was published on the 15th of February 2022.

How many controls are there in ISO 27002:2022?

There are 93 controls in ISO 27002:2022. Previously there 114 controls. This is a reduction of 21 controls.

How many sections are there in ISO 27002:2022?

There are 4 sections in ISO 27002:2022. Previously there were 14 sections. This is reduction of 10 sections.

ISO 27001:2022 Statement Of Applicability

You can download the new ISO 27001:2002 controls in the the Statement of Applicability.

As a bonus you get a copy of the 2013 version of the controls as well.

Allowing you to easily compare the two and assess the new requirements.

ISO 27001 Statement of Applicability-template

Source Material

This document is an opinion article based on the publicly available information provided here. It is noted the document is under preparation for final publication and is subject to changes.

ISO 27001 Quick Links

Organisational Controls - A5

ISO 27001 Annex A 5.1 Policies for information security

ISO 27001 Annex A 5.2 Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3 Segregation of duties

ISO 27001 Annex A 5.4 Management responsibilities

ISO 27001 Annex A 5.5 Contact with authorities

ISO 27001 Annex A 5.6 Contact with special interest groups

ISO 27001 Annex A 5.7 Threat intelligence – new

ISO 27001 Annex A 5.8 Information security in project management

ISO 27001 Annex A 5.9 Inventory of information and other associated assets – change

ISO 27001 Annex A 5.10 Acceptable use of information and other associated assets – change

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.13 Labelling of information

ISO 27001 Annex A 5.14 Information transfer

ISO 27001 Annex A 5.15 Access control

ISO 27001 Annex A 5.16 Identity management

ISO 27001 Annex A 5.17 Authentication information – new

ISO 27001 Annex A 5.18 Access rights – change

ISO 27001 Annex A 5.19 Information security in supplier relationships

ISO 27001 Annex A 5.20 Addressing information security within supplier agreements

ISO 27001 Annex A 5.21 Managing information security in the ICT supply chain – new

ISO 27001 Annex A 5.22 Monitoring, review and change management of supplier services – change

ISO 27001 Annex A 5.23 Information security for use of cloud services – new

ISO 27001 Annex A 5.24 Information security incident management planning and preparation – change

ISO 27001 Annex A 5.25 Assessment and decision on information security events 

ISO 27001 Annex A 5.26 Response to information security incidents

ISO 27001 Annex A 5.27 Learning from information security incidents

ISO 27001 Annex A 5.28 Collection of evidence

ISO 27001 Annex A 5.29 Information security during disruption – change

ISO 27001 Annex A 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32 Intellectual property rights

ISO 27001 Annex A 5.33 Protection of records

ISO 27001 Annex A 5.34 Privacy and protection of PII

ISO 27001 Annex A 5.35 Independent review of information security

ISO 27001 Annex A 5.36 Compliance with policies and standards for information security

ISO 27001 Annex A 5.37 Documented operating procedures 

Technology Controls - A8

ISO 27001 Annex A 8.1 User Endpoint Devices

ISO 27001 Annex A 8.2 Privileged Access Rights

ISO 27001 Annex A 8.3 Information Access Restriction

ISO 27001 Annex A 8.4 Access To Source Code

ISO 27001 Annex A 8.5 Secure Authentication

ISO 27001 Annex A 8.6 Capacity Management

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9 Configuration Management 

ISO 27001 Annex A 8.10 Information Deletion

ISO 27001 Annex A 8.11 Data Masking

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15 Logging

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.17 Clock Synchronisation

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems

ISO 27001 Annex A 8.20 Network Security

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001 Annex A 8.23 Web Filtering

ISO 27001 Annex A 8.24 Use of CryptographyISO27001 Annex A 8.25 Secure Development Life Cycle

ISO 27001 Annex A 8.26 Application Security Requirements

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28 Secure Coding

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30 Outsourced Development

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32 Change Management

ISO 27001 Annex A 8.33 Test Information

ISO 27001 Annex A 8.34 Protection of information systems during audit testing