0% found this document useful (0 votes)
90 views26 pages

4.1 Standar International ISO IEC 27001-2022

This document is the International Standard ISO/IEC 27001 which provides requirements for an Information Security Management System (ISMS). The standard specifies the requirements to help organizations manage risks to security and establish, implement, maintain and continually improve an ISMS. It covers best practices for risks and controls across a number of security domains.

Uploaded by

Feri Andi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views26 pages

4.1 Standar International ISO IEC 27001-2022

This document is the International Standard ISO/IEC 27001 which provides requirements for an Information Security Management System (ISMS). The standard specifies the requirements to help organizations manage risks to security and establish, implement, maintain and continually improve an ISMS. It covers best practices for risks and controls across a number of security domains.

Uploaded by

Feri Andi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

INTERNATIONAL ISO/IEC

STANDARD 27001

Third edition
2022-10

LY
ON
SE
Information security, cybersecurity
and privacy protection — Information
security management systems —

O
Requirements

RP
Sécurité de l'information, cybersécurité et protection de la vie
privée — Systèmes de management de la sécurité de l'information —
Exigences
PU
GN
NI
AI
TR
R
FO

Reference number
ISO/IEC 27001:2022(E)

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

© ISO/IEC 2022
ISO/IEC 27001:2022(E)

LY
ON
O SE
RP
PU
N G
NI
AI
TR
R

COPYRIGHT PROTECTED DOCUMENT


© ISO/IEC 2022
FO

ŽŽ”‹‰Š–•”‡•‡”˜‡†ǤŽ‡••‘–Ї”™‹•‡•’‡ ‹ϐ‹‡†ǡ‘””‡“—‹”‡†‹–Ї ‘–‡š–‘ˆ‹–•‹’އ‡–ƒ–‹‘ǡ‘’ƒ”–‘ˆ–Š‹•’—„Ž‹ ƒ–‹‘ƒ›


„‡”‡’”‘†— ‡†‘”—–‹Ž‹œ‡†‘–Ї”™‹•‡‹ƒ›ˆ‘”‘”„›ƒ›‡ƒ•ǡ‡Ž‡ –”‘‹ ‘”‡ Šƒ‹ ƒŽǡ‹ Ž—†‹‰’Š‘–‘ ‘’›‹‰ǡ‘”’‘•–‹‰‘
–Ї‹–‡”‡–‘”ƒ‹–”ƒ‡–ǡ™‹–Š‘—–’”‹‘”™”‹––‡’‡”‹••‹‘Ǥ‡”‹••‹‘ ƒ„‡”‡“—‡•–‡†ˆ”‘‡‹–Ї” ƒ––Їƒ††”‡••„‡Ž‘™
‘” ǯ•‡„‡”„‘†›‹–Ї ‘—–”›‘ˆ–Ї”‡“—‡•–‡”Ǥ
 ‘’›”‹‰Š–‘ˆϐ‹ ‡
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

ͶͲͳȈŠǤ†‡Žƒ†‘‡–ͺ
 ǦͳʹͳͶ‡”‹‡”ǡ ‡‡˜ƒ
Š‘‡ǣΪͶͳʹʹ͹ͶͻͲͳͳͳ
ƒ‹Žǣ ‘’›”‹‰Š–̷‹•‘Ǥ‘”‰
Website: [Link]
—„Ž‹•Ї†‹™‹–œ‡”Žƒ†

ii © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Contents ƒ‰‡

Foreword........................................................................................................................................................................................................................................ iv
Introduction .................................................................................................................................................................................................................................v

LY
1 Scope ................................................................................................................................................................................................................................. 1
2 Normative references ..................................................................................................................................................................................... 1
͵ ‡”•ƒ††‡ϐ‹‹–‹‘• .................................................................................................................................................................................... 1

ON
4 Context of the organization ...................................................................................................................................................................... 1
ͶǤͳ 
 †‡”•–ƒ†‹‰–Ї‘”‰ƒ‹œƒ–‹‘ƒ†‹–• ‘–‡š– ..................................................................................................... 1
ͶǤʹ 
 †‡”•–ƒ†‹‰–Ї‡‡†•ƒ†‡š’‡ –ƒ–‹‘•‘ˆ‹–‡”‡•–‡†’ƒ”–‹‡• ........................................................... 1
ͶǤ͵ 
 ‡–‡”‹‹‰–Ї• ‘’‡‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ....................................... 2
ͶǤͶ  ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡................................................................................................................... 2

SE
5 Leadership .................................................................................................................................................................................................................. 2
ͷǤͳ  ‡ƒ†‡”•Š‹’ƒ† ‘‹–‡– ..................................................................................................................................................... 2
ͷǤʹ ‘Ž‹ › ............................................................................................................................................................................................................... ͵

O
ͷǤ͵  ”‰ƒ‹œƒ–‹‘ƒŽ”‘އ•ǡ”‡•’‘•‹„‹Ž‹–‹‡•ƒ†ƒ—–Š‘”‹–‹‡• ....................................................................................... ͵

6 Planning ........................................................................................................................................................................................................................ 3

RP
͸Ǥͳ  –‹‘•–‘ƒ††”‡••”‹••ƒ†‘’’‘”–—‹–‹‡• ................................................................................................................. ͵

͸ǤͳǤͳ  ‡‡”ƒŽ ........................................................................................................................................................................................ ͵
͸ǤͳǤʹ  ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡– ............................................................................................................ Ͷ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

͸ǤͳǤ͵  ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡– ................................................................................................................ Ͷ


͸Ǥʹ  ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ƒ†’Žƒ‹‰–‘ƒ Š‹‡˜‡–Ї ................................................................. 5
PU
7 Support ........................................................................................................................................................................................................................... 6
7.1 Resources .................................................................................................................................................................................................... 6
7.2 Competence ............................................................................................................................................................................................... 6
͹Ǥ͵  ™ƒ”‡‡••................................................................................................................................................................................................... 6
G

͹ǤͶ ‘—‹ ƒ–‹‘ ...................................................................................................................................................................................... 6


͹Ǥͷ ‘ —‡–‡†‹ˆ‘”ƒ–‹‘ .............................................................................................................................................................. 6
͹ǤͷǤͳ  ‡‡”ƒŽ ........................................................................................................................................................................................ 6
N

͹ǤͷǤʹ ”‡ƒ–‹‰ƒ†—’†ƒ–‹‰ ................................................................................................................................................... 7


͹ǤͷǤ͵   ‘–”‘Ž‘ˆ†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ ................................................................................................................. 7
NI

8 Operation ..................................................................................................................................................................................................................... 7
ͺǤͳ 
 ’‡”ƒ–‹‘ƒŽ’Žƒ‹‰ƒ† ‘–”‘Ž ......................................................................................................................................... 7
ͺǤʹ  ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡– ............................................................................................................................... ͺ
AI

ͺǤ͵  ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡– .................................................................................................................................. ͺ


9 Performance evaluation .............................................................................................................................................................................. 8
TR

ͻǤͳ  ‘‹–‘”‹‰ǡ‡ƒ•—”‡‡–ǡƒƒŽ›•‹•ƒ†‡˜ƒŽ—ƒ–‹‘............................................................................................. ͺ

ͻǤʹ  –‡”ƒŽƒ—†‹– ........................................................................................................................................................................................... ͺ
ͻǤʹǤͳ ‡‡”ƒŽ ........................................................................................................................................................................................ ͺ
ͻǤʹǤʹ –‡”ƒŽƒ—†‹–’”‘‰”ƒ‡ ......................................................................................................................................... ͻ
ͻǤ͵  ƒƒ‰‡‡–”‡˜‹‡™ .......................................................................................................................................................................... ͻ

R

ͻǤ͵Ǥͳ ‡‡”ƒŽ ........................................................................................................................................................................................ ͻ


ͻǤ͵Ǥʹ ƒƒ‰‡‡–”‡˜‹‡™‹’—–• ...................................................................................................................................... ͻ
ͻǤ͵Ǥ͵ ƒƒ‰‡‡–”‡˜‹‡™”‡•—Ž–• ..................................................................................................................................... ͻ
FO

10 Improvement......................................................................................................................................................................................................... 10
ͳͲǤͳ 
 ‘–‹—ƒŽ‹’”‘˜‡‡– ............................................................................................................................................................... 10
ͳͲǤʹ 
 ‘ ‘ˆ‘”‹–›ƒ† ‘””‡ –‹˜‡ƒ –‹‘............................................................................................................................. 10
Annex A ȋ‘”ƒ–‹˜‡Ȍ Information security controls reference........................................................................................... 11
Bibliography............................................................................................................................................................................................................................. 19

© ISO/IEC 2022 – All rights reserved iii


ISO/IEC 27001:2022(E)

Foreword
 ȋ–Ї –‡”ƒ–‹‘ƒŽ ”‰ƒ‹œƒ–‹‘ ˆ‘” –ƒ†ƒ”†‹œƒ–‹‘Ȍ ƒ†  ȋ–Ї –‡”ƒ–‹‘ƒŽ އ –”‘–‡ А‹ ƒŽ
‘‹••‹‘Ȍ ˆ‘” –Ї •’‡ ‹ƒŽ‹œ‡† •›•–‡ ˆ‘” ™‘”ކ™‹†‡ •–ƒ†ƒ”†‹œƒ–‹‘Ǥ ƒ–‹‘ƒŽ „‘†‹‡• –Šƒ– ƒ”‡
‡„‡”• ‘ˆ  ‘”  ’ƒ”–‹ ‹’ƒ–‡ ‹ –Ї †‡˜‡Ž‘’‡– ‘ˆ –‡”ƒ–‹‘ƒŽ –ƒ†ƒ”†• –Š”‘—‰Š –‡ А‹ ƒŽ

LY
‘‹––‡‡• ‡•–ƒ„Ž‹•Ї† „› –Ї ”‡•’‡ –‹˜‡ ‘”‰ƒ‹œƒ–‹‘ –‘ †‡ƒŽ ™‹–Š ’ƒ”–‹ —Žƒ” ϐ‹‡Ž†• ‘ˆ –‡ А‹ ƒŽ
ƒ –‹˜‹–›Ǥ ƒ† –‡ А‹ ƒŽ ‘‹––‡‡• ‘ŽŽƒ„‘”ƒ–‡‹ϐ‹‡Ž†•‘ˆ—–—ƒŽ‹–‡”‡•–Ǥ–Ї”‹–‡”ƒ–‹‘ƒŽ
‘”‰ƒ‹œƒ–‹‘•ǡ‰‘˜‡”‡–ƒŽƒ†‘Ǧ‰‘˜‡”‡–ƒŽǡ‹Ž‹ƒ‹•‘™‹–Š ƒ† ǡƒŽ•‘–ƒ‡’ƒ”–‹–Ї

ON
™‘”Ǥ
Ї ’”‘ ‡†—”‡• —•‡† –‘ †‡˜‡Ž‘’ –Š‹• †‘ —‡– ƒ† –Š‘•‡ ‹–‡†‡† ˆ‘” ‹–• ˆ—”–Ї” ƒ‹–‡ƒ ‡
ƒ”‡ †‡• ”‹„‡† ‹ –Ї Ȁ  ‹”‡ –‹˜‡•ǡ ƒ”– ͳǤ  ’ƒ”–‹ —Žƒ”ǡ –Ї †‹ˆˆ‡”‡– ƒ’’”‘˜ƒŽ ”‹–‡”‹ƒ
‡‡†‡† ˆ‘” –Ї †‹ˆˆ‡”‡– –›’‡• ‘ˆ †‘ —‡– •Š‘—ކ „‡ ‘–‡†Ǥ Š‹• †‘ —‡– ™ƒ• †”ƒˆ–‡† ‹
ƒ ‘”†ƒ ‡ ™‹–Š –Ї ‡†‹–‘”‹ƒŽ ”—އ• ‘ˆ –Ї Ȁ  ‹”‡ –‹˜‡•ǡ ƒ”– ʹ ȋ•‡‡ [Link]/directives or

SE
™™™Ǥ‹‡ Ǥ ŠȀ‡„‡”•̴‡š’‡”–•Ȁ”‡ˆ†‘ •).
––‡–‹‘ ‹• †”ƒ™ –‘ –Ї ’‘••‹„‹Ž‹–› –Šƒ– •‘‡ ‘ˆ –Ї ‡Ž‡‡–• ‘ˆ –Š‹• †‘ —‡– ƒ› „‡ –Ї •—„Œ‡ –
‘ˆ ’ƒ–‡– ”‹‰Š–•Ǥ  ƒ†  •ŠƒŽŽ ‘– „‡ Їކ ”‡•’‘•‹„އ ˆ‘” ‹†‡–‹ˆ›‹‰ ƒ› ‘” ƒŽŽ •— Š ’ƒ–‡–
”‹‰Š–•Ǥ ‡–ƒ‹Ž• ‘ˆ ƒ› ’ƒ–‡– ”‹‰Š–• ‹†‡–‹ϐ‹‡† †—”‹‰ –Ї †‡˜‡Ž‘’‡– ‘ˆ –Ї †‘ —‡– ™‹ŽŽ „‡ ‹ –Ї

O
–”‘†— –‹‘ƒ†Ȁ‘”‘–Ї Ž‹•–‘ˆ’ƒ–‡–†‡ Žƒ”ƒ–‹‘•”‡ ‡‹˜‡†ȋ•‡‡™™™Ǥ‹•‘Ǥ‘”‰Ȁ’ƒ–‡–•) or the IEC
Ž‹•–‘ˆ’ƒ–‡–†‡ Žƒ”ƒ–‹‘•”‡ ‡‹˜‡†ȋ•‡‡Š––’•ǣȀȀ’ƒ–‡–•Ǥ‹‡ Ǥ Š).

‘•–‹–—–‡ƒ‡†‘”•‡‡–Ǥ RP
›–”ƒ†‡ƒ‡—•‡†‹–Š‹•†‘ —‡–‹•‹ˆ‘”ƒ–‹‘‰‹˜‡ˆ‘”–Ї ‘˜‡‹‡ ‡‘ˆ—•‡”•ƒ††‘‡•‘–

‘” ƒ ‡š’Žƒƒ–‹‘ ‘ˆ –Ї ˜‘Ž—–ƒ”› ƒ–—”‡ ‘ˆ •–ƒ†ƒ”†•ǡ –Ї ‡ƒ‹‰ ‘ˆ  •’‡ ‹ϐ‹  –‡”• ƒ†
PU
‡š’”‡••‹‘• ”‡Žƒ–‡† –‘ ‘ˆ‘”‹–› ƒ••‡••‡–ǡ ƒ• ™‡ŽŽ ƒ• ‹ˆ‘”ƒ–‹‘ ƒ„‘—– ̵• ƒ†Š‡”‡ ‡ –‘
–Ї ‘”ކ ”ƒ†‡ ”‰ƒ‹œƒ–‹‘ ȋȌ ’”‹ ‹’އ• ‹ –Ї ‡ А‹ ƒŽ ƒ””‹‡”• –‘ ”ƒ†‡ ȋȌ •‡‡
[Link]/iso/[Link]Ǥ –Ї ǡ•‡‡™™™Ǥ‹‡ Ǥ ŠȀ—†‡”•–ƒ†‹‰Ǧ•–ƒ†ƒ”†•.
Š‹• †‘ —‡– ™ƒ• ’”‡’ƒ”‡† „› ‘‹– ‡ А‹ ƒŽ ‘‹––‡‡ Ȁ   ͳǡ Information Technologyǡ
G

—„ ‘‹––‡‡ʹ͹ǡInformation security, cybersecurity and privacy protection.


Š‹• –Š‹”† ‡†‹–‹‘ ƒ ‡Ž• ƒ† ”‡’Žƒ ‡• –Ї •‡ ‘† ‡†‹–‹‘ ȋ Ȁ  ʹ͹ͲͲͳǣʹͲͳ͵Ȍǡ ™Š‹ Š Šƒ• „‡‡
N

–‡ А‹ ƒŽŽ›”‡˜‹•‡†Ǥ –ƒŽ•‘‹ ‘”’‘”ƒ–‡•–Ї‡ А‹ ƒŽ‘””‹‰‡†ƒ Ȁ ʹ͹ͲͲͳǣʹͲͳ͵Ȁ‘”ͳǣʹͲͳͶƒ†


Ȁ ʹ͹ͲͲͳǣʹͲͳ͵Ȁ‘”ʹǣʹͲͳͷǤ
NI

Їƒ‹ Šƒ‰‡•ƒ”‡ƒ•ˆ‘ŽŽ‘™•ǣ
Ȅ –Ї –‡š– Šƒ• „‡‡ ƒŽ‹‰‡† ™‹–Š –Ї Šƒ”‘‹œ‡† •–”— –—”‡ ˆ‘” ƒƒ‰‡‡– •›•–‡ •–ƒ†ƒ”†•
AI

ƒ† Ȁ ʹ͹ͲͲʹǣʹͲʹʹǤ


› ˆ‡‡†„ƒ  ‘” “—‡•–‹‘• ‘ –Š‹• †‘ —‡– •Š‘—ކ „‡ †‹”‡ –‡† –‘ –Ї —•‡”ǯ• ƒ–‹‘ƒŽ •–ƒ†ƒ”†•
TR

„‘†›Ǥ  ‘’އ–‡ Ž‹•–‹‰ ‘ˆ –Ї•‡ „‘†‹‡• ƒ „‡ ˆ‘—† ƒ– [Link]/[Link] ƒ†
™™™Ǥ‹‡ Ǥ ŠȀƒ–‹‘ƒŽǦ ‘‹––‡‡•.
R
FO

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

iv © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Introduction
0.1 General
Š‹•†‘ —‡–Šƒ•„‡‡’”‡’ƒ”‡†–‘’”‘˜‹†‡”‡“—‹”‡‡–•ˆ‘”‡•–ƒ„Ž‹•Š‹‰ǡ‹’އ‡–‹‰ǡƒ‹–ƒ‹‹‰

LY
ƒ† ‘–‹—ƒŽŽ› ‹’”‘˜‹‰ ƒ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡Ǥ Ї ƒ†‘’–‹‘ ‘ˆ ƒ
‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡‹•ƒ•–”ƒ–‡‰‹ †‡ ‹•‹‘ˆ‘”ƒ‘”‰ƒ‹œƒ–‹‘ǤЇ‡•–ƒ„Ž‹•Š‡–
ƒ†‹’އ‡–ƒ–‹‘‘ˆƒ‘”‰ƒ‹œƒ–‹‘ǯ•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡‹•‹ϐŽ—‡ ‡†„›–Ї
‘”‰ƒ‹œƒ–‹‘ǯ•‡‡†•ƒ†‘„Œ‡ –‹˜‡•ǡ•‡ —”‹–›”‡“—‹”‡‡–•ǡ–Ї‘”‰ƒ‹œƒ–‹‘ƒŽ’”‘ ‡••‡•—•‡†ƒ†–Ї

ON
•‹œ‡ƒ†•–”— –—”‡‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ǤŽŽ‘ˆ–Ї•‡‹ϐŽ—‡ ‹‰ˆƒ –‘”•ƒ”‡‡š’‡ –‡†–‘ Šƒ‰‡‘˜‡”–‹‡Ǥ
Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡’”‡•‡”˜‡•–Ї ‘ϐ‹†‡–‹ƒŽ‹–›ǡ‹–‡‰”‹–›ƒ†ƒ˜ƒ‹Žƒ„‹Ž‹–›
‘ˆ‹ˆ‘”ƒ–‹‘„›ƒ’’Ž›‹‰ƒ”‹•ƒƒ‰‡‡–’”‘ ‡••ƒ†‰‹˜‡• ‘ϐ‹†‡ ‡–‘‹–‡”‡•–‡†’ƒ”–‹‡•–Šƒ–
”‹••ƒ”‡ƒ†‡“—ƒ–‡Ž›ƒƒ‰‡†Ǥ

SE
– ‹• ‹’‘”–ƒ– –Šƒ– –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ‹• ’ƒ”– ‘ˆ ƒ† ‹–‡‰”ƒ–‡† ™‹–Š –Ї
‘”‰ƒ‹œƒ–‹‘ǯ•’”‘ ‡••‡•ƒ†‘˜‡”ƒŽŽƒƒ‰‡‡–•–”— –—”‡ƒ†–Šƒ–‹ˆ‘”ƒ–‹‘•‡ —”‹–›‹• ‘•‹†‡”‡†
‹–Ї†‡•‹‰‘ˆ’”‘ ‡••‡•ǡ‹ˆ‘”ƒ–‹‘•›•–‡•ǡƒ† ‘–”‘Ž•Ǥ –‹•‡š’‡ –‡†–Šƒ–ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›
ƒƒ‰‡‡–•›•–‡‹’އ‡–ƒ–‹‘™‹ŽŽ„‡• ƒŽ‡†‹ƒ ‘”†ƒ ‡™‹–Š–Ї‡‡†•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǥ

O
Š‹•†‘ —‡– ƒ„‡—•‡†„›‹–‡”ƒŽƒ†‡š–‡”ƒŽ’ƒ”–‹‡•–‘ƒ••‡••–Ї‘”‰ƒ‹œƒ–‹‘̵•ƒ„‹Ž‹–›–‘‡‡–
–Ї‘”‰ƒ‹œƒ–‹‘ǯ•‘™‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–•Ǥ

RP
Ї ‘”†‡” ‹ ™Š‹ Š ”‡“—‹”‡‡–• ƒ”‡ ’”‡•‡–‡† ‹ –Š‹• †‘ —‡– †‘‡• ‘– ”‡ϐއ – –Ї‹” ‹’‘”–ƒ ‡
‘”‹’Ž›–Ї‘”†‡”‹™Š‹ Š–Ї›ƒ”‡–‘„‡‹’އ‡–‡†ǤЇŽ‹•–‹–‡•ƒ”‡‡—‡”ƒ–‡†ˆ‘””‡ˆ‡”‡ ‡
’—”’‘•‡‘Ž›Ǥ
PU
Ȁ  ʹ͹ͲͲͲ †‡• ”‹„‡• –Ї ‘˜‡”˜‹‡™ ƒ† –Ї ˜‘ ƒ„—Žƒ”› ‘ˆ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡–
•›•–‡•ǡ ”‡ˆ‡”‡ ‹‰ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ˆƒ‹Ž› ‘ˆ •–ƒ†ƒ”†• ȋ‹ Ž—†‹‰
Ȁ ʹ͹ͲͲ͵[2]ǡ Ȁ ʹ͹ͲͲͶ[͵]ƒ† Ȁ ʹ͹ͲͲͷ[Ͷ]Ȍǡ™‹–Š”‡Žƒ–‡†–‡”•ƒ††‡ϐ‹‹–‹‘•Ǥ
G

0.2 Compatibility with other management system standards


N

Š‹•†‘ —‡–ƒ’’Ž‹‡•–ЇŠ‹‰ŠǦއ˜‡Ž•–”— –—”‡ǡ‹†‡–‹ ƒŽ•—„Ǧ Žƒ—•‡–‹–އ•ǡ‹†‡–‹ ƒŽ–‡š–ǡ ‘‘–‡”•ǡ


ƒ† ‘”‡†‡ϐ‹‹–‹‘•†‡ϐ‹‡†‹‡š‘ˆ Ȁ ‹”‡ –‹˜‡•ǡƒ”–ͳǡ‘•‘Ž‹†ƒ–‡† —’’އ‡–ǡ
NI

ƒ†–Ї”‡ˆ‘”‡ƒ‹–ƒ‹• ‘’ƒ–‹„‹Ž‹–›™‹–Š‘–Ї”ƒƒ‰‡‡–•›•–‡•–ƒ†ƒ”†•–Šƒ–Šƒ˜‡ƒ†‘’–‡†–Ї
‡šǤ
AI

Š‹• ‘‘ƒ’’”‘ƒ І‡ϐ‹‡†‹–Ї‡š™‹ŽŽ„‡—•‡ˆ—Žˆ‘”–Š‘•‡‘”‰ƒ‹œƒ–‹‘•–Šƒ– Š‘‘•‡–‘


‘’‡”ƒ–‡ƒ•‹‰Ž‡ƒƒ‰‡‡–•›•–‡–Šƒ–‡‡–•–Ї”‡“—‹”‡‡–•‘ˆ–™‘‘”‘”‡ƒƒ‰‡‡–•›•–‡
•–ƒ†ƒ”†•Ǥ
TR
R
FO

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

© ISO/IEC 2022 – All rights reserved v


FO
R
TR
AI
NIN
G
PU
RP
O SE
ON
LY
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
INTERNATIONAL STANDARD ISO/IEC 27001:2022(E)

Information security, cybersecurity and privacy


protection — Information security management systems

LY
— Requirements

ON
1 Scope
Š‹•†‘ —‡–•’‡ ‹ϐ‹‡•–Ї”‡“—‹”‡‡–•ˆ‘”‡•–ƒ„Ž‹•Š‹‰ǡ‹’އ‡–‹‰ǡƒ‹–ƒ‹‹‰ƒ† ‘–‹—ƒŽŽ›
‹’”‘˜‹‰ ƒ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ™‹–Š‹ –Ї ‘–‡š– ‘ˆ –Ї ‘”‰ƒ‹œƒ–‹‘Ǥ Š‹•
†‘ —‡–ƒŽ•‘‹ Ž—†‡•”‡“—‹”‡‡–•ˆ‘”–Їƒ••‡••‡–ƒ†–”‡ƒ–‡–‘ˆ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••

SE
–ƒ‹Ž‘”‡†–‘–Ї‡‡†•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ǤЇ”‡“—‹”‡‡–••‡–‘—–‹–Š‹•†‘ —‡–ƒ”‡‰‡‡”‹ ƒ†ƒ”‡
‹–‡†‡†–‘„‡ƒ’’Ž‹ ƒ„އ–‘ƒŽŽ‘”‰ƒ‹œƒ–‹‘•ǡ”‡‰ƒ”†Ž‡••‘ˆ–›’‡ǡ•‹œ‡‘”ƒ–—”‡Ǥš Ž—†‹‰ƒ›‘ˆ–Ї
”‡“—‹”‡‡–••’‡ ‹ϐ‹‡†‹Žƒ—•‡•Ͷ to 10‹•‘–ƒ ‡’–ƒ„އ™Š‡ƒ‘”‰ƒ‹œƒ–‹‘ Žƒ‹• ‘ˆ‘”‹–›–‘
this document.

O
2 Normative references

RP
Ї ˆ‘ŽŽ‘™‹‰ †‘ —‡–• ƒ”‡ ”‡ˆ‡””‡† –‘ ‹ –Ї –‡š– ‹ •— Š ƒ ™ƒ› –Šƒ– •‘‡ ‘” ƒŽŽ ‘ˆ –Ї‹” ‘–‡–
‘•–‹–—–‡• ”‡“—‹”‡‡–• ‘ˆ –Š‹• †‘ —‡–Ǥ ‘” †ƒ–‡† ”‡ˆ‡”‡ ‡•ǡ ‘Ž› –Ї ‡†‹–‹‘ ‹–‡† ƒ’’Ž‹‡•Ǥ ‘”
—†ƒ–‡†”‡ˆ‡”‡ ‡•ǡ–ЇŽƒ–‡•–‡†‹–‹‘‘ˆ–Ї”‡ˆ‡”‡ ‡††‘ —‡–ȋ‹ Ž—†‹‰ƒ›ƒ‡†‡–•Ȍƒ’’Ž‹‡•Ǥ
PU
Ȁ  ʹ͹ͲͲͲǡ Information technology — Security techniques — Information security management
systems — Overview and vocabulary

͵ ‡”•ƒ††‡ϐ‹‹–‹‘•
G

‘”–Ї’—”’‘•‡•‘ˆ–Š‹•†‘ —‡–ǡ–Ї–‡”•ƒ††‡ϐ‹‹–‹‘•‰‹˜‡‹ Ȁ ʹ͹ͲͲͲƒ’’Ž›Ǥ


N

ƒ† ƒ‹–ƒ‹–‡”‹‘Ž‘‰›†ƒ–ƒ„ƒ•‡•ˆ‘”—•‡‹•–ƒ†ƒ”†‹œƒ–‹‘ƒ––Їˆ‘ŽŽ‘™‹‰ƒ††”‡••‡•ǣ

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Ȅ Ž‹‡„”‘™•‹‰’Žƒ–ˆ‘”ǣƒ˜ƒ‹Žƒ„އƒ–[Link]
NI

Ȅ އ –”‘’‡†‹ƒǣƒ˜ƒ‹Žƒ„އƒ–[Link] –”‘’‡†‹ƒ.org/


AI

4 Context of the organization


TR

4.1 Understanding the organization and its context


Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡‡š–‡”ƒŽƒ†‹–‡”ƒŽ‹••—‡•–Šƒ–ƒ”‡”‡Ž‡˜ƒ––‘‹–•’—”’‘•‡ƒ†–Šƒ–
ƒˆˆ‡ –‹–•ƒ„‹Ž‹–›–‘ƒ Š‹‡˜‡–Ї‹–‡†‡†‘—– ‘‡ȋ•Ȍ‘ˆ‹–•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ
R

 ‡–‡”‹‹‰–Ї•‡‹••—‡•”‡ˆ‡”•–‘‡•–ƒ„Ž‹•Š‹‰–Ї‡š–‡”ƒŽƒ†‹–‡”ƒŽ ‘–‡š–‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘


‘•‹†‡”‡†‹Žƒ—•‡ͷǤͶǤͳ‘ˆ ͵ͳͲͲͲǣʹͲͳͺ[5].
FO

4.2 Understanding the needs and expectations of interested parties


Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡ǣ
ƒȌ ‹–‡”‡•–‡†’ƒ”–‹‡•–Šƒ–ƒ”‡”‡Ž‡˜ƒ––‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǣ
„Ȍ –Ї”‡Ž‡˜ƒ–”‡“—‹”‡‡–•‘ˆ–Ї•‡‹–‡”‡•–‡†’ƒ”–‹‡•Ǣ
Ȍ ™Š‹ Š ‘ˆ –Ї•‡ ”‡“—‹”‡‡–• ™‹ŽŽ „‡ ƒ††”‡••‡† –Š”‘—‰Š –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡–
•›•–‡Ǥ

© ISO/IEC 2022 – All rights reserved 1


ISO/IEC 27001:2022(E)

 Ї”‡“—‹”‡‡–•‘ˆ‹–‡”‡•–‡†’ƒ”–‹‡• ƒ‹ Ž—†‡އ‰ƒŽƒ†”‡‰—Žƒ–‘”›”‡“—‹”‡‡–•ƒ† ‘–”ƒ –—ƒŽ


‘„Ž‹‰ƒ–‹‘•Ǥ

4.3 Determining the scope of the information security management system

LY
Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ †‡–‡”‹‡ –Ї „‘—†ƒ”‹‡• ƒ† ƒ’’Ž‹ ƒ„‹Ž‹–› ‘ˆ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–›
ƒƒ‰‡‡–•›•–‡–‘‡•–ƒ„Ž‹•Š‹–•• ‘’‡Ǥ
Ї†‡–‡”‹‹‰–Š‹•• ‘’‡ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘•‹†‡”ǣ

ON
ƒȌ –Ї‡š–‡”ƒŽƒ†‹–‡”ƒŽ‹••—‡•”‡ˆ‡””‡†–‘‹ͶǤͳǢ
„Ȍ –Ї”‡“—‹”‡‡–•”‡ˆ‡””‡†–‘‹ͶǤʹǢ
Ȍ ‹–‡”ˆƒ ‡•ƒ††‡’‡†‡ ‹‡•„‡–™‡‡ƒ –‹˜‹–‹‡•’‡”ˆ‘”‡†„›–Ї‘”‰ƒ‹œƒ–‹‘ǡƒ†–Š‘•‡–Šƒ–ƒ”‡
’‡”ˆ‘”‡†„›‘–Ї”‘”‰ƒ‹œƒ–‹‘•Ǥ

SE
Ї• ‘’‡•ŠƒŽŽ„‡ƒ˜ƒ‹Žƒ„އƒ•†‘ —‡–‡†‹ˆ‘”ƒ–‹‘Ǥ

4.4 Information security management system

O
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Šǡ‹’އ‡–ǡƒ‹–ƒ‹ƒ† ‘–‹—ƒŽŽ›‹’”‘˜‡ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›

RP
ƒƒ‰‡‡– •›•–‡ǡ ‹ Ž—†‹‰ –Ї ’”‘ ‡••‡• ‡‡†‡† ƒ† –Ї‹” ‹–‡”ƒ –‹‘•ǡ ‹ ƒ ‘”†ƒ ‡ ™‹–Š –Ї
”‡“—‹”‡‡–•‘ˆ–Š‹•†‘ —‡–Ǥ

5 Leadership
PU
5.1 Leadership and commitment
‘’ ƒƒ‰‡‡– •ŠƒŽŽ †‡‘•–”ƒ–‡ އƒ†‡”•Š‹’ ƒ† ‘‹–‡– ™‹–Š ”‡•’‡ – –‘ –Ї ‹ˆ‘”ƒ–‹‘
•‡ —”‹–›ƒƒ‰‡‡–•›•–‡„›ǣ
G

ƒȌ ‡•—”‹‰–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›ƒ†–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ƒ”‡‡•–ƒ„Ž‹•Ї†


ƒ†ƒ”‡ ‘’ƒ–‹„އ™‹–Š–Ї•–”ƒ–‡‰‹ †‹”‡ –‹‘‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǣ
N

„Ȍ ‡•—”‹‰ –Ї ‹–‡‰”ƒ–‹‘ ‘ˆ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ”‡“—‹”‡‡–• ‹–‘ –Ї
NI

‘”‰ƒ‹œƒ–‹‘ǯ•’”‘ ‡••‡•Ǣ
Ȍ ‡•—”‹‰–Šƒ––Ї”‡•‘—” ‡•‡‡†‡†ˆ‘”–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ƒ”‡ƒ˜ƒ‹Žƒ„އǢ
AI

†Ȍ ‘—‹ ƒ–‹‰–Ї‹’‘”–ƒ ‡‘ˆ‡ˆˆ‡ –‹˜‡‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–ƒ†‘ˆ ‘ˆ‘”‹‰


–‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡”‡“—‹”‡‡–•Ǣ
TR

‡Ȍ ‡•—”‹‰–Šƒ––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ƒ Š‹‡˜‡•‹–•‹–‡†‡†‘—– ‘‡ȋ•ȌǢ


ˆȌ †‹”‡ –‹‰ ƒ† •—’’‘”–‹‰ ’‡”•‘• –‘ ‘–”‹„—–‡ –‘ –Ї ‡ˆˆ‡ –‹˜‡‡•• ‘ˆ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–›
ƒƒ‰‡‡–•›•–‡Ǣ
R

‰Ȍ ’”‘‘–‹‰ ‘–‹—ƒŽ‹’”‘˜‡‡–Ǣƒ†


ŠȌ •—’’‘”–‹‰‘–Ї””‡Ž‡˜ƒ–ƒƒ‰‡‡–”‘އ•–‘†‡‘•–”ƒ–‡–Ї‹”އƒ†‡”•Š‹’ƒ•‹–ƒ’’Ž‹‡•–‘–Ї‹”
FO

ƒ”‡ƒ•‘ˆ”‡•’‘•‹„‹Ž‹–›Ǥ
 ‡ˆ‡”‡ ‡–‘Dz„—•‹‡••dz‹–Š‹•†‘ —‡– ƒ„‡‹–‡”’”‡–‡†„”‘ƒ†Ž›–‘‡ƒ–Š‘•‡ƒ –‹˜‹–‹‡•–Šƒ–ƒ”‡
‘”‡–‘–Ї’—”’‘•‡•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ǯ•‡š‹•–‡ ‡Ǥ

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

2 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

5.2 Policy
‘’ƒƒ‰‡‡–•ŠƒŽŽ‡•–ƒ„Ž‹•Šƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›–Šƒ–ǣ
ƒȌ ‹•ƒ’’”‘’”‹ƒ–‡–‘–Ї’—”’‘•‡‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǣ

LY
„Ȍ ‹ Ž—†‡•‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ȋ•‡‡6.2Ȍ‘”’”‘˜‹†‡•–Їˆ”ƒ‡™‘”ˆ‘”•‡––‹‰‹ˆ‘”ƒ–‹‘
•‡ —”‹–›‘„Œ‡ –‹˜‡•Ǣ
Ȍ ‹ Ž—†‡•ƒ ‘‹–‡––‘•ƒ–‹•ˆ›ƒ’’Ž‹ ƒ„އ”‡“—‹”‡‡–•”‡Žƒ–‡†–‘‹ˆ‘”ƒ–‹‘•‡ —”‹–›Ǣ

ON
†Ȍ ‹ Ž—†‡•ƒ ‘‹–‡––‘ ‘–‹—ƒŽ‹’”‘˜‡‡–‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ
Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›•ŠƒŽŽǣ
‡Ȍ „‡ƒ˜ƒ‹Žƒ„އƒ•†‘ —‡–‡†‹ˆ‘”ƒ–‹‘Ǣ

SE
ˆȌ „‡ ‘—‹ ƒ–‡†™‹–Š‹–Ї‘”‰ƒ‹œƒ–‹‘Ǣ
‰Ȍ „‡ƒ˜ƒ‹Žƒ„އ–‘‹–‡”‡•–‡†’ƒ”–‹‡•ǡƒ•ƒ’’”‘’”‹ƒ–‡Ǥ

O
5.3 Organizational roles, responsibilities and authorities

RP
‘’ƒƒ‰‡‡–•ŠƒŽŽ‡•—”‡–Šƒ––Ї”‡•’‘•‹„‹Ž‹–‹‡•ƒ†ƒ—–Š‘”‹–‹‡•ˆ‘””‘އ•”‡Ž‡˜ƒ––‘‹ˆ‘”ƒ–‹‘
•‡ —”‹–›ƒ”‡ƒ••‹‰‡†ƒ† ‘—‹ ƒ–‡†™‹–Š‹–Ї‘”‰ƒ‹œƒ–‹‘Ǥ
‘’ƒƒ‰‡‡–•ŠƒŽŽƒ••‹‰–Ї”‡•’‘•‹„‹Ž‹–›ƒ†ƒ—–Š‘”‹–›ˆ‘”ǣ
PU
ƒȌ ‡•—”‹‰–Šƒ––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ‘ˆ‘”•–‘–Ї”‡“—‹”‡‡–•‘ˆ–Š‹•
†‘ —‡–Ǣ
„Ȍ ”‡’‘”–‹‰‘–Ї’‡”ˆ‘”ƒ ‡‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡–‘–‘’ƒƒ‰‡‡–Ǥ
 ‘’ ƒƒ‰‡‡– ƒ ƒŽ•‘ ƒ••‹‰ ”‡•’‘•‹„‹Ž‹–‹‡• ƒ† ƒ—–Š‘”‹–‹‡• ˆ‘” ”‡’‘”–‹‰ ’‡”ˆ‘”ƒ ‡ ‘ˆ –Ї
G

‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡™‹–Š‹–Ї‘”‰ƒ‹œƒ–‹‘Ǥ
N

6 Planning
NI

6.1 Actions to address risks and opportunities


AI

6.1.1 General

Ї ’Žƒ‹‰ ˆ‘” –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ǡ –Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ ‘•‹†‡”
TR

the issues referred to in ͶǤͳ ƒ† –Ї ”‡“—‹”‡‡–• ”‡ˆ‡””‡† –‘ ‹ ͶǤʹ ƒ† †‡–‡”‹‡ –Ї ”‹•• ƒ†
‘’’‘”–—‹–‹‡•–Šƒ–‡‡†–‘„‡ƒ††”‡••‡†–‘ǣ
ƒȌ ‡•—”‡–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ƒƒ Š‹‡˜‡‹–•‹–‡†‡†‘—– ‘‡ȋ•ȌǢ
„Ȍ ’”‡˜‡–ǡ‘””‡†— ‡ǡ—†‡•‹”‡†‡ˆˆ‡ –•Ǣ
R

Ȍ ƒ Š‹‡˜‡ ‘–‹—ƒŽ‹’”‘˜‡‡–Ǥ
FO

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’Žƒǣ
†Ȍ ƒ –‹‘•–‘ƒ††”‡••–Ї•‡”‹••ƒ†‘’’‘”–—‹–‹‡•Ǣƒ†
e) how to
ͳȌ ‹–‡‰”ƒ–‡ ƒ† ‹’އ‡– –Ї ƒ –‹‘• ‹–‘ ‹–• ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡
’”‘ ‡••‡•Ǣƒ†
ʹȌ ‡˜ƒŽ—ƒ–‡–Ї‡ˆˆ‡ –‹˜‡‡••‘ˆ–Ї•‡ƒ –‹‘•Ǥ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

© ISO/IEC 2022 – All rights reserved 3


ISO/IEC 27001:2022(E)

6.1.2 Information security risk assessment

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡ϐ‹‡ƒ†ƒ’’Ž›ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–’”‘ ‡••–Šƒ–ǣ


ƒȌ ‡•–ƒ„Ž‹•Ї•ƒ†ƒ‹–ƒ‹•‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹• ”‹–‡”‹ƒ–Šƒ–‹ Ž—†‡ǣ

LY
ͳȌ –Ї”‹•ƒ ‡’–ƒ ‡ ”‹–‡”‹ƒǢƒ†
ʹȌ ”‹–‡”‹ƒˆ‘”’‡”ˆ‘”‹‰‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–•Ǣ

ON
„Ȍ ‡•—”‡• –Šƒ– ”‡’‡ƒ–‡† ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• ƒ••‡••‡–• ’”‘†— ‡ ‘•‹•–‡–ǡ ˜ƒŽ‹† ƒ†
‘’ƒ”ƒ„އ”‡•—Ž–•Ǣ
Ȍ ‹†‡–‹ϐ‹‡•–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ǣ
ͳȌ ƒ’’Ž› –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• ƒ••‡••‡– ’”‘ ‡•• –‘ ‹†‡–‹ˆ› ”‹•• ƒ••‘ ‹ƒ–‡† ™‹–Š

SE
–Ї Ž‘•• ‘ˆ ‘ϐ‹†‡–‹ƒŽ‹–›ǡ ‹–‡‰”‹–› ƒ† ƒ˜ƒ‹Žƒ„‹Ž‹–› ˆ‘” ‹ˆ‘”ƒ–‹‘ ™‹–Š‹ –Ї • ‘’‡ ‘ˆ –Ї
‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǣƒ†
ʹȌ ‹†‡–‹ˆ›–Ї”‹•‘™‡”•Ǣ

O
†Ȍ ƒƒŽ›•‡•–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ǣ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

ͳȌ ƒ••‡••–Ї’‘–‡–‹ƒŽ ‘•‡“—‡ ‡•–Šƒ–™‘—ކ”‡•—Ž–‹ˆ–Ї”‹••‹†‡–‹ϐ‹‡†‹6.1.2 c) 1) were to


ƒ–‡”‹ƒŽ‹œ‡Ǣ
ʹȌ ƒ••‡••–Ї”‡ƒŽ‹•–‹ Ž‹‡Ž‹Š‘‘†‘ˆ–Ї‘ —””‡ ‡‘ˆ–Ї”‹••‹†‡–‹ϐ‹‡†‹6.1.2 ȌͳȌǢƒ† RP
PU
͵Ȍ †‡–‡”‹‡–Їއ˜‡Ž•‘ˆ”‹•Ǣ
‡Ȍ ‡˜ƒŽ—ƒ–‡•–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ǣ
ͳȌ ‘’ƒ”‡–Ї”‡•—Ž–•‘ˆ”‹•ƒƒŽ›•‹•™‹–Š–Ї”‹• ”‹–‡”‹ƒ‡•–ƒ„Ž‹•Ї†‹6.1.2ƒȌǢƒ†
G

ʹȌ ’”‹‘”‹–‹œ‡–ЇƒƒŽ›•‡†”‹••ˆ‘””‹•–”‡ƒ–‡–Ǥ
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ƒ„‘—––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–
N

process.
NI

6.1.3 Information security risk treatment

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡ϐ‹‡ƒ†ƒ’’Ž›ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’”‘ ‡••–‘ǣ


AI

ƒȌ •‡Ž‡ – ƒ’’”‘’”‹ƒ–‡ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• –”‡ƒ–‡– ‘’–‹‘•ǡ –ƒ‹‰ ƒ ‘—– ‘ˆ –Ї ”‹•
ƒ••‡••‡–”‡•—Ž–•Ǣ
TR

„Ȍ †‡–‡”‹‡ ƒŽŽ ‘–”‘Ž• –Šƒ– ƒ”‡ ‡ ‡••ƒ”› –‘ ‹’އ‡– –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• –”‡ƒ–‡–
‘’–‹‘ȋ•Ȍ Š‘•‡Ǣ
ͳ ”‰ƒ‹œƒ–‹‘• ƒ†‡•‹‰ ‘–”‘Ž•ƒ•”‡“—‹”‡†ǡ‘”‹†‡–‹ˆ›–Їˆ”‘ƒ›•‘—” ‡Ǥ
R

Ȍ ‘’ƒ”‡ –Ї ‘–”‘Ž• †‡–‡”‹‡† ‹ ͸ǤͳǤ͵ „Ȍ ƒ„‘˜‡ ™‹–Š –Š‘•‡ ‹ ‡š  ƒ† ˜‡”‹ˆ› –Šƒ– ‘
‡ ‡••ƒ”› ‘–”‘Ž•Šƒ˜‡„‡‡‘‹––‡†Ǣ
FO

NOTE 2 ‡š  ‘–ƒ‹• ƒ Ž‹•– ‘ˆ ’‘••‹„އ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ‘–”‘Ž•Ǥ •‡”• ‘ˆ –Š‹• †‘ —‡– ƒ”‡
directed to ‡š–‘‡•—”‡–Šƒ–‘‡ ‡••ƒ”›‹ˆ‘”ƒ–‹‘•‡ —”‹–› ‘–”‘Ž•ƒ”‡‘˜‡”Ž‘‘‡†Ǥ

͵ Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–› ‘–”‘ޕދ•–‡†‹‡šƒ”‡‘–‡šŠƒ—•–‹˜‡ƒ†ƒ††‹–‹‘ƒŽ‹ˆ‘”ƒ–‹‘


•‡ —”‹–› ‘–”‘Ž• ƒ„‡‹ Ž—†‡†‹ˆ‡‡†‡†Ǥ

†Ȍ ’”‘†— ‡ƒ–ƒ–‡‡–‘ˆ’’Ž‹ ƒ„‹Ž‹–›–Šƒ– ‘–ƒ‹•ǣ


Ȅ –Ї‡ ‡••ƒ”› ‘–”‘Ž•ȋ•‡‡͸ǤͳǤ͵„Ȍƒ† ȌȌǢ

4 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Ȅ Œ—•–‹ϐ‹ ƒ–‹‘ˆ‘”–Ї‹”‹ Ž—•‹‘Ǣ


Ȅ ™Š‡–Ї”–Ї‡ ‡••ƒ”› ‘–”‘Ž•ƒ”‡‹’އ‡–‡†‘”‘–Ǣƒ†
Ȅ –ЇŒ—•–‹ϐ‹ ƒ–‹‘ˆ‘”‡š Ž—†‹‰ƒ›‘ˆ–Ї‡š controls.

LY
‡Ȍ ˆ‘”—Žƒ–‡ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’ŽƒǢƒ†
ˆȌ ‘„–ƒ‹”‹•‘™‡”•ǯƒ’’”‘˜ƒŽ‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’Žƒƒ†ƒ ‡’–ƒ ‡‘ˆ–Ї
”‡•‹†—ƒŽ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••Ǥ

ON
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ƒ„‘—––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–
process.
Ͷ Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• ƒ••‡••‡– ƒ† –”‡ƒ–‡– ’”‘ ‡•• ‹ –Š‹• †‘ —‡– ƒŽ‹‰• ™‹–Š –Ї
’”‹ ‹’އ•ƒ†‰‡‡”‹ ‰—‹†‡Ž‹‡•’”‘˜‹†‡†‹ ͵ͳͲͲͲ[5].

SE
6.2 Information security objectives and planning to achieve them
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Š‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ƒ–”‡Ž‡˜ƒ–ˆ— –‹‘•ƒ†އ˜‡Ž•Ǥ

O
Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡••ŠƒŽŽǣ

RP
ƒȌ „‡ ‘•‹•–‡–™‹–Š–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›Ǣ
„Ȍ „‡‡ƒ•—”ƒ„އȋ‹ˆ’”ƒ –‹ ƒ„އȌǢ
Ȍ –ƒ‡‹–‘ƒ ‘—–ƒ’’Ž‹ ƒ„އ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–•ǡƒ†”‡•—Ž–•ˆ”‘”‹•ƒ••‡••‡–
PU
ƒ†”‹•–”‡ƒ–‡–Ǣ
†Ȍ „‡‘‹–‘”‡†Ǣ
‡Ȍ „‡ ‘—‹ ƒ–‡†Ǣ
G

ˆȌ „‡—’†ƒ–‡†ƒ•ƒ’’”‘’”‹ƒ–‡Ǣ
‰Ȍ „‡ƒ˜ƒ‹Žƒ„އƒ•†‘ —‡–‡†‹ˆ‘”ƒ–‹‘Ǥ
N

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•Ǥ


NI

Ї’Žƒ‹‰Š‘™–‘ƒ Š‹‡˜‡‹–•‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡ǣ


ŠȌ ™Šƒ–™‹ŽŽ„‡†‘‡Ǣ
AI

‹Ȍ ™Šƒ–”‡•‘—” ‡•™‹ŽŽ„‡”‡“—‹”‡†Ǣ


TR

ŒȌ ™Š‘™‹ŽŽ„‡”‡•’‘•‹„އǢ
Ȍ ™Š‡‹–™‹ŽŽ„‡ ‘’އ–‡†Ǣƒ†
ŽȌ Š‘™–Ї”‡•—Ž–•™‹ŽŽ„‡‡˜ƒŽ—ƒ–‡†Ǥ
R

6.3 Planning of changes


FO

Ї –Ї ‘”‰ƒ‹œƒ–‹‘ †‡–‡”‹‡• –Ї ‡‡† ˆ‘” Šƒ‰‡• –‘ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡–
•›•–‡ǡ–Ї Šƒ‰‡••ŠƒŽŽ„‡ ƒ””‹‡†‘—–‹ƒ’Žƒ‡†ƒ‡”Ǥ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

© ISO/IEC 2022 – All rights reserved 5


ISO/IEC 27001:2022(E)

7 Support

7.1 Resources

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ †‡–‡”‹‡ ƒ† ’”‘˜‹†‡ –Ї ”‡•‘—” ‡• ‡‡†‡† ˆ‘” –Ї ‡•–ƒ„Ž‹•Š‡–ǡ

LY
‹’އ‡–ƒ–‹‘ǡ ƒ‹–‡ƒ ‡ ƒ† ‘–‹—ƒŽ ‹’”‘˜‡‡– ‘ˆ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡–
•›•–‡Ǥ

ON
7.2 Competence
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽǣ
ƒȌ †‡–‡”‹‡ –Ї ‡ ‡••ƒ”› ‘’‡–‡ ‡ ‘ˆ ’‡”•‘ȋ•Ȍ †‘‹‰ ™‘” —†‡” ‹–• ‘–”‘Ž –Šƒ– ƒˆˆ‡ –• ‹–•
‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‡”ˆ‘”ƒ ‡Ǣ

SE
„Ȍ ‡•—”‡ –Šƒ– –Ї•‡ ’‡”•‘• ƒ”‡ ‘’‡–‡– ‘ –Ї „ƒ•‹• ‘ˆ ƒ’’”‘’”‹ƒ–‡ ‡†— ƒ–‹‘ǡ –”ƒ‹‹‰ǡ ‘”
‡š’‡”‹‡ ‡Ǣ
Ȍ ™Š‡”‡ƒ’’Ž‹ ƒ„އǡ–ƒ‡ƒ –‹‘•–‘ƒ “—‹”‡–Ї‡ ‡••ƒ”› ‘’‡–‡ ‡ǡƒ†‡˜ƒŽ—ƒ–‡–Ї‡ˆˆ‡ –‹˜‡‡••

O
‘ˆ–Їƒ –‹‘•–ƒ‡Ǣƒ†
†Ȍ ”‡–ƒ‹ƒ’’”‘’”‹ƒ–‡†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ƒ•‡˜‹†‡ ‡‘ˆ ‘’‡–‡ ‡Ǥ

RP
’’Ž‹ ƒ„އƒ –‹‘• ƒ‹ Ž—†‡ǡˆ‘”‡šƒ’އǣ–Ї’”‘˜‹•‹‘‘ˆ–”ƒ‹‹‰–‘ǡ–Ї‡–‘”‹‰‘ˆǡ‘”–Ї”‡Ǧ
ƒ••‹‰‡–‘ˆ —””‡–‡’Ž‘›‡‡•Ǣ‘”–ЇŠ‹”‹‰‘” ‘–”ƒ –‹‰‘ˆ ‘’‡–‡–’‡”•‘•Ǥ
PU
7.3 Awareness
‡”•‘•†‘‹‰™‘”—†‡”–Ї‘”‰ƒ‹œƒ–‹‘ǯ• ‘–”‘Ž•ŠƒŽŽ„‡ƒ™ƒ”‡‘ˆǣ
ƒȌ –Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›Ǣ
G

„Ȍ –Ї‹” ‘–”‹„—–‹‘–‘–Ї‡ˆˆ‡ –‹˜‡‡••‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ǡ‹ Ž—†‹‰


–Ї„‡‡ϐ‹–•‘ˆ‹’”‘˜‡†‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‡”ˆ‘”ƒ ‡Ǣƒ†
N

Ȍ –Ї ‹’Ž‹ ƒ–‹‘• ‘ˆ ‘– ‘ˆ‘”‹‰ ™‹–Š –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡
”‡“—‹”‡‡–•Ǥ
NI

7.4 Communication
AI

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡–Ї‡‡†ˆ‘”‹–‡”ƒŽƒ†‡š–‡”ƒŽ ‘—‹ ƒ–‹‘•”‡Ž‡˜ƒ––‘–Ї


‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡‹ Ž—†‹‰ǣ
TR

ƒȌ ‘™Šƒ––‘ ‘—‹ ƒ–‡Ǣ


„Ȍ ™Š‡–‘ ‘—‹ ƒ–‡Ǣ
Ȍ ™‹–ЙБ–‘ ‘—‹ ƒ–‡Ǣ
R

†Ȍ Š‘™–‘ ‘—‹ ƒ–‡Ǥ


FO

7.5 Documented information

7.5.1 General

Ї‘”‰ƒ‹œƒ–‹‘ǯ•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡•ŠƒŽŽ‹ Ž—†‡ǣ


ƒȌ †‘ —‡–‡†‹ˆ‘”ƒ–‹‘”‡“—‹”‡†„›–Š‹•†‘ —‡–Ǣƒ†

6 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

„Ȍ †‘ —‡–‡†‹ˆ‘”ƒ–‹‘†‡–‡”‹‡†„›–Ї‘”‰ƒ‹œƒ–‹‘ƒ•„‡‹‰‡ ‡••ƒ”›ˆ‘”–Ї‡ˆˆ‡ –‹˜‡‡••


‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ
 Ї ‡š–‡– ‘ˆ †‘ —‡–‡† ‹ˆ‘”ƒ–‹‘ ˆ‘” ƒ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ƒ †‹ˆˆ‡”
ˆ”‘‘‡‘”‰ƒ‹œƒ–‹‘–‘ƒ‘–Ї”†—‡–‘ǣ

LY
ͳȌ –Ї•‹œ‡‘ˆ‘”‰ƒ‹œƒ–‹‘ƒ†‹–•–›’‡‘ˆƒ –‹˜‹–‹‡•ǡ’”‘ ‡••‡•ǡ’”‘†— –•ƒ†•‡”˜‹ ‡•Ǣ

ʹȌ –Ї ‘’Ž‡š‹–›‘ˆ’”‘ ‡••‡•ƒ†–Ї‹”‹–‡”ƒ –‹‘•Ǣƒ†

ON
͵Ȍ –Ї ‘’‡–‡ ‡‘ˆ’‡”•‘•Ǥ

7.5.2 Creating and updating

Ї ”‡ƒ–‹‰ƒ†—’†ƒ–‹‰†‘ —‡–‡†‹ˆ‘”ƒ–‹‘–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•—”‡ƒ’’”‘’”‹ƒ–‡ǣ

SE
ƒȌ ‹†‡–‹ϐ‹ ƒ–‹‘ƒ††‡• ”‹’–‹‘ȋ‡Ǥ‰Ǥƒ–‹–އǡ†ƒ–‡ǡƒ—–Š‘”ǡ‘””‡ˆ‡”‡ ‡—„‡”ȌǢ
„Ȍ ˆ‘”ƒ–ȋ‡Ǥ‰ǤŽƒ‰—ƒ‰‡ǡ•‘ˆ–™ƒ”‡˜‡”•‹‘ǡ‰”ƒ’Š‹ •Ȍƒ†‡†‹ƒȋ‡Ǥ‰Ǥ’ƒ’‡”ǡ‡Ž‡ –”‘‹ ȌǢƒ†
Ȍ ”‡˜‹‡™ƒ†ƒ’’”‘˜ƒŽˆ‘”•—‹–ƒ„‹Ž‹–›ƒ†ƒ†‡“—ƒ ›Ǥ

O
7.5.3 Control of documented information

†‘ —‡–•ŠƒŽŽ„‡ ‘–”‘ŽŽ‡†–‘‡•—”‡ǣ RP
‘ —‡–‡† ‹ˆ‘”ƒ–‹‘ ”‡“—‹”‡† „› –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ƒ† „› –Š‹•

ƒȌ ‹–‹•ƒ˜ƒ‹Žƒ„އƒ†•—‹–ƒ„އˆ‘”—•‡ǡ™Š‡”‡ƒ†™Š‡‹–‹•‡‡†‡†Ǣƒ†
PU
„Ȍ ‹–‹•ƒ†‡“—ƒ–‡Ž›’”‘–‡ –‡†ȋ‡Ǥ‰Ǥˆ”‘Ž‘••‘ˆ ‘ϐ‹†‡–‹ƒŽ‹–›ǡ‹’”‘’‡”—•‡ǡ‘”Ž‘••‘ˆ‹–‡‰”‹–›ȌǤ
‘”–Ї ‘–”‘Ž‘ˆ†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽƒ††”‡••–Їˆ‘ŽŽ‘™‹‰ƒ –‹˜‹–‹‡•ǡƒ•
ƒ’’Ž‹ ƒ„އǣ
G

Ȍ †‹•–”‹„—–‹‘ǡƒ ‡••ǡ”‡–”‹‡˜ƒŽƒ†—•‡Ǣ
N

†Ȍ •–‘”ƒ‰‡ƒ†’”‡•‡”˜ƒ–‹‘ǡ‹ Ž—†‹‰–Ї’”‡•‡”˜ƒ–‹‘‘ˆއ‰‹„‹Ž‹–›Ǣ


‡Ȍ ‘–”‘Ž‘ˆ Šƒ‰‡•ȋ‡Ǥ‰Ǥ˜‡”•‹‘ ‘–”‘ŽȌǢƒ†
NI

ˆȌ ”‡–‡–‹‘ƒ††‹•’‘•‹–‹‘Ǥ
‘ —‡–‡† ‹ˆ‘”ƒ–‹‘ ‘ˆ ‡š–‡”ƒŽ ‘”‹‰‹ǡ †‡–‡”‹‡† „› –Ї ‘”‰ƒ‹œƒ–‹‘ –‘ „‡ ‡ ‡••ƒ”› ˆ‘”
AI

–Ї ’Žƒ‹‰ ƒ† ‘’‡”ƒ–‹‘ ‘ˆ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ǡ •ŠƒŽŽ „‡ ‹†‡–‹ϐ‹‡† ƒ•

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
ƒ’’”‘’”‹ƒ–‡ǡƒ† ‘–”‘ŽŽ‡†Ǥ
TR

  ‡•• ƒ‹’Ž›ƒ†‡ ‹•‹‘”‡‰ƒ”†‹‰–Ї’‡”‹••‹‘–‘˜‹‡™–Ї†‘ —‡–‡†‹ˆ‘”ƒ–‹‘‘Ž›ǡ‘”


–Ї’‡”‹••‹‘ƒ†ƒ—–Š‘”‹–›–‘˜‹‡™ƒ† Šƒ‰‡–Ї†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ǡ‡– Ǥ

8 Operation
R

8.1 Operational planning and control


FO

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’Žƒǡ‹’އ‡–ƒ† ‘–”‘Ž–Ї’”‘ ‡••‡•‡‡†‡†–‘‡‡–”‡“—‹”‡‡–•ǡƒ†–‘


‹’އ‡––Їƒ –‹‘•†‡–‡”‹‡†‹Žƒ—•‡͸ǡ„›ǣ
Ȅ ‡•–ƒ„Ž‹•Š‹‰ ”‹–‡”‹ƒˆ‘”–Ї’”‘ ‡••‡•Ǣ
Ȅ ‹’އ‡–‹‰ ‘–”‘Ž‘ˆ–Ї’”‘ ‡••‡•‹ƒ ‘”†ƒ ‡™‹–Š–Ї ”‹–‡”‹ƒǤ
‘ —‡–‡† ‹ˆ‘”ƒ–‹‘ •ŠƒŽŽ „‡ ƒ˜ƒ‹Žƒ„އ –‘ –Ї ‡š–‡– ‡ ‡••ƒ”› –‘ Šƒ˜‡ ‘ϐ‹†‡ ‡ –Šƒ– –Ї
’”‘ ‡••‡•Šƒ˜‡„‡‡ ƒ””‹‡†‘—–ƒ•’Žƒ‡†Ǥ

© ISO/IEC 2022 – All rights reserved 7


ISO/IEC 27001:2022(E)

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘–”‘Ž’Žƒ‡† Šƒ‰‡•ƒ†”‡˜‹‡™–Ї ‘•‡“—‡ ‡•‘ˆ—‹–‡†‡† Šƒ‰‡•ǡ


–ƒ‹‰ƒ –‹‘–‘‹–‹‰ƒ–‡ƒ›ƒ†˜‡”•‡‡ˆˆ‡ –•ǡƒ•‡ ‡••ƒ”›Ǥ
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•—”‡–Šƒ–‡š–‡”ƒŽŽ›’”‘˜‹†‡†’”‘ ‡••‡•ǡ’”‘†— –•‘”•‡”˜‹ ‡•–Šƒ–ƒ”‡”‡Ž‡˜ƒ–
–‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ƒ”‡ ‘–”‘ŽŽ‡†Ǥ

LY
8.2 Information security risk assessment
Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ ’‡”ˆ‘” ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• ƒ••‡••‡–• ƒ– ’Žƒ‡† ‹–‡”˜ƒŽ• ‘” ™Š‡

ON
•‹‰‹ϐ‹ ƒ– Šƒ‰‡•ƒ”‡’”‘’‘•‡†‘”‘ —”ǡ–ƒ‹‰ƒ ‘—–‘ˆ–Ї ”‹–‡”‹ƒ‡•–ƒ„Ž‹•Ї†‹6.1.2ƒȌǤ
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘‘ˆ–Ї”‡•—Ž–•‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•
ƒ••‡••‡–•Ǥ

8.3 Information security risk treatment

SE
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‹’އ‡––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’ŽƒǤ
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘‘ˆ–Ї”‡•—Ž–•‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•

O
–”‡ƒ–‡–Ǥ

9 Performance evaluation

9.1 Monitoring, measurement, analysis and evaluation


RP
PU
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡ǣ
ƒȌ ™Šƒ–‡‡†•–‘„‡‘‹–‘”‡†ƒ†‡ƒ•—”‡†ǡ‹ Ž—†‹‰‹ˆ‘”ƒ–‹‘•‡ —”‹–›’”‘ ‡••‡•ƒ† ‘–”‘Ž•Ǣ
„Ȍ –Ї ‡–Š‘†• ˆ‘” ‘‹–‘”‹‰ǡ ‡ƒ•—”‡‡–ǡ ƒƒŽ›•‹• ƒ† ‡˜ƒŽ—ƒ–‹‘ǡ ƒ• ƒ’’Ž‹ ƒ„އǡ –‘ ‡•—”‡
˜ƒŽ‹† ”‡•—Ž–•Ǥ Ї ‡–Š‘†• •‡Ž‡ –‡† •Š‘—ކ ’”‘†— ‡ ‘’ƒ”ƒ„އ ƒ† ”‡’”‘†— ‹„އ ”‡•—Ž–• –‘ „‡
G

‘•‹†‡”‡†˜ƒŽ‹†Ǣ
N

Ȍ ™Š‡–Ї‘‹–‘”‹‰ƒ†‡ƒ•—”‹‰•ŠƒŽŽ„‡’‡”ˆ‘”‡†Ǣ
†Ȍ ™Š‘•ŠƒŽŽ‘‹–‘”ƒ†‡ƒ•—”‡Ǣ
NI

‡Ȍ ™Š‡–Ї”‡•—Ž–•ˆ”‘‘‹–‘”‹‰ƒ†‡ƒ•—”‡‡–•ŠƒŽŽ„‡ƒƒŽ›•‡†ƒ†‡˜ƒŽ—ƒ–‡†Ǣ
ˆȌ ™Š‘•ŠƒŽŽƒƒŽ›•‡ƒ†‡˜ƒŽ—ƒ–‡–Ї•‡”‡•—Ž–•Ǥ
AI

‘ —‡–‡†‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡ƒ˜ƒ‹Žƒ„އƒ•‡˜‹†‡ ‡‘ˆ–Ї”‡•—Ž–•Ǥ
TR

Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ ‡˜ƒŽ—ƒ–‡ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ’‡”ˆ‘”ƒ ‡ ƒ† –Ї ‡ˆˆ‡ –‹˜‡‡•• ‘ˆ –Ї
‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ
R
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

9.2 Internal audit


FO

9.2.1 General

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘†— –‹–‡”ƒŽƒ—†‹–•ƒ–’Žƒ‡†‹–‡”˜ƒŽ•–‘’”‘˜‹†‡‹ˆ‘”ƒ–‹‘‘™Š‡–Ї”


–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ǣ
ƒȌ ‘ˆ‘”•–‘
ͳȌ –Ї‘”‰ƒ‹œƒ–‹‘ǯ•‘™”‡“—‹”‡‡–•ˆ‘”‹–•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǣ

8 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

ʹȌ –Ї”‡“—‹”‡‡–•‘ˆ–Š‹•†‘ —‡–Ǣ


„Ȍ ‹•‡ˆˆ‡ –‹˜‡Ž›‹’އ‡–‡†ƒ†ƒ‹–ƒ‹‡†Ǥ

9.2.2 Internal audit programme

LY
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’Žƒǡ‡•–ƒ„Ž‹•Šǡ‹’އ‡–ƒ†ƒ‹–ƒ‹ƒƒ—†‹–’”‘‰”ƒ‡ȋ•Ȍǡ‹ Ž—†‹‰–Ї
ˆ”‡“—‡ ›ǡ‡–Š‘†•ǡ”‡•’‘•‹„‹Ž‹–‹‡•ǡ’Žƒ‹‰”‡“—‹”‡‡–•ƒ†”‡’‘”–‹‰Ǥ
Ї‡•–ƒ„Ž‹•Š‹‰–Ї‹–‡”ƒŽƒ—†‹–’”‘‰”ƒ‡ȋ•Ȍǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘•‹†‡”–Ї‹’‘”–ƒ ‡‘ˆ

ON
–Ї’”‘ ‡••‡• ‘ ‡”‡†ƒ†–Ї”‡•—Ž–•‘ˆ’”‡˜‹‘—•ƒ—†‹–•Ǥ
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽǣ
ƒȌ †‡ϐ‹‡–Їƒ—†‹– ”‹–‡”‹ƒƒ†• ‘’‡ˆ‘”‡ƒ Šƒ—†‹–Ǣ

SE
„Ȍ •‡Ž‡ –ƒ—†‹–‘”•ƒ† ‘†— –ƒ—†‹–•–Šƒ–‡•—”‡‘„Œ‡ –‹˜‹–›ƒ†–Ї‹’ƒ”–‹ƒŽ‹–›‘ˆ–Їƒ—†‹–’”‘ ‡••Ǣ
Ȍ ‡•—”‡–Šƒ––Ї”‡•—Ž–•‘ˆ–Їƒ—†‹–•ƒ”‡”‡’‘”–‡†–‘”‡Ž‡˜ƒ–ƒƒ‰‡‡–Ǣ

O
‘ —‡–‡†‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡ƒ˜ƒ‹Žƒ„އƒ•‡˜‹†‡ ‡‘ˆ–Ї‹’އ‡–ƒ–‹‘‘ˆ–Їƒ—†‹–’”‘‰”ƒ‡ȋ•Ȍ
ƒ†–Їƒ—†‹–”‡•—Ž–•Ǥ

9.3 Management review

9.3.1 General
RP
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

PU
‘’ƒƒ‰‡‡–•ŠƒŽŽ”‡˜‹‡™–Ї‘”‰ƒ‹œƒ–‹‘̵•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ƒ–’Žƒ‡†
‹–‡”˜ƒŽ•–‘‡•—”‡‹–• ‘–‹—‹‰•—‹–ƒ„‹Ž‹–›ǡƒ†‡“—ƒ ›ƒ†‡ˆˆ‡ –‹˜‡‡••Ǥ

9.3.2 Management review inputs


G

Їƒƒ‰‡‡–”‡˜‹‡™•ŠƒŽŽ‹ Ž—†‡ ‘•‹†‡”ƒ–‹‘‘ˆǣ


ƒȌ –Ї•–ƒ–—•‘ˆƒ –‹‘•ˆ”‘’”‡˜‹‘—•ƒƒ‰‡‡–”‡˜‹‡™•Ǣ
N

„Ȍ Šƒ‰‡•‹‡š–‡”ƒŽƒ†‹–‡”ƒŽ‹••—‡•–Šƒ–ƒ”‡”‡Ž‡˜ƒ––‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–


NI

•›•–‡Ǣ
Ȍ Šƒ‰‡• ‹ ‡‡†• ƒ† ‡š’‡ –ƒ–‹‘• ‘ˆ ‹–‡”‡•–‡† ’ƒ”–‹‡• –Šƒ– ƒ”‡ ”‡Ž‡˜ƒ– –‘ –Ї ‹ˆ‘”ƒ–‹‘
•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǣ
AI

†Ȍ ˆ‡‡†„ƒ ‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‡”ˆ‘”ƒ ‡ǡ‹ Ž—†‹‰–”‡†•‹ǣ


TR

ͳȌ ‘ ‘ˆ‘”‹–‹‡•ƒ† ‘””‡ –‹˜‡ƒ –‹‘•Ǣ


ʹȌ ‘‹–‘”‹‰ƒ†‡ƒ•—”‡‡–”‡•—Ž–•Ǣ
͵Ȍ ƒ—†‹–”‡•—Ž–•Ǣ
R

ͶȌ ˆ—Žϐ‹Ž‡–‘ˆ‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•Ǣ


FO

‡Ȍ ˆ‡‡†„ƒ ˆ”‘‹–‡”‡•–‡†’ƒ”–‹‡•Ǣ


ˆȌ ”‡•—Ž–•‘ˆ”‹•ƒ••‡••‡–ƒ†•–ƒ–—•‘ˆ”‹•–”‡ƒ–‡–’ŽƒǢ
‰Ȍ ‘’’‘”–—‹–‹‡•ˆ‘” ‘–‹—ƒŽ‹’”‘˜‡‡–Ǥ

9.3.3 Management review results

Ї ”‡•—Ž–• ‘ˆ –Ї ƒƒ‰‡‡– ”‡˜‹‡™ •ŠƒŽŽ ‹ Ž—†‡ †‡ ‹•‹‘• ”‡Žƒ–‡† –‘ ‘–‹—ƒŽ ‹’”‘˜‡‡–
‘’’‘”–—‹–‹‡•ƒ†ƒ›‡‡†•ˆ‘” Šƒ‰‡•–‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ

© ISO/IEC 2022 – All rights reserved 9


ISO/IEC 27001:2022(E)

‘ —‡–‡†‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡ƒ˜ƒ‹Žƒ„އƒ•‡˜‹†‡ ‡‘ˆ–Ї”‡•—Ž–•‘ˆƒƒ‰‡‡–”‡˜‹‡™•Ǥ

10 Improvement

LY
10.1 Continual improvement
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘–‹—ƒŽŽ›‹’”‘˜‡–Ї•—‹–ƒ„‹Ž‹–›ǡƒ†‡“—ƒ ›ƒ†‡ˆˆ‡ –‹˜‡‡••‘ˆ–Ї‹ˆ‘”ƒ–‹‘
•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ

ON
10.2 Nonconformity and corrective action
Їƒ‘ ‘ˆ‘”‹–›‘ —”•ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽǣ
ƒȌ ”‡ƒ ––‘–Ї‘ ‘ˆ‘”‹–›ǡƒ†ƒ•ƒ’’Ž‹ ƒ„އǣ

SE
ͳȌ –ƒ‡ƒ –‹‘–‘ ‘–”‘Žƒ† ‘””‡ –‹–Ǣ
ʹȌ †‡ƒŽ™‹–Š–Ї ‘•‡“—‡ ‡•Ǣ

O
„Ȍ ‡˜ƒŽ—ƒ–‡–Ї‡‡†ˆ‘”ƒ –‹‘–‘‡Ž‹‹ƒ–‡–Ї ƒ—•‡•‘ˆ‘ ‘ˆ‘”‹–›ǡ‹‘”†‡”–Šƒ–‹–†‘‡•‘–”‡ —”
‘”‘ —”‡Ž•‡™Š‡”‡ǡ„›ǣ
ͳȌ ”‡˜‹‡™‹‰–Ї‘ ‘ˆ‘”‹–›Ǣ
ʹȌ †‡–‡”‹‹‰–Ї ƒ—•‡•‘ˆ–Ї‘ ‘ˆ‘”‹–›Ǣƒ†
RP
PU
͵Ȍ †‡–‡”‹‹‰‹ˆ•‹‹Žƒ”‘ ‘ˆ‘”‹–‹‡•‡š‹•–ǡ‘” ‘—ކ’‘–‡–‹ƒŽŽ›‘ —”Ǣ
Ȍ ‹’އ‡–ƒ›ƒ –‹‘‡‡†‡†Ǣ
†Ȍ ”‡˜‹‡™–Ї‡ˆˆ‡ –‹˜‡‡••‘ˆƒ› ‘””‡ –‹˜‡ƒ –‹‘–ƒ‡Ǣƒ†
G

‡Ȍ ƒ‡ Šƒ‰‡•–‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ǡ‹ˆ‡ ‡••ƒ”›Ǥ


‘””‡ –‹˜‡ƒ –‹‘••ŠƒŽŽ„‡ƒ’’”‘’”‹ƒ–‡–‘–Ї‡ˆˆ‡ –•‘ˆ–Ї‘ ‘ˆ‘”‹–‹‡•‡ ‘—–‡”‡†Ǥ
N

‘ —‡–‡†‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡ƒ˜ƒ‹Žƒ„އƒ•‡˜‹†‡ ‡‘ˆǣ
NI

ˆȌ –Їƒ–—”‡‘ˆ–Ї‘ ‘ˆ‘”‹–‹‡•ƒ†ƒ›•—„•‡“—‡–ƒ –‹‘•–ƒ‡ǡ


‰Ȍ –Ї”‡•—Ž–•‘ˆƒ› ‘””‡ –‹˜‡ƒ –‹‘Ǥ
AI
TR
R
FO

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

10 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Annex A
ȋ‘”ƒ–‹˜‡Ȍ

Information security controls reference

LY
ON
Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–› ‘–”‘ޕދ•–‡†‹ƒ„އǤͳƒ”‡†‹”‡ –Ž›†‡”‹˜‡†ˆ”‘ƒ†ƒŽ‹‰‡†™‹–Š–Š‘•‡
listed in ISO/IEC 27002:2022[1]ǡŽƒ—•‡•ͷ–‘ͺǡƒ†•ŠƒŽŽ„‡—•‡†‹ ‘–‡š–™‹–Š͸ǤͳǤ͵.

Table A.1 — Information security controls

SE
5 Organizational controls
5.1 ‘Ž‹ ‹‡•ˆ‘”‹ˆ‘”ƒ–‹‘•‡ —- Control
”‹–›
ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›ƒ†–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ‹‡••ŠƒŽŽ„‡†‡-
ϐ‹‡†ǡƒ’’”‘˜‡†„›ƒƒ‰‡‡–ǡ’—„Ž‹•Ї†ǡ ‘—‹ ƒ–‡†–‘ƒ†

O
ƒ ‘™Ž‡†‰‡†„›”‡Ž‡˜ƒ–’‡”•‘‡Žƒ†”‡Ž‡˜ƒ–‹–‡”‡•–‡†’ƒ”–‹‡•ǡ
ƒ†”‡˜‹‡™‡†ƒ–’Žƒ‡†‹–‡”˜ƒŽ•ƒ†‹ˆ•‹‰‹ϐ‹ ƒ– Šƒ‰‡•‘ —”Ǥ
ˆ‘”ƒ–‹‘•‡ —”‹–›”‘އ•ƒ† Control

RP
5.2
responsibilities
ˆ‘”ƒ–‹‘•‡ —”‹–›”‘އ•ƒ†”‡•’‘•‹„‹Ž‹–‹‡••ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†
ƒŽŽ‘ ƒ–‡†ƒ ‘”†‹‰–‘–Ї‘”‰ƒ‹œƒ–‹‘‡‡†•Ǥ
ͷǤ͵ ‡‰”‡‰ƒ–‹‘‘ˆ†—–‹‡• Control
PU
‘ϐŽ‹ –‹‰†—–‹‡•ƒ† ‘ϐŽ‹ –‹‰ƒ”‡ƒ•‘ˆ”‡•’‘•‹„‹Ž‹–›•ŠƒŽŽ„‡•‡‰-
”‡‰ƒ–‡†Ǥ
ͷǤͶ ƒƒ‰‡‡–”‡•’‘•‹„‹Ž‹–‹‡• Control
ƒƒ‰‡‡–•ŠƒŽŽ”‡“—‹”‡ƒŽŽ’‡”•‘‡Ž–‘ƒ’’Ž›‹ˆ‘”ƒ–‹‘•‡ —”‹–›
‹ƒ ‘”†ƒ ‡™‹–Š–Ї‡•–ƒ„Ž‹•Ї†‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›ǡ–‘’-
G

‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ‹‡•ƒ†’”‘ ‡†—”‡•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǥ


5.5 ‘–ƒ –™‹–Šƒ—–Š‘”‹–‹‡• Control
N
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Šƒ†ƒ‹–ƒ‹ ‘–ƒ –™‹–Š”‡Ž‡˜ƒ–


ƒ—–Š‘”‹–‹‡•Ǥ
NI

5.6 ‘–ƒ –™‹–Š•’‡ ‹ƒŽ‹–‡”‡•– Control


groups
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Šƒ†ƒ‹–ƒ‹ ‘–ƒ –™‹–Š•’‡ ‹ƒŽ
‹–‡”‡•–‰”‘—’•‘”‘–Ї”•’‡ ‹ƒŽ‹•–•‡ —”‹–›ˆ‘”—•ƒ†’”‘ˆ‡••‹‘ƒŽ
AI

ƒ••‘ ‹ƒ–‹‘•Ǥ
5.7 Š”‡ƒ–‹–‡ŽŽ‹‰‡ ‡ Control
TR

ˆ‘”ƒ–‹‘”‡Žƒ–‹‰–‘‹ˆ‘”ƒ–‹‘•‡ —”‹–›–Š”‡ƒ–••ŠƒŽŽ„‡ ‘ŽŽ‡ –‡†


ƒ†ƒƒŽ›•‡†–‘’”‘†— ‡–Š”‡ƒ–‹–‡ŽŽ‹‰‡ ‡Ǥ
ͷǤͺ ˆ‘”ƒ–‹‘•‡ —”‹–›‹’”‘Œ‡ – Control
ƒƒ‰‡‡–
ˆ‘”ƒ–‹‘•‡ —”‹–›•ŠƒŽŽ„‡‹–‡‰”ƒ–‡†‹–‘’”‘Œ‡ –ƒƒ‰‡‡–Ǥ
R

ͷǤͻ ˜‡–‘”›‘ˆ‹ˆ‘”ƒ–‹‘ƒ† Control


‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–•
‹˜‡–‘”›‘ˆ‹ˆ‘”ƒ–‹‘ƒ†‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–•ǡ‹ Ž—†‹‰
FO

‘™‡”•ǡ•ŠƒŽŽ„‡†‡˜‡Ž‘’‡†ƒ†ƒ‹–ƒ‹‡†Ǥ
5.10  ‡’–ƒ„އ—•‡‘ˆ‹ˆ‘”ƒ–‹‘ Control
ƒ†‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–•
—އ•ˆ‘”–Їƒ ‡’–ƒ„އ—•‡ƒ†’”‘ ‡†—”‡•ˆ‘”Šƒ†Ž‹‰‹ˆ‘”ƒ–‹‘ƒ†
‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–••ŠƒŽŽ„‡‹†‡–‹ϐ‹‡†ǡ†‘ —‡–‡†ƒ†‹’އ‡–‡†Ǥ
5.11 ‡–—”‘ˆƒ••‡–• Control
‡”•‘‡Žƒ†‘–Ї”‹–‡”‡•–‡†’ƒ”–‹‡•ƒ•ƒ’’”‘’”‹ƒ–‡•ŠƒŽŽ”‡–—”ƒŽŽ
–Ї‘”‰ƒ‹œƒ–‹‘ǯ•ƒ••‡–•‹–Ї‹”’‘••‡••‹‘—’‘ Šƒ‰‡‘”–‡”‹ƒ–‹‘
‘ˆ–Ї‹”‡’Ž‘›‡–ǡ ‘–”ƒ –‘”ƒ‰”‡‡‡–Ǥ

© ISO/IEC 2022 – All rights reserved 11


ISO/IEC 27001:2022(E)

Table A.1 (continued)


5.12 Žƒ••‹ϐ‹ ƒ–‹‘‘ˆ‹ˆ‘”ƒ–‹‘ Control
ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡ Žƒ••‹ϐ‹‡†ƒ ‘”†‹‰–‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›
‡‡†•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘„ƒ•‡†‘ ‘ϐ‹†‡–‹ƒŽ‹–›ǡ‹–‡‰”‹–›ǡƒ˜ƒ‹Žƒ„‹Ž‹–›

LY
ƒ†”‡Ž‡˜ƒ–‹–‡”‡•–‡†’ƒ”–›”‡“—‹”‡‡–•Ǥ
ͷǤͳ͵ ƒ„‡ŽŽ‹‰‘ˆ‹ˆ‘”ƒ–‹‘ Control
ƒ’’”‘’”‹ƒ–‡•‡–‘ˆ’”‘ ‡†—”‡•ˆ‘”‹ˆ‘”ƒ–‹‘Žƒ„‡ŽŽ‹‰•ŠƒŽŽ„‡
†‡˜‡Ž‘’‡†ƒ†‹’އ‡–‡†‹ƒ ‘”†ƒ ‡™‹–Š–Ї‹ˆ‘”ƒ–‹‘ Žƒ•-

ON
•‹ϐ‹ ƒ–‹‘• Ї‡ƒ†‘’–‡†„›–Ї‘”‰ƒ‹œƒ–‹‘Ǥ
ͷǤͳͶ ˆ‘”ƒ–‹‘–”ƒ•ˆ‡” Control
ˆ‘”ƒ–‹‘–”ƒ•ˆ‡””—އ•ǡ’”‘ ‡†—”‡•ǡ‘”ƒ‰”‡‡‡–••ŠƒŽŽ„‡‹’Žƒ ‡
ˆ‘”ƒŽŽ–›’‡•‘ˆ–”ƒ•ˆ‡”ˆƒ ‹Ž‹–‹‡•™‹–Š‹–Ї‘”‰ƒ‹œƒ–‹‘ƒ†„‡–™‡‡
–Ї‘”‰ƒ‹œƒ–‹‘ƒ†‘–Ї”’ƒ”–‹‡•Ǥ

SE
5.15 Access control Control
—އ•–‘ ‘–”‘Ž’Š›•‹ ƒŽƒ†Ž‘‰‹ ƒŽƒ ‡••–‘‹ˆ‘”ƒ–‹‘ƒ†‘–Ї”
ƒ••‘ ‹ƒ–‡†ƒ••‡–••ŠƒŽŽ„‡‡•–ƒ„Ž‹•Ї†ƒ†‹’އ‡–‡†„ƒ•‡†‘„—•‹-
‡••ƒ†‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–•Ǥ

O
5.16 †‡–‹–›ƒƒ‰‡‡– Control

RP
Їˆ—ŽŽŽ‹ˆ‡ › އ‘ˆ‹†‡–‹–‹‡••ŠƒŽŽ„‡ƒƒ‰‡†Ǥ
5.17 —–Ї–‹ ƒ–‹‘‹ˆ‘”ƒ–‹‘ Control
ŽŽ‘ ƒ–‹‘ƒ†ƒƒ‰‡‡–‘ˆƒ—–Ї–‹ ƒ–‹‘‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡
‘–”‘ŽŽ‡†„›ƒƒƒ‰‡‡–’”‘ ‡••ǡ‹ Ž—†‹‰ƒ†˜‹•‹‰’‡”•‘‡Ž‘
PU
ƒ’’”‘’”‹ƒ–‡Šƒ†Ž‹‰‘ˆƒ—–Ї–‹ ƒ–‹‘‹ˆ‘”ƒ–‹‘Ǥ
ͷǤͳͺ Access rights Control
 ‡••”‹‰Š–•–‘‹ˆ‘”ƒ–‹‘ƒ†‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–••ŠƒŽŽ„‡
’”‘˜‹•‹‘‡†ǡ”‡˜‹‡™‡†ǡ‘†‹ϐ‹‡†ƒ†”‡‘˜‡†‹ƒ ‘”†ƒ ‡™‹–Š–Ї
‘”‰ƒ‹œƒ–‹‘ǯ•–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ›‘ƒ†”—އ•ˆ‘”ƒ ‡•• ‘–”‘ŽǤ
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

ͷǤͳͻ ˆ‘”ƒ–‹‘•‡ —”‹–›‹•—’’Ž‹‡” Control


”‡Žƒ–‹‘•Š‹’•
”‘ ‡••‡•ƒ†’”‘ ‡†—”‡••ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†‹’އ‡–‡†–‘ƒƒ‰‡
N

–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ƒ••‘ ‹ƒ–‡†™‹–Š–Ї—•‡‘ˆ•—’’Ž‹‡”ǯ•


products or services.
NI

5.20 ††”‡••‹‰‹ˆ‘”ƒ–‹‘•‡ —”‹–› Control


™‹–Š‹•—’’Ž‹‡”ƒ‰”‡‡‡–•
‡Ž‡˜ƒ–‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–••ŠƒŽŽ„‡‡•–ƒ„Ž‹•Ї†ƒ†
ƒ‰”‡‡†™‹–Їƒ Š•—’’Ž‹‡”„ƒ•‡†‘–Ї–›’‡‘ˆ•—’’Ž‹‡””‡Žƒ–‹‘•Š‹’Ǥ
AI

5.21 ƒƒ‰‹‰‹ˆ‘”ƒ–‹‘•‡ —”‹–› Control


‹–Ї‹ˆ‘”ƒ–‹‘ƒ† ‘—-
”‘ ‡••‡•ƒ†’”‘ ‡†—”‡••ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†‹’އ‡–‡†–‘ƒƒ‰‡
‹ ƒ–‹‘–‡ А‘Ž‘‰›ȋ Ȍ•—’’Ž›
TR

–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ƒ••‘ ‹ƒ–‡†™‹–Š–Ї ’”‘†— –•ƒ†


Šƒ‹
•‡”˜‹ ‡••—’’Ž› Šƒ‹Ǥ
5.22 ‘‹–‘”‹‰ǡ”‡˜‹‡™ƒ† Šƒ‰‡ Control
ƒƒ‰‡‡–‘ˆ•—’’Ž‹‡”•‡”˜‹ ‡•
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡‰—Žƒ”Ž›‘‹–‘”ǡ”‡˜‹‡™ǡ‡˜ƒŽ—ƒ–‡ƒ†ƒƒ‰‡
Šƒ‰‡‹•—’’Ž‹‡”‹ˆ‘”ƒ–‹‘•‡ —”‹–›’”ƒ –‹ ‡•ƒ†•‡”˜‹ ‡†‡Ž‹˜‡”›Ǥ
R

ͷǤʹ͵ ˆ‘”ƒ–‹‘•‡ —”‹–›ˆ‘”—•‡‘ˆ Control


cloud services
”‘ ‡••‡•ˆ‘”ƒ “—‹•‹–‹‘ǡ—•‡ǡƒƒ‰‡‡–ƒ†‡š‹–ˆ”‘ Ž‘—†•‡”˜‹ ‡•
FO

•ŠƒŽŽ„‡‡•–ƒ„Ž‹•Ї†‹ƒ ‘”†ƒ ‡™‹–Š–Ї‘”‰ƒ‹œƒ–‹‘ǯ•‹ˆ‘”ƒ–‹‘


•‡ —”‹–›”‡“—‹”‡‡–•Ǥ
ͷǤʹͶ ˆ‘”ƒ–‹‘•‡ —”‹–›‹ ‹†‡– Control
ƒƒ‰‡‡–’Žƒ‹‰ƒ†’”‡’ƒ-
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’Žƒƒ†’”‡’ƒ”‡ˆ‘”ƒƒ‰‹‰‹ˆ‘”ƒ–‹‘•‡ —-
”ƒ–‹‘
”‹–›‹ ‹†‡–•„›†‡ϐ‹‹‰ǡ‡•–ƒ„Ž‹•Š‹‰ƒ† ‘—‹ ƒ–‹‰‹ˆ‘”ƒ–‹‘
•‡ —”‹–›‹ ‹†‡–ƒƒ‰‡‡–’”‘ ‡••‡•ǡ”‘އ•ƒ†”‡•’‘•‹„‹Ž‹–‹‡•Ǥ

12 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Table A.1 (continued)


5.25 ••‡••‡–ƒ††‡ ‹•‹‘‘‹- Control
ˆ‘”ƒ–‹‘•‡ —”‹–›‡˜‡–•
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽƒ••‡••‹ˆ‘”ƒ–‹‘•‡ —”‹–›‡˜‡–•ƒ††‡ ‹†‡‹ˆ
–Ї›ƒ”‡–‘„‡ ƒ–‡‰‘”‹œ‡†ƒ•‹ˆ‘”ƒ–‹‘•‡ —”‹–›‹ ‹†‡–•Ǥ

LY
5.26 ‡•’‘•‡–‘‹ˆ‘”ƒ–‹‘•‡ —”‹–› Control
incidents
ˆ‘”ƒ–‹‘•‡ —”‹–›‹ ‹†‡–••ŠƒŽŽ„‡”‡•’‘†‡†–‘‹ƒ ‘”†ƒ ‡™‹–Š
the documented procedures.

ON
5.27 ‡ƒ”‹‰ˆ”‘‹ˆ‘”ƒ–‹‘•‡- Control
—”‹–›‹ ‹†‡–•
‘™Ž‡†‰‡‰ƒ‹‡†ˆ”‘‹ˆ‘”ƒ–‹‘•‡ —”‹–›‹ ‹†‡–••ŠƒŽŽ„‡—•‡†–‘
•–”‡‰–Їƒ†‹’”‘˜‡–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–› ‘–”‘Ž•Ǥ
ͷǤʹͺ Collection of evidence Control
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Šƒ†‹’އ‡–’”‘ ‡†—”‡•ˆ‘”–Ї‹†‡-

SE
–‹ϐ‹ ƒ–‹‘ǡ ‘ŽŽ‡ –‹‘ǡƒ “—‹•‹–‹‘ƒ†’”‡•‡”˜ƒ–‹‘‘ˆ‡˜‹†‡ ‡”‡Žƒ–‡†
–‘‹ˆ‘”ƒ–‹‘•‡ —”‹–›‡˜‡–•Ǥ
ͷǤʹͻ ˆ‘”ƒ–‹‘ •‡ —”‹–› †—”‹‰ Control
disruption
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’ŽƒŠ‘™–‘ƒ‹–ƒ‹‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒ–ƒ

O
ƒ’’”‘’”‹ƒ–‡އ˜‡Ž†—”‹‰†‹•”—’–‹‘Ǥ
ͷǤ͵Ͳ ”‡ƒ†‹‡••ˆ‘”„—•‹‡•• ‘- Control

ͷǤ͵ͳ
–‹—‹–›

RP
”‡ƒ†‹‡•••ŠƒŽŽ„‡’Žƒ‡†ǡ‹’އ‡–‡†ǡƒ‹–ƒ‹‡†ƒ†–‡•–‡†
„ƒ•‡†‘„—•‹‡•• ‘–‹—‹–›‘„Œ‡ –‹˜‡•ƒ†  ‘–‹—‹–›”‡“—‹”‡‡–•Ǥ
‡‰ƒŽǡ•–ƒ–—–‘”›ǡ”‡‰—Žƒ–‘”›ƒ† Control
‘–”ƒ –—ƒŽ”‡“—‹”‡‡–•
PU
‡‰ƒŽǡ•–ƒ–—–‘”›ǡ”‡‰—Žƒ–‘”›ƒ† ‘–”ƒ –—ƒŽ”‡“—‹”‡‡–•”‡Ž‡˜ƒ––‘
‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒ†–Ї‘”‰ƒ‹œƒ–‹‘ǯ•ƒ’’”‘ƒ Š–‘‡‡––Ї•‡
”‡“—‹”‡‡–••ŠƒŽŽ„‡‹†‡–‹ϐ‹‡†ǡ†‘ —‡–‡†ƒ†‡’–—’–‘†ƒ–‡Ǥ
ͷǤ͵ʹ –‡ŽŽ‡ –—ƒŽ’”‘’‡”–›”‹‰Š–• Control
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‹’އ‡–ƒ’’”‘’”‹ƒ–‡’”‘ ‡†—”‡•–‘’”‘–‡ –
G

‹–‡ŽŽ‡ –—ƒŽ’”‘’‡”–›”‹‰Š–•Ǥ
ͷǤ͵͵ ”‘–‡ –‹‘‘ˆ”‡ ‘”†• Control
N

‡ ‘”†••ŠƒŽŽ„‡’”‘–‡ –‡†ˆ”‘Ž‘••ǡ†‡•–”— –‹‘ǡˆƒŽ•‹ϐ‹ ƒ–‹‘ǡ—ƒ—-

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
–Š‘”‹œ‡†ƒ ‡••ƒ†—ƒ—–Š‘”‹œ‡†”‡Ž‡ƒ•‡Ǥ
NI

ͷǤ͵Ͷ ”‹˜ƒ ›ƒ†’”‘–‡ –‹‘‘ˆ’‡”•‘- Control


ƒŽ‹†‡–‹ϐ‹ƒ„އ‹ˆ‘”ƒ–‹‘ȋ Ȍ
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‹†‡–‹ˆ›ƒ†‡‡––Ї”‡“—‹”‡‡–•”‡‰ƒ”†‹‰
–Ї’”‡•‡”˜ƒ–‹‘‘ˆ’”‹˜ƒ ›ƒ†’”‘–‡ –‹‘‘ˆ ƒ ‘”†‹‰–‘ƒ’’Ž‹ ƒ„އ
AI

Žƒ™•ƒ†”‡‰—Žƒ–‹‘•ƒ† ‘–”ƒ –—ƒŽ”‡“—‹”‡‡–•Ǥ


ͷǤ͵ͷ †‡’‡†‡–”‡˜‹‡™‘ˆ‹ˆ‘”ƒ- Control
–‹‘•‡ —”‹–›
TR

Ї‘”‰ƒ‹œƒ–‹‘ǯ•ƒ’’”‘ƒ Š–‘ƒƒ‰‹‰‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒ†


‹–•‹’އ‡–ƒ–‹‘‹ Ž—†‹‰’‡‘’އǡ’”‘ ‡••‡•ƒ†–‡ А‘Ž‘‰‹‡••ŠƒŽŽ
„‡”‡˜‹‡™‡†‹†‡’‡†‡–Ž›ƒ–’Žƒ‡†‹–‡”˜ƒŽ•ǡ‘”™Š‡•‹‰‹ϐ‹ ƒ–
Šƒ‰‡•‘ —”Ǥ
ͷǤ͵͸ ‘’Ž‹ƒ ‡™‹–Š’‘Ž‹ ‹‡•ǡ”—އ• Control
ƒ†•–ƒ†ƒ”†•ˆ‘”‹ˆ‘”ƒ–‹‘
R

‘’Ž‹ƒ ‡™‹–Š–Ї‘”‰ƒ‹œƒ–‹‘ǯ•‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›ǡ–‘’-


•‡ —”‹–›
‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ‹‡•ǡ”—އ•ƒ†•–ƒ†ƒ”†••ŠƒŽŽ„‡”‡‰—Žƒ”Ž›”‡˜‹‡™‡†Ǥ
FO

ͷǤ͵͹ ‘ —‡–‡†‘’‡”ƒ–‹‰’”‘ ‡- Control


dures
’‡”ƒ–‹‰’”‘ ‡†—”‡•ˆ‘”‹ˆ‘”ƒ–‹‘’”‘ ‡••‹‰ˆƒ ‹Ž‹–‹‡••ŠƒŽŽ„‡
†‘ —‡–‡†ƒ†ƒ†‡ƒ˜ƒ‹Žƒ„އ–‘’‡”•‘‡Ž™Š‘‡‡†–ЇǤ

© ISO/IEC 2022 – All rights reserved 13


ISO/IEC 27001:2022(E)

Table A.1 (continued)


6 People controls
6.1 Screening Control
ƒ ‰”‘—†˜‡”‹ϐ‹ ƒ–‹‘ Ї •‘ƒŽŽ ƒ†‹†ƒ–‡•–‘„‡ ‘‡’‡”•‘‡Ž

LY
•ŠƒŽŽ„‡ ƒ””‹‡†‘—–’”‹‘”–‘Œ‘‹‹‰–Ї‘”‰ƒ‹œƒ–‹‘ƒ†‘ƒ‘‰‘‹‰
„ƒ•‹•–ƒ‹‰‹–‘ ‘•‹†‡”ƒ–‹‘ƒ’’Ž‹ ƒ„އŽƒ™•ǡ”‡‰—Žƒ–‹‘•ƒ†‡–Š‹ •
ƒ†„‡’”‘’‘”–‹‘ƒŽ–‘–Ї„—•‹‡••”‡“—‹”‡‡–•ǡ–Ї Žƒ••‹ϐ‹ ƒ–‹‘‘ˆ
–Ї‹ˆ‘”ƒ–‹‘–‘„‡ƒ ‡••‡†ƒ†–Ї’‡” ‡‹˜‡†”‹••Ǥ

ON
6.2 ‡”• ƒ† ‘†‹–‹‘• ‘ˆ ‡- Control
’Ž‘›‡–
Ї‡’Ž‘›‡– ‘–”ƒ –—ƒŽƒ‰”‡‡‡–••ŠƒŽŽ•–ƒ–‡–Ї’‡”•‘‡Žǯ•ƒ†
–Ї‘”‰ƒ‹œƒ–‹‘ǯ•”‡•’‘•‹„‹Ž‹–‹‡•ˆ‘”‹ˆ‘”ƒ–‹‘•‡ —”‹–›Ǥ
͸Ǥ͵ ˆ‘”ƒ–‹‘•‡ —”‹–›ƒ™ƒ”‡‡••ǡ Control
‡†— ƒ–‹‘ƒ†–”ƒ‹‹‰
‡”•‘‡Ž‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ƒ†”‡Ž‡˜ƒ–‹–‡”‡•–‡†’ƒ”–‹‡••ŠƒŽŽ”‡ ‡‹˜‡

SE
ƒ’’”‘’”‹ƒ–‡‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒ™ƒ”‡‡••ǡ‡†— ƒ–‹‘ƒ†–”ƒ‹‹‰
ƒ†”‡‰—Žƒ”—’†ƒ–‡•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘̵•‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›ǡ
–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ‹‡•ƒ†’”‘ ‡†—”‡•ǡƒ•”‡Ž‡˜ƒ–ˆ‘”–Ї‹”Œ‘„ˆ— –‹‘Ǥ
͸ǤͶ ‹• ‹’Ž‹ƒ”›’”‘ ‡•• Control

O
†‹• ‹’Ž‹ƒ”›’”‘ ‡•••ŠƒŽŽ„‡ˆ‘”ƒŽ‹œ‡†ƒ† ‘—‹ ƒ–‡†–‘–ƒ‡
ƒ –‹‘•ƒ‰ƒ‹•–’‡”•‘‡Žƒ†‘–Ї””‡Ž‡˜ƒ–‹–‡”‡•–‡†’ƒ”–‹‡•™Š‘

6.5
‘” Šƒ‰‡‘ˆ‡’Ž‘›‡– RP
Šƒ˜‡ ‘‹––‡†ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›˜‹‘Žƒ–‹‘Ǥ
‡•’‘•‹„‹Ž‹–‹‡•ƒˆ–‡”–‡”‹ƒ–‹‘ Control
ˆ‘”ƒ–‹‘•‡ —”‹–›”‡•’‘•‹„‹Ž‹–‹‡•ƒ††—–‹‡•–Šƒ–”‡ƒ‹˜ƒŽ‹†ƒˆ–‡”
–‡”‹ƒ–‹‘‘” Šƒ‰‡‘ˆ‡’Ž‘›‡–•ŠƒŽŽ„‡†‡ϐ‹‡†ǡ‡ˆ‘” ‡†ƒ†
PU
‘—‹ ƒ–‡†–‘”‡Ž‡˜ƒ–’‡”•‘‡Žƒ†‘–Ї”‹–‡”‡•–‡†’ƒ”–‹‡•Ǥ
6.6 ‘ϐ‹†‡–‹ƒŽ‹–›‘”‘Ǧ†‹• Ž‘•—”‡ Control
ƒ‰”‡‡‡–•
‘ϐ‹†‡–‹ƒŽ‹–›‘”‘Ǧ†‹• Ž‘•—”‡ƒ‰”‡‡‡–•”‡ϐއ –‹‰–Ї‘”‰ƒ-
‹œƒ–‹‘ǯ•‡‡†•ˆ‘”–Ї’”‘–‡ –‹‘‘ˆ‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡‹†‡–‹ϐ‹‡†ǡ
†‘ —‡–‡†ǡ”‡‰—Žƒ”Ž›”‡˜‹‡™‡†ƒ†•‹‰‡†„›’‡”•‘‡Žƒ†‘–Ї”
G

”‡Ž‡˜ƒ–‹–‡”‡•–‡†’ƒ”–‹‡•Ǥ
6.7 ‡‘–‡™‘”‹‰ Control
N

‡ —”‹–›‡ƒ•—”‡••ŠƒŽŽ„‡‹’އ‡–‡†™Š‡’‡”•‘‡Žƒ”‡™‘”‹‰
”‡‘–‡Ž›–‘’”‘–‡ –‹ˆ‘”ƒ–‹‘ƒ ‡••‡†ǡ’”‘ ‡••‡†‘”•–‘”‡†‘—–•‹†‡
NI

–Ї‘”‰ƒ‹œƒ–‹‘ǯ•’”‡‹•‡•Ǥ
͸Ǥͺ ˆ‘”ƒ–‹‘•‡ —”‹–›‡˜‡–”‡- Control
porting
AI

Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’”‘˜‹†‡ƒ‡ Šƒ‹•ˆ‘”’‡”•‘‡Ž–‘”‡’‘”–
‘„•‡”˜‡†‘”•—•’‡ –‡†‹ˆ‘”ƒ–‹‘•‡ —”‹–›‡˜‡–•–Š”‘—‰Šƒ’’”‘’”‹ƒ–‡
Šƒ‡Ž•‹ƒ–‹‡Ž›ƒ‡”Ǥ
TR

7 Physical controls
7.1 Š›•‹ ƒŽ•‡ —”‹–›’‡”‹‡–‡”• Control
‡ —”‹–›’‡”‹‡–‡”••ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†—•‡†–‘’”‘–‡ –ƒ”‡ƒ•–Šƒ–
‘–ƒ‹‹ˆ‘”ƒ–‹‘ƒ†‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–•Ǥ
Š›•‹ ƒŽ‡–”›
R

7.2 Control
‡ —”‡ƒ”‡ƒ••ŠƒŽŽ„‡’”‘–‡ –‡†„›ƒ’’”‘’”‹ƒ–‡‡–”› ‘–”‘Ž•ƒ†
ƒ ‡••’‘‹–•Ǥ
FO

͹Ǥ͵ ‡ —”‹‰‘ˆϐ‹ ‡•ǡ”‘‘•ƒ†ˆƒ- Control


cilities
Š›•‹ ƒŽ•‡ —”‹–›ˆ‘”‘ˆϐ‹ ‡•ǡ”‘‘•ƒ†ˆƒ ‹Ž‹–‹‡••ŠƒŽŽ„‡†‡•‹‰‡†ƒ†
implemented.
͹ǤͶ Š›•‹ ƒŽ•‡ —”‹–›‘‹–‘”‹‰ Control
”‡‹•‡••ŠƒŽŽ„‡ ‘–‹—‘—•Ž›‘‹–‘”‡†ˆ‘”—ƒ—–Š‘”‹œ‡†’Š›•‹ ƒŽ
ƒ ‡••Ǥ

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

14 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Table A.1 (continued)


7.5 ”‘–‡ –‹‰ƒ‰ƒ‹•–’Š›•‹ ƒŽƒ† Control
‡˜‹”‘‡–ƒŽ–Š”‡ƒ–•
”‘–‡ –‹‘ƒ‰ƒ‹•–’Š›•‹ ƒŽƒ†‡˜‹”‘‡–ƒŽ–Š”‡ƒ–•ǡ•— Šƒ•ƒ–—”ƒŽ
†‹•ƒ•–‡”•ƒ†‘–Ї”‹–‡–‹‘ƒŽ‘”—‹–‡–‹‘ƒŽ’Š›•‹ ƒŽ–Š”‡ƒ–•–‘

LY
‹ˆ”ƒ•–”— –—”‡•ŠƒŽŽ„‡†‡•‹‰‡†ƒ†‹’އ‡–‡†Ǥ
7.6 ‘”‹‰‹•‡ —”‡ƒ”‡ƒ• Control
‡ —”‹–›‡ƒ•—”‡•ˆ‘”™‘”‹‰‹•‡ —”‡ƒ”‡ƒ••ŠƒŽŽ„‡†‡•‹‰‡†ƒ†
implemented.

ON
7.7 އƒ”†‡•ƒ† އƒ”• ”‡‡ Control
އƒ”†‡•”—އ•ˆ‘”’ƒ’‡”•ƒ†”‡‘˜ƒ„އ•–‘”ƒ‰‡‡†‹ƒƒ† އƒ”
• ”‡‡”—އ•ˆ‘”‹ˆ‘”ƒ–‹‘’”‘ ‡••‹‰ˆƒ ‹Ž‹–‹‡••ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
ƒ’’”‘’”‹ƒ–‡Ž›‡ˆ‘” ‡†Ǥ
͹Ǥͺ “—‹’‡–•‹–‹‰ƒ†’”‘–‡ –‹‘ Control

SE
“—‹’‡–•ŠƒŽŽ„‡•‹–‡†•‡ —”‡Ž›ƒ†’”‘–‡ –‡†Ǥ
͹Ǥͻ ‡ —”‹–›‘ˆƒ••‡–•‘ˆˆǦ’”‡‹•‡• Control
ˆˆǦ•‹–‡ƒ••‡–••ŠƒŽŽ„‡’”‘–‡ –‡†Ǥ

O
7.10 –‘”ƒ‰‡‡†‹ƒ Control
–‘”ƒ‰‡‡†‹ƒ•ŠƒŽŽ„‡ƒƒ‰‡†–Š”‘—‰Š–Ї‹”Ž‹ˆ‡ › އ‘ˆƒ “—‹•‹–‹‘ǡ

7.11 Supporting utilities Control


RP
—•‡ǡ–”ƒ•’‘”–ƒ–‹‘ƒ††‹•’‘•ƒŽ‹ƒ ‘”†ƒ ‡™‹–Š–Ї‘”‰ƒ‹œƒ–‹‘ǯ•
Žƒ••‹ϐ‹ ƒ–‹‘• Ї‡ƒ†Šƒ†Ž‹‰”‡“—‹”‡‡–•Ǥ
PU
ˆ‘”ƒ–‹‘’”‘ ‡••‹‰ˆƒ ‹Ž‹–‹‡••ŠƒŽŽ„‡’”‘–‡ –‡†ˆ”‘’‘™‡”ˆƒ‹Ž—”‡•
ƒ†‘–Ї”†‹•”—’–‹‘• ƒ—•‡†„›ˆƒ‹Ž—”‡•‹•—’’‘”–‹‰—–‹Ž‹–‹‡•Ǥ
7.12 ƒ„Ž‹‰•‡ —”‹–› Control
ƒ„އ• ƒ””›‹‰’‘™‡”ǡ†ƒ–ƒ‘”•—’’‘”–‹‰‹ˆ‘”ƒ–‹‘•‡”˜‹ ‡••ŠƒŽŽ
„‡’”‘–‡ –‡†ˆ”‘‹–‡” ‡’–‹‘ǡ‹–‡”ˆ‡”‡ ‡‘”†ƒƒ‰‡Ǥ
G

͹Ǥͳ͵ “—‹’‡–ƒ‹–‡ƒ ‡ Control


“—‹’‡–•ŠƒŽŽ„‡ƒ‹–ƒ‹‡† ‘””‡ –Ž›–‘‡•—”‡ƒ˜ƒ‹Žƒ„‹Ž‹–›ǡ‹–‡‰”‹–›
N

ƒ† ‘ϐ‹†‡–‹ƒŽ‹–›‘ˆ‹ˆ‘”ƒ–‹‘Ǥ
͹ǤͳͶ ‡ —”‡ †‹•’‘•ƒŽ ‘” ”‡Ǧ—•‡ ‘ˆ Control
NI

‡“—‹’‡–
–‡•‘ˆ‡“—‹’‡– ‘–ƒ‹‹‰•–‘”ƒ‰‡‡†‹ƒ•ŠƒŽŽ„‡˜‡”‹ϐ‹‡†–‘‡-
•—”‡–Šƒ–ƒ›•‡•‹–‹˜‡†ƒ–ƒƒ†Ž‹ ‡•‡†•‘ˆ–™ƒ”‡Šƒ•„‡‡”‡‘˜‡†
‘”•‡ —”‡Ž›‘˜‡”™”‹––‡’”‹‘”–‘†‹•’‘•ƒŽ‘””‡Ǧ—•‡Ǥ
AI

8 Technological controls
ͺǤͳ User end point devices Control
TR

ˆ‘”ƒ–‹‘•–‘”‡†‘ǡ’”‘ ‡••‡†„›‘”ƒ ‡••‹„އ˜‹ƒ—•‡”‡†’‘‹–


†‡˜‹ ‡••ŠƒŽŽ„‡’”‘–‡ –‡†Ǥ
ͺǤʹ ”‹˜‹Ž‡‰‡†ƒ ‡••”‹‰Š–• Control
ЇƒŽŽ‘ ƒ–‹‘ƒ†—•‡‘ˆ’”‹˜‹Ž‡‰‡†ƒ ‡••”‹‰Š–••ŠƒŽŽ„‡”‡•–”‹ –‡†
ƒ†ƒƒ‰‡†Ǥ
R

ͺǤ͵ ˆ‘”ƒ–‹‘ƒ ‡••”‡•–”‹ –‹‘ Control


FO

 ‡••–‘‹ˆ‘”ƒ–‹‘ƒ†‘–Ї”ƒ••‘ ‹ƒ–‡†ƒ••‡–••ŠƒŽŽ„‡”‡•–”‹ –‡†‹


ƒ ‘”†ƒ ‡™‹–Š–Ї‡•–ƒ„Ž‹•Ї†–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ›‘ƒ ‡•• ‘–”‘ŽǤ
ͺǤͶ Access to source code Control
‡ƒ†ƒ†™”‹–‡ƒ ‡••–‘•‘—” ‡ ‘†‡ǡ†‡˜‡Ž‘’‡––‘‘Ž•ƒ†•‘ˆ–™ƒ”‡
Ž‹„”ƒ”‹‡••ŠƒŽŽ„‡ƒ’’”‘’”‹ƒ–‡Ž›ƒƒ‰‡†Ǥ

© ISO/IEC 2022 – All rights reserved 15


ISO/IEC 27001:2022(E)

Table A.1 (continued)


ͺǤͷ ‡ —”‡ƒ—–Ї–‹ ƒ–‹‘ Control
‡ —”‡ƒ—–Ї–‹ ƒ–‹‘–‡ А‘Ž‘‰‹‡•ƒ†’”‘ ‡†—”‡••ŠƒŽŽ„‡‹’އ‡–‡†
„ƒ•‡†‘‹ˆ‘”ƒ–‹‘ƒ ‡••”‡•–”‹ –‹‘•ƒ†–Ї–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ›

LY
‘ƒ ‡•• ‘–”‘ŽǤ
ͺǤ͸ ƒ’ƒ ‹–›ƒƒ‰‡‡– Control
Ї—•‡‘ˆ”‡•‘—” ‡••ŠƒŽŽ„‡‘‹–‘”‡†ƒ†ƒ†Œ—•–‡†‹Ž‹‡™‹–Š —””‡–
ƒ†‡š’‡ –‡† ƒ’ƒ ‹–›”‡“—‹”‡‡–•Ǥ

ON
ͺǤ͹ ”‘–‡ –‹‘ƒ‰ƒ‹•–ƒŽ™ƒ”‡ Control
”‘–‡ –‹‘ƒ‰ƒ‹•–ƒŽ™ƒ”‡•ŠƒŽŽ„‡‹’އ‡–‡†ƒ†•—’’‘”–‡†„›
ƒ’’”‘’”‹ƒ–‡—•‡”ƒ™ƒ”‡‡••Ǥ
ͺǤͺ ƒƒ‰‡‡–‘ˆ–‡ А‹ ƒŽ˜—Ž- Control
‡”ƒ„‹Ž‹–‹‡•

SE
ˆ‘”ƒ–‹‘ƒ„‘—––‡ А‹ ƒŽ˜—ސ‡”ƒ„‹Ž‹–‹‡•‘ˆ‹ˆ‘”ƒ–‹‘•›•–‡•‹
—•‡•ŠƒŽŽ„‡‘„–ƒ‹‡†ǡ–Ї‘”‰ƒ‹œƒ–‹‘ǯ•‡š’‘•—”‡–‘•— Š˜—ސ‡”ƒ„‹Ž‹–‹‡•
•ŠƒŽŽ„‡‡˜ƒŽ—ƒ–‡†ƒ†ƒ’’”‘’”‹ƒ–‡‡ƒ•—”‡••ŠƒŽŽ„‡–ƒ‡Ǥ
ͺǤͻ ‘ϐ‹‰—”ƒ–‹‘ƒƒ‰‡‡– Control

O
‘ϐ‹‰—”ƒ–‹‘•ǡ‹ Ž—†‹‰•‡ —”‹–› ‘ϐ‹‰—”ƒ–‹‘•ǡ‘ˆŠƒ”†™ƒ”‡ǡ•‘ˆ–™ƒ”‡ǡ
•‡”˜‹ ‡•ƒ†‡–™‘”••ŠƒŽŽ„‡‡•–ƒ„Ž‹•Ї†ǡ†‘ —‡–‡†ǡ‹’އ‡–‡†ǡ

RP
‘‹–‘”‡†ƒ†”‡˜‹‡™‡†Ǥ
ͺǤͳͲ ˆ‘”ƒ–‹‘†‡Ž‡–‹‘ Control
ˆ‘”ƒ–‹‘•–‘”‡†‹‹ˆ‘”ƒ–‹‘•›•–‡•ǡ†‡˜‹ ‡•‘”‹ƒ›‘–Ї”
•–‘”ƒ‰‡‡†‹ƒ•ŠƒŽŽ„‡†‡Ž‡–‡†™Š‡‘Ž‘‰‡””‡“—‹”‡†Ǥ
PU
ͺǤͳͳ ƒ–ƒƒ•‹‰ Control
ƒ–ƒƒ•‹‰•ŠƒŽŽ„‡—•‡†‹ƒ ‘”†ƒ ‡™‹–Š–Ї‘”‰ƒ‹œƒ–‹‘ǯ•
–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ›‘ƒ ‡•• ‘–”‘Žƒ†‘–Ї””‡Žƒ–‡†–‘’‹ Ǧ•’‡ ‹ϐ‹ 
’‘Ž‹ ‹‡•ǡƒ†„—•‹‡••”‡“—‹”‡‡–•ǡ–ƒ‹‰ƒ’’Ž‹ ƒ„އއ‰‹•Žƒ–‹‘‹–‘
‘•‹†‡”ƒ–‹‘Ǥ
G

ͺǤͳʹ ƒ–ƒއƒƒ‰‡’”‡˜‡–‹‘ Control


ƒ–ƒއƒƒ‰‡’”‡˜‡–‹‘‡ƒ•—”‡••ŠƒŽŽ„‡ƒ’’Ž‹‡†–‘•›•–‡•ǡ‡–-
N

™‘”•ƒ†ƒ›‘–Ї”†‡˜‹ ‡•–Šƒ–’”‘ ‡••ǡ•–‘”‡‘”–”ƒ•‹–•‡•‹–‹˜‡

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
‹ˆ‘”ƒ–‹‘Ǥ
NI

ͺǤͳ͵ ˆ‘”ƒ–‹‘„ƒ —’ Control


ƒ —’ ‘’‹‡•‘ˆ‹ˆ‘”ƒ–‹‘ǡ•‘ˆ–™ƒ”‡ƒ†•›•–‡••ŠƒŽŽ„‡ƒ‹–ƒ‹‡†
ƒ†”‡‰—Žƒ”Ž›–‡•–‡†‹ƒ ‘”†ƒ ‡™‹–Š–Їƒ‰”‡‡†–‘’‹ Ǧ•’‡ ‹ϐ‹ ’‘Ž‹ ›
AI

‘„ƒ —’Ǥ
ͺǤͳͶ ‡†—†ƒ ›‘ˆ‹ˆ‘”ƒ–‹‘’”‘- Control
‡••‹‰ˆƒ ‹Ž‹–‹‡•
TR

ˆ‘”ƒ–‹‘’”‘ ‡••‹‰ˆƒ ‹Ž‹–‹‡••ŠƒŽŽ„‡‹’އ‡–‡†™‹–Š”‡†—†ƒ ›


•—ˆϐ‹ ‹‡––‘‡‡–ƒ˜ƒ‹Žƒ„‹Ž‹–›”‡“—‹”‡‡–•Ǥ
ͺǤͳͷ Logging Control
‘‰•–Šƒ–”‡ ‘”†ƒ –‹˜‹–‹‡•ǡ‡š ‡’–‹‘•ǡˆƒ—Ž–•ƒ†‘–Ї””‡Ž‡˜ƒ–‡˜‡–•
•ŠƒŽŽ„‡’”‘†— ‡†ǡ•–‘”‡†ǡ’”‘–‡ –‡†ƒ†ƒƒŽ›•‡†Ǥ
R

ͺǤͳ͸ ‘‹–‘”‹‰ƒ –‹˜‹–‹‡• Control


‡–™‘”•ǡ•›•–‡•ƒ†ƒ’’Ž‹ ƒ–‹‘••ŠƒŽŽ„‡‘‹–‘”‡†ˆ‘”ƒ‘ƒŽ‘—•
FO

„‡Šƒ˜‹‘—”ƒ†ƒ’’”‘’”‹ƒ–‡ƒ –‹‘•–ƒ‡–‘‡˜ƒŽ—ƒ–‡’‘–‡–‹ƒŽ‹ˆ‘”-
ƒ–‹‘•‡ —”‹–›‹ ‹†‡–•Ǥ
ͺǤͳ͹ Ž‘ •› Š”‘‹œƒ–‹‘ Control
Ї Ž‘ •‘ˆ‹ˆ‘”ƒ–‹‘’”‘ ‡••‹‰•›•–‡•—•‡†„›–Ї‘”‰ƒ‹œƒ–‹‘
•ŠƒŽŽ„‡•› Š”‘‹œ‡†–‘ƒ’’”‘˜‡†–‹‡•‘—” ‡•Ǥ

16 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Table A.1 (continued)


ͺǤͳͺ •‡‘ˆ’”‹˜‹Ž‡‰‡†—–‹Ž‹–›’”‘‰”ƒ• Control
Ї—•‡‘ˆ—–‹Ž‹–›’”‘‰”ƒ•–Šƒ– ƒ„‡ ƒ’ƒ„އ‘ˆ‘˜‡””‹†‹‰•›•–‡
ƒ†ƒ’’Ž‹ ƒ–‹‘ ‘–”‘Ž••ŠƒŽŽ„‡”‡•–”‹ –‡†ƒ†–‹‰Š–Ž› ‘–”‘ŽŽ‡†Ǥ

LY
ͺǤͳͻ •–ƒŽŽƒ–‹‘‘ˆ•‘ˆ–™ƒ”‡‘‘’- Control
‡”ƒ–‹‘ƒŽ•›•–‡•
”‘ ‡†—”‡•ƒ†‡ƒ•—”‡••ŠƒŽŽ„‡‹’އ‡–‡†–‘•‡ —”‡Ž›ƒƒ‰‡
•‘ˆ–™ƒ”‡‹•–ƒŽŽƒ–‹‘‘‘’‡”ƒ–‹‘ƒŽ•›•–‡•Ǥ

ON
ͺǤʹͲ ‡–™‘”••‡ —”‹–› Control
‡–™‘”•ƒ†‡–™‘”†‡˜‹ ‡••ŠƒŽŽ„‡•‡ —”‡†ǡƒƒ‰‡†ƒ† ‘–”‘ŽŽ‡†
–‘’”‘–‡ –‹ˆ‘”ƒ–‹‘‹•›•–‡•ƒ†ƒ’’Ž‹ ƒ–‹‘•Ǥ
ͺǤʹͳ ‡ —”‹–›‘ˆ‡–™‘”•‡”˜‹ ‡• Control
‡ —”‹–›‡ Šƒ‹••ǡ•‡”˜‹ ‡އ˜‡Ž•ƒ†•‡”˜‹ ‡”‡“—‹”‡‡–•‘ˆ‡–™‘”

SE
•‡”˜‹ ‡••ŠƒŽŽ„‡‹†‡–‹ϐ‹‡†ǡ‹’އ‡–‡†ƒ†‘‹–‘”‡†Ǥ
ͺǤʹʹ ‡‰”‡‰ƒ–‹‘‘ˆ‡–™‘”• Control
”‘—’•‘ˆ‹ˆ‘”ƒ–‹‘•‡”˜‹ ‡•ǡ—•‡”•ƒ†‹ˆ‘”ƒ–‹‘•›•–‡••ŠƒŽŽ
„‡•‡‰”‡‰ƒ–‡†‹–Ї‘”‰ƒ‹œƒ–‹‘ǯ•‡–™‘”•Ǥ

O
ͺǤʹ͵ ‡„ϐ‹Ž–‡”‹‰ Control
 ‡••–‘‡š–‡”ƒŽ™‡„•‹–‡••ŠƒŽŽ„‡ƒƒ‰‡†–‘”‡†— ‡‡š’‘•—”‡–‘

ͺǤʹͶ •‡‘ˆ ”›’–‘‰”ƒ’Š› Control RP


ƒŽ‹ ‹‘—• ‘–‡–Ǥ

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
—އ•ˆ‘”–Ї‡ˆˆ‡ –‹˜‡—•‡‘ˆ ”›’–‘‰”ƒ’Š›ǡ‹ Ž—†‹‰ ”›’–‘‰”ƒ’Š‹ ‡›
PU
ƒƒ‰‡‡–ǡ•ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†‹’އ‡–‡†Ǥ
ͺǤʹͷ ‡ —”‡†‡˜‡Ž‘’‡–Ž‹ˆ‡ › އ Control
—އ•ˆ‘”–Ї•‡ —”‡†‡˜‡Ž‘’‡–‘ˆ•‘ˆ–™ƒ”‡ƒ†•›•–‡••ŠƒŽŽ„‡
‡•–ƒ„Ž‹•Ї†ƒ†ƒ’’Ž‹‡†Ǥ
ͺǤʹ͸ ’’Ž‹ ƒ–‹‘•‡ —”‹–›”‡“—‹”‡- Control
G

ments
ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–••ŠƒŽŽ„‡‹†‡–‹ϐ‹‡†ǡ•’‡ ‹ϐ‹‡†ƒ†
ƒ’’”‘˜‡†™Š‡†‡˜‡Ž‘’‹‰‘”ƒ “—‹”‹‰ƒ’’Ž‹ ƒ–‹‘•Ǥ
N

ͺǤʹ͹ ‡ —”‡•›•–‡ƒ” Š‹–‡ –—”‡ƒ† Control


engineering principles
”‹ ‹’އ•ˆ‘”‡‰‹‡‡”‹‰•‡ —”‡•›•–‡••ŠƒŽŽ„‡‡•–ƒ„Ž‹•Ї†ǡ†‘ —-
NI

‡–‡†ǡƒ‹–ƒ‹‡†ƒ†ƒ’’Ž‹‡†–‘ƒ›‹ˆ‘”ƒ–‹‘•›•–‡†‡˜‡Ž‘’‡–
ƒ –‹˜‹–‹‡•Ǥ
ͺǤʹͺ
AI

Secure coding Control


‡ —”‡ ‘†‹‰’”‹ ‹’އ••ŠƒŽŽ„‡ƒ’’Ž‹‡†–‘•‘ˆ–™ƒ”‡†‡˜‡Ž‘’‡–Ǥ
ͺǤʹͻ ‡ —”‹–›–‡•–‹‰‹†‡˜‡Ž‘’‡– Control
TR

ƒ†ƒ ‡’–ƒ ‡
‡ —”‹–›–‡•–‹‰’”‘ ‡••‡••ŠƒŽŽ„‡†‡ϐ‹‡†ƒ†‹’އ‡–‡†‹–Ї
†‡˜‡Ž‘’‡–Ž‹ˆ‡ › އǤ
ͺǤ͵Ͳ Outsourced development Control
Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‹”‡ –ǡ‘‹–‘”ƒ†”‡˜‹‡™–Їƒ –‹˜‹–‹‡•”‡Žƒ–‡†
R

–‘‘—–•‘—” ‡†•›•–‡†‡˜‡Ž‘’‡–Ǥ
ͺǤ͵ͳ ‡’ƒ”ƒ–‹‘‘ˆ†‡˜‡Ž‘’‡–ǡ–‡•– Control
FO

ƒ†’”‘†— –‹‘‡˜‹”‘‡–•
‡˜‡Ž‘’‡–ǡ–‡•–‹‰ƒ†’”‘†— –‹‘‡˜‹”‘‡–••ŠƒŽŽ„‡•‡’ƒ”ƒ–‡†
ƒ†•‡ —”‡†Ǥ
ͺǤ͵ʹ Šƒ‰‡ƒƒ‰‡‡– Control
Šƒ‰‡•–‘‹ˆ‘”ƒ–‹‘’”‘ ‡••‹‰ˆƒ ‹Ž‹–‹‡•ƒ†‹ˆ‘”ƒ–‹‘•›•–‡•
•ŠƒŽŽ„‡•—„Œ‡ ––‘ Šƒ‰‡ƒƒ‰‡‡–’”‘ ‡†—”‡•Ǥ
ͺǤ͵͵ ‡•–‹ˆ‘”ƒ–‹‘ Control
‡•–‹ˆ‘”ƒ–‹‘•ŠƒŽŽ„‡ƒ’’”‘’”‹ƒ–‡Ž›•‡Ž‡ –‡†ǡ’”‘–‡ –‡†ƒ†ƒƒ‰‡†Ǥ

© ISO/IEC 2022 – All rights reserved 17


ISO/IEC 27001:2022(E)

Table A.1 (continued)


ͺǤ͵Ͷ ”‘–‡ –‹‘‘ˆ‹ˆ‘”ƒ–‹‘•›•- Control
–‡•†—”‹‰ƒ—†‹––‡•–‹‰
—†‹––‡•–•ƒ†‘–Ї”ƒ••—”ƒ ‡ƒ –‹˜‹–‹‡•‹˜‘Ž˜‹‰ƒ••‡••‡–‘ˆ‘’-
‡”ƒ–‹‘ƒŽ•›•–‡••ŠƒŽŽ„‡’Žƒ‡†ƒ†ƒ‰”‡‡†„‡–™‡‡–Ї–‡•–‡”ƒ†

LY
ƒ’’”‘’”‹ƒ–‡ƒƒ‰‡‡–Ǥ

ON
SE

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---
O
RP
PU
N G
NI
AI
TR
R
FO

18 © ISO/IEC 2022 – All rights reserved


ISO/IEC 27001:2022(E)

Bibliography

ȏͳȐ Ȁ  ʹ͹ͲͲʹǣʹͲʹʹǡ Information security, cybersecurity and privacy protection — Information

LY
security controls
ȏʹȐ Ȁ ʹ͹ͲͲ͵ǡInformation technology — Security techniques — Information security management
systems — Guidance

ON
ȏ͵Ȑ Ȁ ʹ͹ͲͲͶǡInformation technology — Security techniques — Information security management
— Monitoring, measurement, analysis and evaluation
ȏͶȐ Ȁ  ʹ͹ͲͲͷǡ Information security, cybersecurity and privacy protection — Guidance on
managing information security risks

SE
ȏͷȐ ͵ͳͲͲͲǣʹͲͳͺǡRisk management — Guidelines

O
RP
PU
N G
NI
AI
TR
R
FO

--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

© ISO/IEC 2022 – All rights reserved 19


ISO/IEC 27001:2022(E)

LY
ON
OSE
RP
PU
G
--``,,,,,``````,,,,,`,`,`,`,,`,-`-`,,`,,`,`,,`---

N
NI
AI
TR
R
FO

౧Ͳ͵ǤͳͲͲǤ͹ͲǢ͵ͷǤͲ͵Ͳ
”‹ ‡„ƒ•‡†‘ͳͻ’ƒ‰‡•

© ISO/IEC 2022 – All rights reserved

You might also like