What are the categories of controls in ISO 27001?

What are the categories of controls in ISO 27001?What are the categories of controls in ISO 27001?
Rebecca KappelRebecca Kappel Staff asked 9 months ago

1 Answers
Rebecca KappelRebecca Kappel Staff answered 9 months ago
ISO/IEC 27001 provides guidelines for establishing robust Information Security Management Systems (ISMS). The recent update to ISO/IEC 27001 in 2022 reflects ongoing technological advancements and emerging security threats. 

Notably, the revision sees a significant reduction in the ISO 27001 Annex A controls list, decreasing from 114 to 93.

Let’s explore these new ISO 27001 categories in-depth and understand how they contribute to enhancing information security practices across organizations worldwide.

ISO 27001 Controls

1. Organizational Controls (37 controls)

These ISO27001 controls focus on the organizational aspects of information security management. They encompass policies, procedures, and practices that govern the organization’s overall approach to managing information security. Examples of organizational controls include:

  • Establishing and maintaining an information security policy.
  • Defining roles and responsibilities for information security.
  • Implementing processes for managing third-party relationships.
  • Conducting regular security awareness and training programs for employees.
  • Establishing incident response and business continuity plans.

2. People Controls (8 controls)

People controls address the human element of information security management. These ISO 27001 privacy controls ensure that employees, contractors, and other personnel understand their roles and responsibilities in safeguarding information assets. Examples of people controls include:

  • Performing background checks on personnel.
  • Providing security awareness training to employees.
  • Defining access rights and permissions based on job roles.
  • Establishing disciplinary procedures for security policy violations.

3. Physical Controls (14 controls)

Physical controls focus on securing the physical environment in which information assets are stored, processed, or transmitted. These controls aim to prevent unauthorized access, damage, or theft of physical assets. Examples of physical controls include:

  • Implementing access controls (e.g., locks, badges) to restrict entry to secure areas.
  • Installing surveillance cameras and alarm systems to monitor and detect unauthorized access.
  • Implementing environmental controls (e.g., temperature, humidity) to protect equipment and data storage media.
  • Establishing procedures for the secure disposal of sensitive information and electronic devices.

4. Technological Controls (34 controls)

Technological controls use technology to protect information assets and mitigate security risks. These controls include hardware, software, and technical measures implemented to secure information systems and networks. Examples of technological controls include:

  • Implementing firewalls, intrusion detection systems, and antivirus software to protect against external threats.
  • Encrypting data at rest and in transit to maintain confidentiality.
  • Implementing access control mechanisms (e.g., authentication, authorization) to restrict access to sensitive information.
  • Implementing security controls for mobile devices, cloud services, and emerging technologies.

There you have it: 4 control categories and 93 controls. 

By implementing controls from each category, organizations can establish a comprehensive information security management system to protect their valuable assets from threats and vulnerabilities.

Related Content

GRCaaS

GRCaaS

Today, businesses are juggling more GRC requirements than ever before. It’s no surprise that many companies…
Discretionary Access Control (DAC)

Discretionary Access Control (DAC)

What is Discretionary Access Control (DAC)?  Discretionary Access Control (DAC) is one of the simplest and…
Covered Defense Information (CDI)

Covered Defense Information (CDI)

What is CDI (Covered Defense Information)? Covered Defense Information (CDI) refers to unclassified information that requires…
Skip to content