Skip to main content

How to Select the Right Controls for Your ISMS

S
Written by Sally Wood
Updated over 11 months ago

Selecting the right controls in your Statement of Applicability (SoA) for your Information Security Management System (ISMS) is a critical step in achieving compliance with ISO 27001 and ensuring effective risk management.

This article provides a systematic approach to help you determine which controls are necessary for your organisation, ensuring your ISMS is both robust and tailored to your specific needs.

Step 1: Understand ISO 27001 Control Framework

Begin by familiarising yourself with Annex A of ISO 27001, which outlines the 114 controls in 14 categories ranging from access control to information security incident management. Understanding these categories and their controls is crucial as it forms the backbone of your ISMS.

Step 2: Conduct a Thorough Risk Assessment

The cornerstone of selecting the right controls is a comprehensive risk assessment. Identify potential threats and vulnerabilities that could impact your organization. Evaluate each risk based on its likelihood of occurrence and potential impact on your organization. This assessment helps prioritise risks and directly informs the control selection process.

Step 3: Map Controls to Assessed Risks

With a clear understanding of your organisation's risk profile, map the relevant ISO 27001 controls to these risks. Each control should address a specific risk. The goal is to mitigate risks to an acceptable level through appropriate control measures. This step requires a balance between over- and under-protecting assets, ensuring that controls are cost-effective and proportionate to the risk.

Step 4: Consider Legal and Regulatory Requirements

Beyond just addressing risks, ensure that the controls you select also comply with legal, regulatory, and contractual requirements relevant to your organisation. Non-compliance can lead to significant penalties and damage your organisation’s reputation.

Step 5: Evaluate Existing Controls

Assess existing security measures to determine their effectiveness. This evaluation helps identify any gaps that new controls must fill or areas where existing controls can be enhanced or replaced. Leveraging existing controls effectively can reduce implementation costs and disruption.

Step 6: Prioritise Control Implementation

Prioritise the implementation of controls based on the severity of the risks they mitigate, the regulatory requirements, and the resources available. Some controls may be critical and need immediate implementation, while others might be less urgent.

Step 7: Document Control Justifications in the SoA

For each control selected, document the rationale in the Statement of Applicability (SoA). This documentation should include the specific risks addressed by the control, compliance requirements, and any other reasons for their selection. This not only aids in transparency but also in audits.

Step 8: Review and Update Controls Regularly

As risks evolve and new threats emerge, regularly review and update your control selection. This ongoing process ensures that your ISMS remains effective and responsive to changes in the threat landscape and organisational priorities.

Selecting the right controls for your ISMS is a detailed process that requires a deep understanding of both the ISO 27001 framework and your organisation's unique risk environment. By following these steps, you can ensure that your ISMS effectively mitigates risks, complies with legal and regulatory requirements, and supports your organisational goals.

By using de.iterate, organisations can ensure that they have selected the right controls, and their ISMS is robust, compliant, and capable of protecting their most critical assets.

Did this answer your question?