Skip to content
English
  • There are no suggestions because the search field is empty.

What are 'controls' according to ISO 27001?

A core component of ISO 27001 is the use of controls—specific actions, processes, or tools designed to
manage risks and enhance the security of information. This detailed article explores what controls are
according to ISO 27001, how they are structured within the standard, and how they should be
implemented within an organisation. Controls are measures that an organisation puts in place to ensure
that identified security risks are mitigated effectively. These controls are derived from best practices for
securing information and information systems, and they address various aspects of information security,
including confidentiality, integrity, and availability of data.

Structure of Controls in ISO 27001
ISO 27001 controls are outlined in Annex A of the standard, which provides a comprehensive list of 93
controls, divided into 4 categories, each addressing different security aspects. Here’s an overview.

Theme 1: Organisational Controls (37 controls)
  1. Information security roles and responsibilities
  2. Segregation of duties
  3. Contact with authorities
  4. Contact with special interest groups
  5. Information security in project management
  6. Inventory of information and other associated assets
  7. Acceptable use of information and other associated assets
  8. Return of assets
  9. Classification of information
  10. Labelling of information
  11. Information transfer
  12. Access control
  13. Identity management
  14. Authentication information
  15. Access rights
  16. Information security in supplier relationships
  17. Addressing information security within supplier agreements
  18. Management of information security incidents and improvements
  19. Information security during disruption
  20. ICT readiness for business continuity
  21. Information security for the use of cloud services
  22. Legal, statutory, regulatory and contractual requirements
  23. Intellectual property rights
  24. Protection of records
  25. Privacy and protection of PII (personally identifiable information)
  26. Independent review of information security
  27. Compliance with policies, rules and standards for information security
  28. Information security in the relationships with suppliers and third parties
  29. Information security training and awareness
  30. Responsibilities after termination or change of employment
  31. Remote working
  32. Secure development lifecycle
  33. Application security requirements
  34. Secure system architecture and engineering principles
  35. Secure coding
  36. Security testing in development and acceptance
  37. Outsourced development
Theme 2: People Controls (8 controls)
  1. Screening
  2. Terms and conditions of employment
  3. Information security awareness, education and training
  4. Disciplinary process
  5. Responsibilities after termination or change of employment
  6. Confidentiality or non-disclosure agreements
  7. Remote working
  8. Information security event reporting
Theme 3: Physical Controls (14 controls)
  1. Physical security perimeter
  2. Physical entry controls
  3. Securing offices, rooms and facilities
  4. Physical security monitoring
  5. Protection against physical and environmental threats
  6. Working in secure areas
  7. Clear desk and clear screen policy
  8. Equipment siting and protection
  9. Security of assets off-premises
  10. Storage media
  11. Supporting utilities
  12. Cabling security
  13. Equipment maintenance
  14. Secure disposal or re-use of equipment
Theme 4: Technological Controls (34 controls)
  1. User endpoint devices
  2. Privileged access rights
  3. Information access restriction
  4. Access to source code
  5. Secure authentication
  6. Capacity management
  7. Protection against malware
  8. Management of technical vulnerabilities
  9. Configuration management
  10. Information deletion
  11. Data masking
  12. Data leakage prevention
  13. Information backup
  14. Use of cryptography
  15. Key management
  16. Network security
  17. Security of network services
  18. Segregation of networks
  19. Web filtering
  20. Use of mobile devices
  21. Application control
  22. Information transfer
  23. Logging
  24. Monitoring activities
  25. Clock synchronisation
  26. Installation of software
  27. Software updates
  28. Event logging and correlation
  29. Anomaly detection
  30. Prevention of misuse
  31. Security of email and messaging
  32. Intrusion prevention and detection
  33. Remote access
  34. Secure development tools