new ISO27001:2022

What’s changing in ISO 27001?


ISO 27001:2022 is not significantly different from ISO 27001:2013, but there are some notable changes:


Context and scope

You must now identify the “relevant” requirements of interested parties and determine which will be addressed through the ISMS (information security management system).

The ISMS now explicitly includes the “processes needed and their interactions”.

Planning

Information security objectives must now be monitored and made “available as documented information”.

There is a new section on planning changes to the ISMS. This does not specify any processes that must be included, so you should determine how you can demonstrate that changes to the ISMS have indeed been planned.

Support

The requirements to define who will communicate and the processes for

effecting communication have been replaced by a requirement to define “how to communicate”.

Operation

The requirement to plan how to achieve information security objectives has been replaced by a

requirement to establish criteria for processes to implement actions identified in Clause 6, and to

control those processes in line with the criteria.

Organisations are now required to control “externally provided processes, products or services”

relevant to the ISMS rather than just processes.

Performance and evaluation

Methods of monitoring, measuring, analysing and evaluating the effectiveness of the ISMS

now need to be comparable and reproducible. The management review must now also consider changes in the needs and expectations of interested parties.

Annex A

Annex A has been revised to align it with ISO 27002:2022. The Annex A controls are discussed in the section below.

What’s changed in ISO 27001?


First, the phrase “code of practice” has been dropped from the title of the updated ISO 27002 standard. This better reflects its purpose as a reference set of information security controls.

The Standard itself is significantly longer than the previous version, and the controls have been reordered and updated. Some controls have been merged or removed, and some have been added:

  • ISO 27002:2022 lists 93 controls rather than ISO 27002:2013’s 114.
  • These controls are grouped into 4 ‘themes’ rather than 14 clauses. They are:
    • People (8 controls)
    • Organizational (37 controls)
    • Technological (34 controls)
    • Physical (14 controls)
  • The completely new controls are:
    • Threat intelligence
    • Information security for use of cloud services
    • ICT readiness for business continuity
    • Physical security monitoring
    • Configuration management
    • Information deletion
    • Data masking
    • Data leakage prevention
    • Monitoring activities
    • Web filtering
    • Secure coding
  • The controls now also have five types of ‘attribute’ to make them easier to categorise:
    • Control type (preventive, detective, corrective)
    • Information security properties (confidentiality, integrity, availability)
    • Cybersecurity concepts (identify, protect, detect, respond, recover)
    • Operational capabilities (governance, asset management, etc.)
    • Security domains (governance and ecosystem, protection, defence, resilience)

In security as in life, the hardest weaknesses to pinpoint are your own. Fortunately, we have no problem thoroughly documenting all of your flaws. In fact, it’s kind of our job here at Compassrose.

And that’s a good thing: Knowing your vulnerabilities—and the ways in which attackers could exploit them—is one of the greatest insights you can get in improving your security program. With that in mind, Compassrose Penetration Testing Services team will simulate a real-world attack on your networks, applications, devices, and/or people to demonstrate the security level of your key systems and infrastructure and show you what it will take to strengthen it. Much like your mum, we don't highlight your failings because it bothers you—we do it because we care. This testing is done as part of our ISO27001 intergration into your company, so there is no need to go looking for a company. Compassrose is here for your accreditation to ISO27001 from concept to accreditation. 

iso27001 pen testing

How will this affect organisations implementing ISO 27001?


Certification bodies are unlikely to offer certification to ISO 27001:2022 for at least six months after the Standard’s publication and ISO 27001:2013 will not be retired for another three years, so there is no need to worry that any work you have done to implement ISO 27001:2013 has been wasted.


Depending on how far your ISO 27001:2013 implementation project has progressed, you may wish to use the new Annex A controls from ISO 27001:2022 as an alternative control set, although you will still need to compare these with the 2013 Annex A controls in your Statement of Applicability.

(ISO 27002:2022 has an annex that compares its controls with the 2013 iteration of the Standard, so this should be relatively straightforward.)


Before renewing your ISO 27001 certification after three years, you will need to transition your ISMS to comply with the 2022 iteration of the Standard.

We have everything you need to implement an ISO 27001-compliant ISMS and achieve certification to the Standard.


ISO 27001 Compliance and Cybersecurity


There are 2 major parts to the ISO 27000 standard family. The first part is the specifications for the ISMS and considerations of all the Annex A controls as outlined in ISO 27001.

The second part is ISO 27002, which provides guidance on how to implement the controls. Together they combine the what and how for an Information Security Management System.

 

Compassrose offers customised consulting programs to fit your business needs to assist you in implementing and maintaining an effective ISMS. Once you have implemented ISO 27001 with our assistance, you will be compliant to the international standard. Should you choose to continue toward certification, we can offer options for you.

 

Many customers that pursue ISO 27001, have or need to have ISO 9001 in place. ISO 27001 is designed to dovetail with other standards in the ISO family such as ISO 9001, ISO 14001, ISO 20000-1 (information technology) and more.