11 new controls, reorganized Annex A, and a transition deadline — here is your complete guide.
ISO/IEC 27001:2022 was published on 25 October 2022, replacing the 2013 edition. If you are currently certified or implementing ISO 27001, this revision affects your Statement of Applicability, Annex A controls, and your transition deadline. Here is everything you need to know.
The 2022 revision made changes in two key areas: the main body (clauses 4–10) and Annex A (the controls catalogue).
The main clauses saw relatively minor but important updates:
The biggest change is in Annex A:
The 4 new themes (replacing 14 categories) are:
58 controls remain essentially unchanged, 35 were merged into 24 controls, and 23 were renamed/reorganized. No controls were deleted — only consolidated or restructured. And 11 brand new controls were added.
These are the controls that did not exist in the 2013 version:
Organizations must collect and analyze information about threats to produce actionable threat intelligence relevant to their environment.
Processes for acquisition, use, management, and exit from cloud services must be established, aligned with information security requirements.
ICT readiness must be planned, implemented, maintained, and tested based on business continuity objectives and ICT continuity requirements.
Premises must be monitored for unauthorized physical access on a continuous basis.
Configurations of hardware, software, services, and networks must be established, documented, implemented, monitored, and reviewed.
Information stored in systems, devices, or other storage media must be deleted when no longer required.
Data masking must be used in accordance with the organization's access control policy and other policies, and business requirements.
Data leakage prevention measures must be applied to systems, networks, and devices that process, store, or transmit sensitive information.
Networks, systems, and applications must be monitored for anomalous behavior, and actions taken to evaluate potential information security incidents.
Access to external websites must be managed to reduce exposure to malicious content.
Secure coding principles must be applied to software development. This is now a formal requirement, not just good practice.
All ISO 27001:2013 certificates must transition to ISO 27001:2022 by 31 October 2025. After this date, certificates based on the 2013 version will no longer be valid. Organizations should begin their transition immediately if they have not already done so.
Subscribe to relevant threat feeds (CERT-In alerts, sector-specific ISACs, commercial threat intel). Document how you consume and act on threat intelligence. Even a simple process of reviewing CERT-In advisories and updating controls accordingly counts.
Document all cloud services in use. Create a cloud security policy covering acceptable use, shared responsibility model, exit strategy, and data residency requirements. Conduct cloud security assessments for critical cloud workloads.
Formalize your secure SDLC. Implement SAST tools in CI/CD pipelines, document secure coding guidelines (reference OWASP), and require security code reviews for critical modules. Train developers on secure coding.
Classify your data assets. Implement DLP tools or policies for email, endpoint, and cloud. At minimum, document what sensitive data exists, where it flows, and what controls prevent unauthorized exfiltration.