Annex A explained

Information security management has become a critical priority for organisations of all sizes. ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through a comprehensive Information Security Management System (ISMS).

What is ISO 27001?

ISO 27001 is an internationally recognised standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). It specifies the requirements for establishing, implementing, maintaining, and continually improving an ISMS within the context of your organisation.

The standard takes a risk-based approach — rather than prescribing specific security controls, it requires organisations to identify their own risks and select appropriate controls from Annex A to address them.

Why Does ISO 27001 Matter?

Cyber threats are growing in both frequency and sophistication. Data breaches, ransomware attacks, and insider threats can cause severe financial and reputational damage. ISO 27001 certification demonstrates to clients, partners, and regulators that your organisation takes information security seriously.

Business Benefits

Beyond compliance, ISO 27001 delivers tangible business value. Certified organisations often win contracts faster because procurement teams trust their security posture. Insurance premiums can reduce. And internally, the process of building an ISMS forces organisations to understand and document their own data flows — often uncovering inefficiencies along the way.

Regulatory Alignment

ISO 27001 maps closely to other regulatory frameworks including GDPR, NIS2, and SOC 2. Achieving ISO 27001 certification can significantly reduce the effort required to demonstrate compliance with these overlapping requirements, since many controls satisfy multiple frameworks simultaneously.

The ISO 27001 Framework Structure

The 2022 revision of ISO 27001 follows the Harmonised Structure (HS), also known as Annex SL, which is shared across all modern ISO management system standards. This makes it easier to integrate with ISO 9001 (quality) and ISO 22301 (business continuity) if your organisation already holds those certifications.

Clauses 4 to 10

The main body of the standard runs from Clause 4 through to Clause 10. Clause 4 requires you to understand your organisation and its context — who are your interested parties, what are their requirements, and what is the scope of your ISMS? Clause 5 covers leadership, making clear that top management must be visibly committed to the ISMS, not just delegate it to IT.

Clause 6 is where risk management lives. You must establish a process for identifying information security risks, assess their likelihood and impact, and decide how to treat each one — accepting, avoiding, transferring, or mitigating through controls. Clause 8 then requires you to actually implement those plans, while Clauses 9 and 10 cover performance evaluation and continual improvement.

Annex A Controls

Annex A in the 2022 version contains 93 controls organised into four themes: Organisational (37 controls), People (8 controls), Physical (14 controls), and Technological (34 controls). Not every control is mandatory — you select those relevant to your identified risks and document your reasoning in a Statement of Applicability (SoA).

The Certification Process

Achieving ISO 27001 certification involves two stages. Stage 1 is a documentation review — the auditor examines your ISMS documentation to confirm you have the required policies, procedures, and risk assessment outputs in place. Stage 2 is the main audit, where the auditor visits your organisation (or conducts a remote audit) to verify that your ISMS is actually operating as documented.

How Long Does It Take?

A realistic timeline for a small to medium-sized organisation is six to twelve months from gap analysis to certification. Larger organisations with complex infrastructure or multiple sites should budget twelve to eighteen months. The most common reason projects overrun is underestimating the time required to complete the risk assessment and implement technical controls.

Choosing a Certification Body

Only accredited certification bodies can issue ISO 27001 certificates that are internationally recognised. In the UK, look for bodies accredited by UKAS. In the US, ANAB accreditation is the relevant mark. Avoid certification schemes that are not backed by a recognised national accreditation body — they carry little weight with enterprise customers or regulators.

Common Implementation Mistakes

Many organisations treat ISO 27001 as a paperwork exercise, producing policies nobody reads and risk registers that are never updated. Auditors are trained to spot this — they will interview staff, test whether controls actually work, and look for evidence of continual improvement. A certificate obtained this way will not survive a surveillance audit twelve months later.

Scope Too Broad

First-time implementers often define a scope that covers the entire organisation when a narrower scope would be more manageable. If your primary objective is winning enterprise contracts, consider scoping to the systems and teams that directly handle client data. You can always expand scope at a later recertification cycle.

Neglecting the Human Element

Technology controls alone are not enough. ISO 27001 requires a security awareness programme that ensures all staff understand their responsibilities. Phishing simulations, clear acceptable use policies, and regular training sessions are not optional extras — they are Annex A controls that auditors will specifically check for evidence of implementation.

Maintaining Certification

ISO 27001 certification is not a one-time achievement. Certificates are valid for three years, with annual surveillance audits in years one and two, and a full recertification audit in year three. Between audits, your ISMS must continue to operate — internal audits must run on schedule, management reviews must take place, and nonconformities must be tracked and closed out.

Organisations that treat certification as a project with an end date rather than an ongoing programme consistently struggle at surveillance audits. The standard rewards organisations that embed security thinking into their normal business operations rather than running a parallel compliance process.

More Articles

More from ISO 27001 Hub

An overview of ISO 27001 Requirements

The core requirements of ISO 27001 are addressed in Clauses 4.1 through to 10.2. Here we’ll look through an overview…

Read more
Headstart: Begin with 81% of the work already complete

Why Starting from Zero is an ISO 27001 Death Trap Most organizations treat ISO 27001 like a blank canvas. They…

Read more
Your complete guide to ISO 27001

ISO 27001 provides organisations with a structured framework to safeguard their information assets and ISMS. In this article we’ll explore…

Read more
👋 30-Minute demo at Zero cost

Don't Wait for a Crisis

Start Today, Stay Secure Tomorrow!

Book Demo