{"id":2282,"date":"2026-03-31T11:28:40","date_gmt":"2026-03-31T11:28:40","guid":{"rendered":"https:\/\/autoresilience.ai\/blogs\/?post_type=compliance_hub&#038;p=2282"},"modified":"2026-04-01T05:53:45","modified_gmt":"2026-04-01T05:53:45","slug":"annex-a-explained","status":"publish","type":"compliance_hub","link":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/","title":{"rendered":"Annex A explained"},"content":{"rendered":"\n<p>Information security management has become a critical priority for organisations of all sizes. ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through a comprehensive Information Security Management System (ISMS).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is ISO 27001?<\/h2>\n\n\n\n<p>ISO 27001 is an internationally recognised standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). It specifies the requirements for establishing, implementing, maintaining, and continually improving an ISMS within the context of your organisation.<\/p>\n\n\n\n<p>The standard takes a risk-based approach \u2014 rather than prescribing specific security controls, it requires organisations to identify their own risks and select appropriate controls from Annex A to address them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Does ISO 27001 Matter?<\/h2>\n\n\n\n<p>Cyber threats are growing in both frequency and sophistication. Data breaches, ransomware attacks, and insider threats can cause severe financial and reputational damage. ISO 27001 certification demonstrates to clients, partners, and regulators that your organisation takes information security seriously.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Business Benefits<\/h3>\n\n\n\n<p>Beyond compliance, ISO 27001 delivers tangible business value. Certified organisations often win contracts faster because procurement teams trust their security posture. Insurance premiums can reduce. And internally, the process of building an ISMS forces organisations to understand and document their own data flows \u2014 often uncovering inefficiencies along the way.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Regulatory Alignment<\/h3>\n\n\n\n<p>ISO 27001 maps closely to other regulatory frameworks including GDPR, NIS2, and SOC 2. Achieving ISO 27001 certification can significantly reduce the effort required to demonstrate compliance with these overlapping requirements, since many controls satisfy multiple frameworks simultaneously.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The ISO 27001 Framework Structure<\/h2>\n\n\n\n<p>The 2022 revision of ISO 27001 follows the Harmonised Structure (HS), also known as Annex SL, which is shared across all modern ISO management system standards. This makes it easier to integrate with ISO 9001 (quality) and ISO 22301 (business continuity) if your organisation already holds those certifications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Clauses 4 to 10<\/h3>\n\n\n\n<p>The main body of the standard runs from Clause 4 through to Clause 10. Clause 4 requires you to understand your organisation and its context \u2014 who are your interested parties, what are their requirements, and what is the scope of your ISMS? Clause 5 covers leadership, making clear that top management must be visibly committed to the ISMS, not just delegate it to IT.<\/p>\n\n\n\n<p>Clause 6 is where risk management lives. You must establish a process for identifying information security risks, assess their likelihood and impact, and decide how to treat each one \u2014 accepting, avoiding, transferring, or mitigating through controls. Clause 8 then requires you to actually implement those plans, while Clauses 9 and 10 cover performance evaluation and continual improvement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Annex A Controls<\/h3>\n\n\n\n<p>Annex A in the 2022 version contains 93 controls organised into four themes: Organisational (37 controls), People (8 controls), Physical (14 controls), and Technological (34 controls). Not every control is mandatory \u2014 you select those relevant to your identified risks and document your reasoning in a Statement of Applicability (SoA).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Certification Process<\/h2>\n\n\n\n<p>Achieving ISO 27001 certification involves two stages. Stage 1 is a documentation review \u2014 the auditor examines your ISMS documentation to confirm you have the required policies, procedures, and risk assessment outputs in place. Stage 2 is the main audit, where the auditor visits your organisation (or conducts a remote audit) to verify that your ISMS is actually operating as documented.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How Long Does It Take?<\/h3>\n\n\n\n<p>A realistic timeline for a small to medium-sized organisation is six to twelve months from gap analysis to certification. Larger organisations with complex infrastructure or multiple sites should budget twelve to eighteen months. The most common reason projects overrun is underestimating the time required to complete the risk assessment and implement technical controls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Choosing a Certification Body<\/h3>\n\n\n\n<p>Only accredited certification bodies can issue ISO 27001 certificates that are internationally recognised. In the UK, look for bodies accredited by UKAS. In the US, ANAB accreditation is the relevant mark. Avoid certification schemes that are not backed by a recognised national accreditation body \u2014 they carry little weight with enterprise customers or regulators.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Implementation Mistakes<\/h2>\n\n\n\n<p>Many organisations treat ISO 27001 as a paperwork exercise, producing policies nobody reads and risk registers that are never updated. Auditors are trained to spot this \u2014 they will interview staff, test whether controls actually work, and look for evidence of continual improvement. A certificate obtained this way will not survive a surveillance audit twelve months later.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scope Too Broad<\/h3>\n\n\n\n<p>First-time implementers often define a scope that covers the entire organisation when a narrower scope would be more manageable. If your primary objective is winning enterprise contracts, consider scoping to the systems and teams that directly handle client data. You can always expand scope at a later recertification cycle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Neglecting the Human Element<\/h3>\n\n\n\n<p>Technology controls alone are not enough. ISO 27001 requires a security awareness programme that ensures all staff understand their responsibilities. Phishing simulations, clear acceptable use policies, and regular training sessions are not optional extras \u2014 they are Annex A controls that auditors will specifically check for evidence of implementation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Maintaining Certification<\/h2>\n\n\n\n<p>ISO 27001 certification is not a one-time achievement. Certificates are valid for three years, with annual surveillance audits in years one and two, and a full recertification audit in year three. Between audits, your ISMS must continue to operate \u2014 internal audits must run on schedule, management reviews must take place, and nonconformities must be tracked and closed out.<\/p>\n\n\n\n<p>Organisations that treat certification as a project with an end date rather than an ongoing programme consistently struggle at surveillance audits. The standard rewards organisations that embed security thinking into their normal business operations rather than running a parallel compliance process.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security management has become a critical priority for organisations of all sizes. ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through a comprehensive Information Security Management System (ISMS). What is ISO 27001? ISO 27001 is an internationally recognised standard published by the International Organization for Standardization (ISO) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","compliance_category":[62,59,61],"class_list":["post-2282","compliance_hub","type-compliance_hub","status-publish","hentry","compliance_category-article","compliance_category-iso-27001-hub","compliance_category-iso-42001-hub"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Annex A explained - autoResilience<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Annex A explained - autoResilience\" \/>\n<meta property=\"og:description\" content=\"Information security management has become a critical priority for organisations of all sizes. ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through a comprehensive Information Security Management System (ISMS). What is ISO 27001? ISO 27001 is an internationally recognised standard published by the International Organization for Standardization (ISO) [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"autoResilience\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T05:53:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/\",\"url\":\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/\",\"name\":\"Annex A explained - autoResilience\",\"isPartOf\":{\"@id\":\"https:\/\/autoresilience.ai\/blogs\/#website\"},\"datePublished\":\"2026-03-31T11:28:40+00:00\",\"dateModified\":\"2026-04-01T05:53:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/autoresilience.ai\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance Hub\",\"item\":\"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Annex A explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/autoresilience.ai\/blogs\/#website\",\"url\":\"https:\/\/autoresilience.ai\/blogs\/\",\"name\":\"autoResilience\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/autoresilience.ai\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annex A explained - autoResilience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/","og_locale":"en_US","og_type":"article","og_title":"Annex A explained - autoResilience","og_description":"Information security management has become a critical priority for organisations of all sizes. ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through a comprehensive Information Security Management System (ISMS). What is ISO 27001? ISO 27001 is an internationally recognised standard published by the International Organization for Standardization (ISO) [&hellip;]","og_url":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/","og_site_name":"autoResilience","article_modified_time":"2026-04-01T05:53:45+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/","url":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/","name":"Annex A explained - autoResilience","isPartOf":{"@id":"https:\/\/autoresilience.ai\/blogs\/#website"},"datePublished":"2026-03-31T11:28:40+00:00","dateModified":"2026-04-01T05:53:45+00:00","breadcrumb":{"@id":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/annex-a-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/autoresilience.ai\/blogs\/"},{"@type":"ListItem","position":2,"name":"Compliance Hub","item":"https:\/\/autoresilience.ai\/blogs\/compliance-hub\/"},{"@type":"ListItem","position":3,"name":"Annex A explained"}]},{"@type":"WebSite","@id":"https:\/\/autoresilience.ai\/blogs\/#website","url":"https:\/\/autoresilience.ai\/blogs\/","name":"autoResilience","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/autoresilience.ai\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/compliance_hub\/2282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/compliance_hub"}],"about":[{"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/types\/compliance_hub"}],"author":[{"embeddable":true,"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/comments?post=2282"}],"wp:attachment":[{"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/media?parent=2282"}],"wp:term":[{"taxonomy":"compliance_category","embeddable":true,"href":"https:\/\/autoresilience.ai\/blogs\/wp-json\/wp\/v2\/compliance_category?post=2282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}