Understanding ISO 27001 Controls (Guide To Annex A)
Understanding ISO 27001 Controls (Guide To Annex A)
Understanding ISO 27001 Controls (Guide To Annex A)
Summary: In this article, we’ll cover the 14 specific categories of the ISO 27001 Annex A
controls. You’ll learn how to decide which ISO 27001 framework controls to implement and
who should be involved in the implementation process. By the end of this article, you’ll have
a basic understanding of ISO 27001 Annex A controls and how to implement them in your
organization.
ISO 27001 defines and audits these controls during stage two of the ISO 27001 certification
process. An external accredited certification body runs a series of evidentiary audits that
confirm the organization’s technology and processes are correctly deployed and working
properly. The auditors also confirm the implemented solutions align with the controls that
were declared to be in use by the organization during part one, the documentation review
stage of the certification process.
Since industry compliance requirements, technology needs, and scope of operations are
unique for each organization, the ISO 27001 Annex A control list serves as a framework,
rather than a checklist of requirements. For the certification, however, each firm must draft a
Statement of Applicability (SoA), defining the specific Annex A controls based on the
company’s identified risks, legal and contractual requirements, and overall business needs.
Technology, processes, and policies must be in place to maintain adequate contact with
authorities and special interest groups, such as associations, industry groups, or specialty
security organizations. Additionally, organizations must have systems and policies for
maintaining information security for special projects outside of normal day-to-day operations
while using mobile devices, and during teleworking operations.
Assets management
Annex A.8 dives into identifying and protecting a firm’s technology and data assets. ISO
27001 lists specific asset management controls that govern the systems for taking inventory
of assets, assigning the responsibility of ownership for each asset, outlining and enforcing
acceptable use of company assets, and requiring employees to return assets to the firm after
use.
Annex A.8 also requires organizations to have policies and mechanisms for classifying and
labeling all managed data based on its sensitivity, value, or legal requirements. In addition,
companies need processes that outline how personnel must handle certain assets based on
how an asset is classified. Organizations also need a system that enables the secure
management, disposal, and transfer of physical or removable media.
Access Control
Annex A.9 is one of the largest categories on the list, with plenty of controls relating to the
management of user data access and system privileges. For example, businesses need to
establish control policies that enforce the principle of least privilege for network and resource
access. Organizations must have a comprehensive system for registering, deregistering, and
provisioning users and for managing user rights for both standard and privileged accounts.
Next, Annex A.9 requires organizations to utilize secure controls for storing authentication
information, such as user credentials, and to establish policies that specify which users may
access credential data. User access rights should be reviewed ongoingly and periodic
adjustments should be made based on those reviews. Lastly, firms should create secure login
procedures and password management systems and establish access control processes for
internal software.
Cryptography
A short but essential category within the ISO control framework, Annex A.10 covers how an
organization manages encryption and cryptographic controls to secure its sensitive data. The
first control covers setting and enforcing organizational policies that require users to deploy
encryption under specific circumstances and setting minimum cryptographic standards.
Companies also need a procedure for managing cryptographic keys and their life cycles.
Organizations must identify and manage risk for secured areas and delivery locations.
Systems should be in place for the secure installation, protection, maintenance, removal,
disposal, and reuse of equipment and assets—even those located off-premises or unattended
by users. Firms must establish clear desk policies for employees and have mechanisms to
secure telecommunications cabling and protect equipment from utility failures.
Operational Security
Annex A.12 describes the secure management of data-processing operations. ISO 27001 A.12
requires systems for documenting operating procedures; overseeing change management; and
managing operational capacity for data storage, processing power, and communications.
Organizations need controls to separate their development, testing, and operating
environments; back up their data; protect from malware; log user and network activity.
Companies must secure their log information, keep system administrators’ activity data
separate from the activity data for regular users, and track all system events in a single time
zone. Also, to maintain the integrity of their operating systems, organizations need to
institute:
ISO 27001 A.13 also specifically addresses the management of information security when
communicating with external sources, such as customers, suppliers, and other stakeholders.
Organizations need policies and procedures for external information transfers, confidential
agreements between the organization and outside users, and protection mechanisms for
electronic messaging.
ISO 27001 A.14 requires teams to restrict the changes employees can make to software
packages purchased from an outside vendor and limit the customization of open-source code.
Firms should also establish and enforce secure system engineering principles. They must
utilize secure development environments, properly manage outsourced development, and
have processes for security and acceptance testing while protecting test data.
Supplier Relationships
Annex A.15 discusses the control areas used to secure any assets that are accessible to third-
party suppliers or partners. Organizations need policies to manage supplier relationships and
address security within their service agreements.
They must also consider and address the risks associated with supply chains for managed
technology systems. When using data hosting centers or infrastructure-as-a-service (IaaS)
providers, for instance, organizations have minimal control over decisions or events that
could compromise data and applications that are managed elsewhere. Finally, organizations
should continuously monitor supplier services for delivery and be prepared to handle service
changes.
Annex A.16 requires firms to set criteria for what qualifies as an incident, create mechanisms
to learn from incidents, and implement technology that helps collect evidence of an incident.
Compliance
Finally, Annex A.18 describes the management of legal and contractual obligations.
Businesses must identify the applicable compliance requirements for information security,
understand their intellectual property rights, and have systems that protect records that fall
under a compliance umbrella. There should be solid controls to safeguard personally
identifiable information (PII) and deployed cryptographic technology that follows contractual
and regulatory requirements across all territories.
The compliance and information security evaluation component of Annex A.18 outlines that
firms should obtain independent, third-party reviews of their information security risks and
controls and of their adherence to compliance requirements. Organizations must also perform
internal evaluations to ensure compliance with their own security policies and procedures, as
well as conduct technical reviews of internal software, security technology, and other
information systems.
For example, if a healthcare facility is seeking compliance certification for the Health
Insurance Portability and Accountability Act (HIPAA) through the Health Information Trust
Alliance (HITRUST), the organization will need a comprehensive system for each control
area defined in the Compliance category.
The Supplier Relationships category will be relevant only to organizations that work with
suppliers. Likewise, the Physical and Environmental Security category will be irrelevant to a
business that works remotely and relies solely on cloud-based applications; however, that
organization will need to implement comprehensive controls in the Access Control and
Communications Security categories.
Specific ISO 27001 control categories require certain roles to provide input and complete
specific tasks. For example,
A human resources director will manage some of the Human Resource Security activities,
such as running background checks on candidates.
An in-house attorney will draft specific organizational policies across the various Annex A
categories.
An IT manager will install software to protect network assets and endpoints relevant to the
categories that require software controls to improve security.
Alternatively, companies can opt to invest in outside consultants who will help implement the
ISO 27001 controls list. While individual departments within the organization will still need
to be involved, a dedicated contractor with ISO 27001 experience can bring skills, resources,
and an outside perspective that an in-house lead often lacks.
Once those control requirements are determined, firms should run a gap analysis to compare
the controls necessary for the organization to those already implemented in their current
ISMS. Based on the gaps, they can implement the new controls by updating company
policies, hiring personnel, developing new processes, and purchasing new technology to
upgrade the ISMS.
After implementing the new security systems, organizations must train personnel in the
operations of the new controls. Finally, once everything is in place, they start the ISO 27001
certification process by conducting an internal audit.