5403

ISO 27001 Controls Checklist & 2022 New Controls (Annex A Guide)

What if your organisation already has security controls in place… but the ones attackers actually exploit aren’t even on your…

What if your organisation already has security controls in place… but the ones attackers actually exploit aren’t even on your checklist?

According to IBM’s Cost of a Data Breach Report 2025, the global average cost of a breach has climbed to $4.44 million. Even more telling, organisations that lack structured security frameworks tend to face higher costs and longer recovery times. For organisations holding sensitive data, the question is no longer whether to implement structured security controls, but which framework to use.

ISO/IEC 27001 is the answer for organisations worldwide. It is the only internationally recognised standard for an Information Security Management System (ISMS). At its core is Annex A: a structured control library of 93 security controls.

This guide walks you through the ISO 27001 controls checklist in a way that’s clear and usable. You’ll see how Annex A is structured, what changed in the 2022 update, and how to apply these controls without overcomplicating your compliance efforts.

Mitigata – Your Complete ISO 27001 Compliance Partner

Mitigata, India’s top cyber resilience company with solutions across insurance, security and compliance, can be your best partner in the compliance journey. Our platform serves as a central hub, helping businesses to manage the entire ISO 27001 process with ease.

Over 800+ businesses across 25+ industries trust us to simplify compliance, reduce risks, and prepare them for audits.

Here’s what our platform – Gordon offers:

  • Automate Compliance – It automates repetitive tasks such as evidence gathering, monitoring, and reminders for pending actions.
  • Risk Management – It provides a real-time overview of organisational risks. It uses automated risk registers to track threats and maintain libraries of known vulnerabilities, enabling early identification of potential problems.
  • Documentation – It helps organise all documentation, policies, and evidence in one place.
  • Expert Support – It provides round-the-clock access to expert support, helping with gap assessments, ISMS setup, policy creation, and more.
  • Training – Mitigata offers free training on educating employees about their role in maintaining information security.
  • VAPT Services – Run vulnerability scans and penetration tests to detect and fix real security gaps fast.

One Tool to Manage Your End-to-End ISO 27001 Process

Use Gordon to handle everything, from scope analysis and risk to audits and even staff training.

What Are ISO 27001 Annex A Controls?

ISO 27001 Annex A Controls are designed to ensure that an organisation’s information assets maintain the CIA (Confidentiality, Integrity, and Availability) required to protect the core tenets of confidentiality and information privacy.

Organisations choose their applicable controls from Annex A because it offers an implementation menu that differs from traditional prescriptive requirements.

The risk-based methodology of ISO 27001 enables organisations of all sizes and industry sectors to use the standard. The organisation must determine which controls to use based on its existing threat model, rather than necessarily implementing the 93 standard controls.

From 14 Domains to 4 Categories: What Changed in ISO 27001:2022?

The previous framework includes ISO 27001 (2013), which contains 14 controls distributed across 14 domains, including Asset Management and Cryptography. The 2022 revision replaced these with four streamlined categories, improving the framework’s usability by aligning it with current business operations.

ISO 27001:2013 (14 Domains)ISO 27001:2022 (4 Categories)
A.5 – A.18 (14 clause domains)Organisational Controls (37)
114 total controlsPeople Controls (8)
Redundant overlaps across domainsPhysical Controls (14)
Less aligned with cloud/remote workTechnological Controls (34)

Think your systems are secure? A proper VAPT assessment reveals hidden vulnerabilities most teams completely overlook.

ISO 27001 Controls Checklist: The 4-Category Breakdown

Use this high-level ISO 27001 controls checklist to understand what each category covers and how many controls fall under each:

Category# of ControlsPrimary Focus
Organisational Controls (A.5)37Governance, policies, risk management, supplier security
People Controls (A.6)8Employee screening, training, HR security, and remote work
Physical Controls (A.7)14Facility security, equipment protection, and secure disposal
Technological Controls (A.8)34IAM, encryption, monitoring, secure development, logging

Deep Dive: ISO 27001 Annex A Control Categories Explained

(A.5) Organisational Controls – Governance & Risk Management

With 37 controls, this is the largest category and serves as the governance backbone of your ISMS. It covers information security policies, access control frameworks, supplier security management, legal and regulatory compliance, and incident management procedures.

Key controls include:

ControlTitleWhat It Requires
A.5.1Policies for information securityDocumented, approved, and communicated security policies
A.5.2Information security roles and responsibilitiesNamed ownership for security functions
A.5.5Contact with authoritiesDefined contacts with law enforcement and regulators
A.5.7Threat intelligenceNew in 2022 – proactive collection and analysis of threat data
A.5.15Access controlPolicy governing access to information and systems
A.5.19Information security in supplier relationshipsSecurity requirements built into vendor contracts
A.5.23Information security for use of cloud servicesNew in 2022 – security requirements specific to cloud providers
A.5.24Information security incident management planningDocumented incident response procedures
A.5.30ICT readiness for business continuityNew in 2022 – IT systems designed to support recovery

Get ISO 27001 Certified Without Breaking Your Budget

Test the platform for free, explore all features, and see why our pricing beats the rest.

(A.6) People Controls – The Human Firewall

Verizon’s 2023 DBIR report states that human error causes approximately 74% of all data breaches. People Controls protects this security risk by implementing employee screening systems, conducting security training programs, enforcing disciplinary actions for policy breaches and establishing remote work security protocols.

ControlTitleWhat It Requires
A.6.1ScreeningPre-employment background verification
A.6.2Terms and conditions of employmentSecurity responsibilities documented in contracts
A.6.3Information security awareness, education and trainingOngoing security training for all staff
A.6.4Disciplinary processDefined consequences for security policy violations
A.6.5Responsibilities after termination or change of employmentAccess revocation and data return on departure
A.6.6Confidentiality or non-disclosure agreementsNDAs covering information security obligations
A.6.7Remote workingNew in 2022 – controls for distributed and hybrid work
A.6.8Information security event reportingMechanism for staff to report security incidents

(A.7) Physical Controls – Securing the Physical Layer

Physical security requirements are mandatory compliance obligations that organisations must fulfil throughout their cloud-first operations.

The 14 controls establish requirements for securing office spaces and building perimeters, protecting equipment from theft or damage, ensuring secure disposal of media and devices, and protecting against environmental and natural-disaster threats.

ControlTitleWhat It Requires
A.7.1Physical security perimetersDefined and secured boundaries for sensitive areas
A.7.2Physical entryControlled access to secure zones
A.7.4Physical security monitoringNew in 2022 – surveillance of sensitive areas
A.7.6Working in secure areasProcedures for operating within sensitive spaces
A.7.8Equipment siting and protectionProtection from environmental and physical threats
A.7.10Storage mediaSecure management of portable storage devices
A.7.14Secure disposal or re-use of equipmentVerified data destruction before disposal or reuse

VPNs aren’t as secure as you think. Here’s a VPN alternative modern teams are quietly switching to.

(A.8) Technological Controls – Your Digital Defence Layer

The most expansive technical category, with 34 controls, directly aligned with modern security frameworks such as Zero Trust.

Key controls include:

ControlTitleWhat It Requires
A.8.2Privileged access rightsControlled allocation and use of admin privileges
A.8.5Secure authenticationMFA and strong authentication for all systems
A.8.8Management of technical vulnerabilitiesVulnerability scanning and patch management
A.8.10Information deletionNew in 2022 – secure and compliant data disposal
A.8.11Data maskingNew in 2022 – protection of sensitive data in non-production environments
A.8.12Data leakage preventionNew in 2022 – controls preventing unauthorised data exfiltration
A.8.16Monitoring activitiesNew in 2022 – ongoing oversight of systems and user behaviour
A.8.23Web filteringNew in 2022 – controls on access to malicious web content
A.8.25Secure development life cycleSecurity requirements across the full SDLC
A.8.28Secure codingNew in 2022 – embedding security into software development
A.8.34Protection of information systems during audit testingSafeguards during audit activities

Simplify ISO 27001 Compliance Today

Achieve ISO 27001 compliance faster with Mitigata’s expert led compliance readiness services.

ISO 27001 2022 New Controls: 11 Additions You Need to Know

The ISO 27001:2022 update streamlined Annex A from 114 controls (in the 2013 version) to 93 controls, which were divided into four intuitive categories. The following are the new controls:

New ISO 27001 ControlWhy It Matters
Threat IntelligenceProactive identification of emerging threat actors and TTPs
Data MaskingProtects sensitive data in non-production environments
Data Leakage Prevention (DLP)Stops unauthorised exfiltration of sensitive information
Web FilteringControls access to malicious or non-compliant web content
Secure CodingEmbeds security into the software development process
ICT Readiness for Business ContinuityEnsures IT systems support recovery and resilience plans
Remote Working SecurityAddresses risks of distributed and hybrid work models
Physical Security MonitoringSurveillance of sensitive areas for unauthorised access
Configuration ManagementSecure baseline configurations for hardware and software
Information DeletionEnsures secure and compliant data disposal
Monitoring ActivitiesOngoing oversight of systems and user behaviour

The Statement of Applicability: The Most Critical Document in ISO 27001

When you’re undergoing your information security risk treatment process, you need to go through Annex A to determine what controls your specific organisation needs and verify that no necessary controls have been omitted.

The output of that process is the Statement of Applicability (SoA), the single most important document in your ISO 27001 certification.

Your SoA must document every one of the 93 Annex A controls with:

  • Applicability decision — included or excluded from your ISMS
  • Justification — why each decision was made, tied to your risk assessment
  • Implementation status — planned, in progress, or operational
  • Control owner — the named individual responsible

Struggling with compliance delays? The right ISO 27001 tools can simplify and speed up everything.

How to Build an Effective ISO 27001 Controls Checklist

Building an ISO 27001 controls checklist involves five steps: conducting a formal risk assessment, mapping identified risks to Annex A controls, documenting applicability decisions in your Statement of Applicability, implementing selected controls with measurable KPIs and named ownership, and establishing continuous monitoring and internal audit cycles.

Follow these five steps:

  1. Conduct a formal risk assessment to identify threats and vulnerabilities
  2. Mapping identified risks to relevant Annex A controls
  3. Document applicability decisions in the Statement of Applicability (SoA)
  4. Implement selected controls with measurable KPIs and ownership
  5. Establish continuous monitoring, internal audit, and management review cycles

Fast-Track Your ISO 27001 Readiness

Get audit-ready frameworks, expert guidance, and faster ISO 27001 certification outcomes.

Common ISO 27001 Implementation Mistakes to Avoid

The following are the common ISO 27001 Implementation mistakes to avoid:

  • Treating Annex A as a checkbox exercise rather than a risk-driven process
  • Implementing all 93 controls without a risk assessment to justify inclusion
  • Ignoring documentation requirements, an incomplete SoA is a top audit failure reason
  • Neglecting continuous monitoring and assuming a one-time implementation is sufficient
  • Overlooking the 11 new ISO 27001 2022 controls when migrating from the 2013 standard

Conclusion

The 2022 update modernised the standard for today’s threat environment: cloud security, remote work, AI-driven threats, and data leakage are now explicitly addressed. The 11 new controls reflect gaps in the 2013 standard that real-world attacks have exploited.

If your organisation is still operating under a 2013 certification, the transition deadline has passed. Act now.

Talk with our experts today and accelerate your ISO 27001 compliance.

Frequently Asked Questions (FAQs)

1. How many controls are in ISO 27001:2022?

ISO 27001:2022 Annex A contains 93 controls organised into 4 categories: Organisational (37), People (8), Physical (14), and Technological (34). This is a reduction from 114 controls in the 2013 version.

2. What were the 14 controls of ISO 27001?

The ’14 controls’ reference the 14 domain-based clauses in ISO 27001:2013, ranging from Information Security Policies (A.5) to Compliance (A.18). These have been consolidated into 4 streamlined categories in the 2022 update.

3. What are the new ISO 27001 controls in 2022?

ISO 27001:2022 introduced 11 new controls, including Threat Intelligence, Data Masking, Data Leakage Prevention, Web Filtering, Secure Coding, ICT Readiness for Business Continuity, Remote Working, and Physical Security Monitoring.

4. Is it mandatory to implement all 93 Annex A controls?

No. ISO 27001 is a risk-based framework. Organisations must select applicable controls based on their risk assessment and justify the inclusion or exclusion of each control in their Statement of Applicability (SoA).

5. What is an ISO 27001 controls checklist?

An ISO 27001 controls checklist is a structured document mapping all Annex A controls to your organisation’s risk profile, implementation status, responsible owner, and audit evidence. It is a core component of certification readiness.

6. When must organisations transition to ISO 27001:2022?

Organisations certified under ISO 27001:2013 had until October 31, 2025, to transition to the 2022 version. New certifications are issued only under the 2022 standard.

Sarang

Sarang Ashokan is a cybersecurity content writer at Mitigata. He writes SEO-focused content that breaks down complex security topics into clear, easy-to-understand ideas. His work helps businesses make sense of cyber risks and stay better prepared, whether they come from a technical background or not.

Leave a Reply

Your email address will not be published. Required fields are marked *