Compliance/ISO 27001:2022

ISO/IEC 27001:2022

Crosswalk to NIST CSF 2.0 · 123 controls · Updated April 2026.

ISO/IEC 27001:2022 is the international standard for information security management systems (ISMS). It specifies requirements for establishing, operating, monitoring, and improving an ISMS, and includes 93 Annex A controls organized into four themes — Organizational, People, Physical, and Technological.

About ISO 27001:2022

ISO 27001:2022 restructured the Annex A controls that were in the 2013 edition — 93 controls in 4 themes replaces 114 controls in 14 domains. The change reflects modern practice: controls that were historically siloed (e.g., supplier relationships, cryptography) are now grouped by function rather than by domain.

Certification requires a formal ISMS with documented risk treatment, management review, and an internal audit program. Stage 1 and Stage 2 audits are conducted by an accredited certification body, typically on a three-year cycle with annual surveillance.

SecurityStack maps ISO 27001:2022 Annex A controls to NIST CSF 2.0 categories. Organizations pursuing ISO 27001 often start with NIST CSF as the internal framing then map to ISO for external certification.

Primary audience: International organizations, enterprise SaaS vendors selling into European markets, and any organization pursuing formal ISMS certification.

Controls by domain

123 controls across 6 groups. Mapping strengths to NIST CSF 2.0 categories are summarized below.

Main Body Clauses 15 controls
Control IDName
ISO-CL.10.1Clause 10.1 - Continual Improvement

Continual Improvement

ISO-CL.10.2Clause 10.2 - Nonconformity and Corrective Action

Nonconformity and Corrective Action

ISO-CL.4.1Clause 4.1 - Understanding the Organization and Its Context

Understanding the Organization and Its Context

ISO-CL.4.2Clause 4.2 - Understanding Needs/Expectations of Interested Parties

Understanding Needs/Expectations of Interested Parties

ISO-CL.5.2Clause 5.2 - Information Security Policy

Information Security Policy

ISO-CL.5.3Clause 5.3 - Organizational Roles, Responsibilities and Authorities

Organizational Roles, Responsibilities and Authorities

ISO-CL.6.1Clause 6.1 - Actions to Address Risks and Opportunities

Actions to Address Risks and Opportunities

ISO-CL.6.1.2Clause 6.1.2 - Information Security Risk Assessment

Information Security Risk Assessment

ISO-CL.6.1.3Clause 6.1.3 - Information Security Risk Treatment

Information Security Risk Treatment

ISO-CL.7.4Clause 7.4 - Communication

Communication

ISO-CL.8.1Clause 8.1 - Operational Planning and Control

Operational Planning and Control

ISO-CL.8.2Clause 8.2 - Information Security Risk Assessment (ongoing)

Information Security Risk Assessment (ongoing)

ISO-CL.8.3Clause 8.3 - Information Security Risk Treatment (ongoing)

Information Security Risk Treatment (ongoing)

ISO-CL.9.1Clause 9.1 - Monitoring, Measurement, Analysis and Evaluation

Monitoring, Measurement, Analysis and Evaluation

ISO-CL.9.3Clause 9.3 - Management Review

Management Review

Organizational Controls (A.5) 15 controls
Control IDName
ISO-A.5.11A.5.11 - Return of Assets

Return of Assets

ISO-A.5.12A.5.12 - Classification of Information

Classification of Information

ISO-A.5.13A.5.13 - Labelling of Information

Labelling of Information

ISO-A.5.14A.5.14 - Information Transfer

Information Transfer

ISO-A.5.22A.5.22 - Monitoring/Review/Change Mgmt of Supplier Services

Monitoring/Review/Change Mgmt of Supplier Services

ISO-A.5.23A.5.23 - Information Security for Use of Cloud Services (NEW 2022)

Information Security for Use of Cloud Services (NEW 2022)

ISO-A.5.24A.5.24 - Incident Management Planning and Preparation

Incident Management Planning and Preparation

ISO-A.5.3A.5.3 - Segregation of Duties

Segregation of Duties

ISO-A.5.32A.5.32 - Intellectual Property Rights

Intellectual Property Rights

ISO-A.5.34A.5.34 - Privacy and Protection of PII

Privacy and Protection of PII

ISO-A.5.35A.5.35 - Independent Review of Information Security

Independent Review of Information Security

ISO-A.5.37A.5.37 - Documented Operating Procedures

Documented Operating Procedures

ISO-A.5.4A.5.4 - Management Responsibilities

Management Responsibilities

ISO-A.5.5A.5.5 - Contact with Authorities

Contact with Authorities

ISO-A.5.6A.5.6 - Contact with Special Interest Groups

Contact with Special Interest Groups

People Controls (A.6) 5 controls
Control IDName
ISO-A.6.2A.6.2 - Terms and Conditions of Employment

Terms and Conditions of Employment

ISO-A.6.4A.6.4 - Disciplinary Process

Disciplinary Process

ISO-A.6.5A.6.5 - Responsibilities After Termination or Change of Employment

Responsibilities After Termination or Change of Employment

ISO-A.6.6A.6.6 - Confidentiality or Non-Disclosure Agreements

Confidentiality or Non-Disclosure Agreements

ISO-A.6.7A.6.7 - Remote Working

Remote Working

Physical Controls (A.7) 14 controls
Control IDName
ISO-A.7.1A.7.1 - Physical Security Perimeters

Physical Security Perimeters

ISO-A.7.10A.7.10 - Storage Media

Storage Media

ISO-A.7.11A.7.11 - Supporting Utilities

Supporting Utilities

ISO-A.7.12A.7.12 - Cabling Security

Cabling Security

ISO-A.7.13A.7.13 - Equipment Maintenance

Equipment Maintenance

ISO-A.7.14A.7.14 - Secure Disposal or Re-Use of Equipment

Secure Disposal or Re-Use of Equipment

ISO-A.7.2A.7.2 - Physical Entry

Physical Entry

ISO-A.7.3A.7.3 - Securing Offices, Rooms and Facilities

Securing Offices, Rooms and Facilities

ISO-A.7.4A.7.4 - Physical Security Monitoring (NEW 2022)

Physical Security Monitoring (NEW 2022)

ISO-A.7.5A.7.5 - Protecting Against Physical and Environmental Threats

Protecting Against Physical and Environmental Threats

ISO-A.7.6A.7.6 - Working in Secure Areas

Working in Secure Areas

ISO-A.7.7A.7.7 - Clear Desk and Clear Screen

Clear Desk and Clear Screen

ISO-A.7.8A.7.8 - Equipment Siting and Protection

Equipment Siting and Protection

ISO-A.7.9A.7.9 - Security of Assets Off-Premises

Security of Assets Off-Premises

Technological Controls (A.8) 18 controls
Control IDName
ISO-A.8.13A.8.13 - Information Backup

Information Backup

ISO-A.8.14A.8.14 - Redundancy of Information Processing Facilities

Redundancy of Information Processing Facilities

ISO-A.8.18A.8.18 - Use of Privileged Utility Programs

Use of Privileged Utility Programs

ISO-A.8.22A.8.22 - Segregation of Networks

Segregation of Networks

ISO-A.8.23A.8.23 - Web Filtering (NEW 2022)

Web Filtering (NEW 2022)

ISO-A.8.25A.8.25 - Secure Development Life Cycle

Secure Development Life Cycle

ISO-A.8.26A.8.26 - Application Security Requirements

Application Security Requirements

ISO-A.8.27A.8.27 - Secure System Architecture and Engineering Principles

Secure System Architecture and Engineering Principles

ISO-A.8.28A.8.28 - Secure Coding (NEW 2022)

Secure Coding (NEW 2022)

ISO-A.8.29A.8.29 - Security Testing in Development and Acceptance

Security Testing in Development and Acceptance

ISO-A.8.3A.8.3 - Information Access Restriction

Information Access Restriction

ISO-A.8.30A.8.30 - Outsourced Development

Outsourced Development

ISO-A.8.31A.8.31 - Separation of Development/Test/Production Environments

Separation of Development/Test/Production Environments

ISO-A.8.32A.8.32 - Change Management

Change Management

ISO-A.8.33A.8.33 - Test Information

Test Information

ISO-A.8.34A.8.34 - Protection of Info Systems During Audit Testing

Protection of Info Systems During Audit Testing

ISO-A.8.4A.8.4 - Access to Source Code

Access to Source Code

ISO-A.8.6A.8.6 - Capacity Management

Capacity Management

Ungrouped 56 controls
Control IDName
ISO-A.12.4Logging and monitoring

ISO ref: A.12.4

ISO-A.5.1Policies for information security

ISO ref: A.5.1

ISO-A.5.10Acceptable use of assets

ISO ref: A.5.10

ISO-A.5.15Access control

ISO ref: A.5.15

ISO-A.5.16Identity management

ISO ref: A.5.16

ISO-A.5.17Authentication information

ISO ref: A.5.17

ISO-A.5.18Access rights

ISO ref: A.5.18

ISO-A.5.19InfoSec in supplier relationships

ISO ref: A.5.19

ISO-A.5.2Information security roles and responsibilities

ISO ref: A.5.2

ISO-A.5.20Addressing InfoSec in supplier agreements

ISO ref: A.5.20

ISO-A.5.21Managing ICT supply chain

ISO ref: A.5.21

ISO-A.5.25Assessment and decision on information security events

ISO ref: A.5.25

ISO-A.5.26Response to information security incidents

ISO ref: A.5.26

ISO-A.5.27Learning from incidents

ISO ref: A.5.27

ISO-A.5.28Collection of evidence

ISO ref: A.5.28

ISO-A.5.29Information security during disruption

ISO ref: A.5.29

ISO-A.5.30ICT readiness for business continuity

ISO ref: A.5.30

ISO-A.5.31Legal/regulatory requirements

ISO ref: A.5.31

ISO-A.5.33Protection of records

ISO ref: A.5.33

ISO-A.5.36Compliance with policies

ISO ref: A.5.36

ISO-A.5.7Threat intelligence

ISO ref: A.5.7

ISO-A.5.8InfoSec in project management

ISO ref: A.5.8

ISO-A.5.9Inventory of information and assets

ISO ref: A.5.9

ISO-A.6.1Screening

ISO ref: A.6.1

ISO-A.6.3Information security awareness, education and training

ISO ref: A.6.3

ISO-A.6.8Information security event reporting

ISO ref: A.6.8

ISO-A.8.1User endpoint devices

ISO ref: A.8.1

ISO-A.8.10Information deletion

ISO ref: A.8.10

ISO-A.8.11Data masking

ISO ref: A.8.11

ISO-A.8.12Data leakage prevention

ISO ref: A.8.12

ISO-A.8.15Logging

ISO ref: A.8.15

ISO-A.8.16Monitoring activities

ISO ref: A.8.16

ISO-A.8.17Clock synchronization

ISO ref: A.8.17

ISO-A.8.19Installation of software on operational systems

ISO ref: A.8.19

ISO-A.8.2Privileged access rights

ISO ref: A.8.2

ISO-A.8.20Networks security

ISO ref: A.8.20

ISO-A.8.21Security of network services

ISO ref: A.8.21

ISO-A.8.24Use of cryptography

ISO ref: A.8.24

ISO-A.8.5Secure authentication

ISO ref: A.8.5

ISO-A.8.7Protection against malware

ISO ref: A.8.7

ISO-A.8.8Management of technical vulnerabilities

ISO ref: A.8.8

ISO-A.8.9Configuration management

ISO ref: A.8.9

ISO-Clause-10.1Continual improvement

ISO ref: Clause 10.1

ISO-Clause-10.2Nonconformity and corrective action

ISO ref: Clause 10.2

ISO-Clause-4.1Understanding the organization

ISO ref: Clause 4.1

ISO-Clause-4.2Understanding needs of interested parties

ISO ref: Clause 4.2

ISO-Clause-5.2Policy

ISO ref: Clause 5.2

ISO-Clause-5.3Organizational roles

ISO ref: Clause 5.3

ISO-Clause-6.1Actions to address risks

ISO ref: Clause 6.1

ISO-Clause-6.1.2Information security risk assessment

ISO ref: Clause 6.1.2

ISO-Clause-6.1.3Risk treatment plan

ISO ref: Clause 6.1.3

ISO-Clause-7.4Communication

ISO ref: Clause 7.4

ISO-Clause-8.3Information security risk treatment

ISO ref: Clause 8.3

ISO-Clause-8.4Business continuity planning

ISO ref: Clause 8.4

ISO-Clause-9.1Monitoring, measurement, analysis

ISO ref: Clause 9.1

ISO-Clause-9.3Management review

ISO ref: Clause 9.3

Crosswalk density to NIST CSF 2.0

Top 12 NIST CSF categories by number of ISO 27001:2022 controls mapped. The distribution tells you where the framework's emphasis sits against NIST's six functions.

NIST categoryControls mapped
PR.AA8
PR.PS7
PR.IR7
PR.DS6
GV.OC6
RC.CO5
RC.RP5
GV.OV5
ID.IM5
GV.RM5
DE.CM5
GV.PO4

Frequently asked questions

What changed between ISO 27001:2013 and 2022?

The main body clauses (4-10) are largely unchanged. Annex A was significantly restructured: 114 controls in 14 domains became 93 controls in 4 themes (Organizational, People, Physical, Technological). Eleven controls are new, including explicit controls for cloud services, data masking, threat intelligence, and configuration management.

Do I need both ISO 27001 and SOC 2?

Not necessarily, but many SaaS vendors get both. ISO 27001 is stronger internationally; SOC 2 is the de facto expectation for U.S. buyers. The underlying controls overlap substantially — maintaining both is roughly 1.3× the effort of maintaining one, not 2×.

How long does certification take?

From a standing start, 12–18 months is typical. The work splits roughly into ISMS documentation (3–6 months), control implementation and evidence gathering (6–9 months), and formal certification audit (Stage 1 + Stage 2 over ~2 months). Organizations with an existing security program can compress this significantly.

Next

See your stack against ISO 27001:2022

Start a free assessment, select ISO 27001:2022 as a required framework, and see which controls your current tools already cover — and which gaps need new investment.