Skip to content

ISO 27001:2022 Controls

Note

Controls not covered below are controls which cannot be fulfilled by Welkin. These include requirements such as:

  • Your management team needs to regularly perform various risk analysis.
  • You need to do background checks when recruiting.
  • You need to activate multi-factor authentication in your Identity Provider.
  • You need to have a policy on how to safely use USB sticks.
  • Requirements which fall under the scope of the application.

ISO/IEC 27001:2022 is the latest version of the international standard for Information Security Management Systems (ISMS). It provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.

ISO/IEC 27001:2022 is structured around a risk-based approach, where organizations must identify and mitigate security risks through a set of well-defined controls. These controls are detailed in Annex A and includes 93 controls categorized into four key themes:

  1. Organizational Controls (37 controls) – Covering governance, policies, roles, and responsibilities, such as information security roles, supplier relationships, and threat intelligence.
  2. People Controls (8 controls) – Focused on human factors, including security awareness training, screening, and disciplinary processes.
  3. Physical Controls (14 controls) – Addressing physical security measures like access controls, equipment security, and environmental protections.
  4. Technological Controls (34 controls) – Covering cybersecurity measures such as encryption, identity management, and network security.

Welkin can help your organization implement some of these control.

Important

Many ISO 27001:2022 controls apply to your organization. Being a product, Welkin cannot help you implement all of them. For example, "Annex A 6 People Controls" is something your HR department should be tasked with and is outside the scope of Welkin. Controls which are not mentioned below are outside the scope of Welkin as an application platform.

Click on the links below to navigate the documentation by control.

ISO 27001 Annex A 5.1 Policies for Information Security

ISO 27001 Annex A 5.3 Segregation of Duties

ISO 27001 Annex A 5.15 Access Control

ISO 27001 Annex A 5.16 Identity Management

ISO 27001 Annex A 5.19 Information Security in Supplier Relationships

ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements

ISO 27001 Annex A 5.21 Managing Information Security in the ICT Supply Chain

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation

ISO 27001 Annex A 5.30 ICT Readiness for Business Continuity

ISO 27001 Annex A 5.32 Intellectual Property Rights

ISO 27001 Annex A 5.34 Privacy and Protection of PII

ISO 27001 Annex A 5.36 Compliance With Policies, Rules and Standards for Information Security

ISO 27001 Annex A 7 Physical Controls

ISO 27001 Annex A 8.2 Privileged Access Rights

ISO 27001 Annex A 8.5 Secure Authentication

ISO 27001 Annex A 8.6 Capacity Management

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9 Configuration Management

ISO 27001 Annex A 8.10 Information Deletion

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15 Logging

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.17 Clock Synchronization

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001 Annex A 8.20 Networks Security

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001 Annex A 8.23 Web filtering

ISO 27001 Annex A 8.24 Use of Cryptography

ISO 27001 Annex A 8.25 Secure Development Life Cycle

ISO 27001 Annex A 8.27 Secure System Architecture and Engineering Principles

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32 Change Management

ISO 27001 Annex A 5.37 Documented Operating Procedures

The whole Welkin documentation contributes to this control.