ISO 27001:2022 Controls¶
Note
Controls not covered below are controls which cannot be fulfilled by Welkin. These include requirements such as:
- Your management team needs to regularly perform various risk analysis.
- You need to do background checks when recruiting.
- You need to activate multi-factor authentication in your Identity Provider.
- You need to have a policy on how to safely use USB sticks.
- Requirements which fall under the scope of the application.
ISO/IEC 27001:2022 is the latest version of the international standard for Information Security Management Systems (ISMS). It provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.
ISO/IEC 27001:2022 is structured around a risk-based approach, where organizations must identify and mitigate security risks through a set of well-defined controls. These controls are detailed in Annex A and includes 93 controls categorized into four key themes:
- Organizational Controls (37 controls) – Covering governance, policies, roles, and responsibilities, such as information security roles, supplier relationships, and threat intelligence.
- People Controls (8 controls) – Focused on human factors, including security awareness training, screening, and disciplinary processes.
- Physical Controls (14 controls) – Addressing physical security measures like access controls, equipment security, and environmental protections.
- Technological Controls (34 controls) – Covering cybersecurity measures such as encryption, identity management, and network security.
Welkin can help your organization implement some of these control.
Important
Many ISO 27001:2022 controls apply to your organization. Being a product, Welkin cannot help you implement all of them. For example, "Annex A 6 People Controls" is something your HR department should be tasked with and is outside the scope of Welkin. Controls which are not mentioned below are outside the scope of Welkin as an application platform.
Click on the links below to navigate the documentation by control.
ISO 27001 Annex A 5.1 Policies for Information Security¶
ISO 27001 Annex A 5.3 Segregation of Duties¶
ISO 27001 Annex A 5.15 Access Control¶
ISO 27001 Annex A 5.16 Identity Management¶
ISO 27001 Annex A 5.19 Information Security in Supplier Relationships¶
ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements¶
ISO 27001 Annex A 5.21 Managing Information Security in the ICT Supply Chain¶
ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation¶
ISO 27001 Annex A 5.30 ICT Readiness for Business Continuity¶
ISO 27001 Annex A 5.32 Intellectual Property Rights¶
ISO 27001 Annex A 5.34 Privacy and Protection of PII¶
ISO 27001 Annex A 5.36 Compliance With Policies, Rules and Standards for Information Security¶
ISO 27001 Annex A 7 Physical Controls¶
ISO 27001 Annex A 8.2 Privileged Access Rights¶
ISO 27001 Annex A 8.5 Secure Authentication¶
ISO 27001 Annex A 8.6 Capacity Management¶
ISO 27001 Annex A 8.7 Protection Against Malware¶
ISO 27001 Annex A 8.8 Management of Technical Vulnerabilities¶
ISO 27001 Annex A 8.9 Configuration Management¶
ISO 27001 Annex A 8.10 Information Deletion¶
ISO 27001 Annex A 8.12 Data Leakage Prevention¶
ISO 27001 Annex A 8.13 Information Backup¶
ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities¶
ISO 27001 Annex A 8.15 Logging¶
ISO 27001 Annex A 8.16 Monitoring Activities¶
ISO 27001 Annex A 8.17 Clock Synchronization¶
ISO 27001 Annex A 8.18 Use of Privileged Utility Programs¶
ISO 27001 Annex A 8.20 Networks Security¶
ISO 27001 Annex A 8.21 Security of Network Services¶
ISO 27001 Annex A 8.22 Segregation of Networks¶
ISO 27001 Annex A 8.23 Web filtering¶
ISO 27001 Annex A 8.24 Use of Cryptography¶
ISO 27001 Annex A 8.25 Secure Development Life Cycle¶
ISO 27001 Annex A 8.27 Secure System Architecture and Engineering Principles¶
ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance¶
ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments¶
ISO 27001 Annex A 8.32 Change Management¶
ISO 27001 Annex A 5.37 Documented Operating Procedures¶
The whole Welkin documentation contributes to this control.