Welcome to Amtivo in the US, formerly Orion, ASR, CMA, Audit3 and QSR.

Orion Logo ASR Logo CMA - Amtivo Quality Systems Registrars Inc. Logo

ISO 27001 Clauses 4-10—Technical Requirements Detailed

Get Started Today

  • Located nationwide
  • Save time & money
  • No extra or hidden fees

Request a Quote

Implementing the Requirements of ISO/IEC 27001:2022 To Help Demonstrate Conformanceand Achieve Certification

To successfully achieve and retain ISO/IEC 27001 certification, it is a critical success factor for organizations to properly understand its technical and mandatory requirements. As a result, they must establish, operate, maintain and continually improve a conformant Information Security Management System (ISMS) in an effective and efficient manner.   

The following information explores ISO/IEC 27001, providing insights into the standard’s clauses and controls and their requirements to achieve conformance and also explains the documentation your ISMS will be audited against during an ISO certification audit. It focuses on the technical requirements of ISO 27001—ideal if you are ready to learn more about the specifics.  

If you’re just starting out and looking for a high-level overview of what ISO 27001 is and why it matters, we recommend heading over to our Beginner’s Guide to ISO 27001 instead. 

  • Summary Insights into ISO/IEC 27001 Requirements 
  • ISMS Management Components 
  • Annex A Information Security Controls Reference 
  • Key Documents Auditors Commonly Reference 
  • Useful Resources 
  • Get Started on your ISO/IEC 27001 Certification Journey 

 

Summary Insights Into ISO/IEC 27001 Requirements

ISO/IEC 27001 is divided into two components, or parts: 

1. Mandatory “Management” or “ISMS” component (Clauses 4 to 10)

This part contains approximately 140-150 requirements for setting up, running, maintaining, and continually improving an Information Security Management System. These are the core requirements that every organization must follow to be in line with the standard.  

2. Annex A information security controls (Clauses 5 to 8)   

This part contains ninety-three potential controls – practical measures or actions that help reduce risks to information and systems. You do not need to use all of them. The ones you choose depend on what comes out of your risk assessment and planning process (Clause 6).  

Although ISO/IEC 27001 includes Clauses 1 to 3, these clauses do not contain any conformance requirements. They explain the scope, give references, and define terms. They do not include any requirements for certification, meaning they can be safely ignored when focusing on the core requirements.  

The table below summarizes ISO/IEC 27001’s Clauses 4 to 10 and the Annex A information security controls reference Clauses 5 to 10including identification of mandatory documentation. 

 

ISMS/Management Component:

Clause 

Summary of ISO/IEC 27001 Requirements

Mandatory-Only Documentation 

Clause 4 Context of the organization 

This clause in ISO/IEC 27001 asks organizations to consider both external and internal factors that could affect how they manage information security. It also asks you to understand the needs and expectations of stakeholders, and to identify any key relationships or dependencies. All of this is considered when defining the scope of your ISMS.

Your ISMS scope sets the boundaries for which data and information will be protected under the system, and which will not. This applies no matter where the information is stored or accessed, whether it is in your offices, in the cloud, or from a remote location.

ISO/IEC 27001 refers to the scope as the “boundary and applicability” of the ISMS. In simple terms, it is about being clear on what is included in your security efforts, and what sits outside of them.

The ISMS Scope. 

Clause 5 Leadership 

ISO/IEC 27001 is frequently referred to as a “top-down management driven” management system. One of the standard’s key clauses outlines what is expected from top management. It requires them to show clear leadership and commitment, set and share a high-level Information Security Policy, and make sure that everyone involved in the ISMS knows their roles, responsibilities and authority. In short, it is about strong governance and clear communication from the top.

An Information Security Policy. 

Clause 6 Planning 

As the clause title indicates, organizations are required to plan the establishment and implementation of their ISMS.

This involves identifying and addressing risks and opportunities, assessing, and treating information security risks, setting clear information security objectives, and planning for change.

These objectives should be communicated effectively and, where practical, monitored and measured, taking into account security requirements as well as the outcomes of risk assessments and treatments.

Plans should be developed to achieve these objectives, detailing the “what,” “how,” “when,” and “who.”

Additionally, any changes to the ISMS must be managed in a planned and controlled manner.  

Information security risk assessment process. 

Information security risk treatment process. 

Information security objectives. 

Clause 7 Support 

Another well-named clause in ISO/IEC 27001 sets out what is needed to properly support an ISMS.

This includes making sure the organization provides enough time, people, funding, information, and infrastructure to run it effectively.

It also covers the competence of personnel, with a requirement to take action if someone lacks the necessary skills.

Everyone in the organization must have a basic level of information security awareness. On top of that, communication around the ISMS must be planned and purposeful, and the management of ISMS-related documents (known as “documented information”) needs to be handled in a clear, efficient, and effective way.

Evidence of competence (for all relevant ISMS roles). 

Clause 8 Operation 

Building on previous clause requirements which establish and implement an ISMS, organizations now need to operate and maintain (including continual improvement) their ISMS.

Clause 8 focuses on putting the ISMS into action. It outlines what is needed to run the system day to day and make sure it meets the standard’s requirements and supports your organization’s ISMS objectives.

This includes planning, implementing, and controlling all relevant processes. To do this, you need to set clear criteria for how processes should work and make sure they are followed.

The clause also highlights the need to manage changes effectively, oversee any outsourced processes, and keep up with ongoing risk assessment and treatment.

The results of operationalised risk assessment and treatment. 

Additionally, optional documentation can be generated to underpin organizational confidence that ISMS processes are carried out as planned. 

Clause 9 Performance evaluation 

This clause focuses on using data and insight to support continual improvement of the ISMS. It sets out requirements for monitoring, measuring, analysing and evaluating how the system is performing. The organization decides what to monitor, how to do it, when it should happen and who is responsible. 

It also covers the need for internal audits and regular management reviews at planned intervals. 

In short, this clause asks organizations to review how well their ISMS is working, and whether it continues to be suitable, effective and fit for purpose. 

The results of monitoring, measurement, analysis and evaluation. 

A fully documented internal audit program. 

The results of ISMS review by Top Management. 

Clause 10 Improvement 

Building on the results from performance evaluation in Clause 9, this final mandatory clause focuses on continual improvement of the ISMS. 

It requires organizations to regularly review how suitable, adequate and effective their ISMS is. It also covers how to handle nonconformities when something doesn’t meet the standard by taking the right corrective action

Nonconformities might be spotted during internal or external audits, reviews of security incidents, or day-to-day observations. Addressing these issues properly is a key part of keeping the ISMS effective over time.  

Nonconformities (the nature of), corrective actions and their results. 

 

Annex A Information Security Controls Reference

IMPORTANT NOTE: The controls provided in Annex A are NOT MANDATORY as the standard specifies that organizations can design their own controls as required or identify them from any source—of course including from Annex A. Irrespective of the source of an organization’s controls, they are only implemented when determined necessary to implement risk treatment options (in response to analyzed unacceptable risk to the confidentiality, integrity and availability of organizational information and information processing facilities).

Clause 

Summary of Requirements 

Example, typical or suggested/inferred documentation 

Clause 5 Organizational controls (37 Controls)

This group includes 37 controls that are organizational in nature. They focus on managing risks linked to governance, management, and day-to-day operations rather than technical systems, people, or physical security.

Like all Annex A controls, these can be preventive, detective and/or corrective in how they work. 

Examples include controls related to information security governance (policies, procedures, roles and responsibilities, segregation of duties, contacts, etc.), threat intelligence, asset management, Identity and Access Management (IAM), supplier relations, information security incident management, legal, statutory, regulatory and contractual requirements (including IP, record and PII protection, independent review and compliance). 

Information security and topic-specific policies. 

Inventory of assets. 

Rules for acceptable use of assets (mandatory). 

Information classification and labelling procedures. 

Rules for physical and logical access. 

Supplier agreements (to include organizational information security requirements). 

Information security incident management procedures (mandatory). 

Information security continuity (plans, testing, etc.). 

Legal, statutory, regulatory and contractual requirements and approach to compliance (mandatory). 

Documented information process and information process facilities operating procedures (mandatory). 

Clause 6 People controls (8 Controls) 

This section includes 8 controls that are HR-related. They focus on managing risks connected to people in the organization and how they interact with information and the systems used to process it. 

Like all Annex A controls, these can be preventive, detective and/or corrective in how they work. 

Examples include controls related to pre-employment (screening, terms and conditions, confidentiality/NDAs), during employment (awareness, disciplinary process, remote working, incident reporting) and personnel termination (responsibilities after termination or change). 

Personnel terms and conditions of employment (including information security responsibilities). 

Formal disciplinary process. 

Confidentiality or non-disclosure agreements (mandatory). 

Remote working requirements. 

Clause 7 Physical controls (14 Controls) 

Contains a selection of 14 controls designed to primarily respond to or modify risks associated with the physical site and environment.  

Like all Annex A controls, these can be preventive, detective and/or corrective in how they work. 

Examples include controls for physical perimeter, entry and the internal security of offices, rooms and facilities (all including monitoring), procedures for working in secure areas, protection of all physical assets (onsite and offsite), equipment maintenance, secure disposal and clear desk and screen. 

Building and services schematics. 

Procedures for working in secure areas. 

Rules for clear desks and screens. 

Rules for the management of the lifecycle of storage media (can be related to organizational asset management controls, including classification and labelling). 

Equipment maintenance agreements and records (can be related to organizational supplier relation controls). 

Clause 8 Technological controls (34 Controls) 

Contains a selection of 34 controls designed to primarily respond to or modify risks associated with the use of technology.   

As with all Annex A controls, they have preventive, detective and/or corrective attributes. 

Examples include controls for IT operations (configuration management, capacity management, end point device management, information and utility access restrictions, authentication, malware protection, technical vulnerability management, backup, data masking and leakage prevention, redundancy, logging and monitoring), network operations (network security, services, segregation, filtering), cryptography, secure software development (lifecycle, policy, principles, coding, testing, outsourcing) and change management. 

Technical vulnerability management process and procedures. 

Configuration management (mandatory). 

Backup policy. 

Logging and monitoring procedures and activities. 

Network diagrams. 

Rules for secure development (lifecycle and secure coding). 

Change management procedure or process. 

 

What To Expect From the ISO/IEC 27001 Certification Process

Undertaking ISO/IEC 27001 certification is a strategic investment, helping you improve your organization’s information security management. 

Your journey begins with a Stage 1 Audit by a qualified auditor, who will assist with the readiness of your ISMS and identify, if necessary, any potential nonconformities. Your organization will then implement any necessary changes before continuing the certification process. 

Once the identified issues are addressed, your organization will progress to the Stage 2 Audit. On successful completion, you will be awarded ISO/IEC 27001 certificationdemonstrating that your organization takes information security seriously and manages it to a recognized international standard. 

Amtivo in the U.S. is an ANAB-accredited certification body for ISO certifications, with proven expertise to provide services to support your business “journey” towards successful ISO certifications. The ANSI National Accreditation Board (ANAB)  is the national body with responsibility for the accreditation of certification bodies in the United States. 

 

Key Documents Auditors Commonly Reference

Our Auditors will reference the following documents to audit your ISMS, as set out by the International Accreditation Forum (IAF), International Organization for Standardization (ISO), and the International Electrotechnical Commission (IEC): 

Standard

Title

Purpose (in relation to ISO/IEC 27001:2022)

Certifiable standard:

   

ISO/IEC 27001:2022

Information security, cybersecurity, and privacy protection—Information security management systems—Requirements

The core standard that specifies the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It is the certifiable standard organizations are audited against.

Supporting standards that auditors often refer to:

   

ISO/IEC 27002:2022

Information security, cybersecurity, and privacy protection—Information security controls

Provides detailed guidance on the controls listed in Annex A of ISO/IEC 27001. Used to help organizations implement and interpret the required security controls.

ISO/IEC 27005:2022

Information security, cybersecurity, and privacy protection—Guidance on information security risk management

Offers comprehensive guidance on risk management tailored for ISMS implementation. It supports the risk assessment and treatment processes required by ISO 27001 (Clause 6.1).

ISO/IEC 27007:2020

Guidelines for information security management systems auditing

Provides guidance on auditing ISMSs and on the competence of ISMS auditors. It complements ISO 19011 and is primarily used by auditors performing ISO 27001 audits.

Audit governance standards that guide how certification bodies operate:

   

ISO/IEC 27006-1:2024

Requirements for bodies providing audit and certification of information security management systems

Specifies requirements for certification bodies performing ISO/IEC 27001 audits to ensure consistency, competence, and impartiality. It operationalizes ISO/IEC 17021-1 for ISMS certification.

ISO/IEC 17021-1:2015

Conformity assessment—Requirements for bodies providing audit and certification of management systems—Part 1: Requirements

The generic framework for all management system certification schemes. It defines how certification bodies must manage impartiality, competence, audit processes, and certification decisions—applicable to ISO 27001 through ISO/IEC 27006-1.

ISO 19011:2018

Guidelines for auditing management systems

Provides generic principles and guidance for auditing all types of management systems. It serves as the foundation for audit processes, upon which ISO/IEC 27007 builds for ISMS-specific auditing.

   

Contact Us to Get Started 

Start your journey to ISO 27001 certification todayget a quote or contact our team to discuss your needs. 

Useful Resources

How to get ISO 27001

How to Get ISO 27001 Certification

Discover how to get ISO 27001 and enjoy the advantages for your business. Read our guide on achieving ISO 27001 certification.
How much does ISO 27001 cost

How Much Does ISO 27001 Certification Cost?

A guide to the costs of ISO 27001 certification for your organization, covering audits, consultants, and ongoing maintenance fees.
cybersecurity_template

Cybersecurity Policy Template

Get our free Cybersecurity Policy template. Secure systems, reduce risk and align with ISO 27001, 9001 & 20000-1.
Steps to Compliance ISO 27001

ISO 27001 Checklist – 10 steps to compliance

A step-by-step guide to implementing ISO 27001 in your organization, from planning to certification.

Get Started on Your Certification Journey Now

Your certification costs will depend on the size of your business, location, and the sector you’re in.

footerCta amtivo group