Skip to content

ISO 27001

Implement and maintain ISO 27001:2022 certification with CyberOrigen.

Overview

ISO 27001 is the international standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive company information.

Structure

ISMS Requirements (Clauses 4-10)

ClauseTitle
4Context of the Organization
5Leadership
6Planning
7Support
8Operation
9Performance Evaluation
10Improvement

Annex A Controls

93 controls across 4 themes:

ThemeControls
Organizational37 controls
People8 controls
Physical14 controls
Technological34 controls

Control Categories

A.5 - Organizational Controls

ControlTitle
A.5.1Policies for information security
A.5.2Information security roles
A.5.3Segregation of duties
A.5.7Threat intelligence
...(37 total)

A.6 - People Controls

ControlTitle
A.6.1Screening
A.6.2Terms and conditions
A.6.3Awareness, education, training
...(8 total)

A.7 - Physical Controls

ControlTitle
A.7.1Physical security perimeters
A.7.4Physical security monitoring
A.7.9Security of assets off-premises
...(14 total)

A.8 - Technological Controls

ControlTitle
A.8.1User endpoint devices
A.8.5Secure authentication
A.8.7Protection against malware
A.8.9Configuration management
A.8.12Data leakage prevention
A.8.15Logging
A.8.16Monitoring activities
A.8.24Use of cryptography
...(34 total)

Getting Started

1. Enable Framework

  1. Go to GRCFrameworks
  2. Click Enroll on ISO 27001:2022
  3. Click Enable

2. Statement of Applicability

Define which controls apply:

  1. Go to GRCControl Library
  2. Filter by ISO 27001
  3. Mark controls as:
    • Applicable (implement)
    • Not Applicable (with justification)

3. Risk Assessment

  1. Go to GRCRisk Register
  2. Identify information security risks
  3. Assess likelihood and impact
  4. Define treatment plans

Key Controls

Technical Controls

CyberOrigen helps with:

ControlCyberOrigen Feature
A.8.7 Malware protectionQuarantine management
A.8.8 Vulnerability management11-phase scanning
A.8.9 Configuration managementConfiguration checks
A.8.15 LoggingAudit log tracking
A.8.24 CryptographyTLS/encryption scanning

Organizational Controls

Document management for:

ControlEvidence Type
A.5.1 PoliciesPolicy management
A.5.2 RolesRACI matrix
A.5.23 Third-partyVendor management

Certification Process

Stage 1 Audit

Documentation review:

  • ISMS scope
  • Risk assessment methodology
  • Statement of Applicability
  • Policies and procedures

Stage 2 Audit

Implementation verification:

  • Control testing
  • Evidence review
  • Interviews
  • Site visits

Surveillance Audits

Annual audits to maintain certification:

  • Subset of controls tested
  • Corrective action follow-up
  • Continuous improvement review

Evidence Collection

Automated Evidence

  • Vulnerability scan results
  • Configuration assessments
  • Access reviews
  • Log exports

Manual Evidence

  • Policies and procedures
  • Risk assessment records
  • Training records
  • Management reviews

Control Mapping

ISO 27001 maps to other frameworks:

ISO 27001SOC 2PCI-DSS
A.5.1CC1.412.1
A.8.5CC6.18.1
A.8.8CC7.16.1
A.8.24CC6.73.4

Continuous Compliance

ISMS Maintenance

  • Monthly: Review metrics and incidents
  • Quarterly: Internal audit sample
  • Annually: Management review, full internal audit
  • 3-Year: Recertification audit

CyberOrigen Monitoring

  • Real-time compliance score
  • Control status tracking
  • Evidence freshness alerts
  • Risk register updates

Common Gaps

ControlIssueSolution
A.5.1Outdated policiesPolicy review schedule
A.6.3No security trainingTraining program
A.8.8Vulnerability backlogRemediation SLAs
A.8.15Incomplete loggingLog aggregation

Resources

Agentic AI-Powered Security & Compliance