Skip to main content

Annex A

Also known as: ISO 27001 Annex A, Annex A Controls

The catalogue of 93 information security controls in ISO/IEC 27001:2022, organised into four themes (organisational, people, physical, technological), referenced from the Statement of Applicability.

Written by Askara Solutions editorial team · Updated

Annex A is the 93-control catalogue at the back of ISO/IEC 27001:2022. It replaces the 114-control structure of the 2013 edition and groups controls into four themes: organisational (37), people (8), physical (14), and technological (34). Each control has a reference number (A.5.1 through A.8.34), a one-line title, and a sentence-long objective.

The catalogue does not tell you which controls to implement. That decision is made in your Statement of Applicability, by reference to your risk assessment. A control that does not address a risk you have identified does not need to be applied; if it does and you choose not to apply it, the SoA records the justification.

The detailed implementation guidance for each Annex A control lives in the companion standard ISO/IEC 27002:2022. Auditors do not require organisations to follow 27002 in detail, but they do expect to see that the implementation of each applied control is recognisable as the same control 27002 describes. The Askara Solutions agent maintains the mapping between your risk register and the Annex A controls, so the SoA writes itself rather than being assembled from a template at the end.

Related terms

  • ISO 27001

    International standard that defines the requirements for an information security management system (ISMS), including risk assessment, control selection, and management review.

  • Statement of Applicability

    ISO 27001 document that records, for every Annex A control, whether it is applied, why it is applied, and what evidence demonstrates that it operates.

  • Information Security Management System

    The documented set of policies, procedures, and accountability that an organisation uses to manage information-security risk over time.

  • Risk Assessment

    The structured process of identifying threats, estimating likelihood and impact, and producing a defensible record of which risks the organisation accepts, treats, or transfers.

Authoritative sources

Where to read more.