Skip to main content

ISO 27001

Also known as: ISO/IEC 27001, ISO27001

International standard that defines the requirements for an information security management system (ISMS), including risk assessment, control selection, and management review.

Written by Askara Solutions editorial team · Updated

ISO 27001 is the international standard for information security management. For a growing European company, it is increasingly the document a customer or partner asks for before they sign. The 2022 revision is the version auditors look at; earlier versions are accepted in some jurisdictions during transition windows.

The standard does not prescribe specific controls. It requires that you operate an information security management system (the ISMS) and that the controls you select are traceable to the risks your business actually faces. That second requirement is the part most organisations underestimate. Getting certified is not a matter of ticking the 93 controls in Annex A; it is a matter of explaining, on the record, why you chose the ones you chose and why the rest are not material.

Most certification bodies expect to see four artefacts before they will run a Stage 1 audit: an information security policy, a risk register, a Statement of Applicability, and evidence that the management review cycle has run at least once. The Askara Solutions agent walks your team through the work that produces those artefacts so the certificate reflects what your organisation actually does, not what a consultant prepared on its behalf.

Related terms

  • Information Security Management System

    The documented set of policies, procedures, and accountability that an organisation uses to manage information-security risk over time.

  • Annex A

    The catalogue of 93 information security controls in ISO/IEC 27001:2022, organised into four themes (organisational, people, physical, technological), referenced from the Statement of Applicability.

  • Statement of Applicability

    ISO 27001 document that records, for every Annex A control, whether it is applied, why it is applied, and what evidence demonstrates that it operates.

  • Risk Assessment

    The structured process of identifying threats, estimating likelihood and impact, and producing a defensible record of which risks the organisation accepts, treats, or transfers.