By Richard Nealon
The 27001 Standard was so well written (along with its accompanying set of 27002 controls) in its last two iterations (2005 & 2013), that it almost remained the same up until 2022. In February 2022 a new version of 27002 was launched and in October 2022 a new version of 27001.
Companies that are currently certified under the 2013 version of the standard have until 2025 to migrate to the new version of the standard. This is a mandatory migration to retain the certification. The timeframe may seem ample, but prompt action is crucial to ensure a seamless transition.
So what has changed in the new version?
The controls in 27002 have been “sorted” into four new key areas, now called Themes, instead of the old 18 “Domain” model set:
The controls have been realigned – in many cases, they’ve been merged (where they would have spanned more than one domain in the 2013 model (e.g Storage Media which would have been covered by 08.3.1, 08.3.2, 08.3.3 and 11.2.5)). Some controls have rationalised and some newer controls (mainly addressing advances and changes in computing practices) have been introduced, namely:
In reality, many of these controls may have been addressed by businesses since they’ve become introduced. In some cases, the business may have already considered (1) some of these controls and found that the risk associated with not doing them falls comfortably within the organisation’s risk appetite/risk tolerance. The rationalisation, and adding of new controls has resulted in an overall reduction in the numbers of controls from 114 to 93 (but that’s only structural – nothing substantive has really been removed).
The second big change has been the addition of “Attributes” (not a word I favour because it could lead to confusion with other security related meanings of the word e.g. NIST, SABSA, where attribute means something completely different). These ISO Attributes are broken down into five categories
These attributes are really designed to give a “view” of each control and can be really useful in assessing whether controls are required, effective, and/or allocated. They can be a useful tool in the production of metrics for management, auditors & regulators, and can be used to demonstrate effective risk management. Of course, organisations are not limited to just these attributes – they can define their own as well.
That’s all really. The controls are laid out in pretty much the same way :
If you’re already certified to 27001:2013, you will need to:
If you’re not already certified to 27001:2013 then now it’s a great time to certify to the new version (27001:2022) and get ahead of the competition. Cycubix have extensive experience of bringing Small & Medium Enterprises to ISO27001 certification (and keeping them certified) with minimum cost/disruption. Please reach out to us at info@cycubix.com to discuss how we can help you to :
Richard Nealon is an official certified instructor for ISC2 and a seasoned Information Security and Risk Management professional with over 35 years’ experience.In his role as a vCISO with clients across a range of industries, Richard has worked with clients to enable them to manage their cyber risk. In addition to vCISO services, Cycubix offers cybersecurity consultancy services tailored to help clients secure the applications critical to their business.