ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It provides a structured framework for managing sensitive company information so that it remains secure. The standard encompasses people, processes, and IT systems by applying a risk management process. It was first published in 2005, revised in 2013, and updated again in 2022 to align with modern threats and business environments.
The core of ISO/IEC 27001 is the implementation of an ISMS, which involves assessing risks to information security and implementing controls to mitigate these risks. It also emphasizes continual improvement and alignment with the organization’s goals and compliance obligations.
ISO/IEC 27001 adopts the PDCA (Plan-Do-Check-Act) cycle as the foundation for establishing, implementing, operating, monitoring, and improving an Information Security Management System (ISMS). This approach ensures continuous improvement and alignment with organizational goals and risks.
The following table outlines ISO/IEC 27001's major clauses grouped by each PDCA phase:
PDCA | Clause Items |
---|---|
1. Scope 2. Normative references 3. Terms and definitions |
|
Plan |
4. Context of the organization 4.1 Understanding of the organization and its context 4.2 Understanding the needs and expectations of interested parties 4.3 Determining the scope of the information security management system 4.4 Information security management system 5. Leadership 5.1 Management commitment 5.2 Policy 5.3 Organizational roles, responsibilities and authorities 6. Planning 6.1 Actions to address risks and opportunities 6.2 Information security objectives and planning to achieve them |
Do |
7. Support 7.1 Resources 7.2 Competence 7.3 Awareness and training 7.4 Communication 7.5 Documentation 8. Operation 8.1 Operational planning and control 8.2 Information security risk assessment 8.3 Information security risk treatment |
Check |
9. Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal audit 9.3 Management review |
Act |
10. Improvement 10.1 Nonconformity control and corrective actions 10.2 Continual improvement |
Annex A of ISO/IEC 27001:2013 outlines 18 control domains that help organizations ensure comprehensive information security management:
These domains contain a total of 114 controls, which organizations can select and apply based on the outcome of their risk assessment.