ISO 27001 remains a vital asset for any organisation looking to demonstrate compliance while showing an organisation’s entrenched culture of security, writes Cyber Compliance Technician Aidan Collins.
The internationally recognised standard for Information Security Management Systems (ISMS) offers robust protection against cyber threats with its controls, fostering a culture of security.
With most organisations being certified to the 2013 rendition of the standard, a deadline to migrate to the newer revision, ISO 27001:2022, has been set for 31st October 2025.
Out of the original 114 controls in ISO27001:2013, a total of 57 have been consolidated, 23 have undergone name changes, and 11 new controls have been introduced. The remaining 35 controls were unchanged. This result is a streamlined set of 93 controls, split into four groups.
We recommend that you start updating your ISMS now to get ahead of the deadline rather than working towards it.
We have undergone the transition ourselves ahead of our next surveillance audit and can tell you that mapping existing controls to the new requirements, updating manuals, changing Annex-A control numbers and other aspects of the documentation is time-consuming – especially if not planned correctly.
We have a template Information Security Manual, Policies and Procedures that reflects the new requirements that can be purchased here.
A useful starting point is to map your existing control numbers across using our mapping tool below. If you require assistance migrating to the new version of the standard, please let us know.
Indelible Data Mapping Tool
2022 control | Control | 2013 Controls | |||
5.1 | Policies | 5.1.1 | 5.1.2 | ||
5.2 | Information | 6.1.1 | |||
5.3 | Segregation | 6.1.2 | |||
5.4 | Management | 7.2.1 | |||
5.5 | Contact | 6.1.3 | |||
5.6 | Contact | 6.1.4 | |||
5.7 | Threat intelligence | NEW | |||
5.8 | Information | 6.1.5 | 14.1.1 | ||
5.9 | Inventory | 8.1.1 | 8.1.2 | ||
5.10 | Acceptable | 8.1.3 | 8.2.3 | ||
5.11 | Return of | 8.1.4 | |||
5.12 | Classification | 8.2.1 | |||
5.13 | Labelling | 8.2.2 | |||
5.14 | Information | 13.2.1 | 13.2.2 | 13.2.3 | |
5.15 | Access | 9.1.1 | 9.1.2 | ||
5.16 | Identity | 9.2.1 | |||
5.17 | Authentication | 9.2.4 | 9.3.1 | 9.4.3 | |
5.18 | Access | 9.2.2 | 9.2.5 | 9.2.6 | |
5.19 | Information | 15.1.1 | |||
5.20 | Addressing | 15.1.2 | |||
5.21 | Managing information | 15.1.3 | |||
5.22 | Monitoring, | 15.2.1 | 15.2.2 | ||
5.23 | Information | NEW | |||
5.24 | Information | 16.1.1 | |||
5.25 | Assessment | 16.1.4 | |||
5.26 | Response | 16.1.5 | |||
5.27 | Learning | 16.1.6 | |||
5.28 | Collection | 16.1.7 | |||
5.29 | Information | 17.1.1 | 17.1.2 | 17.1.3 | |
5.30 | ICT | NEW | |||
5.31 | Legal, | 18.1.1 | 18.1.5 | ||
5.32 | Intellectual | 18.1.2 | |||
5.33 | Protection | 18.1.3 | |||
5.34 | Privacy | 18.1.4 | |||
5.35 | Independent | 18.2.1 | |||
5.36 | Compliance | 18.2.2 | 18.2.3 | ||
5.37 | Documented | 12.1.1 | |||
6.1 | Screening | 7.1.1 | |||
6.2 | Terms and | 7.1.2 | |||
6.3 | Information | 7.2.2 | |||
6.4 | Disciplinary | 7.2.3 | |||
6.5 | Responsibilities | 7.3.1 | |||
6.6 | Confidentiality | 13.2.4 | |||
6.7 | Remote | 6.2.2 | |||
6.8 | Information | 16.1.2 | 16.1.3 | ||
7.1 | Physical | 11.1.1 | |||
7.2 | Physical | 11.1.2 | 11.1.6 | ||
7.3 | Securing | 11.1.3 | |||
7.4 | Physical | NEW | |||
7.5 | Protecting | 11.1.4 | |||
7.6 | Working | 11.1.5 | |||
7.7 | Clear | 11.2.9 | |||
7.8 | Equipment | 11.2.1 | |||
7.9 | Security | 11.2.6 | |||
7.10 | Storage | 8.3.1 | 8.3.2 | 8.3.3 | 11.2.5 |
7.11 | Supporting | 11.2.2 | |||
7.12 | Cabling | 11.2.3 | |||
7.13 | Equipment | 11.2.4 | |||
7.14 | Secure | 11.2.7 | |||
8.1 | User | 6.2.1 | 11.2.8 | ||
8.2 | Privileged | 9.2.3 | |||
8.3 | Information | 9.4.1 | |||
8.4 | Access to | 9.4.5 | |||
8.5 | Secure | 9.4.2 | |||
8.6 | Capacity | 12.1.3 | |||
8.7 | Protection | 12.2.1 | |||
8.8 | Management | 12.6.1 | 18.2.3 | ||
8.9 | Configuration | NEW | |||
8.10 | Information | NEW | |||
8.11 | Data | NEW | |||
8.12 | Data | NEW | |||
8.13 | Information | 12.3.1 | |||
8.14 | Redundancy | 17.2.1 | |||
8.15 | Logging | 12.4.1 | 12.4.2 | 12.4.3 | |
8.16 | Monitoring | NEW | |||
8.17 | Clock | 12.4.4 | |||
8.18 | Use of | 9.4.4 | |||
8.19 | Installation | 12.5.1 | 12.6.2 | ||
8.20 | Networks security | 13.1.1 | |||
8.21 | Security | 13.1.2 | |||
8.22 | Segregation | 13.1.3 | |||
8.23 | Web | NEW | |||
8.24 | Use of | 10.1.1 | 10.1.2 | ||
8.25 | Secure | 14.2.1 | |||
8.26 | Application | 14.1.2 | 14.1.3 | ||
8.27 | Secure | 14.2.5 | |||
8.28 | Secure | NEW | |||
8.29 | Security | 14.2.8 | 14.2.9 | ||
8.30 | Outsourced | 14.2.7 | |||
8.31 | Separation | 12.1.4 | 14.2.6 | ||
8.32 | Change | 12.1.2 | 14.2.2 | 14.2.3 | 14.2.4 |
8.33 | Test | 14.3.1 | |||
8.34 | Protection | 12.7.1 |