ISO 27001 definition: What is ISO 27001?
The latest version of the ISO 27001 information security standard was published in September 2013, replacing the 2005 iteration.
For an introduction to the principles of information security management and ISO 27001:2013, read our bestselling An Introduction to Information Security and ISO 27001 (2013) A Pocket Guide, Second Edition.
Speak to an ISO 27001 expert
Having led the world’s first ISO 27001 certification project, we understand what it takes to implement the Standard. Throughout your project, we can support you, from carrying out an initial gap analysis to choosing a certification body. Speak to one of our experts for more information on how we can help you.
What is an ISMS?
An ISMS is a holistic approach to securing the confidentiality, integrity and availability (CIA) of corporate information assets.
An ISO 27001 ISMS consists of policies, procedures and other controls involving people, processes and technology.
Informed by regular information security risk assessments, an ISMS is an efficient, risk-based and technology-neutral approach to keeping your information assets secure.
You can build your ISO 27001 information security management system using the ISO 27001 toolkit, which includes all the pre-written policies, procedures and templates you need.
ISO 27001 and risk management
Risk management forms the cornerstone of an ISO/IEC ISMS. All ISMS projects rely on regular information security risk assessments to determine which security controls to implement and maintain.
The Standard defines its requirements for the risk management process, including risk assessment and treatment, in section 6.1.2.
ISO 27001 benefits
ISO 27001 is one of the most popular information security standards in existence. Independent accredited certification to the Standard is recognised worldwide. The number of certifications has grown by more than 450% in the past ten years.
Implementing the Standard helps you meet the requirements of laws such as the EU GDPR (General Data Protection Regulation) and the NIS (Network and Information Systems) Regulations. This helps reduce the costs associated with data breaches.
Protect your data, wherever it is
Protect all forms of information, whether digital, hard copy or in the Cloud.
Increase your attack resilience
Increase your organisation’s resilience to cyber attacks.
Reduce information security costs
Implement only the security controls you need, helping you get the most from your budget.
Respond to evolving security threats
Constantly adapt to changes both in the environment and inside the organisation.
Improve company culture
An ISMS encompasses people, processes and technology, ensuring staff understand risks and embrace security as part of their everyday working practices.
Meet contractual obligations
Certification demonstrates your organisation’s commitment to data security and provides a valuable credential when tendering for new business.
Learn more about the benefits of certification
ISO/IEC 27001:2013 controls
The Standard doesn’t mandate that all 114 Annex A controls be implemented. A risk assessment should determine which controls are required and explain why other controls are excluded from the ISMS.
Below is the list of control sets.
- A.5 Information security policies
- A.6 Organisation of information security
- A.7 Human resource security
- A.8 Asset management
- A.9 Access control
- A.10 Cryptography
- A.11 Physical and environmental security
- A.12 Operations security
- A.13 Communications security
- A.14 System acquisition, development and maintenance
- A.15 Supplier relationships
- A.16 Information security incident management
- A.17 Information security aspects of business continuity management
- A.18 Compliance
How to achieve ISO 27001 compliance
Implementing an ISMS involves:
- Scoping the project.
- Securing management commitment and budget.
- Identifying interested parties and legal, regulatory and contractual requirements.
- Conducting a risk assessment.
- Reviewing and implementing the required controls.
- Developing internal competence to manage the project.
- Developing the appropriate documentation.
- Conducting staff awareness training.
- Reporting (e.g. the Statement of Applicability and risk treatment plan).
- Continually measuring, monitoring, reviewing and auditing the ISMS.
- Implementing the necessary corrective and preventive actions.
Discover our ISO 27001 implementation checklist and our nine-step approach to implementing an ISMS in our best-selling guide.
Demonstrating GDPR compliance with ISO 27001 and ISO 27701
Like all ISO management system standards, ISO 27001 follows Annex SL. This common high-level structure makes implenting integrated management systems that conform to multiple standards easier.
For instance, an ISO 22301-compliant BCMS (business continuity management system) could share components with an ISO 27001-compliant ISMS.
ISO/IEC 27701:2019 (ISO 27701) is an extension to ISO 27001, expanding its requirements to cover privacy management – including the processing of personal data/PII (personally identifiable information).
Implementing an integrated management system that combines an ISMS and an ISO 27701-compliant PIMS (privacy information management system) will help you meet the GDPR's requirements for managing, processing and protecting personal data.
Learn more about ISO 27701
Ready to simplify your security? Let’s get started.
Having led the world’s first ISO 27001 certification project, we are the global pioneer of the Standard. Let us share our expertise and support you on your journey to ISO 27001 compliance.