Overview of New Security Controls in ISO 27002 EN
Overview of New Security Controls in ISO 27002 EN
Overview of New Security Controls in ISO 27002 EN
in ISO 27002:2022
Author: Rhand Leal
WHITE PAPER
New controls...................................................................................................................................... 6
Renamed controls............................................................................................................................... 7
References ....................................................................................................................................... 14
This standard is a supporting standard for ISO 27001, the world’s leading information security standard,
and on October 25, 2022, the ISO 27001:2022 was published, aligning its Annex A with ISO 27002.
In other words, the controls in ISO 27001 and ISO 27002 are exactly the same; the only difference is that
ISO 27002 provides detailed guidance on how the controls could be implemented.
This white paper highlights the key changes in the 2022 revisions of ISO 27001 & ISO 27002 compared to
the 2013 revisions of those standards.
• Organizational controls (clause 5): This section contains all controls related to various
organizational issues, comprising 37 controls.
• People controls (clause 6): This section focuses on controls related to human resources security,
comprising 8 controls.
• Physical controls (clause 7): This section focuses on controls related to the physical environment,
comprising 14 controls.
• Technological controls (clause 8): This section focuses on controls related to technological
solutions, comprising 34 controls.
• Annex A – Using attributes: This annex provides a matrix of all the new controls, and it compares
their attributes and provides suggestions on how the controls might be used according to their
attributes.
• Annex B – Correspondence with ISO/IEC 27002:2013: This annex provides a mapping between
controls from this version and the controls from the previous 2013 edition.
The reduced number of sections, and the addition of an annex with guidance on how to use the controls,
makes it easier to understand the applicability of controls and designation of responsibilities.
Number of controls
This new version has reduced the number of controls from 114 to 93. Technological advancements, and
an improvement in the understanding of how to apply security practices, are the reasons for the change
in the number of controls.
• Attribute table: A table presenting the set of attributes associated with the control (see next
section for explanation).
• Purpose: Rationale for applying the control, i.e., why a control needs to be implemented (e.g., to
ensure integrity, to define roles, etc.).
• These added elements make it easier for those choosing or analyzing the controls to find out
information to better understand how to sort and justify the use of a control. For example, from
the attribute table, an organization can identify all controls of a preventive nature (e.g., 5.1
Policies for Information Security and 8.25 Secure Development Life Cycle) and work with them in
an integrated way. Through Purpose you can better explain to others the need for implementing
a control, as well as evaluate its adequacy to treat specific risks.
• The elements that already existed in the old ISO 27002 and remain in this new revision of the
standard are:
• Control title: the name of the control.
• Control: a description of what needs to be accomplished to be compliant with the control.
• Guidance: tips on how the control should be implemented.
• Other information: complementary information to understand the control and references to
other documents for consultation.
Controls attributes
From our point of view, this is the change that brings the most value for this new version of the standard,
because it provides a standardized way to sort and filter controls against different criteria.
New controls
Here are the 11 controls that are completely new:
9.4.5 Access control to program source code 8.4 Access to source code
11.2.6 Security of equipment and assets off-premises 7.9 Security of assets off-premises
11.2.9 Clear desk and clear screen policy 7.7 Clear desk and clear screen
17.2.1 Availability of information processing facilities 8.14 Redundancy of information processing facilities
These changes will help keep the focus on information security aspects of processes and activities,
reducing the effort for implementing and maintaining the Information Security Management System.
Merged controls
A total of 57 controls have been merged into 24 new controls:
These merges were considered either because related controls are natural steps of a bigger process, or
because more efficient security could be achieved by considering them in a single control.
Split controls
There is only one control that was split: 18.2.3 Technical compliance review was split into 5.36
Conformance with policies, rules and standards for information security and 8.8 Management of technical
vulnerabilities.
6.1.1 Information security roles and responsibilities 5.2 Information security roles and responsibilities
6.1.4 Contact with special interest groups 5.6 Contact with special interest groups
7.1.2 Terms and conditions of employment 6.2 Terms and conditions of employment
7.2.2 Information security awareness, education 6.3 Information security awareness, education and
and training training
9.4.4 Use of privileged utility programs 8.18 Use of privileged utility programs
11.1.3 Securing offices, rooms and facilities 7.3 Securing offices, rooms and facilities
11.2.1 Equipment siting and protection 7.8 Equipment siting and protection
11.2.7 Secure disposal or re-use of equipment 7.14 Secure disposal or re-use of equipment
16.1.5 Response to information security incidents 5.26 Response to information security incidents
16.1.6 Learning from information security incidents 5.27 Learning from information security incidents
18.2.1 Independent review of information security 5.35 Independent review of information security
Rhand holds an MBA in Business Management from Fundação Getúlio Vargas. His certifications include
ISO 27001 Lead Auditor, ISO 9001 Lead Auditor, Certified Information Security Manager (CISM), Certified
Information Systems Security Professional (CISSP), and others. He is a member of the ISACA Brasília
Chapter.
Our offices:
Zavizanska 12, 10000 Zagreb, Croatia
Via Maggio 1 C, Lugano, CH-6900, Switzerland
275 Seventh Ave, 7th Floor, New York, 10001, U.S.
Email: [email protected]