Annex A — Controls
ISO 27001 Annex A contains 93 controls across four categories. Each control describes a security measure that organisations can implement to protect their information. Here you will find a practice-oriented explanation for each control, including BSI mapping, typical audit evidence and KPIs.
What is ISO 27002?
ISO 27001 tells you which controls you need. ISO 27002 tells you how to implement them. Annex A of ISO 27001 lists 93 controls as a reference — short one-liners defining what each control should achieve. The actual implementation guidance lives in ISO 27002:2022, the companion standard. There you will find a dedicated section for each control with purpose, guidance and supplementary information.
The 93 controls are organised into four themes: organisational (policies, processes, responsibilities), people (training, screening, employment terms), physical (buildings, equipment, environment) and technological (systems, networks, cryptography, development). This structure is new since the 2022 revision — the previous 2013 version had 114 controls in 14 groups.
How to select controls
Risk treatment determines which controls you need — Annex A is the checklist, not the obligation list. ISO 27001 Clause 6.1.3 requires you to compare the controls from Annex A with your risk treatment. The result is the Statement of Applicability (SoA): a table documenting for each of the 93 controls whether it applies, why (or why not), and how it is implemented.
In practice this works in three steps. First, identify risks to your information assets. Then decide for each risk how to treat it — avoid, transfer, accept, or reduce through controls. Finally, check against Annex A to ensure nothing was missed. Controls you do not need (e.g. A.8.28 Secure Coding if you do not develop software) are marked as not applicable — with justification.
The most common mistake: marking all 93 controls as applicable without linking them to your risk landscape. This produces an SoA that cannot be defended in an audit. Better: fewer controls, well justified and demonstrably implemented.
A.5 — Organisational Controls 37
37 controls covering policies, roles, access, suppliers, incidents, compliance and business continuity.
A.6 — People Controls 8
8 controls covering screening, employment terms, awareness training, disciplinary processes and remote working.
A.7 — Physical Controls 14
14 controls covering physical access, monitoring, environmental protection, equipment and secure disposal.
A.8 — Technological Controls 34
34 controls covering endpoints, networks, cryptography, logging, vulnerabilities, development and change management.