Zum Hauptinhalt springen
Starter Kit · Register

Statement of Applicability (SoA)

Updated on 2 min Reviewed by: Cenedril-Redaktion
Clause 6.1.3 ISO 27001

The Statement of Applicability (SoA) is one of the most scrutinised documents in an ISO 27001 audit. It lists all 93 Annex A controls and documents for each one whether it is applied — and if so, why; if not, why not.

Clause 6.1.3 d) explicitly requires a statement that contains all necessary controls, with justification for their inclusion and a declaration of whether they are implemented. No other ISMS document receives as systematic a review from auditors.

What does it contain?

The CSV template covers all 93 controls from Annex A of ISO 27001:2022. Per row:

  • Control ID and title — e.g. A.5.1, Information security policies
  • Applicable (yes/no) — whether the control is relevant within the scope
  • Justification — why the control is applied or excluded
  • Implementation status — fully, partially, planned, excluded
  • Reference to measure(s) — link to the risk treatment plan
  • Reference to policy/document — where is the implementation described?

How to use it

Fill it in during risk treatment. The SoA is built alongside the risk treatment plan. For every risk you mitigate through controls, you identify the corresponding Annex A controls. You mark these as “applied” in the SoA and link them to the specific measures from the treatment plan.

Document exclusions carefully. Review the remaining controls and assess whether they are relevant within your scope. For each excluded control, formulate a justification that references the risk analysis or the nature of the organisation. Blanket exclusions of entire categories (e.g. “all physical controls”) are problematic in audits.

Reconcile regularly. When the scope, risk landscape, or implementation status of a measure changes, the SoA must be updated. In practice, it is reviewed for currency at least during every management review.

Register Template

Statement of Applicability (SoA)

Control IDControl NameThemeApplicableJustificationImplementation StatusImplementation DescriptionReference
A.5.1Policies for information securityOrganizationalYesRequired by ISO 27001 5.2 and regulatory expectationsImplementedInformation Security Policy approved by CEO and communicatedPOL-001
A.5.2Information security roles and responsibilitiesOrganizationalYesRequired to assign accountabilityImplementedRACI matrix and role descriptionsRACI matrix
A.5.3Segregation of dutiesOrganizationalYesRequired to prevent fraud and errorImplementedSeparation enforced in finance and IT administrationAccess Control Policy
A.5.4Management responsibilitiesOrganizationalYesRequired for management commitmentImplementedDocumented in ISP and management review minutesPOL-001
A.5.5Contact with authoritiesOrganizationalYesRequired for regulator/LE contactImplementedAuthority contact list maintainedSecurity Operations Policy
A.5.6Contact with special interest groupsOrganizationalYesImproves threat awarenessImplementedMembership in Allianz für Cybersicherheit + ISACASecOps register
A.5.7Threat intelligenceOrganizationalYesRequired to inform risk treatmentImplementedSubscription to BSI CSW + CERT-EU feedSecOps dashboard
A.5.8Information security in project managementOrganizationalYesRequired for secure projectsImplementedSecurity tollgate in project methodologyPOL-013
A.5.9Inventory of information and other associated assetsOrganizationalYesRequired to protect assetsImplementedAsset register maintainedAsset register
A.5.10Acceptable use of information and other associated assetsOrganizationalYesRequired for user accountabilityImplementedAcceptable Use Policy acknowledged by all staffPOL-004
A.5.11Return of assetsOrganizationalYesRequired at terminationImplementedPart of leaver checklistHR Security Policy
A.5.12Classification of informationOrganizationalYesRequired for proportional protectionImplemented4-level scheme: Public/Internal/Confidential/Strictly ConfidentialPOL-007
A.5.13Labelling of informationOrganizationalYesRequired to operationalise classificationImplementedDocument templates carry classification labelsPOL-007
A.5.14Information transferOrganizationalYesRequired for secure sharingImplementedInformation Transfer Policy + secure portalPOL-008
A.5.15Access controlOrganizationalYesRequired to protect accessImplementedAccess Control Policy + RBACPOL-005
A.5.16Identity managementOrganizationalYesRequired for unique identitiesImplementedCentral IdP (Entra ID)Access Control Policy
A.5.17Authentication informationOrganizationalYesRequired to protect credentialsImplementedMFA enforced + password managerAccess Control Policy
A.5.18Access rightsOrganizationalYesRequired for least privilegeImplementedQuarterly access reviewAccess Control Policy
A.5.19Information security in supplier relationshipsOrganizationalYesThird-party riskImplementedSupplier Security Policy + screeningPOL-010
A.5.20Addressing information security within supplier agreementsOrganizationalYesContractual requirementImplementedSecurity clauses in all supplier contractsPOL-010
A.5.21Managing information security in the ICT supply chainOrganizationalYesSupply chain riskImplementedSBOM requirements for critical SWPOL-010
A.5.22Monitoring review and change management of supplier servicesOrganizationalYesRequired for ongoing assuranceImplementedAnnual supplier reviewPOL-010
A.5.23Information security for use of cloud servicesOrganizationalYesCloud usage presentImplementedCloud provider assessment checklistPOL-010
A.5.24Information security incident management planning and preparationOrganizationalYesRequired for incident readinessImplementedIncident Response PlanPROC-001
A.5.25Assessment and decision on information security eventsOrganizationalYesRequired to triage eventsImplementedTriage process in IRPPROC-001
A.5.26Response to information security incidentsOrganizationalYesRequired for containmentImplementedRunbooks for top 10 incident typesPROC-001
A.5.27Learning from information security incidentsOrganizationalYesRequired for improvementImplementedPost-incident review templatePROC-001
A.5.28Collection of evidenceOrganizationalYesRequired for investigationsImplementedChain-of-custody procedurePROC-001
A.5.29Information security during disruptionOrganizationalYesBCM integrationImplementedBCP + security requirements during disruptionPOL-009
A.5.30ICT readiness for business continuityOrganizationalYesBCM integrationImplementedDR Plan + testsPROC-003
A.5.31Legal statutory regulatory and contractual requirementsOrganizationalYesCompliance obligationImplementedLegal register maintainedLegal register
A.5.32Intellectual property rightsOrganizationalYesRequired to manage IPRImplementedIPR Policy + software asset controlsPOL-012
A.5.33Protection of recordsOrganizationalYesRequired for integrity and retentionImplementedRecord retention scheduleDPO procedure
A.5.34Privacy and protection of PIIOrganizationalYesGDPR obligationImplementedData Protection Policy + DPOPOL-018
A.5.35Independent review of information securityOrganizationalYesRequired by ISO 27001 9.2ImplementedAnnual external auditAudit plan
A.5.36Compliance with policies rules and standardsOrganizationalYesRequired for assuranceImplementedQuarterly policy conformance checkPOL-003
A.5.37Documented operating proceduresOrganizationalYesRequired for operationsImplementedRunbook libraryIT Operations Policy
A.6.1ScreeningPeopleYesRequired pre-employmentImplementedBackground check for sensitive rolesPOL-006
A.6.2Terms and conditions of employmentPeopleYesRequired for accountabilityImplementedSecurity clauses in employment contractPOL-006
A.6.3Information security awareness education and trainingPeopleYesRequired for competenceImplementedAnnual awareness training + phishingPOL-006
A.6.4Disciplinary processPeopleYesRequired for enforcementImplementedHR disciplinary procedurePOL-006
A.6.5Responsibilities after termination or change of employmentPeopleYesRequired for offboardingImplementedLeaver checklistPOL-006
A.6.6Confidentiality or non-disclosure agreementsPeopleYesRequired to protect informationImplementedNDAs signed at onboardingPOL-006
A.6.7Remote workingPeopleYesRemote working existsImplementedRemote Working Policy + managed endpointsPOL-014
A.6.8Information security event reportingPeopleYesRequired for detectionImplementedReporting channel + trainingPOL-004
A.7.1Physical security perimetersPhysicalYesOn-premises offices existImplementedBadge + monitored perimeterPOL-015
A.7.2Physical entryPhysicalYesRequiredImplementedBadge access + visitor logPOL-015
A.7.3Securing offices rooms and facilitiesPhysicalYesRequiredImplementedLocked rooms for sensitive areasPOL-015
A.7.4Physical security monitoringPhysicalYesRequiredImplementedCCTV at main entrancesPOL-015
A.7.5Protecting against physical and environmental threatsPhysicalYesRequiredImplementedFire protection + water sensorsPOL-015
A.7.6Working in secure areasPhysicalYesRequiredImplementedClean desk rule for secure roomsPOL-015
A.7.7Clear desk and clear screenPhysicalYesRequiredImplementedClean desk policyPOL-015
A.7.8Equipment siting and protectionPhysicalYesRequiredImplementedServer room access controlsPOL-015
A.7.9Security of assets off-premisesPhysicalYesLaptops used off-siteImplementedDevice encryption + trackingPOL-016
A.7.10Storage mediaPhysicalYesRemovable media usedImplementedEncrypted USB only + registerPOL-016
A.7.11Supporting utilitiesPhysicalYesRequiredImplementedUPS + generator testsPOL-015
A.7.12Cabling securityPhysicalYesRequiredImplementedCable ducts protectedPOL-015
A.7.13Equipment maintenancePhysicalYesRequiredImplementedMaintenance schedulePOL-019
A.7.14Secure disposal or re-use of equipmentPhysicalYesRequiredImplementedCertified disposal vendorPOL-018
A.8.1User endpoint devicesTechnologicalYesRequiredImplementedManaged endpoints with MDMPOL-016
A.8.2Privileged access rightsTechnologicalYesRequiredImplementedPAM solution + MFAPOL-005
A.8.3Information access restrictionTechnologicalYesRequiredImplementedApplication-level RBACPOL-005
A.8.4Access to source codeTechnologicalYesDevelopment in-houseImplementedGit repo access controlPOL-021
A.8.5Secure authenticationTechnologicalYesRequiredImplementedMFA + strong auth policyPOL-005
A.8.6Capacity managementTechnologicalYesRequiredImplementedCapacity monitoringPOL-019
A.8.7Protection against malwareTechnologicalYesRequiredImplementedEDR on all endpoints + serversPOL-016
A.8.8Management of technical vulnerabilitiesTechnologicalYesRequiredImplementedMonthly vuln scan + patchingPOL-019
A.8.9Configuration managementTechnologicalYesRequiredImplementedHardened baselines + drift checksPOL-020
A.8.10Information deletionTechnologicalYesRequiredImplementedDeletion procedures per data typePOL-018
A.8.11Data maskingTechnologicalYesRequired for dev/testImplementedMasking in non-prod environmentsPOL-018
A.8.12Data leakage preventionTechnologicalYesRequiredPartially implementedEmail DLP in placeendpoint DLP planned
A.8.13Information backupTechnologicalYesRequiredImplemented3-2-1 backup strategyPOL-019
A.8.14Redundancy of information processing facilitiesTechnologicalYesRequiredImplementedHA clusters for critical systemsPOL-019
A.8.15LoggingTechnologicalYesRequiredImplementedCentralised logging + SIEMPOL-019
A.8.16Monitoring activitiesTechnologicalYesRequiredImplemented24/7 monitoring by SOCPOL-019
A.8.17Clock synchronisationTechnologicalYesRequired for forensicsImplementedNTP from trusted sourcePOL-019
A.8.18Use of privileged utility programsTechnologicalYesRequiredImplementedRestricted to admins + loggedPOL-005
A.8.19Installation of software on operational systemsTechnologicalYesRequiredImplementedWhitelisting + change controlPOL-020
A.8.20Networks securityTechnologicalYesRequiredImplementedSegmentation + firewallsPOL-019
A.8.21Security of network servicesTechnologicalYesRequiredImplementedHardened services + monitoringPOL-019
A.8.22Segregation of networksTechnologicalYesRequiredImplementedVLANs for prod/dev/guestPOL-019
A.8.23Web filteringTechnologicalYesRequiredImplementedSecure web gatewayPOL-019
A.8.24Use of cryptographyTechnologicalYesRequiredImplementedCryptography Policy + key registerPOL-017
A.8.25Secure development life cycleTechnologicalYesIn-house developmentImplementedSecure SDLC with gatesPOL-021
A.8.26Application security requirementsTechnologicalYesRequiredImplementedSecurity requirements in user storiesPOL-021
A.8.27Secure system architecture and engineering principlesTechnologicalYesRequiredImplementedReference architecturePOL-021
A.8.28Secure codingTechnologicalYesRequiredImplementedSAST + peer reviewPOL-021
A.8.29Security testing in development and acceptanceTechnologicalYesRequiredImplementedDAST + release gatePOL-021
A.8.30Outsourced developmentTechnologicalNoNo outsourced developmentN/ANo outsourced development performedPOL-021
A.8.31Separation of development test and production environmentsTechnologicalYesRequiredImplementedSeparate tenants and dataPOL-021
A.8.32Change managementTechnologicalYesRequiredImplementedCAB + change registerPOL-020
A.8.33Test informationTechnologicalYesRequiredImplementedMasked test dataPOL-021
A.8.34Protection of information systems during audit testingTechnologicalYesRequiredImplementedRead-only audit accountsPOL-021

Sources

ISO 27001 Controls Covered

Clause 6.1.3 Information security risk treatment

Frequently asked questions

Do I have to list all 93 controls in the SoA?

Yes. The SoA must contain every one of the 93 Annex A controls — with a justification for whether it is applied or why it is excluded. A blanket exclusion without justification is an audit finding. Even a control that 'obviously' does not apply (e.g. physical security for a fully remote organisation) needs a traceable explanation.

How often is the SoA updated?

After every material change to the risk landscape, the scope, or the implemented controls — and at least once a year. In practice, the SoA is often updated alongside the risk treatment plan, since both are tightly coupled.

What is the difference between the SoA and the risk treatment plan?

The SoA is the complete overview of all 93 Annex A controls with their applicability status and justification. The risk treatment plan describes the operational implementation of the selected measures with responsibilities and deadlines. The SoA answers 'What?', the plan answers 'How and when?'.