ISO 27001:2022.
What has changed?
by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001
www.patreon.com/AndreyProzorov
1.0, 25.10.2022
Agenda
2
1.Purchasing
2.Life cycle
3.New Name
4.Abstract
5.Number of pages
6.New terminology databases
7.New relevant requirements, 4.2
8.More focus on processses, 4.4 ISMS
9.New requirements for 6.2 IS objectives
10.Planning for changes (NEW)
11.New requirements for 7.4 Communication
12.New requirements for 8.1 Planning
13.New requirements for 9.1 Monitoring
14.New structure of 9.2 and 9.3, and a new input for
Management Review
15.New structure of 10 Improvement
16.NEW Annex A. IS Controls
17.IS Control list and Mapping
18.ISO 27002:2022. Example of Attributes
19.If you have the ISMS, you will need to do
20.Contacts
3
www.iso.org/standard/82875.html
≈119 Euro
Life cycle
4
1. New Name
5
ISO/IEC 27001:2013ISO/IEC 27001:2022
Information technology —
Security techniques —
Information security management
systems —Requirements
Information security, cybersecurity
and privacy protection —
Information security management
systems —Requirements
3. Number of pages
7
ISO/IEC 27001:2013ISO/IEC 27001:2022
2319
4. New terminology databases
8
ISO/IEC 27001:2013ISO/IEC 27001:2022
3 Terms and definitions
For the purposes of this document, the
terms and definitions given in ISO/IEC
27000 apply.
3 Terms and definitions
Forthepurposesofthisdocument,the
termsanddefinitionsgiveninISO/IEC
27000apply.
ISOandIECmaintainterminologydatabases
foruseinstandardizationatthefollowing
addresses:
—ISO Online browsing platform: available
at https://www.iso.org/obp
—IEC Electropedia: available at
https://www.electropedia.org
12. New structure of 9.2 and 9.3
16
ISO/IEC 27001:2013ISO/IEC 27001:2022
9.2 Internal audit
9.3 Management review
9.2Internalaudit
9.2.1General
9.2.2Internalauditprogramme
9.3Managementreview
9.3.1General
9.3.2Managementreviewinputs
9.3.3Managementreviewresults
+newinputforManagementreview:
c)changesinneedsandexpectationsof
interestedpartiesthatarerelevanttothe
informationsecuritymanagementsystem
13. New structure of 10 Improvement
17
ISO/IEC 27001:2013ISO/IEC 27001:2022
10.1 Nonconformity and corrective action
10.2 Continual improvement
10.1 Continual improvement
10.2 Nonconformity and corrective action
14. NEW Annex A. IS Controls
18
Information security controls reference (Annex A)
19
ISO/IEC 27001:2013ISO/IEC 27001:2022
Total number of controls –114Total number of controls –93, 11 new
Domains:
A.5Informationsecuritypolicies
A.6Organisationofinformationsecurity
A.7Humanresourcesecurity
A.8Assetmanagement
A.9Accesscontrol
A.10Cryptography
A.11Physicalandenvironmentalsecurity
A.12Operationssecurity
A.13Communicationssecurity
A.14Systemacquisition,development,andmaintenance
A.15Supplierrelationships
A.16Informationsecurityincidentmanagement
A.17Informationsecurityaspectsofbusinesscontinuity
management
A.18Compliance
Controls are categorized as:
a) People, if they concern individual people
b) Physical, if they concern physical objects
c) Technological, if they concern technology
d) otherwise they are categorized as Organizational
Five attributes only in ISO 27002:2022 (#):
1.Control type (Preventive, Detective, Corrective)
2.Information security properties (CIA)
3.Cybersecurity concepts (Identify, Protect, Detect,
Respond and Recover)
4.Operational capabilities
5.Security domains
20
21
NEW 2022:
A.5.7 Threat intelligence
A.5.23 Information security for use of cloud services
A.5.30 ICT readiness for business continuity
A.7.4 Physical security monitoring
A.8.9 Configuration management
A.8.10 Information deletion
A.8.11 Data masking
A.8.12 Data leakage prevention
A.8.16 Monitoring activities
A.8.23 Web filtering
A.8.28 Secure coding
www.patreon.com/posts/iso-27001-2013-73584456
ISO 27002:2022. Example of Attributes
22
If you have the ISMS, you will need to do:
1.ReviewtheRiskTreatmentPlan(RTP),alignitwiththenewstructureandnumberingof
controls.
2.ReviewandupdatetheStatementofApplicability(SoA).Irecommendusing2spreadsheets
(2013and2022)inthenext1-2years.
3.ReviewandupdatetheISMSManagementreviewprocedure(inputs).
4.ReviewandupdateISobjectivesandtheMonitoring,measurement,analysisandevaluation
procedure.
5.ReviewandupdatetheISMSCommunicationPlan.
6.Reviewandupdateotherpolicies,standardsandprocedures(ifnecessary).
7.Reviewandupdatechecklistsandquestionnairesusedforaudits(internalandexternal).
8.Evaluateandpossiblyadaptthird-partysecuritytools(e.g.,GRC,SIEM,VM)toensurethe
recordsyouareusingtodemonstratecompliancesupportthenewrequirements.
23