
ISO 27001 Controls â A guide to implementing and auditing
Bridget Kenyon is the CISO (chief information security officer) for SSCL. Sheâs also been on the ISO editing team for ISMS (information security management system) standards since 2006, and has served as lead editor forâŻISO/IEC 27001:2022âŻand ISO/IEC 27014:2020. Â
Bridget is also a member of the UK Advisory Council for (ISC)2, and a Fellow of the Chartered Institute of Information Security.Â
Sheâs also been aâŻPCI DSSâŻQSA (Payment Card Industry Data Security Standard Qualified Security Assessor), been head of information security for UCL, and held operational and consultancy roles in both industry and academia.Â
Bridget will always have a foot in both the technical and strategy camps. She enjoys helping people find solutions to thorny problems, and strongly believes that cyber and information security are fundamental to resilient business operations, not ânice to havesâ.Â
Following the success of the first edition, Bridget updatedâŻISO 27001 Controls â A guide to implementing and auditingâŻto reflect the 2022 updates to ISO 27001 and ISO 27002, making her our author of the month for June!Â
We sat down for a chat.Â
What inspired you to writeâŻISO 27001 Controls?Â
Actually, I inherited the book. Years ago, a colleague realised that, although guidance [ISO 27003] existed for the main clauses in ISO 27001 [Clauses 4â10], the controls inâŻAnnex AâŻlacked equivalent guidance.Â
Sure, you could go to ISO 27002 for implementation guidance, but it wasnâtâŻpractical. These types of standards need to be international â but the more generic something gets, the less useful it becomes.Â
My colleague wanted to come at it from the UK perspective. But he also wanted to go beyond simply helping peopleâŻimplementâŻthe control:Â
- When they test the control internally, how can they [internally] audit that control?Â
- How should they expect an [external] auditor to audit that control?Â
- For auditors, if they follow the auditing guidance and discover a problem with a control, and the auditee goes âOK, well, whatâŻshouldâŻI have done?â, the auditor can offer implementation guidance.Â
Thatâs how the book came about â to address all the above. In fact, it was part of a pair:Â
- An advice and guidance book.Â
- A workbook, with sections for the user to fill in for each control.Â
My colleague had been working with a co-author on both books, but she wasnât able to continue, so he approached me to assist.Â
We agreed weâd each take one of the books, with mine being the advice and guidance book. We each updated our book for the 2013 edition of ISO/IEC 27001, and both got our book published.Â
Then, the BSI [British Standards Institution, which published the original books] stopped publishing physical documents, and gave me the copyright to the advice and guidance book.Â
I approached ITGP and asked if theyâd be interested in publishing an updated version of the book. That ultimately became the first edition ofâŻISO 27001 Controls, though you could also think of it as the third edition to the book that started all those years ago.Â
What changes did you make from the last edition to this version?Â
Iâve updated it to match the 2022 version of ISO 27001, which has substantial differences to the previous edition, particularly in the Annex A controls.Â
The Annex A controls have been completely rewritten and tidied, bringing the number down from 114 to 93.Â
But even though there are fewer controls, you havenât lost any of the things you need to do. Rather than having five keys in five drawers, youâve now got all five keys inâŻoneâŻdrawer. But that doesnât reduce the number of keys youâve got.Â
I reviewed every single clause and rewrote the book to match the new controls. With all the new and merged controls, I had to add some entirely new clauses, and combine advice in others. So, in essence, this was a complete rewrite.Â
Do you consider the changes to the Annex A controls a good thing?Â
Yes. Every time we revise a standard â especially ISO 27002 â itâs an incremental improvement.Â
ISO 27002:2022 is the second edition I helped edit. I believe the 2022 Standard introduced two key improvements:Â
- Consolidating some duplicate items.Â
- Adding attributes to the controls, which feel a bit like hashtags.Â
The attributes are meant to address issues like how to âsliceâ the controls if you added them all to a database. What would your tables contain? What would your headings be?Â
The attributes, intended for electronic use, help âbatchâ the controls by their purpose. For example:Â
- Is the control intended toâŻpreventâŻsomething from happening?Â
- Is the control intended toâŻdetectâŻsomething happening?Â
- Is it intended toâŻrespondâŻto something happening?Â
Once youâve batched them, you can easily answer questions like these. You can also easily match them up against other frameworks, like the NIST CSF [Cybersecurity Framework].Â
You can do many different things with the attributes. This âmetadataâ helps you understand what the control is intended to achieve and how it interrelates with the other controls. Iâve included examples in the latest edition of my book of how you might use the attributes [in Chapter 4].Â
And thatâs another thing I changed in this edition of the book. I added that new chapter, partly because it adds value, and partly to make sure the chapter numbers line up with the control numbers. In the first edition, the numbers didnât align, which is messier to read and cross-reference.Â
Do you feel that ISO 27002:2022 takes a more holistic approach?Â
No, not in any way, shape or form.Â
ISO 27002 is a random assortment of security measures that may or may not be relevant to you. I had a colleague who used to refer to ISO 27002 as a âsupermarketâ. Would you buy everything, assuming money was no object? Of course not.Â
Equally, you wouldnât look at ISO 27002 and implementâŻallâŻits controls. The Standard simply provides a selection of security measures that may come in handy. Itâs not telling you to implement them all.Â
You may also need to look outside the Standard to find security measures not covered in ISO 27002 but thatâŻareâŻappropriate to your environment.Â
The point of ISO 27001 certification* is being able to demonstrate that youâre suitably secure. That a trusted third party has come to that conclusion.Â
[*Organisations can only certify against ISO 27001, not ISO 27002.]Â
Many view the Annex A controls as a checklist. Does this misconception stem from the fact that the SoA [Statement of Applicability] must map the organisationâs controls against those in Annex A?Â
Basically, yeah. The SoA used to be unique to ISO 27001. Now, one of the AI [artificial intelligence] standards uses it too.Â
The SoA was created [for BS 7799-2:2002, the predecessor to ISO 27001:2005] because information security was a relatively new topic then. If we simply told organisations to document the security controls they intend to apply, they could easily miss an entire category, completely by accident.Â
You might miss, for example, access control to the building.âŻPhysicallyâŻwalking into a building is a way you can steal information, which people tend to forget when focusing on information security.Â
So, we created the SoA to make sure people didnât accidentally miss entire categories of security measures. Not every category applies to every organisation, but you might not have thought about things youâŻdoâŻneed. The SoA was designed to address that.Â
But when people saw the SoA, they immediately thought it was a checklist, which it never was. Weâve since wrestled, trying various techniques, to dial people back from this âcompletistâ approach.Â
Why is the âchecklistâ approach problematic?Â
Again, you donât buy everything in the supermarket. You also mustnât blindly apply the entire ISO 27002 control set.Â
Iâve seen this happen. An organisation asked me for help because they were having trouble with their ISO 27001 project, struggling to gain any traction.Â
They showed me a spreadsheet withâŻevery singleâŻAnnex A control. I asked them how they picked their controls. They responded: âWe picked the controls we were supposed to, according to Annex A.âÂ
So, I said: âOK, what are your implementation problems?â They replied: âWe just canât get the budget, and no one will take us seriously.âÂ
Well, thatâs because that spreadsheet lacked any relationship with the business. The organisation was treating it as an alien thing; not something to embed in its operations. It was a box-ticking exercise.Â
Earlier, you said you tried âvarious techniquesâ to get people out of this faulty mindset. What did those include?Â
Weâve reworded the part in ISO 27001 that references the SoA [Clause 6.1.3.d] several times. The problem is that we canât use many of the phrases weâd like to have used, because ISO 27001 is a normative standard.Â
In other words, itâs a standard in which every single statement must include the word âshallâ. It canât contain guidance â the Standard must be a set of criteria against which you can audit.Â
Weâre trying to find the best way to phrase the requirement, which is to look at each Annex A control and consider whether itâs relevant. If so, but itâs currently missing from your control set, you need to go back to your risk assessment and work out:Â
- To which risk[s] it pertains; andÂ
- Why you missed it first time.Â
You then add it into the risk assessment as appropriate and continue as normal.Â
You may also need to review the requirements of interested parties, and see if those account for that control.Â
Coming back to your book, what is its top take-away?Â
It doesnât really have a âtop take-awayâ as such. This is a reference guide â itâs not something you read from cover to cover for some life-changing revelation. Although, if you read the book andâŻdoâŻhave one, please let me know â Iâd be fascinated to hear all about it!Â
The book is intended to help people who have a question like: âWhat do I do about authentication information?âÂ
It provides a nice little introduction for each control â a bit of background that answers the question: âWhy bother with this control in the first place?âÂ
I then cover some best practices â or perhaps I should sayâŻgoodâŻpractices â on how to implement the control, along with some caveats and warnings and, where appropriate, some interesting anecdotes.Â
Those are based around my experiences â occasions where Iâve watched something go horribly sideways, and were, in hindsight, funny enough to be worth including.Â
The auditing guidance follows straight after the implementation guidance for each control, describing what auditors should do. Weâve tried to be creative in working out how you can test a control â this can really be challenging at times.Â
It can be difficult to determine whether a control is effective, and not all auditing guidance is suitable for including in an international standard. Sometimes, you need to share a story that puts people off doing something. Thatâs another thing the book does.Â
What do you like the most about the book?Â
Itâs all the anecdotes that bring the book to life. It helps things stick in peopleâs heads.Â
Iâve included many personal experiences, or experiences from someone I know â appropriately redacted, of course â that highlight the practical realities of these controls. All the âdos and donâtsâ based on first- or second-hand experience.Â
And finally, do you have any advice for aspiring authors?Â
Make sure you budget enough time to go through everything at least three times. For technical books like this one, you need to be quite rigorous and structured.Â
In fact, given the size of my manuscript, I guarantee it still contains at least one error â a typo, if nothing else. So, if anyone finds it, please let me know, and Iâll correct it.Â
But you want to publish with as few errors as possible, obviously. So, take the time to review everything, and leave at least a week between reviews. That helps you look at things with fresh eyes.Â
Third-party review is also vital. Send your copy to someone else â preferably to at leastâŻtwoâŻreviewers. Itâs often easier for someone else to review your work than it is for you to review your own.Â
All our books are available in physical, eBook and ePub formats. Â
Find out more about Bridgetâs bookâŻhere. Weâre also offering a 15% discount throughout June! Just use âKenyon15â at the checkout.Â


