What is ISO 27001 2022? What Changed From 2013

What is ISO 27001 2022 version? This guide explains what changed, what stayed the same, and what it means for organisations pursuing or maintaining certification.

If you’ve been looking at ISO 27001 for a while, you may have noticed references to both “ISO 27001:2013” and “ISO 27001:2022.” These are two versions of the same standard — the 2022 edition is the current version, and it replaced the 2013 edition.

This guide explains the key differences, what the update means for organisations just starting out, and what existing certificate holders need to do.


Background: Why Was the Standard Updated?

So, really, what is the ISO 27001 2022 version? ISO standards are reviewed on a regular cycle — typically every five years — to ensure they remain relevant to the current environment. By 2022, the 2013 edition of ISO 27001 was nearly a decade old. The threat landscape had changed significantly: cloud computing, remote working, and supply chain attacks had all become mainstream concerns rather than edge cases.

The 2022 revision — formally called ISO/IEC 27001:2022 — was published in October 2022. It’s the first major revision since 2013.

There’s also a companion document update: ISO/IEC 27002:2022, which provides implementation guidance for the Annex A controls. The 2022 revision of ISO 27002 came first (February 2022) and the Annex A in ISO 27001:2022 directly mirrors the updated 27002 control set. Read more about the relationship between ISO 27001 and ISO 27002.


What Changed in the Main Clauses (Clauses 4–10)?

The changes to the main body of the standard (the clauses that define the requirements for the management system) were relatively modest. The structure, terminology, and core logic of the standard are largely the same.

ISO 27001:2022 — All 11 Clauses at a Glance

The standard is structured into 11 clauses that follow a logical sequence — from understanding your organisation through to continual improvement. Clauses 1–3 are introductory; the requirements begin at Clause 4.

🔍 Context — Understanding your organisation Clauses 4–5
Clause 4
Context of the Organisation
Identify internal and external issues, interested parties, and define your ISMS scope
Clause 5
Leadership
Top management commitment, information security policy, and assigning roles and responsibilities
🎯 Planning — Addressing risks and opportunities Clause 6
Clause 6
Planning
Risk assessment and treatment, Statement of Applicability, and information security objectives
🔧 Support & Operation — Building and running the ISMS Clauses 7–8
Clause 7
Support
Resources, competence, awareness, communication, and documented information
Clause 8
Operation
Operational planning, risk assessment in practice, and implementing the risk treatment plan
📊 Performance — Monitoring and measuring Clause 9
Clause 9.1
Monitoring & Measurement
Define what you'll monitor, how, and how often — and evaluate results
Clause 9.2
Internal Audit
Plan and conduct internal audits to verify the ISMS conforms to requirements
Clause 9.3
Management Review
Top management reviews ISMS performance at planned intervals and makes improvement decisions
🔄 Improvement — Acting on what you find Clause 10
Clause 10.1
Continual Improvement
Continuously improve the suitability, adequacy, and effectiveness of the ISMS
Clause 10.2
Nonconformity & Corrective Action
Identify, respond to, and address the root cause of nonconformities
Annex A — Information Security Controls
93 controls across 4 themes — you select which are applicable based on your risk assessment
Referenced from Clause 6
🏢
Organisational Controls
37 controls (A.5)
👤
People Controls
8 controls (A.6)
🏗️
Physical Controls
14 controls (A.7)
💻
Technological Controls
34 controls (A.8)
Clauses 4–10 are mandatory — every certified organisation must address them. Annex A controls are applied selectively based on your risk assessment. You don't need all 93, but you must justify any you choose to exclude in your Statement of Applicability.

Notable changes in the clauses include:

Clause 6.2 (Information security objectives): A new requirement was added that information security objectives must be monitored. This is a small but meaningful addition — it pushes organisations to track progress against objectives, not just set them.

Clause 6.3 (Planning of changes): A new sub-clause was added requiring that changes to the ISMS are carried out in a planned manner. This formalises good practice that many organisations already followed.

Clause 8.1 (Operational planning and control): The wording was updated to make clear that processes need to be established and controlled, not just planned.

These are incremental improvements rather than structural changes. If you understand the 2013 version of the clauses, you’ll find the 2022 version immediately familiar.

What Is ISO 27001? The Framework at a Glance

ISO 27001 is an internationally recognised standard for managing information security. It works by combining three pillars inside a risk-driven management system.

Information Security Management System (ISMS)
👥

People

  • Security awareness training
  • Roles & responsibilities
  • Background screening
  • Acceptable use policies
  • Management commitment
⚙️

Processes

  • Risk assessment & treatment
  • Incident response procedures
  • Change management
  • Internal audit programme
  • Supplier security reviews
💻

Technology

  • Access controls & MFA
  • Encryption at rest & transit
  • Vulnerability management
  • Logging & monitoring
  • Network security controls
🎯
Underpinned by risk management: ISO 27001 doesn't prescribe a fixed set of controls. You identify your own risks, decide which Annex A controls are relevant, and implement them proportionately. The standard certifies your approach — not a checklist.
The engine: Plan → Do → Check → Act
P
Plan
Clauses 4–6
Define scope, assess risks, set objectives and controls
D
Do
Clauses 7–8
Implement controls, train people, operate processes
C
Check
Clause 9
Monitor performance, internal audit, management review
A
Act
Clause 10
Fix nonconformities, drive continual improvement
ISO 27001 is not a one-time project. The PDCA cycle repeats continuously — each pass around the loop strengthens your security posture. This is what auditors mean when they talk about a "living ISMS."

What Changed in Annex A? (The Controls)

This is where the most significant changes occurred. The control set in Annex A was substantially restructured and refreshed.

The number of controls changed

  • 2013: 114 controls across 14 control domains
  • 2022: 93 controls across 4 control categories (themes)

The reduction from 114 to 93 doesn’t mean controls were removed — many were merged or consolidated. And 11 new controls were added that didn’t exist in 2013.

The 4 new control themes

The 14 control domains from 2013 were replaced with 4 broader categories (called “themes”):

  • Organisational controls (37 controls) — policies, roles, responsibilities, supplier management, incident management
  • People controls (8 controls) — screening, training, awareness, disciplinary process, offboarding
  • Physical controls (14 controls) — physical security perimeters, entry controls, equipment protection
  • Technological controls (34 controls) — endpoint devices, access control, cryptography, secure development, monitoring

The 11 new controls in ISO 27001:2022

These are the controls that are genuinely new — they didn’t exist in the 2013 standard:

ControlName
5.7Threat intelligence
5.23Information security for use of cloud services
5.30ICT readiness for business continuity
7.4Physical security monitoring
8.9Configuration management
8.10Information deletion
8.11Data masking
8.12Data leakage prevention
8.16Monitoring activities
8.23Web filtering
8.28Secure coding

The new controls reflect exactly what you’d expect given the time elapsed since 2013 — cloud security, threat intelligence, data leakage prevention, and secure coding are all very much 21st-century concerns.

Attributes were introduced

The 2022 version also introduced a system of “attributes” for each control — ways to categorise controls by properties such as their type (preventive, detective, corrective), information security properties (confidentiality, integrity, availability), cybersecurity concepts, and more.

These attributes are optional in the sense that the standard doesn’t require you to use them. But they’re useful for organisations that want to map their controls to other frameworks (like NIST or CIS Controls) or filter and analyse their control set.


What Didn’t Change

Despite the restructuring, the fundamental logic of ISO 27001 is unchanged:

  • It’s still a risk-based management system standard
  • You still need to define scope, conduct a risk assessment, produce a Statement of Applicability, and implement appropriate controls
  • The certification process (Stage 1 and Stage 2 audits, surveillance audits, recertification) is unchanged
  • The PDCA (Plan-Do-Check-Act) improvement cycle is still central

If you implement ISO 27001:2022, you’re implementing the same framework as before — just with a modernised and consolidated control set.


What About ISO 27001 Amendment 1:2024?

In February 2024, a further update was published: ISO/IEC 27001:2022/AMD 1:2024. This amendment updated Clause 6.2 to add climate change considerations to information security planning — specifically, the requirement to consider whether climate change is a relevant issue for the organisation’s context.

For most organisations, this is a modest addition. It doesn’t introduce new controls or fundamentally change the framework. Read more about Amendment 1:2024.


What Did Existing Certificate Holders Need to Do?

When the 2022 standard was published, organisations that were already certified to ISO 27001:2013 were given a transition period to move to the new version. IAF (International Accreditation Forum) set the transition deadline as 31 October 2025.

This means all certified organisations should now be certified to ISO 27001:2022. If your certificate says 2013, it should have been upgraded at your last surveillance or recertification audit.

The main transition tasks for existing certificate holders were:

  1. Review the new Annex A controls and update the Statement of Applicability
  2. Assess the 11 new controls and decide whether they apply
  3. Map existing 2013 controls to their 2022 equivalents
  4. Update documentation to reference the new control numbers and categories

What If You’re Starting from Scratch?

If you’re just starting your ISO 27001 journey, you should implement ISO/IEC 27001:2022 from the outset. The 2013 version is no longer the current standard, and no certification body should be certifying against it.

The ISO 27001 toolkit and all content on this site are aligned to the 2022 version. When you see control numbers like 5.1, 6.3, or 8.12, those are the 2022 control references.

The ISO 27001 Certification Journey

From scoping to certificate in hand — here's what the typical path to ISO 27001 certification looks like, and how long each phase takes.

🔭
Scope & Commitment
Weeks 1–2
Define ISMS scope, secure management buy-in, appoint ISMS owner
🔍
Gap Analysis
Weeks 2–4
Assess current controls against ISO 27001 requirements — identify what's missing
📋
Build the ISMS
Months 2–5
Risk assessment, policies, controls, SoA, training — the core implementation work
🔎
Internal Audit
Month 5–6
Independent check that your ISMS is ready — identify and fix any gaps before the external audit
📄
Stage 1 Audit
Month 6–7
Certification body reviews your documentation and confirms readiness for Stage 2
🏛️
Stage 2 Audit
Month 7–9
Auditor tests whether your controls are operating effectively in practice — not just on paper
🏆
Certificate Issued
Valid 3 years
Accredited ISO 27001 certificate — publicly verifiable and commercially powerful
After certification — the ongoing cycle
📊
Year 1 Surveillance Audit
Shorter audit confirming the ISMS is maintained and continually improving
📊
Year 2 Surveillance Audit
Second annual check — broader in scope as your ISMS matures
🔄
Year 3 Recertification
Full recertification audit — certificate renewed for another 3-year cycle
Typical timeline: 6–12 months from standing start to certificate. Organisations with existing security controls, good documentation habits, or a dedicated ISMS resource tend to move faster. Using an experienced consultant can cut 2–3 months off the journey.

Summary of Key Changes

Aspect20132022
Controls114 across 14 domains93 across 4 themes
New controls11 new controls
Monitoring of objectivesNot explicitExplicitly required
Planning of ISMS changesNot explicitNew Clause 6.3
Cloud securityLimitedControl 5.23 specifically addresses it
Threat intelligenceNot addressedControl 5.7
AttributesNot presentOptional attributes system added

Useful Next Steps


ISO 27001 Consultancy

Get ISO 27001 certified in 90 days.
I’ll coach you through every step.

Fully remote. Fixed fee. Working with SMEs across the UK, EU and USA.

✔ Audit-ready plan with structured checkpoints
✔ Full toolkit + templates included
✔ Expert support throughout

Cancel any time
Pro-rata refund on unused sessions

✔ Defined scope, SoA and risk treatment
✔ Plain-English — no jargon
✔ Trusted auditor recommendations

First-pass guarantee
If you don’t pass, I fix it for free

“..no-nonsense help in achieving our UKAS-accredited ISO 27001 certification…”
– Periculum Security Group (UK)

£3,500

fixed

20% Discounts for micro-organisations

ISO 27001 Online Course + Full Toolkit

Stop guessing. Follow a proven step-by-step process.

Highly recommended for anyone looking to understand ISO 27001, whether attempting it on your own or even using a consultant.

✓ Full toolkit included
✓ Learn as you build
✓ 12-month access

✓ 6 hours of video
✓ Email consultancy
✓ 30-day upgrade credit to consultancy

£285

Instant access

iso 27001 course screenshot
View Details Try the demo →

Includes full document toolkit · 30-day consultancy upgrade credit

FAQs

What does the “:2022” mean — is my existing ISO 27001 certification still valid?

The “:2022” refers to the year the current version of the standard was published. ISO 27001 was previously ISO 27001:2013, and the 2022 update introduced significant changes — most notably a restructured Annex A reducing from 114 controls across 14 domains to 93 controls across 4 themes, and 11 new controls added to address modern threats like cloud security and threat intelligence. If you were certified to the 2013 version, certification bodies required transition to the 2022 standard by October 2025. New certifications are issued against ISO 27001:2022 only.

What’s the difference between ISO 27001 and Cyber Essentials?

Cyber Essentials is a UK government-backed scheme focused on a specific set of technical controls — firewalls, secure configuration, access control, malware protection, and patch management. It’s relatively quick and inexpensive to achieve. ISO 27001 is a comprehensive management system standard that covers people, processes, and technology across your entire organisation, with a risk-based approach rather than a fixed control checklist. Many organisations hold both: Cyber Essentials provides a technical baseline; ISO 27001 demonstrates broader security governance maturity. Government contracts often require Cyber Essentials as a minimum, with ISO 27001 for higher-risk suppliers.

What is the Statement of Applicability and why does it matter?

The Statement of Applicability (SoA) is one of the most important documents in your ISMS. It lists all 93 Annex A controls, states whether each one is applicable to your organisation, and — critically — provides a justification for any controls you’ve excluded. Auditors pay close attention to the SoA because it demonstrates that you’ve thought carefully about your risks and made deliberate, documented decisions about your control set. An SoA that simply marks everything as applicable without justification, or excludes controls without explanation, is a common source of audit findings.

Does ISO 27001 cover GDPR compliance?

ISO 27001 and GDPR overlap significantly but are not the same thing. ISO 27001 addresses the security side of data protection — how you protect information assets from threats. GDPR also covers lawful basis for processing, data subject rights, privacy notices, data minimisation, and retention — none of which are part of ISO 27001. Achieving ISO 27001 will help demonstrate that you have appropriate technical and organisational measures in place (a key GDPR requirement under Article 32), but it doesn’t make you GDPR compliant on its own. The two frameworks are complementary and are typically pursued together.

Who issues ISO 27001 certificates and how do I know if one is legitimate?

ISO 27001 certificates are issued by accredited certification bodies — organisations that have been independently assessed and approved to conduct ISO 27001 audits. In the UK, accreditation is granted by UKAS (United Kingdom Accreditation Service). Certificates issued by non-accredited bodies may look identical but carry significantly less weight with enterprise buyers and regulators who understand the difference. To verify a certificate is legitimate, check that the certification body is UKAS-accredited (or accredited by the equivalent national body in other countries) and look for the IAF mark on the certificate. Many accredited bodies also maintain public registers where certificates can be verified.

Photo of author

Written by

Alan Parker

Alan Parker is an ISO 27001 consultant who has helped dozens of UK small businesses achieve certification — often without a dedicated security team or a large budget. With over 30 years in IT governance and qualifications including ITIL v3 Expert, ITIL v4 Bridge, and PRINCE2 Practitioner, Alan writes in plain English for busy teams who need to get things done. Named IT Project Expert of the Year (2024, UK).