Achieve Robust Information Security with ISO 27001:2022

Our platform empowers your organisation to align with ISO 27001, ensuring comprehensive security management. This international standard is essential for protecting sensitive data and enhancing resilience against cyber threats. With over 70,000 certificates issued globally, ISO 27001's widespread adoption underscores its importance in safeguarding information assets.

Why ISO 27001 Matters

Achieving ISO 27001:2022 certification emphasises a comprehensive, risk-based approach to improving information security management, ensuring your organisation effectively manages and mitigates potential threats, aligning with modern security needs. It provides a systematic methodology for managing sensitive information, ensuring it remains secure. Certification can reduce data breach costs by 30% and is recognised in over 150 countries, enhancing international business opportunities and competitive advantage.

How ISO 27001 Certification Benefits Your Business

  1. Achieve Cost Efficiency: Save time and money by preventing costly security breaches. Implement proactive risk management measures to significantly reduce the likelihood of incidents.

  2. Accelerate Sales Growth: Streamline your sales process by reducing extensive security documentation requests (RFIs). Showcase your compliance with international information security standards to shorten negotiation times and close deals faster.

  3. Boost Client Trust: Demonstrate your commitment to information security to enhance client confidence and build lasting trust. Increase customer loyalty and retain clients in sectors like finance, healthcare, and IT services.

Comprehensive Guide on How to Implement ISO 27001:2022 Certification

The standard's structure includes a comprehensive Information Security Management System (ISMS) framework and a detailed ISO 27001 implementation guide that integrates risk management processes and Annex A controls. These components create a holistic security strategy, addressing various aspects of security (ISO 27001:2022 Clause 4.2). This approach not only enhances security but also fosters a culture of awareness and compliance within the organisation.

Streamlining Certification with ISMS.online

ISMS.online plays a crucial role in facilitating alignment by offering tools that streamline the certification process. Our platform provides automated risk assessments and real-time monitoring, simplifying the implementation of ISO 27001:2022 requirements. This not only reduces manual effort but also enhances efficiency and accuracy in maintaining alignment.

Join 25000 + Users Achieving ISO 27001 with ISMS.online. Book Your Free Demo Today!


Understanding ISO 27001:2022

ISO 27001 is a pivotal standard for improving an Information Security Management System (ISMS), offering a structured framework to protect sensitive data. This framework integrates comprehensive risk evaluation processes and Annex A controls, forming a robust security strategy. Organisations can effectively identify, analyse, and address vulnerabilities, enhancing their overall security posture.

Key Elements of ISO 27001:2022

  • ISMS Framework: This foundational component establishes systematic policies and procedures for managing information security (ISO 27001:2022 Clause 4.2). It aligns organisational goals with security protocols, fostering a culture of compliance and awareness.

  • Risk Evaluation: Central to ISO 27001, this process involves conducting thorough assessments to identify potential threats. It is essential for implementing appropriate security measures and ensuring continuous monitoring and improvement.

  • ISO 27001 Controls: ISO 27001:2022 outlines a comprehensive set of ISO 27001 controls within Annex A, designed to address various aspects of information security. These controls include measures for access control, cryptography, physical security, and incident management, among others. Implementing these controls ensures your Information Security Management System (ISMS) effectively mitigates risks and safeguards sensitive information.

iso 27001 requirements and structure

Aligning with International Standards

ISO 27001:2022 is developed in collaboration with the International Electrotechnical Commission (IEC), ensuring that the standard aligns with global best practices in information security. This partnership enhances the credibility and applicability of ISO 27001 across diverse industries and regions.

How ISO 27001 Integrates with Other Standards

ISO 27001:2022 seamlessly integrates with other standards like ISO 9001 for quality management, ISO 27002 for code of practice for information security controls and regulations like GDPR, enhancing compliance and operational efficiency. This integration allows organisations to streamline regulatory efforts and align security practices with broader business objectives. Initial preparation involves a gap analysis to identify areas needing improvement, followed by a risk evaluation to assess potential threats. Implementing Annex A controls ensures comprehensive security measures are in place. The final audit process, including Stage 1 and Stage 2 audits, verifies compliance and readiness for certification.

Why Is ISO 27001:2022 Important for Organisations?

ISO 27001 plays a vital role in strengthening your organisation's data protection strategies. It provides a comprehensive framework for managing sensitive information, aligning with contemporary cybersecurity requirements through a risk-based approach. This alignment not only fortifies defences but also ensures adherence to regulations like GDPR, mitigating potential legal risks (ISO 27001:2022 Clause 6.1).

ISO 27001:2022 Integration with Other Standards

ISO 27001 is part of the broader ISO family of management system standards. This allows it to be seamlessly integrated with other standards, such as:

This integrated approach helps your organisation maintain robust operational standards, streamlining the certification process and enhancing compliance.

How Does ISO 27001:2022 Enhance Risk Management?

  • Structured Risk Management: The standard emphasises the systematic identification, assessment, and mitigation of risks, fostering a proactive security posture.
  • Incident Reduction: Organisations experience fewer breaches due to the robust controls outlined in Annex A.
  • Operational Efficiency: Streamlined processes enhance efficiency, reducing the likelihood of costly incidents.

Structured Risk Management with ISO 27001:2022

ISO 27001 requires organisations to adopt a comprehensive, systematic approach to risk management. This includes:

  • Risk Identification and Assessment: Identify potential threats to sensitive data and evaluate the severity and likelihood of those risks (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Select appropriate treatment options, such as mitigating, transferring, avoiding, or accepting risks. With the addition of new options like exploiting and enhancing, organisations can take calculated risks to harness opportunities.

Each of these steps must be reviewed regularly to ensure that the risk landscape is continuously monitored and mitigated as necessary.

What Are the Benefits for Trust and Reputation?

Certification signifies a commitment to data protection, enhancing your business reputation and customer trust. Certified organisations often see a 20% increase in customer satisfaction, as clients appreciate the assurance of secure data handling.

How ISO 27001 Certification Impacts Client Trust and Sales

  1. Increased Client Confidence: When prospective clients see that your organisation is ISO 27001 certified, it automatically elevates their trust in your ability to protect sensitive information. This trust is essential for sectors where data security is a deciding factor, such as healthcare, finance, and government contracting.

  2. Faster Sales Cycles: ISO 27001 certification reduces the time spent answering security questionnaires during the procurement process. Prospective clients will see your certification as a guarantee of high security standards, speeding up decision-making.

  3. Competitive Advantage: ISO 27001 certification positions your company as a leader in information security, giving you an edge over competitors who may not hold this certification.

How Does ISO 27001:2022 Offer Competitive Advantages?

ISO 27001 opens international business opportunities, recognised in over 150 countries. It cultivates a culture of security awareness, positively influencing organisational culture and encouraging continuous improvement and resilience, essential for thriving in today's digital environment.

How Can ISO 27001 Support Regulatory Adherence?

Aligning with ISO 27001 helps navigate complex regulatory landscapes, ensuring adherence to various legal requirements. This alignment reduces potential legal liabilities and enhances overall governance.

Incorporating ISO 27001:2022 into your organisation not only strengthens your data protection framework but also builds a foundation for sustainable growth and trust in the global market.

Free download

Get your guide to
ISO 27001 success

Everything you need to know about achieving ISO 27001 first time

Get your free guide

Enhancing Risk Management with ISO 27001:2022

ISO 27001:2022 offers a robust framework for managing information security risks, vital for safeguarding your organisation's sensitive data. This standard emphasises a systematic approach to risk evaluation, ensuring potential threats are identified, assessed, and mitigated effectively.

How Does ISO 27001 Structure Risk Management?

ISO 27001:2022 integrates risk evaluation into the Information Security Management System (ISMS), involving:

  • Risk Assessment: Conducting thorough evaluations to identify and analyse potential threats and vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Risk Treatment: Implementing strategies to mitigate identified risks, using controls outlined in Annex A to reduce vulnerabilities and threats.
  • Continuous Monitoring: Regularly reviewing and updating practices to adapt to evolving threats and maintain security effectiveness.

What Techniques and Strategies Are Key?

Effective risk management under ISO 27001:2022 involves:

  • Risk Assessment and Analysis: Utilising methodologies like SWOT analysis and threat modelling to evaluate risks comprehensively.
  • Risk Treatment and Mitigation: Applying controls from Annex A to address specific risks, ensuring a proactive approach to security.
  • Continuous Improvement: Fostering a security-focused culture that encourages ongoing evaluation and enhancement of risk management practices.

How Can the Framework Be Tailored to Your Organisation?

ISO 27001:2022's framework can be customised to fit your organisation's specific needs, ensuring that security measures align with business objectives and regulatory requirements. By fostering a culture of proactive risk management, organisations with ISO 27001 certification experience fewer security breaches and enhanced resilience against cyber threats. This approach not only protects your data but also builds trust with stakeholders, enhancing your organisation's reputation and competitive edge.

Key Changes in ISO 27001:2022

ISO 27001:2022 introduces pivotal updates, enhancing its role in modern cybersecurity. The most significant changes reside in Annex A, which now includes advanced measures for digital security and proactive threat management. These revisions address the evolving nature of security challenges, particularly the increasing reliance on digital platforms.

Key Differences Between ISO 27001:2022 and Earlier Versions

The differences between the 2013 and 2022 versions of ISO 27001 are crucial to understanding the updated standard. While there are no massive overhauls, the refinements in Annex A controls and other areas ensure the standard remains relevant to modern cybersecurity challenges. Key changes include:

  • Restructuring of Annex A Controls: Annex A controls have been condensed from 114 to 93, with some being merged, revised, or newly added. These changes reflect the current cybersecurity environment, making controls more streamlined and focused.
  • New Focus Areas: The 11 new controls introduced in ISO 27001:2022 include areas such as threat intelligence, physical security monitoring, secure coding, and cloud service security, addressing the rise of digital threats and the increased reliance on cloud-based solutions.

Understanding Annex A Controls

  • Enhanced Security Protocols: Annex A now features 93 controls, with new additions focusing on digital security and proactive threat management. These controls are designed to mitigate emerging risks and ensure robust protection of information assets.
  • Digital Security Focus: As digital platforms become integral to operations, ISO 27001:2022 emphasises securing digital environments, ensuring data integrity, and safeguarding against unauthorised access.
  • Proactive Threat Management: New controls enable organisations to anticipate and respond to potential security incidents more effectively, strengthening their overall security posture.

Detailed Breakdown of Annex A Controls in ISO 27001:2022

ISO 27001:2022 introduces a revised set of Annex A controls, reducing the total from 114 to 93 and restructuring them into four main groups. Here’s a breakdown of the control categories:

Control GroupNumber of ControlsExamples
Organisational37Threat intelligence, ICT readiness, information security policies
People8Responsibilities for security, screening
Physical14Physical security monitoring, equipment protection
Technological34Web filtering, secure coding, data leakage prevention

New Controls: ISO 27001:2022 introduces 11 new controls focused on emerging technologies and challenges, including:

  • Cloud services: Security measures for cloud infrastructure.
  • Threat intelligence: Proactive identification of security threats.
  • ICT readiness: Business continuity preparations for ICT systems.

By implementing these controls, organisations ensure they are equipped to handle modern information security challenges.

iso 27002 new controls

Full Table of ISO 27001 Controls

Below is a full list of ISO 27001:2022 controls

ISO 27001:2022 Organisational Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Organisational ControlsAnnex A 5.1Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational ControlsAnnex A 5.2Annex A 6.1.1Information Security Roles and Responsibilities
Organisational ControlsAnnex A 5.3Annex A 6.1.2Segregation of Duties
Organisational ControlsAnnex A 5.4Annex A 7.2.1Management Responsibilities
Organisational ControlsAnnex A 5.5Annex A 6.1.3Contact With Authorities
Organisational ControlsAnnex A 5.6Annex A 6.1.4Contact With Special Interest Groups
Organisational ControlsAnnex A 5.7NEWThreat Intelligence
Organisational ControlsAnnex A 5.8Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational ControlsAnnex A 5.9Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational ControlsAnnex A 5.10Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational ControlsAnnex A 5.11Annex A 8.1.4Return of Assets
Organisational ControlsAnnex A 5.12Annex A 8.2.1Classification of Information
Organisational ControlsAnnex A 5.13Annex A 8.2.2Labelling of Information
Organisational ControlsAnnex A 5.14Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational ControlsAnnex A 5.15Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational ControlsAnnex A 5.16Annex A 9.2.1Identity Management
Organisational ControlsAnnex A 5.17Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational ControlsAnnex A 5.18Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational ControlsAnnex A 5.19Annex A 15.1.1Information Security in Supplier Relationships
Organisational ControlsAnnex A 5.20Annex A 15.1.2Addressing Information Security Within Supplier Agreements
Organisational ControlsAnnex A 5.21Annex A 15.1.3Managing Information Security in the ICT Supply Chain
Organisational ControlsAnnex A 5.22Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational ControlsAnnex A 5.23NEWInformation Security for Use of Cloud Services
Organisational ControlsAnnex A 5.24Annex A 16.1.1Information Security Incident Management Planning and Preparation
Organisational ControlsAnnex A 5.25Annex A 16.1.4Assessment and Decision on Information Security Events
Organisational ControlsAnnex A 5.26Annex A 16.1.5Response to Information Security Incidents
Organisational ControlsAnnex A 5.27Annex A 16.1.6Learning From Information Security Incidents
Organisational ControlsAnnex A 5.28Annex A 16.1.7Collection of Evidence
Organisational ControlsAnnex A 5.29Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational ControlsAnnex A 5.30NEWICT Readiness for Business Continuity
Organisational ControlsAnnex A 5.31Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational ControlsAnnex A 5.32Annex A 18.1.2Intellectual Property Rights
Organisational ControlsAnnex A 5.33Annex A 18.1.3Protection of Records
Organisational ControlsAnnex A 5.34 Annex A 18.1.4Privacy and Protection of PII
Organisational ControlsAnnex A 5.35Annex A 18.2.1Independent Review of Information Security
Organisational ControlsAnnex A 5.36Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational ControlsAnnex A 5.37Annex A 12.1.1Documented Operating Procedures


ISO 27001:2022 People Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
People ControlsAnnex A 6.1Annex A 7.1.1Screening
People ControlsAnnex A 6.2Annex A 7.1.2Terms and Conditions of Employment
People ControlsAnnex A 6.3Annex A 7.2.2Information Security Awareness, Education and Training
People ControlsAnnex A 6.4Annex A 7.2.3Disciplinary Process
People ControlsAnnex A 6.5Annex A 7.3.1Responsibilities After Termination or Change of Employment
People ControlsAnnex A 6.6Annex A 13.2.4Confidentiality or Non-Disclosure Agreements
People ControlsAnnex A 6.7Annex A 6.2.2Remote Working
People ControlsAnnex A 6.8Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting


ISO 27001:2022 Physical Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Physical ControlsAnnex A 7.1Annex A 11.1.1Physical Security Perimeters
Physical ControlsAnnex A 7.2Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical ControlsAnnex A 7.3Annex A 11.1.3Securing Offices, Rooms and Facilities
Physical ControlsAnnex A 7.4NEWPhysical Security Monitoring
Physical ControlsAnnex A 7.5Annex A 11.1.4Protecting Against Physical and Environmental Threats
Physical ControlsAnnex A 7.6Annex A 11.1.5Working In Secure Areas
Physical ControlsAnnex A 7.7Annex A 11.2.9Clear Desk and Clear Screen
Physical ControlsAnnex A 7.8Annex A 11.2.1Equipment Siting and Protection
Physical ControlsAnnex A 7.9Annex A 11.2.6Security of Assets Off-Premises
Physical ControlsAnnex A 7.10Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical ControlsAnnex A 7.11Annex A 11.2.2Supporting Utilities
Physical ControlsAnnex A 7.12Annex A 11.2.3Cabling Security
Physical ControlsAnnex A 7.13Annex A 11.2.4Equipment Maintenance
Physical ControlsAnnex A 7.14Annex A 11.2.7Secure Disposal or Re-Use of Equipment


ISO 27001:2022 Technological Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Technological ControlsAnnex A 8.1Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological ControlsAnnex A 8.2Annex A 9.2.3Privileged Access Rights
Technological ControlsAnnex A 8.3Annex A 9.4.1Information Access Restriction
Technological ControlsAnnex A 8.4Annex A 9.4.5Access to Source Code
Technological ControlsAnnex A 8.5Annex A 9.4.2Secure Authentication
Technological ControlsAnnex A 8.6Annex A 12.1.3Capacity Management
Technological ControlsAnnex A 8.7Annex A 12.2.1Protection Against Malware
Technological ControlsAnnex A 8.8Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological ControlsAnnex A 8.9NEWConfiguration Management
Technological ControlsAnnex A 8.10NEWInformation Deletion
Technological ControlsAnnex A 8.11NEWData Masking
Technological ControlsAnnex A 8.12NEWData Leakage Prevention
Technological ControlsAnnex A 8.13Annex A 12.3.1Information Backup
Technological ControlsAnnex A 8.14Annex A 17.2.1Redundancy of Information Processing Facilities
Technological ControlsAnnex A 8.15Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological ControlsAnnex A 8.16NEWMonitoring Activities
Technological ControlsAnnex A 8.17Annex A 12.4.4Clock Synchronization
Technological ControlsAnnex A 8.18Annex A 9.4.4Use of Privileged Utility Programs
Technological ControlsAnnex A 8.19Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological ControlsAnnex A 8.20Annex A 13.1.1Networks Security
Technological ControlsAnnex A 8.21Annex A 13.1.2Security of Network Services
Technological ControlsAnnex A 8.22Annex A 13.1.3Segregation of Networks
Technological ControlsAnnex A 8.23NEWWeb filtering
Technological ControlsAnnex A 8.24Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological ControlsAnnex A 8.25Annex A 14.2.1Secure Development Life Cycle
Technological ControlsAnnex A 8.26Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological ControlsAnnex A 8.27Annex A 14.2.5Secure System Architecture and Engineering Principles
Technological ControlsAnnex A 8.28NEWSecure Coding
Technological ControlsAnnex A 8.29Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological ControlsAnnex A 8.30Annex A 14.2.7Outsourced Development
Technological ControlsAnnex A 8.31Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological ControlsAnnex A 8.32Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological ControlsAnnex A 8.33Annex A 14.3.1Test Information
Technological ControlsAnnex A 8.34Annex A 12.7.1Protection of Information Systems During Audit Testing


Navigating Implementation Challenges

Organisations may face challenges such as resource constraints and insufficient management support when implementing these updates. Effective resource allocation and stakeholder engagement are crucial for maintaining momentum and achieving successful compliance. Regular training sessions can help clarify the standard's requirements, reducing compliance challenges.

Adapting to Evolving Security Threats

These updates demonstrate ISO 27001:2022's adaptability to the changing security environment, ensuring organisations remain resilient against new threats. By aligning with these enhanced requirements, your organisation can bolster its security framework, improve compliance processes, and maintain a competitive edge in the global market.


How Can Organisations Successfully Attain ISO 27001 Certification?

Achieving ISO 27001:2022 requires a methodical approach, ensuring your organisation aligns with the standard's comprehensive requirements. Here's a detailed guide to navigate this process effectively:

Kickstart Your Certification with a Thorough Gap Analysis

Identify improvement areas with a comprehensive gap analysis. Assess current practices against ISO 27001 standard to pinpoint discrepancies. Develop a detailed project plan outlining objectives, timelines, and responsibilities. Engage stakeholders early to secure buy-in and allocate resources efficiently.

Implement an Effective ISMS

Establish and implement an Information Security Management System (ISMS) tailored to your organisational goals. Implement the 93 Annex A controls, emphasising risk assessment and treatment (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and enhancing precision.

Perform Regular Internal Audits

Conduct regular internal audits to evaluate the effectiveness of your ISMS. Management reviews are essential for performance evaluation and necessary adjustments (ISO 27001:2022 Clause 9.3). ISMS.online facilitates real-time collaboration, boosting team efficiency and audit readiness.

Engage with Certification Bodies

Select an accredited certification body and schedule the audit process, including Stage 1 and Stage 2 audits. Ensure all documentation is complete and accessible. ISMS.online offers templates and resources to simplify documentation and track progress.

Overcome Common Challenges with a Free Consultation

Overcome resource constraints and resistance to change by fostering a culture of security awareness and continuous improvement. Our platform supports maintaining alignment over time, aiding your organisation in achieving and sustaining certification.

Schedule a free consultation to address resource constraints and navigate resistance to change. Learn how ISMS.online can support your implementation efforts and ensure successful certification.

ISO 27001:2022 and Supplier Relationships Requirements

ISO 27001:2022 has introduced new requirements to ensure organisations maintain robust supplier and third-party management programs. This includes:

  • Identifying and Assessing Suppliers: Organisations must identify and analyse third-party suppliers that impact information security. A thorough risk assessment for each supplier is mandatory to ensure compliance with your ISMS.
  • Supplier Security Controls: Ensure that your suppliers implement adequate security controls and that these are regularly reviewed. This extends to ensuring that customer service levels and personal data protection are not adversely affected.
  • Auditing Suppliers: Organisations should audit their suppliers' processes and systems regularly. This aligns with the new ISO 27001:2022 requirements, ensuring that supplier compliance is maintained and that risks from third-party partnerships are mitigated.

Enhanced Employee Cybersecurity Awareness

ISO 27001:2022 continues to emphasise the importance of employee awareness. Implementing policies for ongoing education and training is critical. This approach ensures that your employees are not only aware of security risks but are also capable of actively participating in mitigating those risks.

  • Human Error Prevention: Businesses should invest in training programs that aim to prevent human error, one of the leading causes of security breaches.
  • Clear Policy Development: Establish clear guidelines for employee conduct regarding data security. This includes awareness programs on phishing, password management, and mobile device security.
  • Security Culture: Foster a security-aware culture where employees feel empowered to raise concerns about cybersecurity threats. An environment of openness helps organisations tackle risks before they materialise into incidents.

ISO 27001:2022 Requirements for Human Resource Security

One of the essential refinements in ISO 27001:2022 is its expanded focus on human resource security. This involves:

  • Personnel Screening: Clear guidelines for personnel screening before hiring are crucial to ensuring that employees with access to sensitive information meet required security standards.
  • Training and Awareness: Ongoing education is required to ensure that staff are fully aware of the organisation's security policies and procedures.
  • Disciplinary Actions: Define clear consequences for policy violations, ensuring that all employees understand the importance of complying with security requirements.

These controls ensure that organisations manage both internal and external personnel security risks effectively.

Compliance doesn’t have to be complicated.

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

Employee Awareness Programs and Security Culture

Fostering a culture of security awareness is crucial for maintaining strong defences against evolving cyber threats. ISO 27001:2022 promotes ongoing training and awareness programs to ensure that all employees, from leadership to staff, are involved in upholding information security standards.

  • Phishing Simulations and Security Drills: Conducting regular security drills and phishing simulations helps ensure employees are prepared to handle cyber incidents.
  • Interactive Workshops: Engage employees in practical training sessions that reinforce key security protocols, improving overall organisational awareness.

Continual Improvement and Cybersecurity Culture

Finally, ISO 27001:2022 advocates for a culture of continual improvement, where organisations consistently evaluate and update their security policies. This proactive stance is integral to maintaining compliance and ensuring the organisation stays ahead of emerging threats.

  • Security Governance: Regular updates to security policies and audits of cybersecurity practices ensure ongoing compliance with ISO 27001:2022.
  • Proactive Risk Management: Encouraging a culture that prioritises risk assessment and mitigation allows organisations to stay responsive to new cyber threats.

Optimal Timing for ISO 27001 Adoption

Adopting ISO 27001:2022 is a strategic decision that depends on your organisation's readiness and objectives. The ideal timing often aligns with periods of growth or digital transformation, where enhancing security frameworks can significantly improve business outcomes. Early adoption provides a competitive edge, as certification is recognised in over 150 countries, expanding international business opportunities.

Conducting a Readiness Assessment

To ensure a seamless adoption, conduct a thorough readiness assessment to evaluate current security practices against the updated standard. This involves:

  • Gap Analysis: Identify areas needing improvement and align them with ISO 27001:2022 requirements.
  • Resource Allocation: Ensure adequate resources, including personnel, technology, and budget, are available to support the adoption.
  • Stakeholder Engagement: Secure buy-in from key stakeholders to facilitate a smooth adoption process.

Aligning Certification with Strategic Goals

Aligning certification with strategic goals enhances business outcomes. Consider:

  • Timeline and Deadlines: Be aware of industry-specific deadlines for compliance to avoid penalties.
  • Continuous Improvement: Foster a culture of ongoing evaluation and enhancement of security practices.

Utilising ISMS.online for Effective Management

Our platform, ISMS.online, plays a vital role in managing the adoption effectively. It offers tools for automating compliance tasks, reducing manual effort, and providing real-time collaboration features. This ensures your organisation can maintain compliance and track progress efficiently throughout the adoption process.

By strategically planning and utilising the right tools, your organisation can navigate the adoption of ISO 27001:2022 smoothly, ensuring robust security and compliance.

Where Does ISO 27001:2022 Align with Other Regulatory Standards?

ISO 27001 plays a significant role in aligning with key regulatory frameworks, such as GDPR and NIS 2, to enhance data protection and streamline regulatory adherence. This alignment not only strengthens data privacy but also improves organisational resilience across multiple frameworks.

How Does ISO 27001:2022 Enhance GDPR Compliance?

ISO 27001:2022 complements GDPR by focusing on data protection and privacy through its comprehensive risk management processes (ISO 27001:2022 Clause 6.1). The standard's emphasis on safeguarding personal data aligns with GDPR's stringent requirements, ensuring robust data protection strategies.

What Role Does ISO 27001:2022 Play in Supporting NIS 2 Directives?

The standard supports NIS 2 directives by enhancing cybersecurity resilience. ISO 27001:2022's focus on threat intelligence and incident response aligns with NIS 2's objectives, fortifying organisations against cyber threats and ensuring continuity of critical services.

How Does ISO 27001:2022 Integrate with Other ISO Standards?

ISO 27001 integrates effectively with other ISO standards, such as ISO 9001 and ISO 14001, creating synergies that enhance overall regulatory alignment and operational efficiency. This integration facilitates a unified approach to managing quality, environmental, and security standards within an organisation.

How Can Organisations Achieve Comprehensive Regulatory Alignment with ISO 27001:2022?

Organisations can achieve comprehensive regulatory alignment by synchronising their security practices with broader requirements. Our platform, ISMS.online, offers extensive certification support, providing tools and resources to simplify the process. Industry associations and webinars further enhance understanding and implementation, ensuring organisations remain compliant and competitive.

Can ISO 27001:2022 Effectively Mitigate New Security Challenges?

Emerging threats, including cyber-attacks and data breaches, necessitate robust strategies. ISO 27001:2022 offers a comprehensive framework for managing risks, emphasising a risk-based approach to identify, assess, and mitigate potential threats.

How Does ISO 27001:2022 Enhance Cyber Threat Mitigation?

ISO 27001:2022 strengthens mitigation through structured risk management processes. By implementing Annex A controls, organisations can proactively address vulnerabilities, reducing cyber incidents. This proactive stance builds trust with clients and partners, differentiating businesses in the market.

What Measures Ensure Cloud Security with ISO 27001:2022?

Cloud security challenges are prevalent as organisations migrate to digital platforms. ISO 27001:2022 includes specific controls for cloud environments, ensuring data integrity and safeguarding against unauthorised access. These measures foster customer loyalty and enhance market share.

How Does ISO 27001:2022 Prevent Data Breaches?

Data breaches pose significant risks, impacting reputation and financial stability. ISO 27001:2022 establishes comprehensive protocols, ensuring continuous monitoring and improvement. Certified organisations often experience fewer breaches, maintaining effective security measures.

How Can Organisations Adapt to Evolving Threat Landscapes?

Organisations can adapt ISO 27001:2022 to evolving threats by regularly updating security practices. This adaptability ensures alignment with emerging threats, maintaining robust defences. By demonstrating a commitment to security, certified organisations gain a competitive edge and are preferred by clients and partners.

Cultivating a Security Culture with ISO 27001 Compliance

ISO 27001 serves as a cornerstone in developing a robust security culture by emphasising awareness and comprehensive training. This approach not only fortifies your organisation’s security posture but also aligns with current cybersecurity standards.

How to Enhance Security Awareness and Training

Security awareness is integral to ISO 27001:2022, ensuring your employees understand their roles in protecting information assets. Tailored training programmes empower staff to recognise and respond to threats effectively, minimising incident risks.

What Are Effective Training Strategies?

Organisations can enhance training by:

  • Interactive Workshops: Conduct engaging sessions that reinforce security protocols.
  • E-Learning Modules: Provide flexible online courses for continuous learning.
  • Simulated Exercises: Implement phishing simulations and incident response drills to test readiness.

How Does Leadership Influence Security Culture?

Leadership plays a pivotal role in embedding a security-focused culture. By prioritising security initiatives and leading by example, management instils responsibility and vigilance throughout the organisation, making security integral to the organisational ethos.

What Are the Long-Term Benefits of Security Awareness?

ISO 27001:2022 offers sustained improvements and risk reduction, enhancing credibility and providing a competitive edge. Organisations report increased operational efficiency and reduced costs, supporting growth and opening new opportunities.

How Does ISMS.online Support Your Security Culture?

Our platform, ISMS.online, aids organisations by offering tools for tracking training progress and facilitating real-time collaboration. This ensures that security awareness is maintained and continuously improved, aligning with ISO 27001:2022's objectives.

We'll guide you every step of the way

Our built-in tool takes you from set-up to certification with a 100% success rate.

Book a demo

Navigating Challenges in ISO 27001:2022 Implementation

Implementing ISO 27001:2022 involves overcoming significant challenges, such as managing limited resources and addressing resistance to change. These hurdles must be addressed to achieve certification and enhance your organisation's information security posture.

Identifying Common Implementation Hurdles

Organisations often face difficulties in allocating adequate resources, both financial and human, to meet ISO 27001:2022's comprehensive requirements. Resistance to adopting new security practices can also impede progress, as employees may be hesitant to alter established workflows.

Efficient Resource Management Strategies

To optimise resource management, prioritise tasks based on risk assessment outcomes, focusing on high-impact areas (ISO 27001:2022 Clause 6.1). Our platform, ISMS.online, automates compliance tasks, reducing manual effort and ensuring critical areas receive the necessary attention.

Overcoming Resistance to Change

Effective communication and training are key to mitigating resistance. Engage employees in the implementation process by highlighting the benefits of ISO 27001:2022, such as enhanced data protection and GDPR alignment. Regular training sessions can foster a culture of security awareness and compliance.

Enhancing Implementation with ISMS.online

ISMS.online plays a pivotal role in overcoming these challenges by providing tools that enhance collaboration and streamline documentation. Our platform supports integrated compliance strategies, aligning ISO 27001 with standards like ISO 9001, thereby improving overall efficiency and regulatory adherence. By simplifying the implementation process, ISMS.online helps your organisation achieve and maintain ISO 27001:2022 certification effectively.

What are Key Differences Between ISO 27001:2022 and Earlier Versions

ISO 27001:2022 introduces pivotal updates to meet evolving security demands, enhancing its relevance in today's digital environment. A significant change is the expansion of Annex A controls, now totaling 93, which include new measures for cloud security and threat intelligence. These additions underscore the growing importance of digital ecosystems and proactive threat management.

Impact on Compliance and Certification

The updates in ISO 27001:2022 require adjustments in compliance processes. Your organisation must integrate these new controls into its Information Security Management Systems (ISMS), ensuring alignment with the latest requirements (ISO 27001:2022 Clause 6.1). This integration streamlines certification by providing a comprehensive framework for managing information risks.

New Controls and Their Significance

The introduction of controls focused on cloud security and threat intelligence is noteworthy. These controls help your organisation protect data in complex digital environments, addressing vulnerabilities unique to cloud systems. By implementing these measures, you can enhance your security posture and reduce the risk of data breaches.

Adapting to New Requirements

To adapt to these changes, your organisation should conduct a thorough gap analysis to identify areas needing improvement. This involves assessing current practices against the updated standard, ensuring alignment with new controls. By using platforms like ISMS.online, you can automate compliance tasks, reducing manual effort and enhancing efficiency.

These updates highlight ISO 27001:2022's commitment to addressing contemporary security challenges, ensuring your organisation remains resilient against emerging threats.


Why Should Compliance Officers Prioritise ISO 27001:2022?

ISO 27001:2022 is pivotal for compliance officers seeking to enhance their organisation's information security framework. Its structured methodology for regulatory adherence and risk management is indispensable in today's interconnected environment.

Navigating Regulatory Frameworks

ISO 27001:2022 aligns with global standards like GDPR, providing a comprehensive framework that ensures data protection and privacy. By adhering to its guidelines, you can confidently navigate complex regulatory landscapes, reducing legal risks and enhancing governance (ISO 27001:2022 Clause 6.1).

Proactive Risk Management

The standard's risk-based approach enables organisations to systematically identify, assess, and mitigate risks. This proactive stance minimises vulnerabilities and fosters a culture of continuous improvement, essential for maintaining a robust security posture. Compliance officers can utilise ISO 27001:2022 to implement effective risk treatment strategies, ensuring resilience against emerging threats.

Enhancing Organisational Security

ISO 27001:2022 significantly enhances your organisation's security posture by embedding security practices into core business processes. This integration boosts operational efficiency and builds trust with stakeholders, positioning your organisation as a leader in information security.

Effective Implementation Strategies

Compliance officers can implement ISO 27001:2022 effectively by utilising platforms like ISMS.online, which streamline efforts through automated risk assessments and real-time monitoring. Engaging stakeholders and fostering a security-aware culture are crucial steps in embedding the standard's principles across your organisation.

By prioritising ISO 27001:2022, you not only safeguard your organisation's data but also drive strategic advantages in a competitive market.


How Does ISO 27001:2022 Enhance Security Frameworks?

p>ISO 27001:2022 establishes a comprehensive framework for managing information security, focusing on a risk-based approach. This approach allows your organisation to systematically identify, assess, and address potential threats, ensuring robust protection of sensitive data and adherence to international standards.

Key Strategies for Threat Mitigation

  • Conducting Risk Assessments: Thorough evaluations identify vulnerabilities and potential threats (ISO 27001:2022 Clause 6.1), forming the basis for targeted security measures.
  • Implementing Security Controls: Annex A controls are utilised to address specific risks, ensuring a holistic approach to threat prevention.
  • Continuous Monitoring: Regular reviews of security practices allow adaptation to evolving threats, maintaining the effectiveness of your security posture.

Data Protection and Privacy Alignment

ISO 27001:2022 integrates security practices into organisational processes, aligning with regulations like GDPR. This ensures that personal data is handled securely, reducing legal risks and enhancing stakeholder trust.

Building a Proactive Security Culture

By fostering security awareness, ISO 27001:2022 promotes continuous improvement and vigilance. This proactive stance minimises vulnerabilities and strengthens your organisation's overall security posture. Our platform, ISMS.online, supports these efforts with tools for real-time monitoring and automated risk assessments, positioning your organisation as a leader in information security.

Incorporating ISO 27001:2022 into your security strategy not only fortifies defences but also enhances your organisation's reputation and competitive advantage.


What Advantages Does ISO 27001:2022 Offer to CEOs?

ISO 27001:2022 is a strategic asset for CEOs, enhancing organisational resilience and operational efficiency through a risk-based methodology. This standard aligns security protocols with business objectives, ensuring robust information security management.

How Does ISO 27001:2022 Enhance Strategic Business Integration?

  • Risk Management Framework: ISO 27001:2022 provides a comprehensive framework for identifying and mitigating risks, safeguarding your assets, and ensuring business continuity.
  • Regulatory Compliance Standards: By aligning with global standards like GDPR, it minimises legal risks and strengthens governance, essential for maintaining market trust.

What Are the Competitive Advantages of ISO 27001:2022?

  • Reputation Enhancement: Certification demonstrates a commitment to security, boosting customer trust and satisfaction. Organisations often report increased client confidence, leading to higher retention rates.
  • Global Market Access: With acceptance in over 150 countries, ISO 27001:2022 facilitates entry into international markets, offering a competitive edge.

How Can ISO 27001:2022 Drive Business Growth?

  • Operational Efficiency: Streamlined processes reduce security incidents, lowering costs and improving efficiency.
  • Innovation and Digital Transformation: By fostering a culture of security awareness, it supports digital transformation and innovation, driving business growth.

Integrating ISO 27001:2022 into your strategic planning aligns security measures with organisational goals, ensuring they support broader business objectives. Our platform, ISMS.online, simplifies compliance, offering tools for real-time monitoring and risk management, ensuring your organisation remains secure and competitive.


How to Facilitate Digital Transformation with ISO 27001:2022

ISO 27001:2022 provides a comprehensive framework for organisations transitioning to digital platforms, ensuring data protection and adherence to international standards. This standard is pivotal in managing digital risks and enhancing security measures.

How to Manage Digital Risks Effectively

ISO 27001:2022 offers a risk-based approach to identify and mitigate vulnerabilities. By conducting thorough risk assessments and implementing Annex A controls, your organisation can proactively address potential threats and maintain robust security measures. This approach aligns with evolving cybersecurity requirements, ensuring your digital assets are safeguarded.

How to Foster Secure Digital Innovation

Integrating ISO 27001:2022 into your development lifecycle ensures security is prioritised from design to deployment. This reduces breach risks and enhances data protection, allowing your organisation to pursue innovation confidently while maintaining compliance.

How to Build a Culture of Digital Security

Promoting a culture of security involves emphasising awareness and training. Implement comprehensive programmes that equip your team with the skills needed to recognise and respond to digital threats effectively. This proactive stance fosters a security-conscious environment, essential for successful digital transformation.

By adopting ISO 27001:2022, your organisation can navigate digital complexities, ensuring security and compliance are integral to your strategies. This alignment not only protects sensitive information but also enhances operational efficiency and competitive advantage.


What are the Key Considerations for Implementing ISO 27001:2022

Implementing ISO 27001:2022 involves meticulous planning and resource management to ensure successful integration. Key considerations include strategic resource allocation, engaging key personnel, and fostering a culture of continuous improvement.

Strategic Resource Allocation

Prioritising tasks based on comprehensive risk assessments is essential. Your organisation should focus on high-impact areas, ensuring they receive adequate attention as outlined in ISO 27001:2022 Clause 6.1. Utilising platforms like ISMS.online can automate tasks, reducing manual effort and optimising resource use.

Engaging Key Personnel

Securing buy-in from key personnel early in the process is vital. This involves fostering collaboration and aligning with organisational goals. Clear communication of the benefits and objectives of ISO 27001:2022 helps mitigate resistance and encourages active participation.

Fostering a Culture of Continuous Improvement

Regularly reviewing and updating your Information Security Management Systems (ISMS) to adapt to evolving threats is crucial. This involves conducting periodic audits and management reviews to identify areas for enhancement, as specified in ISO 27001:2022 Clause 9.3.

Steps for Successful Implementation

To ensure successful implementation, your organisation should:

  • Conduct a gap analysis to identify areas needing improvement.
  • Develop a comprehensive project plan with clear objectives and timelines.
  • Utilise tools and resources, such as ISMS.online, to streamline processes and enhance efficiency.
  • Foster a culture of security awareness through regular training and communication.

By addressing these considerations, your organisation can effectively implement ISO 27001:2022, enhancing its security posture and ensuring alignment with international standards.

Get an 81% headstart

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

Start your ISO 27001:2022 journey with ISMS.online. Schedule a personalised demo now to see how our comprehensive solutions can simplify your compliance and streamline your implementation processes. Enhance your security framework and boost operational efficiency with our cutting-edge tools.

How Can ISMS.online Streamline Your Compliance Journey?

  • Automate and Simplify Tasks: Our platform reduces manual effort and enhances precision through automation. The intuitive interface guides you step-by-step, ensuring all necessary criteria are met efficiently.
  • What Support Does ISMS.online Offer?: With features like automated risk assessments and real-time monitoring, ISMS.online helps maintain a robust security posture. Our solution aligns with ISO 27001:2022's risk-based approach, proactively addressing vulnerabilities (ISO 27001:2022 Clause 6.1).
  • Why Schedule a Personalised Demo?: Discover how our solutions can transform your strategy. A personalised demo illustrates how ISMS.online can meet your organisation's specific needs, offering insights into our capabilities and benefits.

How Does ISMS.online Enhance Collaboration and Efficiency?

Our platform fosters seamless teamwork, enabling your organisation to achieve ISO 27001:2022 certification. By utilising ISMS.online, your team can enhance its security framework, improve operational efficiency, and gain a competitive edge. Book a demo today to experience the transformative power of ISMS.online and ensure your organisation remains secure and compliant.


Jump to topic

Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

ISMS Platform Tour

Interested in an ISMS.online platform tour?

Start your free 2-minute interactive demo now and experience the magic of ISMS.online in action!

Try it for free

Related Topics

ISO 27001

Automation in Compliance – Saving Time Without Sacrificing Accuracy

Introduction: The Compliance Efficiency Dilemma   The global regulatory landscape is continuing to evolve in line with technological advances and growing cyber threats. The Digital Operational Resilience Act (DORA), the updated Network and Information Security (NIS 2) Directive and the EU Artificial Intelligence (AI) Act all are either now applicable to in-scope businesses operating within the EU or will soon come into effect. Meanwhile, the UK has its own legislation, including the Cyber Security and Resilience Bill currently being developed. As pressure to ensure compliance increases, many compliance leaders find themselves struggling to find a balance. How can businesses meet rigorous regulatory requirements while driving operational efficiencies, reducing manual workload, and improving accuracy? Here, automation offers part of the solution, particularly for time-intensive tasks like evidence collection and reporting, but it can also unwittingly add new risks to your compliance process if it isn’t implemented strategically. Automation alone isn’t the answer. In this blog, we’ll explore how businesses can implement automation to enhance their compliance efforts while leveraging human expertise to ensure security, accuracy and strategic decision-making.  Why Automation is Essential in Modern Compliance  Many businesses face the challenge of complying with multiple regulations using multiple frameworks, such as ISO 27001 and NIST CSF. Juggling everything required for compliance, from risk assessments and internal audits to policy updates and reporting, presents a complex and potentially overwhelming task for compliance teams. Manually managing compliance requirements across an array of frameworks and to meet a range of often stringent requirements can lead to errors, inefficiencies, and compliance fatigue.  The Thomson Reuters 2023 Risk & Compliance report found that identifying and assessing risk was the most challenging area in the risk and compliance workflow, cited by 56% of respondents, followed by monitoring compliance, cited by 52% of respondents. Compliance teams can benefit significantly from leveraging automation in these areas to manage risk and compliance while maintaining vital human oversight. Automation also offers an essential opportunity for organisations to reduce compliance teams’ manual workload. In fact, the Thomson Reuters report found that almost two-thirds (65%) of respondents said streamlining and automating manual processes would help reduce the complexity and cost of risk and compliance. Additionally, a McKinsey article states that “about 60 percent of all occupations could see 30 percent or more of their constituent activities automated.”  Time-consuming admin tasks including tracking evidence collection, generating reports and flagging risks can be successfully automated, with varying levels of human intervention necessary. By adding automation to your compliance toolkit, your compliance team can focus on strategy, risk mitigation and business alignment rather than repetitive tasks that lead to compliance fatigue, human error and costly financial and reputational consequences.  Embedding automation into your compliance also provides compelling strategic benefits. For example, automating task reminders can bolster your organisation’s long-term resilience: ensure that key tasks are never overlooked, align with evolving regulatory requirements, and receive consistent human oversight so they continue to support your compliance goals.   Adding Automation to Your Compliance Toolkit  Automation can do a lot of the heavy lifting for your compliance team, but there are still areas that require consistent human oversight – over-reliance on automation can lead to missed compliance issues or data inaccuracies. A blend of automation and human decision-making can combine to create a fortified, streamlined compliance strategy.  Fully Automatable Tasks Audit trails and reporting: Automatically log changes, track version history, and generate compliance reports instead of spending time manually entering data.  Monitoring security controls: Auto-check compliance status against predefined controls so your organisation remains compliant.  Task and deadline reminders: Automated alerts for policy reviews, risk assessments, and audits, removing the risk of missed deadlines.  Tasks Requiring Human Oversight Risk assessments: Automation can highlight potential risks, but human judgment is required to analyse impact.  Incident response and decision-making: Automated alerts help detect issues, but expert input ensures correct response.  Compliance strategy and policy creation: Automation can support implementation, but governance needs human input.  Finding the Right Balance: Smart Automation with Human Oversight   Organisations that approach compliance as a ‘set and forget’ exercise in box ticking often find themselves struggling to remain compliant long-term. Regulations shift, businesses grow, and yesterday’s processes quickly become outdated. That’s where automation can make a real difference – helping organisations stay aligned with regulatory expectations, bolster resilience, and respond faster to change. Used well, automation brings agility to compliance. It can reduce the burden of manual tasks, minimise the risk of human error, and help you avoid costly fines or reputational damage. But relying solely on automation is a risk in itself. Algorithms can’t interpret context, nuance, or evolving risk in the way people can. That’s why the most effective compliance strategies combine automation with human oversight. Automation should support decision-making, not replace it. The human element remains essential – particularly when it comes to interpreting risks, reviewing controls, and making judgement calls. Take ISO 27001, for example. It lends itself well to smart automation: task reminders, audit trail creation, and policy review workflows can all be automated. But core elements – like risk assessments and defining treatment plans – still require human input. In fact, our information security experts estimate that only around 20% of ISO 27001 can be fully automated. That’s why a balanced approach, one that brings together people, processes, and technology, is key to long-term compliance success.  Automate with Control with ISMS.online  ISMS.online enables you to marry automation seamlessly with human governance. The platform comes with pre-configured compliance automation out of the box, reducing your team’s manual workload while keeping human oversight and control a top priority. Streamlined smart workflows also help your compliance team to stay audit-ready while maintaining visibility.  The ISMS.online platform also integrates with your core third-party software – such as JIRA, Slack, Microsoft and PowerBI – to keep your compliance data flowing without silos, missed evidence or clunky data transfer processes. Your automated processes will do the heavy lifting for you, while your team can simply validate those tasks requiring human supervision.  With ISMS.online, compliance progress is also easy to view and monitor within your customisable project dashboard, giving you 360-degree oversight of your risk profile, policy and control status, third-party supplier assessments and more.  Supercharge Your Compliance with Strategic Automation  A robust automation strategy doesn’t rely on removing humans from compliance. Instead, a strategic blend of automated tasks and human checks empower compliance teams to focus on what matters. Unlock long-term compliance resilience, adapt quickly to evolving regulatory requirements, and free up your team’s valuable time and resources to focus on the important tasks, not menial day-to-day admin and evidence collection.  Efficiency, accuracy, and risk reduction come from balancing automation with expert oversight. The right compliance automation strategy will not replace human oversight—it will empower your team to focus on what really matters: risk mitigation, resilience, and business growth. If you’re ready to embed automation in your compliance strategy, see the ISMS.online platform in action – take a self-guided, interactive platform tour. Or, for a personalised approach, book your demo.  
Read More
ISO 27001

A Cautionary Tale: What the Advanced Health and Care Case Tells Us About Cyber Resilience

At the end of March, Advanced Computer Software Group was fined just over £3m by the UK’s data protection regulator. Multiple security failures at the IT service provider led to the compromise of personal information on nearly 80,000 people and put vulnerable individuals’ physical safety at risk.The subsidiary in question, Advanced Health and Care (AHC), should have known better. But its failings are not uncommon. It was simply unlucky enough to be found out after ransomware actors targeted the NHS supplier. The question is how other organisations can avoid the same fate. Fortunately, many of the answers lie in the detailed penalty notice recently published by the Information Commissioner’s Office (ICO). What Went Wrong? AHC offers various critical services to healthcare clients including the national health service, including software for patient management, electronic patient records, clinical decision support, care planning and workforce management. It also supports the NHS 111 service for urgent healthcare advice.Although some of the information in the ICO’s penalty notice has been redacted, we can piece together a rough timeline for the ransomware attack.On 2 August 2022, a threat actor logged into AHC’s Staffplan system via a Citrix account using a compromised password/username combo. It’s unclear how these credentials were obtained. Once inside, they executed a file to exploit the two-year-old “ZeroLogon” vulnerability which had not been patched. Doing so enabled them to escalate privileges up to a domain administrator account. The threat actor then used those privileges to move laterally through domains, turn off Anti-virus protection and perform additional reconnaissance. They also moved to AHC’s cloud storage and file hosting services and downloaded “Infrastructure management utilities” to enable data exfiltration. The adversaries deployed ransomware across 395 endpoints and exfiltrated 19GB of data, forcing Advanced to take nine key software offerings offline—three of which as a precaution.The Key Security Gaps The three main security failings unearthed by the ICO’s investigation were as follows:Vulnerability scanning: The ICO found no evidence that AHC was conducting regular vulnerability scans—as it should have been given the sensitivity of the services and data it managed and the fact that the health sector is classed as critical national infrastructure (CNI) by the government. The firm had previously purchased vulnerability scanning, web app scanning and policy compliance tools but had only conducted two scans at the time of the breach.AHC did carry out pen testing but did not follow up on the results, as the threat actors later exploited vulnerabilities uncovered by tests, the ICO said. As per the GDPR, the ICO assessed that this evidence proved AHC failed to “implement appropriate technical and organisational measures to ensure the ongoing confidentiality integrity, availability and resilience of processing systems and services.”Patch management: AHC did patch ZeroLogon but not across all systems because it did not have a “mature patch validation process in place.” In fact, the company couldn’t even validate whether the bug was patched on the impacted server because it had no accurate records to reference.Risk management (MFA): No multifactor authentication (MFA) was in place for the Staffplan Citrix environment. In the whole AHC environment, users only had MFA as an option for logging into two apps (Adastra and Carenotes). The firm had an MFA solution, tested in 2021, but had not rolled it out because of plans to replace certain legacy products to which Citrix provided access. The ICO said AHC cited customer unwillingness to adopt the solution as another barrier. What Was the Impact? There’s a reason why the ICO imposed such a sizeable fine, which was knocked down from an even higher £6.1m after Advanced’s “proactive engagement” with the authorities and its agreeing to a voluntary settlement. Put simply, the breach imperilled the digital and physical safety of many blameless data subjects and took key services offline for weeks on end. Specifically:Threat actors exfiltrated data on 79,404 individuals, almost half of whom had special category data taken. This included medical records, NI numbers, information on religious beliefs, employment, and demographic details. This special category data included details on how to gain entry to the homes of 890 data subjects who were receiving home care. A subsequent service outage impacted 658 customers including the NHS, with some services unavailable for up to 284 days. According to widespread reports at the time, there was major disruption to the critical NHS 111 service, and GP surgeries were forced to use pen and paper.Avoiding the Same Fate “Today’s decision is a stark reminder that organisations risk becoming the next target without robust security measures in place,” said Information Commissioner John Edwards at the time the fine was announced. So, what counts as “robust” in the ICO’s opinion? The penalty notice cites NCSC advice, Cyber Essentials and ISO 27002 – the latter providing key guidance on implementing the controls required by ISO 27001.Specifically, it cites ISO 27002:2017 as stating that: “information about technical vulnerabilities of information systems being used should be obtained in a timely fashion, the organisation’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk.”The NCSC urges vulnerability scans at least once a month, which Advanced apparently did in its corporate environment. The ICO was also at pains to point out that penetration testing alone is not enough, especially when performed in an ad hoc manner like AHC.Additionally, ISO 27001:2022 explicitly recommends MFA in its Annex A to achieve secure authentication, depending on the “type and sensitivity of the data and network.”All of this points to ISO 27001 as a good place to start for organisations looking to reassure regulators they have their customers’ best interests at heart and security by design as a guiding principle. In fact, it goes far beyond the three areas highlighted above, which led to the AHC breach.Critically, it enables companies to dispense with ad hoc measures and take a systemic approach to managing information security risk at all levels of an organisation. That’s good news for any organisation wanting to avoid becoming the next Advanced itself, or taking on a supplier like AHC with a sub-par security posture. The standard helps to establish clear information security obligations to mitigate supply chain risks.In a world of mounting risk and supply chain complexity, this could be invaluable.
Read More
ISO 27001

What’s Going Wrong with NIS 2 Compliance, and How to Put It Right

A "one and done" mindset is not the right fit for regulatory compliance—quite the reverse. Most global regulations require continuous improvement, monitoring, and regular audits and assessments. The EU's NIS 2 directive is no different.That's why many CISOs and compliance leaders will find the latest report from the EU Security Agency (ENISA) interesting reading. ENISA NIS360 2024 outlines six sectors struggling with compliance and points out why, while highlighting how more mature organisations are leading the way. The good news is that organisations already certified to ISO 27001 will find that closing the gaps to NIS 2 compliance is relatively straightforward. What's New in NIS 2 NIS 2 is the EU's attempt to update its flagship digital resilience law for the modern era. Its efforts focus on:Expanding the number of sectors covered by the directive Introducing more concrete baseline cybersecurity requirements Reducing inconsistencies in levels of resilience between different sectors Improving information sharing, incident response and supply chain risk management Holding senior management accountable for any egregious failingsUK organisations will get their own updated version of the original Network and Information Systems (NIS) Directive when the Cyber Security and Resilience Bill finally makes its way into law. However, many provide services to European citizens and/or operate on the continent, meaning they fall within the remit of NIS 2. For these organisations, NIS360 may be a useful read. Which Sectors Are Struggling? Of the 22 sectors and sub-sectors studied in the report, six are said to be in the "risk zone" for compliance – that is, the maturity of their risk posture isn't keeping pace with their criticality. They are:ICT service management: Although it supports organisations in a similar way to other digital infrastructure, the sector's maturity is lower. ENISA points out its "lack of standardised processes, consistency and resources" to stay on top of the increasingly complex digital operations it must support. Poor collaboration between cross-border players compounds the problem, as does the "unfamiliarity" of competent authorities (CAs) with the sector.ENISA urges closer cooperation between CAs and harmonised cross-border supervision, among other things.Space: The sector is increasingly critical in facilitating a range of services, including phone and internet access, satellite TV and radio broadcasts, land and water resource monitoring, precision farming, remote sensing, management of remote infrastructure, and logistics package tracking. However, as a newly regulated sector, the report notes that it is still in the early stages of aligning with NIS 2's requirements. A heavy reliance on commercial off-the-shelf (COTS) products, limited investment in cybersecurity and a relatively immature information-sharing posture add to the challenges.ENISA urges a bigger focus on raising security awareness, improving guidelines for testing of COTS components before deployment, and promoting collaboration within the sector and with other verticals like telecoms.Public administrations: This is one of the least mature sectors despite its vital role in delivering public services. According to ENISA, there's no real understanding of the cyber risks and threats it faces or even what is in scope for NIS 2. However, it remains a major target for hacktivists and state-backed threat actors.ENISA recommends a shared service model with other public entities to optimise resources and enhance security capabilities. It also encourages public administrations to modernise legacy systems, invest in training and use the EU Cyber Solidarity Act to obtain financial support for improving detection, response and remediation.Maritime: Essential to the economy (it manages 68% of freight) and heavily reliant on technology, the sector is challenged by outdated tech, especially OT.ENISA claims it could benefit from tailored guidance for implementing robust cybersecurity risk management controls – prioritising secure-by-design principles and proactive vulnerability management in maritime OT. It calls for an EU-level cybersecurity exercise to enhance multi-modal crisis response.Health: The sector is vital, accounting for 7% of businesses and 8% of employment in the EU. The sensitivity of patient data and the potentially fatal impact of cyber threats mean incident response is critical. However, the diverse range of organisations, devices and technologies within the sector, resource gaps, and outdated practices mean many providers struggle to get beyond basic security. Complex supply chains and legacy IT/OT compound the problem.ENISA wants to see more guidelines on secure procurement and best practice security, staff training and awareness programmes, and more engagement with collaboration frameworks to build threat detection and response.Gas: The sector is vulnerable to attack thanks to its reliance on IT systems for control and interconnectivity with other industries like electricity and manufacturing. ENISA says that incident preparedness and response are particularly poor, especially compared to electricity sector peers.The sector should develop robust, regularly tested incident response plans and improve collaboration with electricity and manufacturing sectors on coordinated cyber defence, shared best practices, and joint exercises. What Are the Leaders Doing Right? According to ENISA, the sectors with the highest maturity levels are notable for several reasons:More substantial cybersecurity guidance, potentially including sector-specific legislation or standards Stronger oversight and support from EU authorities familiar with the sector and its challenges Deeper understanding of risk and more effective risk management Stronger collaboration and information sharing among entities and authorities at a national and EU level More mature operational preparedness through well-tested plansHow to Succeed with NIS 2 Compliance It should be remembered that no two organisations in a specific sector are the same. However, the report's findings are instructive. And while some of the burden for improving compliance falls on the shoulders of CAs – to improve oversight, guidance and support – a big part of it is about taking a risk-based approach to cyber. This is where standards like ISO 27001 come into their own, adding detail that NIS 2 may lack, according to Jamie Boote, associate principal software security consultant at Black Duck:"NIS 2 was written at a high level because it had to apply to a broad range of companies and industries, and as such, couldn't include tailored, prescriptive guidance beyond informing companies of what they had to comply with," he explains to ISMS.online."While NIS 2 tells companies that they must have 'incident handling' or 'basic cyber-hygiene practices and cybersecurity training', it doesn't tell them how to build those programmes, write the policy, train personnel, and provide adequate tooling. Bringing in frameworks that go into detail about how to do incident handling, or supply chain security is vitally helpful when unpacking those policy statements into all the elements that make up the people, processes and technology of a cybersecurity programme."Chris Henderson, senior director of threat operations at Huntress, agrees there's a significant overlap between NIS 2 and ISO 27001."ISO27001 covers many of the same governance, risk management and reporting obligations required under NIS 2. If an organisation already has obtained their ISO 27001 standard, they are well positioned to cover the NIS2 controls as well," he tells ISMS.online. "One area they will need to enhance is crisis management, as there is no equivalent ISO 27001 control. The reporting obligations for NIS 2 also have specific requirements which will not be immediately met through the implementation of ISO 27001."He urges organisations to start by testing out mandatory policy elements from NIS 2 and mapping them to the controls of their chosen framework/standard (e.g. ISO 27001)."It's also important to understand gaps in a framework itself because not every framework may provide full coverage of a regulation, and if there are any unmapped regulatory statements left, an additional framework may need to be added," he adds.That said, compliance can be a major undertaking."Compliance frameworks like NIS 2 and ISO 27001 are large and require a significant amount of work to achieve, Henderson says. "If you are building a security program from the ground up, it is easy to get analysis paralysis trying to understand where to start."This is where third-party solutions, which have already done the mapping work to produce a NIS 2-ready compliance guide, can help.Morten Mjels, CEO of Green Raven Limited, estimates that ISO 27001 compliance will get organisations about 75% of the way to alignment with NIS 2 requirements."Compliance is an ongoing battle with a giant (the regulator) that never tires, never gives up and never gives in," he tells ISMS.online. "This is why larger companies have entire departments dedicated to ensuring compliance across the board. If your company is not in that position, it is worth consulting with one."Check out this webinar to learn more about how ISO 27001 can practically help with NIS 2 compliance.
Read More
ISO 27001

Cybersecurity Advances Have Stalled Among UK Companies: Here’s How to Fix It

Every day, we read about the damage and destruction caused by cyber-attacks. Just this month, research revealed that half of UK firms were forced to halt or disrupt digital transformation projects due to state-sponsored threats. In an ideal world, stories like this would filter through to senior leadership, with efforts redoubled to improve cybersecurity posture. Yet the latest findings from the government tell a different story.Unfortunately, progress has stalled on several fronts, according to the latest Cyber security breaches survey. One of the few positives to take away from the annual report is a growing awareness of ISO 27001. Larger Firms in the Crosshairs Published since 2016, the government’s study is based on a survey of 2,180 UK businesses. But there’s a world of difference between a micro-business with up to nine employees and a medium (50-249 staff) or large (250+ employees) enterprise.That’s why we can’t read too much into the headline figure: an annual fall in the share of businesses overall reporting a cyber-attack or breach in the past year (from 50% to 43%). Even the government admits that the fall is most likely due to fewer micro and small businesses identifying phishing attacks. It may simply be that they’re getting harder to spot, thanks to the malicious use of generative AI (GenAI).In fact, the share of medium (67%) and large-sized (74%) businesses reporting security incidents remains elevated. And large (29%) and medium (20%) businesses are also more likely than businesses overall (16%) to experience a negative outcome. This could include anything from loss of access to files and third-party services to corrupted systems, slower apps, and theft of personal data and funds. Additionally, large firms are most likely to report business disruption such as:Requiring extra staff time to deal with breaches/attacks (32% vs 17% overall) Putting new security measures in place (26% vs 18%) Interruption of employees’ day-to-day work (19% vs 9%) Disruption of service/goods delivery (8% vs 3%) Receiving customer complaints (6% vs 2%)Additionally, while 20% of businesses overall are assessed to have been the victim of at least one cybercrime in the past 12 months, the figure rises to 43% of medium businesses and 52% of large businesses. The Good and the Bad The good news is that most medium and large businesses have taken key actions in each of the NCSC’s best practice 10-step guide to improving cybersecurity posture. And the percentage that has undertaken action in five or more areas has nudged up over the past year, from 80% to 82% for medium and 91% to 95% for larger firms. Additionally, around 95-100% of these organisations have at least three best practice technical rules or controls in place, such as up-to-date malware protection, network firewalls, restricted IT admin/access rights, device security, and VPNs.Yet this hides an arguably more concerning bigger picture. For example:Staff training programmes were in place in 54% of medium and 76% of large businesses – similar to last year’s stats.Third-party supplier risk reviews were conducted by only 32% of medium and 45% of large firms – versus 28% and 48% last year.Incident response plans were in place in just 53% of medium-sized businesses and 75% of large businesses (versus 55% and 73%).There also appears to be a lack of strategic direction and accountability from senior leadership. Just 70% of large businesses (up from 66%) and 57% of mid-sized firms (down from 58%) even have a cybersecurity strategy. In too many large companies, cybersecurity is being managed by the IT director (19%) or an IT manager, technician or administrator (20%).“Businesses should always have a proportionate response to their risk; an independent baker in a small village probably doesn’t need to carry out regular pen tests, for example. However, they should work to understand their risk, and for 30% of large corporates to not be proactive in at least learning about their risk is damning,” argues Ecliptic Dynamics co-founder Tom Kidwell.“There are always steps businesses can take though to lessen the impact of breaches and halt attacks in their infancy. The first of these is understanding your risk and taking appropriate action.”Yet only half (51%) of boards in mid-sized firms have someone responsible for cyber, rising to 66% for larger firms. These figures have remained virtually unchanged for three years. And just 39% of business leaders at medium-sized firms get monthly updates on cyber, rising to half (55%) of large firms. Given the speed and dynamism of today’s threat landscape, that figure is too low. Where Do We Go from Here? An obvious way to improve cybersecurity maturity would be to embrace compliance with best practice standards like ISO 27001. On this front, there are mixed signals from the report. On the one hand, it has this to say:“There seemed to be a growing awareness of accreditations such as Cyber Essentials and ISO 27001 and on the whole, they were viewed positively.”Client and board member pressure and “peace of mind for stakeholders” are said to be driving demand for such approaches, while respondents rightly judge ISO 27001 to be “more robust” than Cyber Essentials.However, awareness of 10 Steps and Cyber Essentials is falling. And far fewer large businesses are seeking external guidance on cybersecurity than last year (51% versus 67%).Ed Russell, CISO business manager of Google Cloud at Qodea, claims that economic instability may be a factor.“In times of uncertainty, external services are often the first areas to face budget cuts – even though reducing spend on cybersecurity guidance is a risky move,” he tells ISMS.online.Russell argues that standards like ISO 27001 greatly enhance cyber maturity, reduce cyber risk and improve regulatory compliance.“These standards help organisations to establish strong security foundations for managing risks and deploy appropriate controls to enhance the protection of their valuable information assets,” he adds.“ISO 27001 is designed to support continuous improvement, helping organisations enhance their overall cybersecurity posture and resilience as threats evolve and regulations change. This not only protects the most critical information but also builds trust with stakeholders – offering a competitive edge.”Cato Networks chief security strategist, Etay Maor, agrees but warns that compliance doesn’t necessarily equal security.“These strategic guidelines should be part of a holistic security practice that includes more operational and tactical frameworks, constant evaluation to compare it to current threats and attacks, breach response exercises and more,” he tells ISMS.online. “They are a good place to start, but organisations must go beyond.”
Read More
ISO 27001

Email Scammers are Evolving: Here’s How to Protect Yourself

Cybercriminals are rattling corporate door knobs on a constant basis, but few attacks are as devious and brazen as business email compromise (BEC). This social engineering attack uses email as a path into an organisation, enabling attackers to dupe victims out of company funds.BEC attacks frequently use email addresses that look like they come from a victim's own company or a trusted partner like a supplier. These domains are often misspelled, or use different character sets to produce domains that look like a trusted source but are malicious.Eagle-eyed employees can spot these malicious addresses, and email systems can handle them using email protection tools like the Domain-based Message Authentication, Reporting, and Conformance (DMARC) email authentication protocol. But what if an attacker is able to use a domain that everyone trusts? When Trusted Sources Can't Be Trusted Cybersecurity company Guardz recently discovered attackers doing just that. On March 13, it published an analysis of an attack that used Microsoft's cloud resources to make a BEC attack more convincing.Attackers used the company's own domains, capitalising on tenant misconfigurations to wrest control from legitimate users. Attackers gain control of multiple M365 organisational tenants, either by taking some over or registering their own. The attackers create administrative accounts on these tenants and create their mail forwarding rules.They then abuse a Microsoft feature that displays an organisation's name, using it to insert a fraudulent transaction confirmation, along with a phone number to call for a refund request. This phishing text gets through the system because traditional email security tools don't scan the organisation name for threats. The email gets to the victim's inbox because Microsoft's domain has a good reputation.When the victim calls the number, the attacker impersonates a customer service agent and persuades them to install malware or hand over personal information such as their login credentials. A Rising Tide Of BEC Attacks This attack highlights the ongoing spectre of BEC attacks, which have escalated over time. The most recent (2024) data from the FBI reported $55.5bn in global BEC losses between 2013 and 2023 - up from almost $51bn reported the prior year.Neither is this the first time that BEC and phishing attacks have targeted Microsoft 365 users. In 2023, researchers noted the rapid rise in W3LL, a phishing kit that specifically compromised Microsoft 365 accounts by bypassing multi-factor authentication. What You Can Do The best approach to mitigating BEC attacks is, as with most other cybersecurity protections, multi-layered. Criminals might break through one layer of protection but are less likely to overcome multiple hurdles. Security and control frameworks, such as ISO 27001 and NIST's Cybersecurity Framework, are good sources of measures to help dodge the scammers. These help to identify vulnerabilities, improve email security protocols, and reduce exposure to credential-based attacks.Technological controls are often a useful weapon against BEC scammers. Using email security controls such as DMARC is safer than not, but as Guardz points out, they won't be effective against attacks using trusted domains.The same goes for content filtering using one of the many available email security tools. While it wouldn't have caught the sneaky threat embedding technique used in the attack reported this March, it's nevertheless a useful measure in general. Advanced content analysis that looks at organisational fields and metadata is optimal.Similarly, conditional access policies are a valuable way to stop some BEC attacks, including the use of multi-factor authentication (MFA). However, this protection, which uses a second out-of-band authentication mechanism to confirm the user's identity, isn't foolproof. Reverse proxy attacks, in which the attacker uses an intermediate server to harvest a victim's MFA credential, are well known. One such attack occurred in 2022, targeting 10,000 organisations using M365. So, use MFA, but don't rely on it alone. Get Employees On Board Many attacks are thwarted not by technical controls but by a vigilant employee who demands verification of an unusual request. Spreading protections across different aspects of your organisation is a good way to minimise risk through diverse protective measures. That makes people and organisational controls key when fighting scammers. Conduct regular training to recognise BEC attempts and verify unusual requests.From an organisational perspective, companies can implement policies that force more secure processes when carrying out the kinds of high-risk instructions - like large cash transfers - that BEC scammers often target. Separation of duties - a specific control within ISO 27001 - is an excellent way to reduce risk by ensuring that it takes multiple people to execute a high-risk process.Speed is essential when responding to an attack that does make it through these various controls. That's why it's also a good idea to plan your incident response before a BEC attack occurs. Create playbooks for suspected BEC incidents, including coordination with financial institutions and law enforcement, that clearly outline who is responsible for which part of the response and how they interact.Continuous security monitoring - a fundamental tenet of ISO 27001 - is also crucial for email security. Roles change. People leave. Keeping a vigilant eye on privileges and watching for new vulnerabilities is critical to keep dangers at bay.BEC scammers are investing in evolving their techniques because they're profitable. All it takes is one big scam to justify the work they put into targeting key executives with financial requests. It's the perfect example of the defender's dilemma, in which an attacker only has to succeed once, while a defender must succeed every time. Those aren't the odds we'd like, but putting effective controls in place helps to balance them more equitably.
Read More
ISO 27001

Some Vulnerabilities Are Forgivable, But Poor Patch Management Is Not

At the start of the year, the UK's National Cyber Security Centre (NCSC) called on the software industry to get its act together. Too many "foundational vulnerabilities" are slipping through into code, making the digital world a more dangerous place, it argued. The plan is to force software vendors to improve their processes and tooling to eradicate these so-called "unforgivable" vulnerabilities once and for all.While ambitious in scope, it will take some time for the agency's plan to bear fruit – if it does at all. In the meantime, organisations need to get better at patching. This is where ISO 27001 can help by improving asset transparency and ensuring software updates are prioritised according to risk. The Problem with CVEs Software ate the world many years ago. And there's more of it around today than ever before – running critical infrastructure, enabling us to work and communicate seamlessly, and offering endless ways to entertain ourselves. With the advent of AI agents, software will embed itself ever further into the critical processes that businesses, their employees and their customers rely on to make the world go round.But because it's (largely) designed by humans, this software is error-prone. And the vulnerabilities that stem from these coding mistakes are a key mechanism for threat actors to breach networks and achieve their goals. The challenge for network defenders is that for the past eight years, a record number of vulnerabilities (CVEs) have been published. The figure for 2024 was over 40,000. That's a lot of security updates to apply.As long as the volume and complexity of software continues to grow, and researchers and threat actors are incentivised to find vulnerabilities, the number of annual CVEs will continue to surge upwards. That means more vulnerabilities for threat actors to exploit.According to one estimate, a whopping 768 CVEs were publicly reported as being exploited in the wild last year. And while 24% of these were zero-days, most were not. In fact, while AI tools are helping some threat actors exploit vulnerabilities faster than ever before, evidence also suggests that legacy bugs remain a major problem. It reveals that 40% of vulnerabilities exploited in 2024 were from 2020 or earlier, and 10% were from 2016 or earlier. What Does the NCSC Want to Do? In this context, the NCSC's plan makes sense. Its Annual Review 2024 bemoans the fact that software vendors are simply not incentivised to produce more secure products, arguing that the priority is too often on new features and time to market."Products and services are produced by commercial enterprises operating in mature markets which – understandably – prioritise growth and profit rather than the security and resilience of their solutions. Inevitably, it's small and medium-sized enterprises (SMEs), charities, education establishments and the wider public sector that are most impacted because, for most organisations, cost consideration is the primary driver," it notes."Put simply, if the majority of customers prioritise price and features over 'security', then vendors will concentrate on reducing time to market at the expense of designing products that improve the security and resilience of our digital world."Instead, the NCSC hopes to build a world where software is "secure, private, resilient, and accessible to all". That will require making "top-level mitigations" easier for vendors and developers to implement through improved development frameworks and adoption of secure programming concepts. The first stage is helping researchers to assess if new vulnerabilities are "forgivable" or "unforgivable" – and in so doing, build momentum for change. However, not everyone is convinced."The NCSC's plan has potential, but its success depends on several factors such as industry adoption and acceptance and implementation by software vendors," cautions Javvad Malik, lead security awareness advocate at KnowBe4. "It also relies on consumer awareness and demand for more secure products as well as regulatory support."It's also true that, even if the NCSC's plan worked, there would still be plenty of "forgivable" vulnerabilities to keep CISOs awake at night. So what can be done to mitigate the impact of CVEs? A Standards-Based Approach Malik suggests that the best practice security standard ISO 27001 is a useful approach."Organisations that are aligned to ISO27001 will have more robust documentation and can align vulnerability management with overall security objectives," he tells ISMS.online.Huntress senior manager of security operations, Dray Agha, argues that the standard provides a "clear framework" for both vulnerability and patch management."It helps businesses stay ahead of threats by enforcing regular security checks, prioritising high-risk vulnerabilities, and ensuring timely updates," he tells ISMS.online. "Rather than reacting to attacks, companies using ISO 27001 can take a proactive approach, reducing their exposure before hackers even strike, denying cybercriminals a foothold in the organisation's network by patching and hardening the environment."However, Agha argues that patching alone is not sufficient."Businesses can go further to defend against cyber threats by deploying network segmentation and web application firewalls (WAFs). These measures act as extra layers of protection, shielding systems from attacks even if patches are delayed," he continues. "Adopting zero trust security models, managed detection and response systems, and sandboxing can also limit the damage if an attack does break through."KnowBe4's Malik agrees, adding that virtual patching, endpoint detection, and response are good options for layering up defences."Organisations can also undertake penetration testing on software and devices prior to deploying into production environments, and then periodically afterwards. Threat intelligence can be utilised to provide insight into emerging threats and vulnerabilities," he says."Many different methods and approaches exist. There has never been a shortage of options, so organisations should look at what works best for their particular risk profile and infrastructure."
Read More
ISO 27001

Encryption in Crisis: UK Businesses Face Security Shake-Up Under Proposed Investigatory Powers Act Reform

The UK Government is pursuing changes to the Investigatory Powers Act, its internet snooping regime, that will enable law enforcement and security services to bypass the end-to-end encryption of cloud providers and access private communications more easily and with greater scope. It claims the changes are in the public's best interests as cybercrime spirals out of control and Britain's enemies look to spy on its citizens.However, security experts think otherwise, arguing that the amendments will create encryption backdoors that allow cyber criminals and other nefarious parties to prey on the data of unsuspecting users. They urge businesses to take encryption into their own hands in order to protect their customers and their reputations, as the cloud services upon which they used to rely are no longer free from government snooping. This is apparent from Apple's decision to stop offering its Advanced Data Protection tool in Britain following demands by British lawmakers for backdoor access to data, despite the fact that the Cupertino-based tech giant can't even access it. Improving Public Safety The government hopes to improve public safety and national security by making these changes. This is because the increased use and sophistication of end-to-end encryption makes intercepting and monitoring communications harder for enforcement and intelligence agencies. Politicians argue that this prevents the authorities from doing their jobs and allows criminals to get away with their crimes, endangering the country and its population.Matt Aldridge, principal solutions consultant at OpenText Security, explains that the government wants to tackle this issue by giving police and intelligence services more powers and scope to compel tech companies to bypass or turn off end-to-end encryption should they suspect a crime.In doing so, investigators could access the raw data held by tech companies. They can then use this information to aid their investigations and ultimately tackle crime.Alridge tells ISMS.online: "The argument is that without this additional ability to gain access to encrypted communications or data, UK citizens will be more exposed to criminal and spying activities, as authorities will not be able to use signals intelligence and forensic investigations to gather critical evidence in such cases."The government is trying to keep up with criminals and other threat actors through broadened data snooping powers, says Conor Agnew, head of compliance operations at Closed Door Security.  He says it is even taking steps to pressure companies to build backdoors into their software, enabling officials to access users' data as they please. Such a move risks "rubbishing the use of end-to-end encryption". Huge Consequences For Businesses However the government tries to justify its decision to modify IPA, the changes present significant challenges for organisations in maintaining data security, complying with regulatory obligations and keeping customers happy.Jordan Schroeder, managing CISO of Barrier Networks, argues that minimising end-to-end encryption for state surveillance and investigatory purposes will create a "systemic weakness" that can be abused by cybercriminals, nation-states and malicious insiders."Weakening encryption inherently reduces the security and privacy protections that users rely on," he says. "This poses a direct challenge for businesses, particularly those in finance, healthcare, and legal services, that depend on strong encryption to protect sensitive client data.Aldridge of OpenText Security agrees that by introducing mechanisms to compromise end-to-end encryption, the government is leaving businesses "hugely exposed" to both intentional and non-intentional cybersecurity issues. This will lead to a "massive decrease in assurance regarding the confidentiality and integrity of data".To comply with these new rules, Aldridge warns that technology service providers may be forced to withhold or delay vital security patches. He adds that this would give cyber criminals more time to exploit unpatched cybersecurity vulnerabilities.Consequently, Alridge expects a "net reduction" in the cybersecurity of tech companies operating in the UK and their users. But due to the interconnected nature of technology services, he says these risks could affect other countries besides the UK.Government-mandated security backdoors could be economically damaging to Britain, too.Agnew of Closed Door Security says international businesses may pull operations from the UK if "judicial overreach" prevents them from safeguarding user data.Without access to mainstream end-to-end encrypted services, Agnew believes many people will turn to the dark web to protect themselves from increased state surveillance. He says increased usage of unregulated data storage will only put users at greater risk and benefit criminals, rendering the government's changes useless. Mitigating These Risks Under a more repressive IPA regime, encryption backdoors risk becoming the norm. Should this happen, organisations will have no choice but to make sweeping changes to their cybersecurity posture.According to Schroeder of Barrier Networks, the most crucial step is a cultural and mindset shift in which businesses no longer assume technology vendors possess the capabilities to protect their data.He explains: "Where businesses once relied on providers like Apple or WhatsApp to ensure E2EE, they must now assume these platforms are incidentally compromised and take responsibility for their own encryption practices."Without adequate protection from technology service providers, Schroeder urges businesses to use independent, self-controlled encryption systems to improve their data privacy.There are a few ways to do this. Schroeder says one option is to encrypt sensitive data before it's transferred to third-party systems. That way, data will be safeguarded if the host platform is hacked.Alternatively, organisations can use open-source, decentralised systems without government-mandated encryption backdoors. The downside, Shroeder says, is that such software has different security risks and isn't always simple to use for non-technical users.Echoing similar views to Schroeder, Aldridge of OpenText Security says businesses must implement additional encryption layers now that they can't depend on the end-to-encryption of cloud providers.Before organisations upload data to the cloud, Aldridge says they should encrypt it locally. Businesses should also refrain from storing encryption keys in the cloud. Instead, he says they should opt for their own locally hosted hardware security modules, smart cards or tokens.Agnew of Closed Door Security recommends that businesses invest in zero-trust and defence-in-depth strategies to protect themselves from the risks of normalised encryption backdoors.But he admits that, even with these steps, organisations will be obligated to hand data to government agencies should it be requested via a warrant. With this in mind, he encourages businesses to prioritise "focusing on what data they possess, what data persons can submit to their databases or websites, and how long they hold this data for". Assessing These Risks Crucially, businesses must consider these challenges as part of a comprehensive risk management strategy. According to Schroeder of Barrier Networks, this will involve conducting regular audits of the security measures employed by encryption providers and the wider supply chain.Aldridge of OpenText Security also stresses the importance of re-evaluating cyber risk assessments to take into account the challenges posed by weakened encryption and backdoors. Then, he adds that they'll need to concentrate on implementing additional encryption layers, sophisticated encryption keys, vendor patch management, and local cloud storage of sensitive data.Another good way to assess and mitigate the risks brought about by the government's IPA changes is by implementing a professional cybersecurity framework.Schroeder says ISO 27001 is a good choice because it provides detailed information on cryptographic controls, encryption key management, secure communications and encryption risk governance. He says: "This can help organisations ensure that even if their primary provider is compromised, they retain control over the security of their data."Overall, the IPA changes seem to be yet another example of the government looking to gain more control over our communications. Touted as a step to bolster national security and protect everyday citizens and businesses, the changes simply put people at greater risk of data breaches. At the same time, companies are forced to dedicate already-stretched IT teams and thin budgets to developing their own means of encryption as they can no longer trust the protections offered by cloud providers. Whatever the case, incorporating the risk of encryption backdoors is now an absolute necessity for businesses.
Read More
ISO 27001

Zero-Day Vulnerabilities: How Can You Prepare for the Unexpected?

Warnings from global cybersecurity agencies showed how vulnerabilities are often being exploited as zero-days. In the face of such an unpredictable attack, how can you be sure you've got a suitable level of protection and whether existing frameworks are enough?  Understanding the Zero-Day Threat It has been almost ten years since cybersecurity speaker and researcher 'The Grugq' stated, "Give a man a zero-day, and he'll have access for a day; teach a man to phish, and he'll have access for life."This line came at the midway point of a decade that had begun with the Stuxnet virus and used multiple zero-day vulnerabilities. This led to a fear of these unknown vulnerabilities, which attackers use for a one-off attack on infrastructure or software and for which preparation was apparently impossible.A zero-day vulnerability is one in which no patch is available, and often, the software vendor does not know about the flaw. Once used, however, the flaw is known and can be patched, giving the attacker a single chance to exploit it. The Evolution of Zero-Day Attacks As the sophistication of attacks reduced in the later 2010s and ransomware, credential stuffing attacks, and phishing attempts were used more frequently, it may feel like the age of the zero-day is over.However, it is no time to dismiss zero-days. Statistics show that 97 zero-day vulnerabilities were exploited in the wild in 2023, over 50 percent more than in 2022. It was a ripe time for national cybersecurity agencies to issue a warning about exploited zero-days.In November, the UK's National Cyber Security Centre (NCSC) – alongside agencies from Australia, Canada, New Zealand and the United States – shared a list of the top 15 routinely exploited vulnerabilities in 2023. Why Zero-Day Vulnerabilities Still Matter In 2023, the majority of those vulnerabilities were initially exploited as zero-days, a significant increase from 2022, when fewer than half of the top vulnerabilities were exploited early.Stefan Tanase, a cyber intelligence expert at CSIS, says, "Zero-days are no longer just tools of espionage; they are fuelling large-scale cybercrime." He cites the exploit of zero-days in Cleo file transfer solutions by the Clop ransomware gang to breach corporate networks and steal data as one of the most recent examples. What Can Organisations Do to Protect Against Zero-Days? So, we know what the problem is, how do we resolve it? The NCSC advisory strongly encouraged enterprise network defenders to maintain vigilance with their vulnerability management processes, including applying all security updates promptly and ensuring they have identified all assets in their estates.Ollie Whitehouse, NCSC chief technology officer, said that to reduce the risk of compromise, organisations should "stay on the front foot" by applying patches promptly, insisting upon secure-by-design products, and being vigilant with vulnerability management.Therefore, defending against an attack in which a zero-day is used requires a reliable governance framework that combines those protective factors. If you are confident in your risk management posture, can you be confident in surviving such an attack? The Role of ISO 27001 in Combating Zero-Day Risks ISO 27001 offers an opportunity to ensure your level of security and resilience. Annex A. 12.6, ' Management of Technical Vulnerabilities,' states that information on technological vulnerabilities of information systems used should be obtained promptly to evaluate the organisation's risk exposure to such vulnerabilities. The company should also take measures to mitigate that risk.While ISO 27001 cannot predict the use of zero-day vulnerabilities or prevent an attack using them, Tanase says its comprehensive approach to risk management and security preparedness equips organisations to better withstand the challenges posed by these unknown threats. How ISO 27001 Helps Build Cyber Resilience ISO 27001 gives you the foundation in risk management and security processes that should prepare you for the most severe attacks. Andrew Rose, a former CISO and analyst and now chief security officer of SoSafe, has implemented 27001 in three organisations and says, "It doesn't guarantee you're secure, but it does guarantee you've got the right processes in place to make you secure."Calling it "a continual Improvement engine," Rose says it works in a loop where you look for vulnerabilities, gather threat intelligence, put it onto a risk register, and use that risk register to create a security Improvement plan. Then, you take that to the executives and take action to fix things or accept the risks.He says, "It puts in all the good governance that you need to be secure or get oversights, all the risk assessment, and the risk analysis. All those things are in place, so it's an excellent model to build."Following the guidelines of ISO 27001 and working with an auditor such as ISMS to ensure that the gaps are addressed, and your processes are sound is the best way to ensure that you are best prepared. Preparing Your Organisation for the Next Zero-Day Attack Christian Toon, founder and principal security strategist at Alvearium Associates, said ISO 27001 is a framework for building your security management system, using it as guidance."You can align yourselves with the standard and do and choose the bits you want to do," he said. "It's about defining what's right for your business within that standard."Is there an element of compliance with ISO 27001 that can help deal with zero days? Toon says it is a game of chance when it comes to defending against an exploited zero-day. However, one step has to involve having the organisation behind the compliance initiative.He says if a company has never had any big cyber issues in the past and "the biggest issues you've probably had are a couple of account takeovers," then preparing for a 'big ticket' item—like patching a zero-day—will make the company realise that it needs to do more.Toon says this leads companies to invest more in compliance and resilience, and frameworks such as ISO 27001 are part of "organisations riding the risk." He says, "They're quite happy to see it as a bit of a low-level compliance thing," and this results in investment.Tanase said part of ISO 27001 requires organisations to perform regular risk assessments, including identifying vulnerabilities—even those unknown or emerging—and implementing controls to reduce exposure."The standard mandates robust incident response and business continuity plans," he said. "These processes ensure that if a zero-day vulnerability is exploited, the organisation can respond swiftly, contain the attack, and minimise damage."The ISO 27001 framework consists of advice to ensure a company is proactive. The best step to take is to be ready to deal with an incident, be aware of what software is running and where, and have a firm handle on governance.
Read More
ISO 27001

Securing Open Source in 2025 and Beyond: A Roadmap for Progress

It's been over three years since Log4Shell, a critical vulnerability in a little-known open-source library, was discovered. With a CVSS score of 10, its relative ubiquity and ease of exploitation singled it out as one of the most serious software flaws of the decade. But even years after it was patched, more than one in 10 downloads of the popular utility are of vulnerable versions. Something is clearly wrong somewhere.A new report from the Linux Foundation has some useful insight into the systemic challenges facing the open-source ecosystem and its users. Unfortunately, there are no easy solutions, but end users can at least mitigate some of the more common risks through industry best practices. A Catastrophic Case Study Open-source software components are everywhere—even proprietary code developers rely on them to accelerate DevOps processes. According to one estimate, 96% of all codebases contain open-source components, and three-quarters contain high-risk open-source vulnerabilities. Given that approaching seven trillion components were downloaded in 2024, this presents a massive potential risk to systems across the globe.Log4j is an excellent case study of what can go wrong. It highlights a major visibility challenge in that software doesn't just contain "direct dependencies" – i.e., open source components that a program explicitly references—but also transitive dependencies. The latter are not imported directly into a project but are used indirectly by a software component. In effect, they're dependencies of direct dependencies. As Google explained at the time, this was the reason why so many Log4j instances were not discovered."The deeper the vulnerability is in a dependency chain, the more steps are required for it to be fixed," it noted.Sonatype CTO Brian Fox explains that "poor dependency management" in firms is a major source of open-source cybersecurity risk."Log4j is a great example. We found 13% of Log4j downloads are of vulnerable versions, and this is three years after Log4Shell was patched," he tells ISMS.online. "This is not an issue unique to Log4j either – we calculated that in the last year, 95% of vulnerable components downloaded had a fixed version already available."However, open source risk isn't just about potential vulnerabilities appearing in hard-to-find components. Threat actors are also actively planting malware in some open-source components, hoping they will be downloaded. Sonatype discovered 512,847 malicious packages in the main open-source ecosystems in 2024, a 156% annual increase. Systemic Challenges Log4j was just the tip of the iceberg in many ways, as a new Linux report reveals. It points to several significant industry-wide challenges with open-source projects:Legacy tech: Many developers continue to rely on Python 2, even though Python 3 was introduced in 2008. This creates backwards incompatibility issues and software for which patches are no longer available. Older versions of software packages also persist in ecosystems because their replacements often contain new functionality, which makes them less attractive to users.A lack of standardised naming schema: Naming conventions for software components are "unique, individualised, and inconsistent", limiting initiatives to improve security and transparency.A limited pool of contributors:"Some widely used OSS projects are maintained by a single individual. When reviewing the top 50 non-npm projects, 17% of projects had one developer, and 40% had one or two developers who accounted for at least 80% of the commits," OpenSSF director of open source supply chain security, David Wheeler tells ISMS.online."A project with a single developer has a greater risk of later abandonment. In addition, they have a greater risk of neglect or malicious code insertion, as they may lack regular updates or peer reviews."Cloud-specific libraries: This could create dependencies on cloud vendors, possible security blind spots, and vendor lock-in."The biggest takeaway is that open source is continuing to increase in criticality for the software powering cloud infrastructure," says Sonatype's Fox. "There has been 'hockey stick' growth in terms of open source usage, and that trend will only continue. At the same time, we have not seen support, financial or otherwise, for open source maintainers grow to match this consumption."Memory-unsafe languages: The adoption of the memory-safe Rust language is growing, but many developers still favour C and C++, which often contain memory safety vulnerabilities. How ISO 27001 Can Help As Red Hat contributor Herve Beraud notes, we should have seen Log4Shell coming because the utility itself (Log4j) had not undergone regular security audits and was maintained only by a small volunteer team, a risk highlighted above. He argues that developers need to think more carefully about the open-source components they use by asking questions about RoI, maintenance costs, legal compliance, compatibility, adaptability, and, of course, whether they're regularly tested for vulnerabilities.Experts also recommend software composition analysis (SCA) tools to enhance visibility into open-source components. These help organisations maintain a programme of continuous evaluation and patching. Better still, consider a more holistic approach that also covers risk management across proprietary software. The ISO 27001 standard delivers a structured framework to help organisations enhance their open-source security posture.This includes help with:Risk assessments and mitigations for open source software, including vulnerabilities or lack of support Maintaining an inventory of open-source software to help ensure all components are up-to-date and secure Access controls so that only authorised team members can use or modify open-source software Security policies and procedures on the use, monitoring and updating of components Supplier relationship management to ensure open source software providers adhere to the security standards and practices Continuous patch management to address security vulnerabilities in open-source software Incident management processes, including detection and response to vulnerabilities or breaches stemming from open-source Promotion of a continuous improvement culture to enhance the effectiveness of security controls Training and awareness for employees to understand the risks associated with open-source softwareThere's plenty more that can also be done, including government bug bounty programmes, education efforts and community funding from tech giants and other large enterprise users of open source. This problem will not be solved overnight, but at least the wheels have started turning.
Read More
ISO 27001

Winter Watches: Our 6 Favourite ISMS.online Webinars of 2024

In 2024, we saw cyber threats increase, data breach costs rise to record levels, and regulatory restrictions tighten as regulations like NIS 2 and the EU AI Act came into effect. Implementing a robust information security strategy is no longer a nice-to-have for organisations, but a mandatory requirement. Applying information security best practices helps businesses mitigate the risk of cyber incidents, avoid costly regulatory fines, and grow customer trust by securing sensitive information.Our top six favourite webinars in our ‘Winter Watches’ series are a must-watch for businesses looking to boost their information security compliance. Covering everything from transitioning to the latest ISO 27001 update to navigating NIS 2 and DORA, these key webinars offer top tips and vital advice from industry experts on establishing, managing, and continuously improving your information security management.Whether you need guidance on implementing the new ISO 42001 standard, support transitioning from ISO 27001:2013 to ISO 27001:2022 or advice on complying with new or upcoming regulations, our top webinars offer advice to help you along the path to success. Transitioning to ISO 27001:2022: Key Changes and Effective Strategies In October 2025, the transition period between the ISO 27001:2013 standard and the latest ISO 27001:2022 standard ends. For organisations certified to the 2013 iteration of ISO 27001, making the switch to compliance with the latest version of the standard can seem daunting.In ‘Transitioning to ISO 27001:2022’, our expert speakers discuss the changes introduced by the new standards and offer guidance on effectively transitioning from the 2013 to 2022 version.Toby Cane, Sam Peters and Christopher Gill provide practical advice on successfully implementing ISO 27001:2022 within your business, discussing:The core changes to the standard, including revised requirements and new Annex A controls The steps you need to take to maintain compliance with ISO 27001:2022 How to build a transition strategy that reduces disruption and ensures a smooth migration to the new standard.This webinar is essential viewing for information security professionals, compliance officers and ISMS decision-makers ahead of the mandatory transition deadline, with under a year to go.Watch Now ISO 42001 Explained: Unlocking Secure AI Management In Your Business Last December, the International Organisation for Standardisation released ISO 42001, the groundbreaking framework designed to help businesses ethically develop and deploy systems powered by artificial intelligence (AI).The ‘ISO 42001 Explained’ webinar provides viewers with an in-depth understanding of the new ISO 42001 standard and how it applies to their organisation. You’ll learn how to ensure your business’s AI initiatives are responsible, ethical and aligned with global standards as new AI-specific regulations continue to be developed across the globe.Our host Toby Cane is joined by Lirim Bllaca, Powell Jones, Iain McIvor and Alan Baldwin. Together, they break down the core principles of ISO 42001 and cover everything you need to know about the AI management standard and the AI regulatory landscape, including:A deep dive into the structure of ISO 42001, including its scope, purpose and core principles The unique challenges and opportunities presented by AI and the impact of AI on your organisation’s regulatory compliance An actionable roadmap for ISO 42001 compliance.Gain a clear understanding of the ISO 42001 standard and ensure your AI initiatives are responsible using insights from our panel of experts.Watch Now Mastering NIS 2 Compliance: A Practical Approach with ISO 27001 The European Union’s NIS 2 Directive entered into force in October, bringing stricter cybersecurity and reporting requirements for businesses across the EU. Does your business comply with the new regulation?In our in-depth ‘Mastering NIS 2 Compliance: A Practical Approach with ISO 27001’ webinar, we break down the new regulation and how the ISO 27001 framework can provide a roadmap to successful NIS 2 compliance.Our panel of compliance experts Toby Cane, Luke Dash, Patrick Sullivan and Arian Sheremeti discuss how organisations affected by NIS 2 can ensure they meet requirements. You’ll learn:The key provisions of the NIS 2 Directive and how they impact your business How ISO 27001 maps to NIS 2 requirements for more efficient compliance How to conduct risk assessments, develop incident response plans and implement security controls for robust compliance.Gain a deeper understanding of NIS 2 requirements and how ISO 27001 best practices can help you efficiently, effectively comply:Watch Now Securing Your Cloud Setup: Unlocking the Power of ISO 27017 & 27018 Compliance Cloud adoption is accelerating, but with 24% of organisations experiencing cloud security incidents last year, standards like ISO 27017 and ISO 27018 are essential for ensuring security, privacy, and long-term business competitiveness.In our webinar, expert speakers Toby Cane, Chris Gill, Iain McIvor and Alan Baldwin explain how these standards can strengthen your organisation’s security posture to reinforce cloud security and enable strategic growth. You’ll discover:What the ISO 27017 and ISO 27018 standards cover, including their scope and objectives Insight into the risks associated with cloud services and how implementing security and privacy controls can mitigate these risks The security and privacy controls to prioritise for NIS 2 compliance.Discover actionable takeaways and top tips from experts to help you improve your organisation’s cloud security stance:Watch NowBuilding Digital Trust: An ISO 27001 Approach to Managing Cybersecurity RisksRecent McKinsey research showing that digital trust leaders will see annual growth rates of at least 10% on their top and bottom lines. Despite this, the 2023 PwC Digital Trust Report found that just 27% of senior leaders believe their current cybersecurity strategies will enable them to achieve digital trust.Our ‘Building Digital Trust: An ISO 27001 Approach to Managing Security Risks’ webinar explores the challenges and opportunities for building digital trust, with a focus on how ISO 27001, the information security standard, can help.Our expert panel, Toby Cane and Gillian Welch, share practical advice and key steps for businesses looking to establish and maintain digital trust. In the 45-minute session, you’ll learn:Best practices for building and maintaining digital trust, including using ISO 27001 The importance of digital trust for businesses How cyber attacks and data breaches impact digital trust.Aimed at CEOs, board members and cybersecurity professionals, this vital webinar provides key insights into the importance of digital trust and how to build and maintain it in your organisation:Watch Now Navigating DORA Compliance with ISO 27001: A Roadmap to Digital Resilience The Digital Operational Resilience Act (DORA) comes into effect in January 2025 and is set to redefine how the financial sector approaches digital security and resilience.With requirements focused on strengthening risk management and enhancing incident response capabilities, the regulation adds to the compliance demands impacting an already highly regulated sector. Financial institutions’ need for a robust compliance strategy and increased digital resilience has never been greater.In ‘Navigating DORA Compliance with ISO 27001: A Roadmap to Digital Resilience’, speakers Toby Cane, Luke Sharples and Arian Sheremeti discuss how leveraging the ISO 27001 standard can help your organisation seamlessly achieve DORA compliance. They cover:DORA's core requirements and how they impact your business. How ISO 27001 provides a structured, practical path to compliance. Actionable steps for conducting gap analyses, managing third-party risks, and implementing incident response plans. Best practices for building resilient digital operations that go beyond simple compliance.Gain an in-depth understanding of DORA requirements and how ISO 27001 best practices can help your financial business comply:Watch Now Unlock Robust Compliance in 2025 Whether you’re just starting your compliance journey or looking to mature your security posture, these insightful webinars offer practical advice for implementing and building robust cybersecurity management. They explore ways to implement key standards like ISO 27001 and ISO 42001 for improved information security and ethical AI development and management.Continuously improve your information security management with ISMS.online – be sure to bookmark the ISMS.online webinar library. We regularly add new sessions with actionable tips and industry trends.
Read More
ISO 27001

Winter Reads: Our 6 Favourite ISMS.online Guides of 2024

In 2024, we saw a wave of new and updated information security regulatory and legal requirements. Regulations like the EU Artificial Intelligence (AI) Act, the updated Network and Information Security (NIS 2) Directive, and the upcoming Digital Operational Resilience Act (DORA) present organisations with brand-new compliance challenges.Additionally, AI technology continues to evolve, and new information security threats and opportunities are emerging at pace. In the current landscape, it’s vital for business leaders to stay ahead of the curve.To help you stay up to date on information security regulatory developments and make informed compliance decisions, ISMS.online publishes practical guides on high-profile topics, from regulatory updates to in-depth analyses of the global cybersecurity landscape. This festive season, we’ve put together our top six favourite guides – the definitive must-reads for business owners seeking to secure their organisations and align with regulatory requirements. Getting Started with NIS 2 Organisations that fall under the scope of NIS 2 are now legally required to comply with the directive, which came into effect in October.Our guide covers everything you need to know about the directive designed to strengthen the digital infrastructure across the EU, including NIS 2 core requirements, the business types that must comply, and, of course, how to comply with the regulation.You’ll discover:A detailed list of the NIS 2 enhanced obligations so you can determine the key areas of your business to review Seven core steps to manage your cybersecurity and align with the requirements of the directive Guidance on how to achieve NIS 2 compliance using ISO 27001 certification.Ensure your business complies with the NIS 2 directive and secure your vital systems and data – download the guide.Discover NIS 2 AI Management Made Easy: The No-Stress Guide to ISO 42001 The groundbreaking ISO 42001 standard was released in 2023; it provides a framework for how organisations build, maintain and continuously improve an artificial intelligence management system (AIMS).Many businesses are keen to realise the benefits of ISO 42001 compliance and prove to customers, prospects and regulators that their AI systems are responsibly and ethically managed. Our popular ISO 42001 guide provides a deep dive into the standard, helping readers learn who ISO 42001 applies to, how to build and maintain an AIMS, and how to achieve certification to the standard.You’ll discover:Key insights into the structure of the ISO 42001 standard, including clauses, core controls and sector-specific contextualisation The principles behind the ISO 42001 standard and how they can be applied to your business The ten building blocks for an effective, ISO 42001-compliant AIMSDownload our guide to gain vital insights to help you achieve compliance with the ISO 42001 standard and learn how to proactively address AI-specific risks to your business.Get the ISO 42001 Guide The Proven Path to ISO 27001 Ready to set your business up for ISO 27001 success? Our handy “Proven Path to ISO 27001” guide walks you through everything from how to embed ISO 27001 in your organisation and build an information security management system (ISMS), right through to achieving ISO 27001 certification first time!Achieving ISO 27001 certification offers a real competitive advantage for your business, but the process can be daunting. Our simple, accessible guide will help you discover all you need to know to achieve success.The guide walks you through:What ISO 27001 is, and how compliance can support your overall business objectives What an ISMS is, and why your organisation needs one How to build and maintain an ISO 27001-certified ISMSYou also learn how the ISMS.online platform provides:An 81% head start on your ISO 27001 policies and controls A step-by-step guided pathway through your implementation - no training required A dedicated team of experts to support you on your way to ISO 27001 success.Read Now The State of Information Security Report 2024 Our ISMS.online State of Information Security Report provided a range of insights into the world of information security this year, with responses from over 1,500 C-professionals across the globe. We looked at global trends, key challenges and how information security professionals strengthened their organisational defences against growing cyber threats.Independently researched by Censuswide and featuring data from professionals in ten key industry verticals and three geographies, this year’s report highlights how robust information security and data privacy practices are not just a nice to have – they’re crucial to business success.The report breaks down everything you need to know, including:The key cyber-attack types impacting organisations globally The top challenges identified by information security professionals and how they’re addressing them Trends across people, budgets, investment and regulations.Download the report to read more and gain the insight you need to stay ahead of the cyber risk landscape and ensure your organisation is set up for success!Read the ReportDiscover our State of Information Security Australia Snapshot and State of Information Security USA Snapshot for location-specific insights. From Complexity to Clarity: A Comprehensive Guide to Cybersecurity Compliance Navigating the world of cybersecurity regulations can seem like a daunting task, with organisations required to comply with an increasingly complex web of regulations and legal requirements. In the guide, we break down everything you need to know about major compliance regulations and how to strengthen your compliance posture.You’ll discover:An overview of key regulations like GDPR, CCPA, GLBA, HIPAA and more A guide to build an effective compliance programme using the four foundations of governance, risk assessment, training and vendor management Best practices for continuous compliance monitoring, reporting and auditing.Ready to elevate your compliance? Download our guide today.Clarify Your Compliance Everything You Need to Know About the ISO 27001:2022 Update As 2024 draws to a close, businesses certified to the 2013 version of ISO 27001 have just under a year left to migrate to the new 2022 version of the standard. The 2022 iteration features a new structure, 11 new controls and five new attributes. Ready to update your ISMS and get certified against ISO 27001:2022? We’ve broken down the updated standard into a comprehensive guide so you can ensure you’re addressing the latest requirements across your organisation.Discover:The core updates to the standard that will impact your approach to information security. The 11 new controls and how they help you safeguard your data. Seamless transition strategies to adopt the new standard quickly and easily.We’ve also created a helpful blog which includes:A video outlining all the ISO 27001:2022 updates A brief ’Summary of Changes’ guide including a roadmap to achieving compliance A demo opportunity to visualise how using ISMS.online could aid your compliance journey.Read the BlogImplementing information security best practices is crucial for any business. We’re here to help you easily action the necessary ISO 27001:2022 changes, maintain compliance, and stay ahead of potential cyber threats.Download Your Guide Unearth Your Information Security Compliance Advantage Whether you’re new to the world of information security or a seasoned infosec professional, our guides provide insight to help your organisation meet compliance requirements, align with stakeholder needs and support a company-wide culture of security awareness.
Read More
ISO 27001

An Integrated Approach: How ISMS.online Achieved ISO 27001 and ISO 27701 Recertification

In October 2024, we attained recertification to ISO 27001, the information security standard, and ISO 27701, the data privacy standard. With our successful recertification, ISMS.online enters its fifth three-year certification cycle—we've held ISO 27001 for over a decade! We're pleased to share that we achieved both certifications with zero non-conformities and plenty of learning.How did we ensure we effectively managed and continued to improve our data privacy and information security? We used our integrated compliance solution – Single Point of Truth, or SPoT, to build our integrated management system (IMS). Our IMS combines our information security management system (ISMS) and privacy information management system (PIMS) into one seamless solution.In this blog, our team shares their thoughts on the process and experience and explains how we approached our ISO 27001 and ISO 27701 recertification audits. What is ISO 27701? ISO 27701 is a privacy extension to ISO 27001. The standard provides guidelines and requirements for implementing and maintaining a PIMS within an existing ISMS framework. Why Should Organisations Look to Implement ISO 27701? Organisations are responsible for storing and handling more sensitive information than ever before. Such a high - and increasing - volume of data offers a lucrative target for threat actors and presents a key concern for consumers and businesses to ensure it's kept safe.With the growth of global regulations, such as GDPR, CCPA, and HIPAA, organisations have a mounting legal responsibility to protect their customers' data. Globally, we're steadily moving towards a compliance landscape where information security can no longer exist without data privacy.The benefits of adopting ISO 27701 extend beyond helping organisations meet regulatory and compliance requirements. These include demonstrating accountability and transparency to stakeholders, improving customer trust and loyalty, reducing the risk of privacy breaches and associated costs, and unlocking a competitive advantage. Our ISO 27001 and ISO 27701 Recertification Audit Preparation As this ISO 27701 audit was a recertification, we knew that it was likely to be more in-depth and have a larger scope than a yearly surveillance audit. It was scheduled to last 9 days in total. Also, since our previous audit, ISMS.online has moved HQ, gained another office and had several personnel changes. We were prepared to address any non-compliances caused by these changes, should the auditor find any. IMS Review Before our audit, we reviewed our policies and controls to ensure that they still reflected our information security and privacy approach. Considering the big changes to our business in the past 12 months, it was necessary to ensure that we could demonstrate continual monitoring and improvement of our approach.This included ensuring that our internal audit programme was up to date and complete, we could evidence recording the outcomes of our ISMS Management meetings, and that our KPIs were up to date to show that we were measuring our infosec and privacy performance. Risk Management and Gap Analysis Risk management and gap analysis should be part of the continual improvement process when maintaining compliance with both ISO 27001 and ISO 27701. However, day-to-day business pressures may make this difficult. We used our own ISMS.online platform project management tools to schedule regular reviews of the critical elements of the ISMS, such as risk analysis, internal audit programme, KPIs, supplier assessments, and corrective actions. Using Our ISMS.online Platform All information relating to our policies and controls is held in our ISMS.online platform, which is accessible by the whole team. This platform enables collaborative updates to be reviewed and approved and also provides automatic versioning and a historical timeline of any changes.The platform also automatically schedules important review tasks, such as risk assessments and reviews, and allows users to create actions to ensure tasks are completed within the necessary timescales. Customisable frameworks provide a consistent approach to processes such as supplier assessments and recruitment, detailing the important infosec and privacy tasks that need to be performed for these activities. What to Expect During an ISO 27001 and ISO 27701 Audit During the audit, the auditor will want to review some key areas of your IMS, such as:Your organisation's policies, procedures, and processes for managing personal data or information security Evaluate your information security and privacy risks and appropriate controls to determine whether your controls effectively mitigate the identified risks. Assess yourincident management. Is your ability to detect, report, investigate, and respond to incidents sufficient? Examine your third-party management to ensure adequate controls are in place to manage third-party risks. Check your training programmes adequately educate your staff on privacy and information security matters. Review your organisation's performance metrics to confirm they meet your outlined privacy and information security objectives.The External Audit Process Before your audit begins, the external auditor will provide a schedule detailing the scope they want to cover and if they would like to talk to specific departments or personnel or visit particular locations.The first day starts with an opening meeting. Members of the executive team, in our case, the CEO and CPO, are present to satisfy the auditor that they manage, actively support, and are engaged in the information security and privacy programme for the whole organisation. This focuses on a review of ISO 27001 and ISO 27701 management clause policies and controls.For our latest audit, after the opening meeting ended, our IMS Manager liaised directly with the auditor to review the ISMS and PIMS policies and controls as per the schedule. The IMS Manager also facilitated engagement between the auditor and wider ISMS.online teams and personnel to discuss our approach to the various information security and privacy policies and controls and obtain evidence that we follow them in day-to-day operations.On the final day, there is a closing meeting where the auditor formally presents their findings from the audit and provides an opportunity to discuss and clarify any related issues. We were pleased to find that, although our auditor raised some observations, he did not discover any non-compliance. People, Processes and Technology: A Three-Pronged Approach to an IMS Part of the ISMS.online ethos is that effective, sustainable information security and data privacy are achieved through people, processes and technology. A technology-only approach will never be successful.A technology-only approach focuses on meeting the standard's minimum requirements rather than effectively managing data privacy risks in the long term. However, your people and processes, alongside a robust technology setup, will set you ahead of the pack and significantly improve your information security and data privacy effectiveness.As part of our audit preparation, for example, we ensured our people and processes were aligned by using the ISMS.online policy pack feature to distribute all the policies and controls relevant to each department. This feature enables tracking of each individual's reading of the policies and controls, ensures individuals are aware of information security and privacy processes relevant to their role, and ensures records compliance.A less effective tick-box approach will often:Involve a superficial risk assessment, which may overlook significant risks Ignore key stakeholders' privacy concerns. Deliver generic training not tailored to the organisation's specific needs. Execute limited monitoring and review of your controls, which may result in undetected incidents.All of these open organisations up to potentially damaging breaches, financial penalties and reputational damage.Mike Jennings, ISMS.online's IMS Manager advises: "Don't just use the standards as a checklist to gain certification; 'live and breathe' your policies and controls. They will make your organisation more secure and help you sleep a little easier at night!" ISO 27701 Roadmap – Download Now We've created a practical one-page roadmap, broken down into five key focus areas, for approaching and achieving ISO 27701 in your business. Download the PDF today for a simple kickstart on your journey to more effective data privacy.Download Now Unlock Your Compliance Advantage Attaining recertification to ISO 27001 and ISO 27001 was a significant achievement for us at ISMS.online, and we used our own platform to do so quickly, effectively and with zero non-conformities.ISMS.online provides an 81% head start, the Assured Results Method, a catalogue of documentation that can be adopted, adapted, or added to, and our Virtual Coach's always-on support. Easily ensure your organisation is actively securing your information and data privacy, continuously improving its approach to security, and complying with standards like ISO 27001 and ISO 27701.Discover the benefits first-hand - request a call with one of our experts today.
Read More

ISO 27001:2022 requirements


ISO 27001:2022 Annex A Controls

Organisational Controls


People Controls


Physical Controls


Technological Controls


About ISO 27001


SOC 2 is here! Strengthen your security and build customer trust with our powerful compliance solution today!