Skip to content
Phishing for Trouble –
The IO Podcast returns for Series 2
Listen now

Why Annex A Has Become Existential for iGaming Platforms

Annex A has become existential for iGaming platforms because it replaces scattered fixes with a single, regulator‑recognised control set you can defend. It then gives your security, platform and compliance teams one shared language for explaining how you keep games fair, wallets accurate and operations resilient across studios, markets and partners.

The information here is for general guidance only and is not legal, regulatory or certification advice. Decisions about standards and licencing should always be taken with your own legal, compliance and security specialists.

If you are a CISO, Head of Platform or Compliance Manager in gaming, you already feel how Annex A sits behind more licence conditions, security questionnaires and technical due‑diligence calls. Regulators, operators and players now expect security and fairness to be engineered in, not bolted on. Annex A gives you a common, internationally recognised list of controls you can point to when you design platforms, run live operations, work with studios and apply for licences.

For years, many gaming businesses have grown by adding pockets of security to solve immediate problems: a fraud rule set here, a DDoS service there, hardening around an RNG, a quick process to get through a specific regulator audit. Each solution made sense at the time, but the end result is often a fragile patchwork. Annex A offers the opposite: a single catalogue of controls that can be selected and adapted to cover your risk landscape across games, markets and partners, especially when captured in a structured ISMS such as ISMS.online rather than scattered files.

Security only becomes real when it shows up in the moments your players care about.

Why gaming security is no longer “just IT risk”

Gaming security is no longer “just IT risk” because failures now trigger licence conditions, fines and public scrutiny, not only technical incidents. Your CISO, Head of Platform or Compliance Manager feels this shift whenever regulators tighten rules or operators challenge whether your controls are strong enough.

A practical way to look at this is that Annex A sits in the middle of four pressures you already feel.

Visual: Four arrows labelled Regulators, Operators, Players and Investors converging on “Annex A controls”.

  • Regulators: expect clear evidence of integrity, fairness, resilience and data protection, often using ISO 27001 and Annex A as reference.
  • Operators and B2B customers: use ISO 27001 alignment as shorthand for trusting your platform with players, brands and licences.
  • Players: judge you on visible outcomes: safe accounts, fair‑feeling matches and wallets that never mysteriously “glitch”.
  • Investors and boards: want a consistent storey about risk, incidents and control effectiveness in every regulated market.

Taken together, these pressures turn Annex A into a shared vocabulary for security and fairness. Instead of explaining “our custom fraud rules” or “our logging set‑up” differently in every conversation, you can anchor them in recognised control areas such as access control, monitoring, cryptography and supplier security.

Turning security spend into measurable platform value

Security spend becomes measurable platform value when you link Annex A control themes to outcomes leadership already tracks. When those links are explicit, budget discussions move from cost to balanced conversations about risk and return.

Annex A helps leadership stop thinking of security as pure overhead. When you treat its control themes as levers on key business outcomes, you can connect investment directly to:

  • Lower incident frequency and reduced impact on live operations.
  • Faster, more predictable licence approvals and renewals.
  • Higher operator win‑rates in B2B sales due diligence.
  • Stronger player trust, especially after incidents.

For example, an organised set of Annex A controls around logging, monitoring and incident management can cut investigation times for suspected cheating or wallet anomalies from days to hours. Controls around change management and secure development can reduce the likelihood of shipping a bug that affects jackpot calculations. Those are outcomes boards understand.

A practical next step is to review the last years incidents and tag each one with the Annex A control area that would have helped prevent or reduce the impact. That simple exercise often makes the case for moving from ad hoc fixes to a structured control set, recorded and maintained in a central ISMS rather than improvised each time.

Book a demo


ISO 27001:2022 and Annex A in a Gaming Context

ISO 27001:2022 defines how you build and run an information security management system (ISMS), and Annex A is its built‑in catalogue of reference controls. For gaming technology providers, Annex A is where abstract “security” turns into concrete expectations for lobbies, RNGs, wallets, data stores, APIs and live operations across regulated markets.

In broad terms, ISO 27001 asks you to understand your context and risks, choose appropriate controls, implement and operate them, and keep improving. Annex A supports the “choose controls” step: it lists controls you can select, adapt or justify excluding in your Statement of Applicability (SoA). Gaming regulators increasingly recognise ISO 27001 as a credible baseline, so aligning Annex A decisions with local rules in each jurisdiction often makes licencing conversations simpler.

Teams that work regularly with ISO 27001 in gambling and gaming see the same pattern: organisations that treat Annex A as a living design tool, not just an audit checklist, find it easier to explain their platforms to regulators, operators and auditors.

The four Annex A themes and how they map to your world

The four Annex A themes help you think about the same platform in four complementary ways: policy, people, premises and technology. Each theme highlights different questions you should be able to answer about your games, infrastructure and partners.

The 2022 edition of Annex A groups all controls into four themes:

  • Organisational controls (A.5): – governance, policies, risk management, asset inventories, supplier management and project security.
  • People controls (A.6): – screening, training, awareness, responsibilities and disciplinary processes.
  • Physical controls (A.7): – site security for offices, data centres and studios.
  • Technological controls (A.8): – access control, cryptography, operations, network security, secure development, logging and monitoring.

For a gaming platform, you can think of these as four lenses on the same outcomes:

  • Fairness and integrity: rely mainly on organisational and technological controls: clear game‑integrity policies, change management around RNGs and odds, secure coding, independent testing and tamper‑evident logs.
  • Player protection and privacy: span all four themes: governance for responsible gambling, training for support and VIP teams, physical security where sensitive operations run, and technical controls on access, encryption and data minimisation.
  • Uptime and resilience: depend heavily on organisational and technological controls: continuity planning, capacity management, DDoS protection, failover designs and tested recovery procedures.
  • Third‑party risk: cuts across organisational and technological domains: supplier assessments, contract clauses and technical guardrails around game studios, payment providers and data feeds.

When regulators state that their security requirements are “based on” ISO 27001 or Annex A, they are usually emphasising that they expect you to have considered each of these categories in a systematic, risk‑based way, not as a loose checklist.

Using Annex A without drowning in controls

Annex A is deliberately comprehensive, but you are not expected to implement every control identically. You are expected to justify which controls are applicable to your risks and show proportionate ways of meeting them. For a gaming provider this typically looks like a structured, evidence‑backed version of decisions you are already making informally.

In practice, this usually means you:

  • Perform a risk assessment that covers game servers, admin tools, player data, wallets, live‑ops tools, analytics and third‑party integrations.
  • Select the subset of Annex A controls that addresses those specific risks, including local regulatory expectations.
  • Document in your SoA which controls are implemented, how they work, and why any are not applicable.

For example, you may operate fully in managed cloud data centres and have no physical servers of your own. Physical controls related to server rooms might then be addressed via supplier management and contract clauses instead of on‑premise measures. Conversely, you will almost certainly decide that controls around access management, secure development, logging, monitoring and supplier security are critical.

A quick exercise is to take your existing policies, procedures and technical standards and map each one to at least one Annex A control. The gaps and overlaps that appear will show you where your current control landscape is stronger or weaker than you thought, and where a structured ISMS such as ISMS.online could help you keep that mapping current as your estate evolves.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




What Changed from ISO 27001:2013 to 2022 – and Why Gaming Providers Should Care

The 2022 revision of ISO 27001 keeps the core ISMS concepts intact but modernises Annex A in ways that matter for cloud‑native gaming. If you still rely on a 2013‑era control list in a microservices and public‑cloud environment, you are likely missing useful tools and creating unnecessary confusion for teams and auditors.

In the 2013 edition, Annex A listed 93 controls across 14 domains. In 2022, that becomes 93 controls grouped into the four themes described earlier. Many controls were merged or re‑worded, and a handful of new ones were added for topics such as threat intelligence, cloud services and data leakage prevention. For gaming providers, the effect is a crisper, more technology‑aware catalogue that is easier to apply to real architectures.

Organisations that have already moved from ISO 27001:2013 to 2022 in gaming report similar benefits: fewer duplicate controls, clearer mapping to cloud services and simpler communication with regulators who are updating their own guidance.

New and sharpened controls that matter for gaming

The new and sharpened Annex A controls matter for gaming because they address the attack patterns and architectures your teams deal with every day. Instead of inventing bespoke labels for these topics, you can rely on a standard language that regulators and auditors already understand.

Several of the modernised controls are especially relevant:

  • Threat intelligence: encourages you to track emerging attacks such as credential stuffing, bot farms, cheat‑as‑a‑service offerings and new forms of bonus abuse.
  • Information security for use of cloud services: focuses on how you evaluate and manage cloud providers, which is crucial when your game backend runs on shared infrastructure.
  • Data masking and data leakage prevention: help you reduce exposure when using production‑like data in testing, analytics or support tools.
  • Secure configuration and hardening: formalise what many teams already know: default settings in databases, container images or game servers are rarely appropriate for production.

These changes reflect the reality that many services, including gaming platforms, now run in highly automated, microservices‑heavy environments that span multiple regions and suppliers. They also make it easier for your security, engineering and compliance teams to have a single, shared control language, especially if you capture those mappings in a system of record such as ISMS.online rather than separate spreadsheets and documents.

Managing the transition without losing your place

Transitioning from the 2013 to the 2022 Annex A list is not just a numbering exercise. You need to protect continuity for regulators, operators and auditors while improving clarity for your teams. The aim is to keep the intent of your existing controls while taking advantage of the cleaner structure.

In outline, you will need to:

  • Re‑map your existing controls to the new list and confirm that intent still matches risk and regulatory expectations.
  • Update references in policies, risk registers, SoA, contracts and audit work programmes so they point to the 2022 control identifiers.
  • Communicate the change clearly to internal teams, operators and regulators so nobody is surprised by new numbers or labels.

Handled well, the new structure can reduce workload. The attributes introduced in ISO 27002:2022, which align with Annex A, make it easier to philtre controls by technology area, security property or operational capability. That is particularly useful when you want to answer a question such as “which controls apply to wallets?” or “which controls protect integrity in our RNG and leaderboards?”

A practical next step is to take a small slice of your estate-such as your random number generator services and associated game logic-and map their existing controls against the 2022 Annex A list. That pilot mapping often reveals quick wins and clarifies how much work the full transition will really require, especially if you use it to validate your approach with one or two key regulators or operators.




Mapping Annex A Domains to Real Gaming Risks

Annex A becomes far more useful when you stop treating it as an index and start using it to organise your specific risks. For gaming providers, those risks cluster around account takeover and fraud, game integrity and fair play, resilience and uptime, and regulatory or contractual non‑compliance. The goal is to see clearly where you are over‑controlling and where obvious gaps remain.

A simple approach is to build a matrix where the rows are your main risk categories and the columns are the four Annex A themes. You then mark where controls are especially important or where coverage is weak. This helps your security, platform and compliance teams focus improvement work where it matters most and gives risk owners a clearer picture of trade‑offs.

Visual: A matrix with risk clusters on the left and the four Annex A themes along the top, showing where controls are strongest or weakest.

To illustrate the idea, the table below sketches three common risk clusters and the Annex A themes that typically demand the most attention.

Before the table, here is the concept in words: fraud and cheating pull heavily on technical and organisational controls; uptime spans organisational, physical and technical; regulatory non‑compliance brings organisational and people issues to the foreground.

Risk cluster Where Annex A themes tend to focus most
Fraud and cheating Organisational and technological controls
Uptime and resilience Organisational, physical and technological controls
Regulatory and licence failure Organisational and people controls, plus selected technology

Example: Fraud, cheating and fair play

Fraud, cheating and fair‑play risks are easier to manage when you connect them to specific Annex A themes instead of one‑off rules. That makes conversations with studios, operators and regulators more concrete, comparable and repeatable.

Common fraud and cheating risks include:

  • Account takeover through credential stuffing.
  • Collusion in peer‑to‑peer games.
  • Manipulation of RNG outputs or jackpot configurations.
  • Use of bots or unauthorised clients to gain advantage.

Controls that tend to matter most here include:

  • Organisational: – policies on fair play and game logic, change control and separation of duties for odds, jackpots and promotions, plus regular reviews of fraud and abuse patterns.
  • People: – screening, training and role‑based access for game operations, VIP and support teams who might be targeted or tempted by abuse.
  • Physical: – security for locations that host sensitive operations such as live studios, broadcast facilities or payment processing teams.
  • Technological: – strong identity and access management, secure coding and review, integrity protection for RNG and game servers, centralised logging, anomaly detection and incident response.

By explicitly mapping these risks to control themes, you make it easier to see whether your main weaknesses are cultural, process‑related or technical, and to explain those choices to external stakeholders.

Example: Uptime, platform stability and regulatory confidence

Uptime, platform stability and regulatory confidence are tightly linked in regulated gaming markets. Annex A gives you a structured way to show that resilience is intentional, not accidental, and that you can defend your design decisions to regulators and operators.

Typical resilience risks include:

  • DDoS attacks on match‑making or login endpoints.
  • Cascading failures in microservice architectures.
  • Region‑wide outages affecting regulated markets.

Relevant Annex A controls include:

  • Organisational: – business continuity planning, defined recovery objectives, regular resilience testing and exercise programmes.
  • People: – clear on‑call structures, training and rehearsals for incident response across engineering and operations.
  • Physical: – resilient hosting, including redundant power, networking and environmental controls where you control facilities.
  • Technological: – network segregation, capacity management, failover mechanisms, automated health checks and monitoring, plus secure configuration and patching.

As regulators increasingly see persistent downtime and instability as consumer‑protection issues, being able to show how Annex A underpins your resilience storey becomes important, not just for audits but also for market access and commercial negotiations.

A practical next step is to pick three recent incidents or near‑misses and categorise which Annex A themes were weak or missing. Use that view to prioritise improvements that will reduce both security and reliability incidents together and to frame investment discussions with leadership in concrete risk‑reduction terms.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Protecting Player Accounts, In‑Game Assets and Wallets with Annex A

Annex A gives you the building blocks to protect player accounts, in‑game assets and wallets by clarifying which controls matter most at each layer. Player‑facing security is clearest where identity, balance integrity and fair progression all work smoothly, and Annex A helps you design those outcomes in a way regulators and operators can follow.

From a player’s perspective, security shows up most clearly in three places: whether their account is safe, whether their in‑game assets remain intact and fairly earned, and whether their balances and payments are always correct. Annex A gives you the building blocks to protect each of these, but the emphasis shifts slightly for each domain.

At a high level, account protection leans on access control and monitoring, in‑game assets lean on integrity and abuse prevention, and wallets lean on financial‑grade controls, segregation of duties and reconciliation. Thinking in these layers makes it easier to plan controls and explain them to external stakeholders, from product managers to regulators.

Visual: A simple flow from player login to in‑game actions to wallet update to reconciliation, with Annex A control themes noted at each step.

Player accounts: identity, access and lifecycle

For player accounts and identities, Annex A directs you to a focused set of access and monitoring controls that block common attacks. Getting these right does more for real‑world risk than any amount of exotic technology or clever fraud rules.

Critical controls here include:

  • Strong authentication, including multi‑factor options, secure session handling and device binding where appropriate.
  • Clear management of privileged and support accounts, so powerful access is tightly controlled and periodically reviewed.
  • Least‑privilege access to internal tools and data, so staff see only the player information they genuinely need.
  • Centralised logging and monitoring of login attempts, credential reuse, unusual login patterns and suspicious device fingerprints.

These controls help you defend against threats such as credential stuffing, social engineering of support staff and shared account abuse. They also give you the evidence needed to investigate disputes and demonstrate to regulators that you take account protection seriously, which in turn supports licence applications and operator trust.

In‑game assets and wallets: integrity, reconciliation and fraud controls

In‑game assets-cosmetics, progression, virtual currencies, loot or tokenised items-usually live in backend services and databases. Their main security property is integrity: they should not be created, destroyed or transferred outside the game’s intended rules, and any exceptional changes must be transparent and auditable.

Relevant controls include:

  • Robust change management and code review for services that affect item drops, progression, crafting or trading.
  • Segregation of duties so no single person can both change game logic and approve those changes into production.
  • Tamper‑evident logging of all asset‑affecting actions, including administrator and support interventions.
  • Monitoring and analytics tuned to detect abnormal asset movements, suspicious farming patterns or exploitation of bugs.

Wallets, deposits and withdrawals add another layer: you must pair integrity with financial correctness and regulatory expectations.

Annex A supports this through:

  • Defined procedures for payment processing, refunds, chargebacks and bonus credits.
  • Encryption of sensitive payment data in transit and at rest, while avoiding storage of unnecessary payment information.
  • Segregation of duties in financial operations, including approvals for large withdrawals or manual balance adjustments.
  • Logging, reconciliation and periodic review of wallet balances against transaction histories.

A practical next step is to document, in simple terms, how one high‑risk flow-such as a deposit, a bonus award or a high‑value item trade-moves through your systems. Mark where Annex A‑style controls currently apply. The gaps you find often line up with the questions auditors, operators and players already ask, giving you a ready‑made roadmap for improvement.




Mapping Annex A Controls onto Your Game Backend Components

Annex A is easier to work with when you map it onto the components your teams recognise: lobbies and match‑making, RNG services, wallets, leaderboards, chat and social features, anti‑cheat and analytics. Instead of discussing controls in the abstract, you can talk concretely about how each component meets, or falls short of, Annex A expectations.

A simple pattern is to start with the components your engineers already draw on architecture diagrams. You then highlight which Annex A themes always apply and where there are optional or context‑specific controls. Capturing that mapping once in a structured ISMS such as ISMS.online saves you from rebuilding the same explanations for every regulator or operator conversation.

A practical component‑to‑control view

A practical way to map components to controls is to create short “control profiles” for each service. These profiles state which Annex A themes are most important and what that means in engineering terms, using language your teams already understand.

For example:

  • Identity and account service: – benefits from access control, secure development, cryptography for tokens, rate limiting and monitoring; a central point for identity and authentication controls.
  • Lobbies and match‑making: – need controls for availability, input validation, abuse detection and fair‑match logic, plus logging and monitoring to diagnose game issues and detect exploitation.
  • RNG and game outcome services: – link closely to controls around cryptography, change management, testing, independent verification and tamper‑evident logging.
  • Wallets and payment gateways: – draw heavily on access control, cryptography, segregation of duties, logging, fraud analytics and supplier security for payment partners.
  • Leaderboards and progression tracking: – require input validation, integrity controls, logging and mechanisms to identify and respond to anomalous scores or progress spikes.
  • Chat, social and community features: – need acceptable‑use policies, moderation tools, privacy‑by‑design, logging and incident procedures for abuse and safety reports.
  • Anti‑cheat and telemetry: – rely on monitoring, anomaly detection, secure update mechanisms and clear boundaries for privacy and legal compliance.

By documenting these mappings once, you make it easier to explain to studios, operators and auditors how controls are implemented end‑to‑end. You also make gaps more visible-for example, if leaderboards lack the same logging rigour as wallets, or if anti‑cheat telemetry is not integrated into your central monitoring and incident processes.

Using patterns, not one‑off designs

Once you have component mappings, you can define simple patterns that make new work “secure by default” rather than relying on heroics at the end of a project. These patterns become reusable building blocks for both your engineering and compliance teams.

Common examples include:

  • A player‑facing microservice pattern that prescribes authentication, rate limiting, logging, metrics and error handling in line with Annex A.
  • A financial transaction pattern for services that can change balances or items of real‑world value, with stricter change management, segregation of duties and reconciliation requirements.
  • A third‑party integration pattern for external game studios or services that connect into your platform, with clear requirements on authentication, network segmentation, logging and contract clauses.

These patterns help engineers, studios and product teams build new services that are “Annex A‑aligned by default”, rather than trying to retrofit controls at the end. They also make it easier for security and compliance teams to review new designs quickly, because they can see whether the right pattern is being used and whether the relevant evidence is already captured in your ISMS.

A practical next step is to work with an architect or tech lead and draught a one‑page “control profile” for each of your main backend components. Capture which Annex A themes are critical, which existing controls apply and where you already have patterns. That set of profiles becomes a foundation for more detailed design work and for your Statement of Applicability.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Adapting Annex A for Cloud‑Native Platforms and Third‑Party Studios

Annex A remains fully applicable in cloud‑native, microservices‑based gaming platforms, but the way you implement controls changes. Instead of focusing on servers and networks you own, you need a shared‑responsibility model that explains which controls sit with your cloud provider, which with your teams and which must be extended to studios and suppliers.

Most modern gaming platforms also depend on a web of third parties: cloud providers, content delivery networks, game studios, payment processors, KYC providers, data feeds and analytics tools. Annex A gives you a consistent language for defining expectations and evidence with each of them, while keeping the overall picture understandable for regulators and operators.

Making Annex A work in Kubernetes, serverless and multi‑region designs

In a cloud‑native architecture, you usually express Annex A controls through a combination of automation, configuration and monitoring rather than one‑off manual changes. The principles stay the same; the mechanisms change to match Kubernetes clusters, serverless functions and managed services.

Typical building blocks include:

  • Infrastructure as code: to standardise secure configurations for clusters, databases, networking and supporting services, supporting Annex A controls on configuration management, change control and secure system engineering.
  • Centralised identity and access management: across cloud accounts, clusters, CI/CD pipelines, repositories and admin tools, aligning with Annex A access control themes.
  • Network segmentation and zero‑trust principles: so each service and studio connection has the minimum necessary access, with clear paths for monitoring and incident isolation.
  • Unified logging and monitoring: across microservices, platforms and regions, enabling rapid detection and response aligned with Annex A operations and incident‑management controls.
  • Automated testing and deployment pipelines: with security checks built in, reflecting Annex A expectations on secure development, change management and testing.

At the same time, you should be explicit about which controls rely on the cloud provider. For example, physical security of data centres, underlying hypervisors and core networking are usually handled by the provider, while guest operating systems, container images, application logic and identity are your responsibility. Gaming teams that capture that split clearly in their ISMS find it much easier to answer detailed cloud‑security questions from auditors and regulators.

Extending control expectations to studios and suppliers

Third‑party risk in gaming is not an abstract concept; it is your daily operating model. Many of the most critical elements of the player experience-game content, match logic, special events and payments-depend on external organisations. Annex A helps you set and enforce expectations across that ecosystem in a way you can show to regulators and operators.

In practical terms:

  • Supplier and third‑party management controls: help you classify partners by criticality, assess their security posture and set minimum requirements in contracts and technical designs.
  • Information security in project and development lifecycles: encourages you to bake security expectations into onboarding new studios or launching new integrations, instead of treating security as a late review.
  • Incident management controls: ensure that when something goes wrong in a studio environment or at a provider, you have clear communication paths, responsibilities and evidence flows.

Concrete steps might include:

  • Standardised security schedules in studio contracts that reference key control expectations such as access control, logging, secure development, incident notification, testing and change control.
  • A common security questionnaire based on Annex A that all high‑impact suppliers must complete and keep up to date.
  • Technical checks, such as scan results, secure‑build artefacts or integration tests, that demonstrate controls are working in live environments, not just on paper.

A practical next step is to sketch your current ecosystem on one page-cloud providers, studios, payment processors, data feeds and marketing partners-and mark, for each, where you rely most heavily on them for Annex A control operation. Then mark where you have strong contractual and technical evidence of that operation, and where you are relying mostly on trust. That picture often becomes the starting point for improving your supplier‑management approach and for configuring your ISMS so those relationships are clearly documented.




Book a Demo With ISMS.online Today

ISMS.online helps your gaming organisation turn Annex A from a static control list into a single, living view of risks, controls and evidence that you can reuse for every regulator, operator and audit. When you replace scattered documents with a structured ISMS, you free teams to concentrate on real improvements instead of endless evidence hunting.

For gaming technology providers, that centralisation has very practical benefits. You can model your game backend-lobbies, RNGs, wallets, leaderboards, chat, anti‑cheat and analytics-once, link each component to the Annex A controls and risks that matter, and then attach the real evidence: policies, procedures, logs, diagrams, test reports and supplier attestations. When a new licence application, operator questionnaire or certification audit arrives, your team spends far less time hunting for documents and far more time refining what really matters.

What a focused session can help you discover

A focused ISMS.online session built around one of your flagship games or platforms can quickly show how well Annex A already fits your world and where it needs strengthening. It is often the fastest way to turn theory into a concrete view of your current strengths and gaps.

In a short demonstration you can explore:

  • How your existing policies and controls map onto the ISO 27001:2022 Annex A structure.
  • Where you already meet gambling‑regulator expectations and where there are gaps or duplication.
  • How backend components and third‑party services can be modelled so that responsibilities and evidence are clear.
  • How workflows for risk reviews, change approvals, incident management and supplier assessments can be made consistent and auditable.

Because the platform is built around Annex A and related standards, you do not have to invent your own structure. You can concentrate on representing your actual risks, systems and decisions accurately and then reuse that work whenever you need to explain your approach.

How to get the most from a demo

You get the most value from a demo when you bring a real challenge and a small, cross‑functional group into the conversation. That keeps the session grounded in your current pressures rather than generic examples.

It usually helps to:

  • Choose one real game or platform that is central to your licencing or B2B pipeline.
  • Involve people who own security, platform engineering, compliance and operations so you see the full picture.
  • Bring a recent regulator request, operator questionnaire or internal risk concern as the starting point.

If you are responsible for security, technology or compliance in a gaming or iGaming organisation, consider using the session to test whether a single, Annex A‑aligned ISMS can support your licences, audits, operators and players. From there you can decide, as a team, whether ISMS.online is the right foundation for your next phase of growth.

When you are ready to turn Annex A from a control list into a practical, reusable storey about how your gaming platform protects players, partners and licences, an ISMS.online demo is a straightforward way to see whether this approach matches your ambitions.

Book a demo



Frequently Asked Questions

How do ISO 27001:2022 Annex A controls actually protect a modern gaming platform?

Annex A protects a gaming platform by turning scattered risk fixes into a single, testable control set that spans players, games and money.

How do Annex A themes line up with real gaming risks?

Annex A in ISO 27001:2022 defines 93 controls across four themes that map neatly onto a gaming estate:

  • Organisational controls: cover game‑integrity governance, licence conditions, risk assessments, supplier oversight, change, incident and problem management, plus how you deal with complaints and suspected AML cases. This is where you show regulators and B2B operators that cheating, collusion, bonus abuse and suspicious transactions are managed systematically, not with “best efforts.”
  • People controls: define who can view or change sensitive things – RTP settings, RNG versions, limits, bonus rules, wallet balances, chargebacks – and how those people are screened, trained, authorised and, when necessary, removed from access. These controls stop a single insider quietly undermining fairness or draining value.
  • Physical controls: protect studios, card shufflers, streaming stages, offices and data centres with access badges, visitor logs, CCTV and environmental protections. They make it difficult for someone to tamper with, replace or steal hardware that underpins lobbies, RNGs, live tables or back‑office consoles.
  • Technological controls: harden your lobbies, RNGs, wallets, anti‑cheat systems, data pipelines, leaderboards and back‑office tools through access control, cryptography, secure development, logging, monitoring, backup and recovery. These are the safeguards that B2B operators and test labs expect to see around high‑risk systems.

A useful way to think about Annex A is: Does every critical piece of the platform have clear rules, owners and evidence for how it is kept safe?

How does this become something auditors, regulators and partners can test?

Annex A gains its real value when you fold it into a live Information Security Management System (ISMS) rather than leaving it as a checklist. In practice you:

  1. Identify concrete risks like account takeover, collusion, botting, bonus abuse, live‑studio compromise, DDoS, outages, fraud and data leakage for your platforms and studios.
  2. Map those risks to Annex A controls and explain which controls are “not applicable” and why. That mapping becomes your Statement of Applicability, which auditors and regulators rely on.
  3. Implement controls through policy, process and technology – for example, change workflows in your CI/CD, access reviews around RTP tools, tamper‑evident logs for RNGs – and link each control to current evidence (logs, approvals, reviews, test reports).

Because Annex A is globally recognised, a supervisor in one jurisdiction, a test lab in another and a B2B operator elsewhere can all read the same mapping and understand how you protect fairness and information security.

A structured platform such as ISMS.online helps you hold that picture together. You can see for each Annex A control:

  • Which platforms, studios and services it applies to
  • Who owns it operationally
  • Which evidence proves it is working

That way, you are not rewriting your security storey for every licence renewal or B2B due‑diligence pack – you are reusing a single, well‑maintained control set that already lines up with international expectations.


How should we map Annex A controls to lobbies, RNGs, wallets and other backend components?

You get the best results when you map Annex A controls to real services in your architecture rather than to abstract departments or org charts.

How do we anchor Annex A in our current platform design?

Start by sketching the main services that make up your platform. Typical examples include:

  • Identity and account services
  • Lobbies and match‑making
  • RNG and outcome engines
  • Wallets and payment gateways
  • Leaderboards and progression systems
  • Chat, social and community features
  • Anti‑cheat, telemetry and analytics pipelines
  • Back‑office and support consoles

For each service, ask two questions:

  1. Which Annex A themes matter here? For example: access control, change management, logging and monitoring, cryptography, supplier security, business continuity.
  2. Which team is accountable for those controls? That might be a platform squad, the game‑server team, live‑ops or a central infrastructure group.

You then describe what “secure enough” looks like for each service type. For instance:

  • Identity / account services: – strong authentication options, secure session handling, limited and reviewed access to admin tools, centralised logging of logins, resets and changes.
  • Lobbies / match‑making: – DDoS protection, input validation, rate‑limiting, health monitoring and clear escalation paths for outages or instability.
  • RNG / outcome engines: – strict change approval, separation of duties between development, testing and deployment, cryptographic protections and tamper‑evident logs for outcome‑affecting code and configurations.
  • Wallets / payment gateways: – dual control for high‑risk manual credits and refunds, encryption of sensitive data, reconciliations between game logs and payment providers, fraud and AML monitoring rules.
  • Leaderboards / progression: – validation of score inputs, monitoring for impossible progression patterns, well‑controlled procedures for manual corrections.
  • Chat / social: – documented moderation policies, tooling for blocking or muting, logging within legal‑retention limits and clear escalation for threats or harmful content.
  • Anti‑cheat / telemetry: – documented detection rules, secure distribution of updates, data‑minimisation and retention controls, with transparency around what you collect and why.

Each of these service‑level expectations can be traced back to specific Annex A controls so that auditors and regulators can see exactly how a high‑level requirement – such as access control or secure development – shows up in day‑to‑day engineering, operations and support.

How do we make Annex A usable for engineers and studios?

Most engineers and studio leads do not want to read 93 controls; they want to know what is required for their service or feature. That is where control profiles help. Examples include:

  • “Any service that can move or influence real‑money balances must implement these Annex A controls and these technical patterns.”
  • “Any external‑facing API must follow this secure‑development profile, these logging standards and this change‑control flow.”

In a platform like ISMS.online you can:

  • Attach each profile to the relevant Annex A controls and risk entries
  • Assign owners and teams
  • Link to evidence such as pipeline rules, playbooks, design docs, penetration tests and access reviews

From there, new games, studios or integrations inherit the right controls by design. It also becomes much easier to answer due‑diligence questions, because you can show exactly how a given control applies to a specific lobby, RNG, wallet or back‑office console, rather than trying to convince people with generic policy statements.


Which Annex A controls should we prioritise for player accounts, in‑game assets and real‑money wallets?

The most effective starting point is to focus Annex A controls where failure hurts most: player identity, in‑game economies and real‑money balances.

Which controls matter most for player accounts and sessions?

For accounts and session management you want to reduce the chance of account takeover, silent misuse and support‑tool abuse. Priority areas include:

  • Access control and authentication: – strong credential rules, options for multi‑factor authentication in higher‑risk markets, sensible lockout and recovery policies, and clear user‑endpoint guidance.
  • Privileged access management: – tightly defined roles for tools that can view or change personal data, limits, self‑exclusion, AML flags or RTP; regular reviews and removal of unused privileges.
  • Session management: – secure cookies and tokens, invalidation on password change, safeguards against session fixation, and clear rules around concurrent sessions where licence conditions demand it.
  • Logging and monitoring: – structured events for key actions (logins, failed attempts, logouts, resets, device changes, admin actions) and tuned detection rules that highlight credential‑stuffing, unusual access patterns or abnormal use of support tools.

These map directly to Annex A controls around user endpoint devices, identity and access management, secure authentication, privileged access rights, logging and activity monitoring.

How should we protect in‑game assets and progression systems?

For in‑game currencies, valuables and ranks the real risk is often undetected manipulation rather than a single spectacular breach. Helpful control areas are:

  • Secure development and change control: – defined pipelines, peer reviews and test expectations for any change that touches drop tables, matchmaking logic, crafting systems or reward rules.
  • Segregation of duties: – no single person can both make and approve changes that influence progression or high‑value rewards, and no one can bypass standard deployment steps.
  • Event logging with integrity protections: – detailed, tamper‑evident records for game events that change assets or progression, including any manual adjustments or compensations.
  • Analytics and anomaly detection: – rules that flag impossible progression speed, unusual trade loops, extreme win‑streaks or repeated high‑value drops that do not match expected behaviour.

In Annex A language you are leaning on controls about change management, secure coding, logging, monitoring, and the integrity and accuracy of information.

What extra safeguards should we apply to real‑money wallets and payment flows?

Where money moves, regulations and expectations are higher. On top of the above, consider:

  • Dual control and approvals: for high‑risk actions such as large balance corrections, manual VIP credits, refunds or ex‑gratia payments.
  • Cryptography and key management: for payment data, wallet keys, API credentials and signing keys, with rotation policies and secure storage that match Annex A guidance.
  • Formal reconciliations: between game ledgers, wallet balances and payment‑provider records, with documented tolerances, responsibilities and escalation paths.
  • Fraud and AML monitoring: aligned to your jurisdictions, targeting patterns such as multi‑accounting, bonus abuse, chargeback rings and structured attempts to evade limits.

These measures align with Annex A themes around cryptography, supplier relationships, operations security, logging and monitoring, incident management and business continuity.

A structured ISMS makes it far easier to hold this together across platforms and studios. With ISMS.online, you can group controls by risk area (identity, in‑game economies, wallets), see which Annex A controls apply, and link each one to the code, processes and reports that prove it works. That gives you a repeatable storey for regulators and partners, rather than rebuilding your explanation every time there is a new licence, integration or audit.


How can gaming providers adapt Annex A to cloud‑native, microservices‑based architectures?

Annex A does not mandate specific technologies, so adapting it to cloud‑native gaming is about expressing each control in terms of code, configuration and automation rather than static paperwork.

What does Annex‑A‑aligned security look like in a cloud‑native stack?

For a microservices or managed‑services architecture, you typically want to:

  • Use infrastructure as code for clusters, networks, IAM roles, storage and supporting services. Version control, peer review and pipeline checks turn Annex A expectations for configuration management and change control into something developers already understand.
  • Consolidate identity and access management across cloud accounts, CI/CD tools, repositories and consoles, with regular access reviews and removal of unused privileges. Anything that can alter outcomes, adjust balances or change monitoring should be behind stronger controls and approval flows.
  • Design for network segmentation and least‑privilege communication between services, with clear ingress and egress boundaries, controlled exposure of admin interfaces and monitoring at key choke points. This aligns with Annex A requirements around network security and access restriction.
  • Implement unified logging and telemetry so every service emits structured events to a central platform. Detection rules, runbooks and response workflows live there, creating tangible evidence for Annex A controls on logging, monitoring and incident response.
  • Integrate security checks into your delivery pipelines – static analysis, dependency scanning, container image checks, policy‑as‑code and controlled deployment stages. You can then demonstrate Annex A’s secure‑development and change‑management controls with screenshots and logs from the tools the teams use every day.

When you approach Annex A this way, an ISO 27001 audit or operator review becomes an examination of how you actually work, rather than a theoretical exercise.

How should we handle shared responsibility with cloud providers and studios?

Cloud‑native platforms depend on shared responsibility. Your ISMS should spell out:

  • What cloud providers cover: – for example, physical data‑centre security, some platform security features, resilience of underlying services.
  • What you own: – account structures, IAM, configuration of managed services, data classification, encryption choices, logging, monitoring, incident handling.
  • What external studios and other suppliers must do: – secure development against your standards, sufficient logging on their side, timely incident reporting, and controlled access into your environments.

You then attach Annex A controls to these responsibilities so that every control is clearly owned. For instance, Annex A controls on physical security might map to the provider, while access control, cryptography, monitoring and incident response remain firmly in your camp.

In ISMS.online you can reflect that model clearly by:

  • Assigning controls to specific cloud accounts or environments
  • Linking them to contracts or data‑processing agreements with providers and studios
  • Storing evidence (such as certifications, reports and configuration screenshots) alongside your own logs and assessments

That gives auditors, regulators and partners confidence that cloud complexity is matched by clear governance, not hidden gaps between you, your providers and your studios.


How do Annex A controls support regulators, licences and B2B operator due diligence?

Annex A gives you a common frame of reference that regulators, test labs and B2B operators already understand, which can significantly shorten licencing, renewal and onboarding conversations.

How does Annex A help with licences and ongoing supervision?

Many gambling regulators either name ISO 27001 explicitly or ask for controls very similar to Annex A. Using Annex A inside your ISMS helps you:

  • Translate broad expectations around fairness, player protection, resilience and information security into specific, numbered controls in your Statement of Applicability.
  • Present one consistent control set across studios and platforms, so that questions about access, change, monitoring, supplier security or continuity are answered in the same structured way.
  • Align with test labs and certification bodies whose checklists often mirror Annex A families (access control, change control, logging and monitoring, continuity, supplier management).

Because Annex A controls are defined in an international standard, regulators can see quickly:

  • Where your ISMS meets or exceeds their rules
  • Where you rely on compensating controls
  • How your controls evolve over time through risk assessments and improvements

That clarity helps when you are explaining changes to your platform, seeking new licences or responding to findings.

How does Annex A make B2B security reviews easier?

B2B operators, aggregators and enterprise partners need to trust your RNGs, wallets, live studios and supporting services. Annex A helps by:

  • Giving you a single language for security controls that can be reused in security schedules, due‑diligence packs and questionnaires.
  • Allowing you to build evidence packs per service type – for example, a wallet pack or RNG pack linked to Annex A controls, owners and selected evidence – that you can share with multiple partners with minimal tailoring.
  • Making it easier to show that critical controls (for example, Annex A controls for configuration management, access restriction, logging, monitoring and incident response) apply uniformly across all relevant environments.

If you maintain your Annex A mappings, risks, controls and evidence in ISMS.online, you can generate regulator‑oriented, operator‑oriented or internal reports from the same underlying system. That reduces duplication, avoids drift between different document sets and demonstrates that your approach is coherent, not patched together for each new commercial opportunity.


How can we move from an ad‑hoc Annex A spreadsheet to a workable ISMS for gaming?

Moving from a spreadsheet to a working ISMS is about turning what you already do into a managed system, not about starting from nothing or burying teams in new documentation.

What is a practical starting path for a gaming organisation?

A sensible starting path that keeps risk low and momentum high is:

  1. Define a clear pilot scope – for example, a single live platform, region or studio where licence, revenue or regulatory pressure is greatest.
  2. List the major risks in that scope – account takeover, fraud, cheating, collusion, bonus abuse, payment issues, outages, live‑studio disruption, data leakage and key licence or player‑protection obligations.
  3. Map those risks to Annex A themes – access control, secure development, change management, supplier management, logging and monitoring, incident handling, business continuity and information classification.
  4. Capture the controls you already operate – policies, playbooks, technical configurations, scheduled checks and monitoring rules, plus where the evidence currently lives (dashboards, ticketing systems, logs, reports).
  5. Define simple control profiles for repeated patterns, such as “any service that touches balances,” “any service that generates outcomes,” or “any studio with live operations.”
  6. Move the structure into an ISMS – connect risks, controls, assets, owners and evidence in one place, and agree review cycles so responsibilities and artefacts stay current.

The aim is to make your existing security, compliance and integrity work visible and repeatable. Teams should be able to see:

  • Which risks they help manage
  • Which Annex A controls relate to their work
  • What evidence they are expected to maintain

An effective ISMS feels like a shared playbook for protecting players, games and money – not an extra set of forms bolted on to the day job.

Once your pilot is running smoothly you can extend:

  • From a single platform to more titles and studios
  • From ISO 27001 to related frameworks (for example, ISO 27701 for privacy, or mapping into regulatory rules like NIS 2)
  • From security‑only focus to an integrated view that includes resilience, player protection and data‑protection obligations

Using a purpose‑built platform such as ISMS.online makes that scale‑out much easier. You can work with ready‑made structures for ISO 27001:2022 clauses and Annex A, link multiple frameworks in one place and use workflows for risks, incidents, audits and management reviews. That leaves your teams free to spend more time improving controls and the player experience, and less time piecing together evidence when an auditor, regulator or B2B operator calls.

If you start with just one live platform and one Annex‑A‑aligned ISMS view, you will quickly see where you are already strong, where gaps exist and how a central system helps you tell a consistent, credible storey about game integrity and information security as you grow.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.