Skip to content

Building a Stronger ISMS with Information Classification – ISO 27001:2022 Annex A 5.12

The classification of information is a fundamental process that enables organisations to group their information assets into relevant categories based on their required level of protection.

According to ISO 27001:2022 Annex A 5.1.2, information must be classified based on various factors, including legal requirements, value, criticality, and sensitivity to unauthorised disclosure or modification. This classification should be designed to reflect the unique business activity of the organisation without impeding or complicating it.

For instance, information intended for public consumption must be suitably marked, whereas confidential or commercially sensitive data must be accorded a higher degree of security. It is crucial to note that the classification of information ranks among the most significant controls in Annex A to ensure that organisational assets are protected.

Purpose of ISO 27001:2022 Annex A 5.12

Annex A Control 5.12 is a preventive control that enables organisations to identify risks by determining the appropriate level of protection for each information asset based on its importance and sensitivity.

In the Supplementary Guidance, Annex A Control 5.12 explicitly cautions against the over- or under-classification of information. Organisations must consider the confidentiality, availability, and integrity requirements when assigning assets to their respective categories. This helps to ensure that the classification scheme balances the business needs for information and the security requirements for each category of information.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Ownership of Annex A 5.12

While it is essential to establish a classification scheme for information assets throughout the entire organisation, it is ultimately the responsibility of the asset owners to ensure that it is implemented correctly.

By ISO 27001:2022 Annex A 5.12, those with pertinent information assets must be held accountable. For instance, the accounting department should classify information based on the organisation-wide classification scheme when accessing folders containing payroll reports and bank statements.

When classifying information, it is crucial for asset owners to consider the business needs and the potential impact that a compromise of information could have on the organisation. Additionally, they should account for the information’s importance and sensitivity levels.

General Guidance on ISO 27001:2022 Annex A 5.12

To successfully implement a robust information classification scheme, organisations ought to take a topical approach, consider each business unit’s specific information needs, and evaluate the level of sensitivity and criticality of the information.

As per Annex A Control 5.12, organisations must evaluate the following seven criteria when implementing a classification scheme:

Establish a Topic-Specific Policy and Address Specific Business Needs

Annex A Control 5.12 of the information security management system refers to Annex A Control 5.1, which pertains to access control. It mandates that organisations adhere to topic-specific policies stipulated in Annex A Control 5.1. Additionally, the classification scheme and levels should consider specific business needs when classifying information assets.

Organisations need to consider their business needs for sharing and using information, as well as the need for the availability of such information. However, classifying an information asset may disrupt critical business functions by restricting access to and use of information.

Therefore, organisations should balance their specific business needs for the availability and use of data and the requirement for maintaining the confidentiality and integrity of that information.

Consider Legal Obligations

Specific laws may require organisations to emphasise safeguarding the confidentiality, integrity, and availability of information. Therefore, legal obligations should be prioritised over the organisation’s internal classification when categorising information assets.

Adopting a risk-based approach and assessing the potential impact of a security breach or compromise on information assets is advisable. This will help prioritise and implement appropriate security measures to mitigate the identified risks.

Every form of information holds a unique significance level to an organisation’s functions and possesses varying degrees of sensitivity depending on the particular circumstances.

When an organisation implements an information classification scheme, it should consider the potential impact that compromising the information’s confidentiality, integrity, or availability could have on the organisation.

For instance, the sensitivity and potential impact of a database containing professional email addresses of qualified leads would be vastly different from that of employees’ health records. Therefore, the organisation should carefully consider the level of protection that each category of information requires and allocate resources accordingly.

Regularly Updating and Reviewing the Classification

Annex A Control 5.12 recognises that information’s value, importance, and level of sensitivity can change over time as the data goes through its life cycle. As a result, organisations need to regularly review their classification of information and make any necessary updates.

ISO 27001 Annex A Control 5.12 pertains to reducing the value and sensitivity of the information to a significant extent.

It is essential to consult with other organisations with you to share information and resolve any disparities.

Each Organisation May Have Distinct Terminology, Levels, and Standards for Their Information Classification Systems

Divergences in information classification between organisations can lead to potential risks when exchanging information assets.

Organisations must collaborate with their counterparts to establish a consensus to ensure uniformity in information classification and consistent interpretation of classification levels to mitigate such risks.

Organisational-Level Consistency

Every department within an organisation must have a shared comprehension of classification levels and protocols to ensure uniformity in classifications across the entire organisation.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Guidance on How to Implement the Classification of Information Scheme

While Annex A 5.12 acknowledges that there is no universally applicable classification system and organisations have the flexibility to establish and define their classification levels, it illustrates an information classification scheme:

  • Disclosure causes no harm.
  • Disclosure causes minor reputational damage or minor operational impact.
  • Disclosure has a significant short-term impact on operations or business objectives.
  • Disclosure seriously impacts long-term business objectives or risks the organisation’s survival.

Changes and Differences From ISO 27002:2013

Annex A 8.2.1 in the previous version dealt with the Classification of Information.

While the two versions are quite similar, there are two main differences:

  1. Firstly, the previous version did not mention the need for consistency in classification levels when information is shared between organisations. However, ISO 27001:2022 mandates that organisations collaborate with their counterparts to ensure uniformity in information classification and understanding.
  2. Secondly, the updated version explicitly requires organisations to develop policies tailored to specific topics. Only a brief reference to access control was made in the older version.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing




[case_study_slider ids=”88859,101932,92016″ autoplay=”true” autoplay_speed=”5000″]


How ISMS.online Help

Our platform is designed to be user-friendly and straightforward, catering to highly technical individuals and all staff members in your organisation.

We advocate involving employees at all levels of the business in constructing your ISMS as it aids in establishing a sustainable system.

Find out more by booking a demo.


David Holloway

Chief Marketing Officer

David Holloway is the Chief Marketing Officer at ISMS.online, with over four years of experience in compliance and information security. As part of the leadership team, David focuses on empowering organisations to navigate complex regulatory landscapes with confidence, driving strategies that align business goals with impactful solutions. He is also the co-host of the Phishing For Trouble podcast, where he delves into high-profile cybersecurity incidents and shares valuable lessons to help businesses strengthen their security and compliance practices.

ISO 27001:2022 Annex A Controls

Organisational Controls