Skip to content

Annex A 8.24 Explained: Implementing Secure Cryptographic Controls

When transmitting information between networks and devices, cyber attackers may attempt to steal sensitive data, alter content, imitate senders/recipients to gain unauthorised access, or intercept the exchange.

Cyber criminals may employ man-in-the-middle (MITM) attacks, intercepting data transmissions and masquerading as the server to get the sender to reveal login credentials. With these credentials, they can gain access to systems and jeopardise sensitive data.

Cryptography, such as encryption, can effectively safeguard the confidentiality, integrity, and availability of information when in transit.

Cryptographic techniques can keep information assets secure when not in use. They ensure that the data is protected from any unauthorised access or modification.

ISO 27001:2022 Annex A 8.24 outlines how organisations can create and apply regulations and processes regarding the utilisation of cryptography.

Purpose of ISO 27001:2022 Annex A 8.24

ISO 27001:2022 Annex A 8.24 allows organisations to secure the confidentiality, integrity, authenticity and availability of information assets through correct application of cryptography and satisfying the following criteria:

  • Business requirements are a must.
  • Ensure information security through the implementation of strict requirements.
  • Statutory, contractual, and organisational mandates necessitate the usage of cryptography.



ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Ownership on Annex A 8.24

Complying with Annex A 8.24 necessitates the implementation of a policy on cryptography, the establishment of an efficient key management process, and the determination of the type of cryptographic technique applicable to the data classification of a given information asset.

The Chief Information Security Officer must be held accountable for setting up proper regulations and protocols regarding cryptographic keys.

General Guidance on ISO 27001:2022 Annex A 8.24 Compliance

ISO 27001:2022 Annex A Control 8.24 stipulates seven requirements organisations must observe when employing cryptographic methods:

  1. Organisations should have a policy in place regarding the use of cryptography, to maximise its benefits and reduce risks. This policy should also outline general principles of protecting information.
  2. Organisations must take into account how delicate their information resources are, as well as the information classification level appointed to them, when selecting the type, strength, and quality of the encryption algorithm.
  3. Organisations ought to utilise cryptographic approaches when transferring info to portable devices, media equipment, or when it is stored thereon.
  4. Organisations need to tackle any matters connected to key management, like forming and shielding cryptographic keys and having a scheme of data recovery in the event that the keys are missing or vulnerable.
  5. Organisations should define the roles and responsibilities for the following:
    • The rules for using cryptographic techniques must be established and enforced.
    • Handling of keys, including their generation.

  6. The organisation adopts and approves standards encompassing the cryptographic algorithms, cipher strength, and usage practices of cryptography.
  7. Organisations should consider the potential impact of encryption on the efficacy of the content inspection controls, such as malware detection.

ISO 27001:2022 Annex A 8.24 emphasises that organisations should consider legal requirements and restrictions that may impact the use of cryptography, including the international transfer of encrypted information.

Organisations should take into consideration liability and continuity of services when they enter into service agreements with external providers of cryptographic services.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Guidance on Key Management

Organisations must set up and follow secure processes for the generation, storage, fetching, and disposal of cryptographic keys.

Organisations ought to install a solid key management system that features regulations, procedures, and criteria for:

  • Generating cryptographic keys for a variety of systems and applications is necessary.
  • The issuing and obtaining of public-key certificates.
  • Distribute keys to intended receivers, including the procedure of key activation.
  • Keys are to be stored securely. Those authorised to access them may do so with the necessary credentials.
  • Changing of keys.
  • Handling of compromised keys should be taken seriously.
  • If keys are compromised or an authorised personnel leaves an organisation, they should be revoked.
  • Recovery of lost keys.
  • Key backup and archival should be performed regularly.
  • Destroying keys.
  • Maintain a record of all activities linked to each key.
  • Establishing the activation and deactivation dates for keys.
  • Accessing keys in response to legal requests.

Finally, it is essential that organisations are aware of the three main risks that this supplementary guidance outlines:

  1. Secure and private keys ought to be safeguarded against unauthorised usage.
  2. Protecting equipment used for creating or storing encryption keys should be done with physical security measures.
  3. Organisations should ensure the validity of their public keys.

What Are the Benefits of Cryptography?

ISO 27001:2022 Annex A 8.24 states that cryptography can be used to help organisations attain four information security objectives. These objectives include verifying the authenticity of public keys through public key management processes:

  1. Cryptography ensures the confidentiality of data, both in transit and when stored, is preserved.
  2. Digital signatures and authentication codes guarantee information communicated is genuine and reliable.
  3. Cryptographic methods give assurance that all events or actions taken, including receipt of information, will not be disavowed.
  4. Authentication through cryptographic methods allows organisations to validate the identity of users seeking access to systems and applications.



ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 8.24 replaces ISO 27001:2013 Annex A 10.1.1 and 10.1.2 in the revised 2022 standard.

The content of the two is nearly the same, though there are some structural modifications.

Whereas the 2013 version had two separate controls, 10.1.1 and 10.1.2, for the use of cryptography, the 2022 version consolidated these into one Annex A Control, 8.24.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

How ISMS.online Help

ISMS.Online is the foremost ISO 27001 management system software, aiding companies in adhering to ISO 27001:2022 and ensuring their security policies and procedures comply with the standard.

This cloud-based platform offers a comprehensive set of tools to aid organisations in implementing an Information Security Management System (ISMS) in line with ISO 27001.

Reach out and book a demonstration today.


John Whiting

John is Head of Product Marketing at ISMS.online. With over a decade of experience working in startups and technology, John is dedicated to shaping compelling narratives around our offerings at ISMS.online ensuring we stay up to date with the ever-evolving information security landscape.

ISO 27001:2022 Annex A Controls

Organisational Controls