Skip to content

ISO 27001:2022 Control 8.27 – Strengthening System Security from the Ground Up

ISO 27001:2022 Annex A 8.27 specifies that organisations must implement secure system architecture and engineering principles to ensure that the design, implementation and management of the information system are appropriate to the organisation’s security requirements. This includes the establishment of secure system architectures, engineering principles and secure design practices.

The intricate structures of contemporary information systems, combined with the ceaselessly shifting cyber security risk environment, make information systems more prone to existing and potential security threats.

Annex A 8.27 outlines how organisations can protect their information systems from security threats through the implementation of secure system engineering principles during all stages of the information system life-cycle.

Purpose of ISO 27001:2022 Annex A 8.27

Annex A 8.27 facilitates organisations to secure information systems during the phases of design, deployment and operation, via the establishment and implementation of secure system engineering principles that system engineers must adhere to.

Ownership of Annex A 8.27

The Chief Information Security Officer is to be held accountable for erecting, sustaining, and putting into action the rules that govern safe engineering of information systems.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




General Guidance on ISO 27001:2022 Annex A 8.27 Compliance

ISO 27001:2022 Annex A 8.27 underscores the necessity for organisations to embed security into the entirety of their information systems, including business processes, applications and data architecture.

Secure engineering practices should be implemented for all tasks associated with information systems, regularly reviewed and updated to account for emerging threats and attack patterns.

Annex A 8.27 also applies to systems created by external providers, in addition to those developed and run internally.

Organisations should guarantee that the practices and standards of service providers are in line with their secure engineering protocols.

ISO 27001:2022 Annex A 8.27 necessitates secure system engineering principles to address the following eight topics:

  1. Methods of user authentication.
  2. Secure session control guidance.
  3. Procedures for sanitising and validating data.
  4. Security measures for protecting information assets and systems against known threats are analysed comprehensively.
  5. Security measures analysed for their ability to identify, eliminate, and respond to security threats.
  6. Analysing the security measures applied to specific business activities, such as information encryption.
  7. Where and how security measures will be implemented. A specific Annex A security control may be integrated within the technical infrastructure as part of this process.
  8. The way in which different security measures work together and operate as a combined system.

Guidance on Zero Trust Principle

Organisations should bear in mind these zero-trust principles:

  • Based on the assumption that the organisation’s systems are already compromised and that the defined perimeter security of its network cannot provide adequate protection.
  • A policy of “verification before trust” should be adopted when it comes to granting access to information systems. This ensures that access is granted only after scrutiny, making sure that the right people have it.
  • Ensuring requests made to information systems are safeguarded with end-to-end encryption provides assurance.
  • Verification mechanisms are implemented assuming access requests from external, open networks to information systems.
  • Implement least privilege and dynamic access control consistent with ISO 27001:2022 Annex A 5.15, 5.18, and 8.2. This must encompass authentication and authorisation of sensitive info and info systems taking into account contextual aspects such as user identities (ISO 27001:2022 Annex A 5.16) and information classification (ISO 27001:2022 Annex A 5.12).
  • Authenticate the identity of the requester and verify authorisation requests to access information systems according to authentication information in ISO 27001:2022 Annex A 5.17, 5.16 and 8.5.

What Should Secure System Engineering Techniques Cover?

Your organisation should keep in mind the following:

  • Incorporating secure architecture principles such as “security by design”, “defence in depth”, “fail securely”, “distrust input from external applications”, “assume breach”, “least privilege”, “usability and manageability” and “least functionality” is paramount.
  • Conducting a security-oriented design review to detect any information security issues and making sure that security measures are established and meet the security needs.
  • Documenting and acknowledging security measures that fail to meet requirements is essential.
  • System hardening is essential for the security of any system.



ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




What Criteria to Consider When Designing Secure Engineering Principles?

Organisations should take into account the following points when setting up secure system engineering principles:

  • The requirement to coordinate Annex A Controls with particular security architecture is indispensable.
  • An organisation’s existing technical security infrastructure, including public key infrastructure, identity management, and data leakage prevention.
  • Can the organisation construct and sustain the technology chosen.
  • The cost and the time needed to fulfil security requisites, taking into account their complexity, must be considered.
  • Adhering to current best practices is essential.

Guidance on Application of Secure System Engineering Principles

ISO 27001:2022 Annex A 8.27 states that organisations can utilise secure engineering principles when setting up the following:

  • Fault tolerance and other resilience strategies are essential. They help ensure that systems remain operational despite the occurrence of unexpected events.
  • Segregation through virtualisation is one technique that can be utilised.
  • Tamper-proofing, ensure that systems remain secure and impervious to malicious interference.

Secure virtualisation technology can reduce the risk of interception between applications running on the same device.

It is emphasised that tamper resistance systems can detect both logical and physical manipulation of information systems, preventing unauthorised access to data.

Changes and Differences From ISO 27001:2013

ISO 27001:2022 Annex A 8.27 replaces ISO 27001:2013 Annex A 14.2.5 in the revised 2022 standard.

The 2022 version contains more extensive demands than the 2013 version, such as:

  • In comparison to 2013, the 2022 version furnishes guidance on what secure engineering principles ought to comprise.
  • As opposed to the 2013 iteration, the 2022 version considers the criteria that organisations should take into account when constructing secure system engineering principles.
  • The 2022 version provides guidance on the zero trust principle, which was not included in the 2013 version.
  • The 2022 edition of the document includes recommendations for secure engineering techniques, such as “security by design,” which was not present in the 2013 version.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

How ISMS.online Help

Our step-by-step checklist makes ISO 27001 implementation a breeze. Our complete compliance solution for ISO/IEC 27001:2022 will guide you through the process from start to finish.

Upon logging in, you can expect up to 81% progress.

This solution is totally comprehensive and straightforward.

Reach out now to book a demonstration.


John Whiting

John is Head of Product Marketing at ISMS.online. With over a decade of experience working in startups and technology, John is dedicated to shaping compelling narratives around our offerings at ISMS.online ensuring we stay up to date with the ever-evolving information security landscape.

ISO 27001:2022 Annex A Controls

Organisational Controls