Skip to content

How is Annex A structured in ISO 27701:2025?

Annex A is normative, meaning its controls are requirements (not optional guidance). It is organised into three tables based on the organisation’s role in processing personally identifiable information (PII):

Table Applies to Controls Focus areas
Table A.1 PII controllers 31 Lawful basis, consent, PII principal rights, privacy by design, data transfers
Table A.2 PII processors 18 Customer agreements, processing purposes, subcontractor management, disclosures
Table A.3 Both controllers and processors 29 Information security policies, access control, incident management, cryptography, development security

Every Annex A control has corresponding implementation guidance in Annex B (e.g. guidance for control A.1.2.2 Identify and Document Purpose is found in B.1.2.2). Organisations must include all applicable controls in their statement of applicability, with justification for any exclusions [Clause 6.1.3 e)].

ISO 27701:2025 Annex A Structure - 78 controls across Table A.1 (31 controller), Table A.2 (18 processor), Table A.3 (29 shared)

What does Table A.1 cover? (PII controller controls)

Table A.1 contains 31 controls grouped into four objectives. These apply to any organisation that determines the purposes and means of PII processing.

Conditions for collection and processing (A.1.2)

Objective: To demonstrate that processing is lawful, with a legal basis per applicable jurisdictions, and with clearly defined and legitimate purposes.

Control Title
A.1.2.2 Identify and Document Purpose Identify and document purpose
A.1.2.3 Identify Lawful Basis Identify lawful basis
A.1.2.4 Determine Consent Determine when and how consent is to be obtained
A.1.2.5 Obtain and Record Consent Obtain and record consent
A.1.2.6 Privacy Impact Assessment Privacy impact assessment
A.1.2.7 Contracts with PII Processors Contracts with PII processors
A.1.2.8 Joint PII Controller Joint PII controller
A.1.2.9 Records of Processing PII Records related to processing PII

Obligations to PII principals (A.1.3)

Objective: To ensure PII principals are provided with appropriate information about the processing of their PII and to meet any other applicable obligations.

Control Title
A.1.3.2 Obligations to PII Principals Determining and fulfilling obligations to PII principals
A.1.3.3 Information for PII Principals Determining information for PII principals
A.1.3.4 Providing Information Providing information to PII principals
A.1.3.5 Modify or Withdraw Consent Providing mechanism to modify or withdraw consent
A.1.3.6 Object to PII Processing Providing mechanism to object to PII processing
A.1.3.7 Access, Correction or Erasure Access, correction or erasure
A.1.3.8 Inform Third Parties PII controllers’ obligations to inform third parties
A.1.3.9 Providing Copy of PII Providing copy of PII processed
A.1.3.10 Handling Requests Handling requests
A.1.3.11 Automated Decision Making Automated decision making

Privacy by design and privacy by default (A.1.4)

Objective: To ensure that processes and systems are designed such that the collection and processing of PII are limited to what is necessary for the identified purpose.

Control Title
A.1.4.2 Limit Collection Limit collection
A.1.4.3 Limit Processing Limit processing
A.1.4.4 Accuracy and Quality Accuracy and quality
A.1.4.5 PII Minimisation PII minimization objectives
A.1.4.6 De-identification and Deletion PII de-identification and deletion at the end of processing
A.1.4.7 Temporary Files Temporary files
A.1.4.8 Retention Retention
A.1.4.9 Disposal Disposal
A.1.4.10 PII Transmission Controls PII transmission controls

PII sharing, transfer and disclosure (A.1.5)

Objective: To determine whether, and document when, PII is shared, transferred or disclosed in accordance with applicable obligations.

Control Title
A.1.5.2 Basis for PII Transfer Identify basis for PII transfer between jurisdictions
A.1.5.3 Countries for PII Transfer Countries and international organizations to which PII can be transferred
A.1.5.4 Records of PII Transfer Records of transfer of PII
A.1.5.5 Records of PII Disclosures Records of PII disclosures to third parties



ISMS.online's powerful dashboard

One of our onboarding specialists will walk you through our platform to help you get started with confidence.




What does Table A.2 cover? (PII processor controls)

Table A.2 contains 18 controls grouped into four objectives. These apply to any organisation that processes PII on behalf of a PII controller.

Conditions for collection and processing (A.2.2)

Control Title
A.2.2.2 Customer Agreement Customer agreement
A.2.2.3 Organisation Purposes Organization’s purposes
A.2.2.4 Marketing and Advertising Marketing and advertising use
A.2.2.5 Infringing Instruction Infringing instruction
A.2.2.6 Customer Obligations Customer obligations
A.2.2.7 Records of Processing PII Records related to processing PII

Obligations to PII principals (A.2.3)

Control Title
A.2.3.2 Obligations to PII Principals Comply with obligations to PII principals

Privacy by design and privacy by default (A.2.4)

Control Title
A.2.4.2 Temporary Files Temporary files
A.2.4.3 Return, Transfer or Disposal Return, transfer or disposal of PII
A.2.4.4 PII Transmission Controls PII transmission controls

PII sharing, transfer and disclosure (A.2.5)

Control Title
A.2.5.2 Basis for PII Transfer Basis for PII transfer between jurisdictions
A.2.5.3 Countries for PII Transfer Countries and international organizations to which PII can be transferred
A.2.5.4 Records of PII Disclosures Records of PII disclosures to third parties
A.2.5.5 PII Disclosure Requests Notification of PII disclosure requests
A.2.5.6 Legally Binding Disclosures Legally binding PII disclosures
A.2.5.7 Disclosure of Subcontractors Disclosure of subcontractors used to process PII
A.2.5.8 Engaging Subcontractors Engagement of a subcontractor to process PII
A.2.5.9 Change of Subcontractor Change of subcontractor to process PII

What does Table A.3 cover? (Shared security controls)

Table A.3 contains 29 controls that apply to both PII controllers and PII processors. These are information security controls with specific PII processing requirements.

Control Title
A.3.3 Information Security Policies Policies for information security
A.3.4 Security Roles Information security roles and responsibilities
A.3.5 Classification of Information Classification of information
A.3.6 Labelling of Information Labelling of information
A.3.7 Information Transfer Information transfer
A.3.8 Identity Management Identity management
A.3.9 Access Rights Access rights
A.3.10 Supplier Agreements Addressing information security within supplier agreements
A.3.11 Incident Management Information security incident management planning and preparation
A.3.12 Security Incident Response Response to information security incidents
A.3.13 Legal and Regulatory Requirements Legal, statutory, regulatory and contractual requirements
A.3.14 Protection of Records Protection of records
A.3.15 Independent Review Independent review of information security
A.3.16 Compliance with Policies Compliance with policies, rules and standards for information security
A.3.17 Security Awareness and Training Information security awareness, education and training
A.3.18 Confidentiality Agreements Confidentiality or non-disclosure agreements
A.3.19 Clear Desk and Clear Screen Clear desk and clear screen
A.3.20 Storage Media Storage media
A.3.21 Secure Disposal of Equipment Secure disposal or re-use of equipment
A.3.22 User Endpoint Devices User endpoint devices
A.3.23 Secure Authentication Secure authentication
A.3.24 Information Backup Information backup
A.3.25 Logging Logging
A.3.26 Use of Cryptography Use of cryptography
A.3.27 Secure Development Life Cycle Secure development life cycle
A.3.28 Application Security Application security requirements
A.3.29 Secure System Architecture Secure system architecture and engineering principles
A.3.30 Outsourced Development Outsourced development
A.3.31 Test Information Test information



climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




How do Annex A and Annex B work together?

Annex A defines the control objectives and control statements (the “what”). Annex B provides implementation guidance (the “how”). Each Annex A control has a matching Annex B clause with the same numbering:

When implementing a control, read both the Annex A requirement and the Annex B guidance together. Annex B is classified as normative, though it uses ‘should’ language rather than ‘shall’, but auditors will expect your implementation to be consistent with its intent.

How does Annex A relate to other annexes?

The standard includes four additional mapping annexes that connect Annex A controls to external frameworks:

These mappings are informative (not normative), but they are invaluable for organisations that need to demonstrate compliance with multiple frameworks simultaneously.

Why choose ISMS.online for ISO 27701:2025 Annex A?

ISMS.online gives you a structured, auditable way to implement every Annex A control:

  • Pre-built control sets — All 78 controls mapped and ready for your statement of applicability
  • Evidence linking — Attach policies, risk assessments, audit results and records directly to each control
  • Role-based views — Filter controls by your role (controller, processor or both) so you see only what applies
  • Gap tracking — Mark each control as implemented, partially implemented or not applicable with justification
  • Cross-framework mapping — See how each control maps to GDPR, ISO 27001 and other frameworks you operate
  • Audit-ready exports — Generate your statement of applicability and evidence packs for external auditors

FAQs

Do I need to implement all 78 Annex A controls?

Not necessarily. You must include all controls that are applicable to your role (controller, processor or both) in your statement of applicability. Any exclusions must be justified. Controls may be excluded where they are not deemed necessary by your risk assessment or where they are not required by applicable legal requirements.


What is the difference between Annex A and Annex B?

Annex A contains the control objectives and control statements (the requirements). Annex B provides implementation guidance for each control. Annex A is normative (mandatory); Annex B guidance is normative and uses ‘should’ language to provide implementation recommendations that auditors expect to see addressed.


How do I know which table applies to my organisation?

If you determine the purposes and means of PII processing, Table A.1 (controller controls) applies. If you process PII on behalf of another organisation, Table A.2 (processor controls) applies. Table A.3 (shared controls) applies to both roles. Many organisations act as both controllers and processors for different processing activities.


How do the 2025 controls map to the 2019 edition?

Annex F provides a complete correspondence table in both directions. Table F.1 maps 2025 controls to their 2019 equivalents. Table F.2 maps 2019 controls to their 2025 equivalents. See our Annex F correspondence guide for the full mapping.



Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.