Now that it has been formally launched, the new ISO 27001 standard is available. The complete name of the standard is ISO/IEC 27001:2022 Information Security, Cybersecurity and Privacy Protection — Information Security Management Systems. Our essential services are supported by vital infrastructures, whose operation depends heavily on the flow of knowledge and data. The reality of our work and personal life is deeply entwined with information security. It is crucial for companies of all sizes to safeguard their information-driven everyday operations, sensitive data, and intellectual property against cyber threats. Building corporate resilience demands a timely and flexible strategy in the era of industrialized cyberattacks, where information security dangers are always evolving. Information and data power value-added business processes. Nothing in our digital economy operates without information sharing.

The new ISO/IEC 27001:2022, which places a strong emphasis on process orientation in information security management, is precisely where it comes into play in this situation. The ISO 27001 standard has served as a trusted but outdated foundation for information security management systems for more than two decades. In spite of its advanced age, the standard was able to expand in the last year of 2021, as seen by a 32% increase in certificates, according to the ISO Survey. The updated ISO/IEC 27001:2022 was released on October 25, 2022, in response to the rising demand for a modern information security assessment framework. What can we expect?

New Features of ISO 27001:2022

Constantly evolving cyber threats try to attack and compromise information flows and hence corporate processes by making use of fresh potential security flaws in organizations. The threats that this mechanism poses to the three fundamental security objectives of information security—confidentiality, integrity, and availability—must be recognized and controlled. Regardless of an organization’s organizational structure, size, or viewpoint, ISO 27001 outlines the framework for an information security management system (ISMS). Risk management is the key component in this.

  1. The long-delayed necessity for process orientation is now made the focal point of a successful ISMS through adaptation to the so-called Harmonized Structure in the new ISO/IEC 27001:2022 standard.
  2. The ISO/IEC 27001:2022 update addresses best practices for managing various information security vulnerabilities.
  3. The subsequent pertinent adjustment further underscores the significance of process orientation, which is a feature shared by all HS-based management systems. 

In addition to the aforementioned changes, 11 new controls, 24 existing controls that need to be combined, and 58 controls that need to be modified. The new controls are as follows:

  1. Threat Intelligence – (A.5.7) – Organizations will need to take proactive measures to find dangers. Risk evaluations, context, and recognizing dangers and opportunities will all be connected to this.
  2. ICT readiness for business continuity (A.5.30) – The emphasis is now firmly on ICT, even though this is similar to earlier business continuity controls.
  3. Information security for the use of cloud services (A.5.23) – Since 2013, there has been a substantial increase in cloud computing, therefore this feature is highly appropriate.
  4. Physical security monitoring (A.7.4) –  Physical security must now be constantly checked.
  5. Configuration Management – The management and recording of configuration is now required.
  6. Data Leakage Prevention (A.8.12)– A concluding GDPR/DPA 2018-related control that strengthens controls.
  7. Secure Coding (A.8.28) – This has been strengthened while still being connected to earlier development controls, particularly read and write access and libraries, etc.
  8. Web Filtering (A.8.23) – With the expansion of the internet, it is more crucial than ever to protect yourself from malicious or hostile websites.
  9. Monitoring Activities (A.8.16) – A stricter interpretation of the standard’s monitoring requirements.
  10. Information Deletion (A.8.10) – In connection with recent rules and laws like GDPR and DPA 2018, stricter controls are required for information erasure.
  11. Data masking  (A.8.11) – Pseudonymization and anonymization are now often used as a result of GDPR and DPA 2018.

A Few Things Needs Attention

  1. Timeline – The transition to ISO/IEC 27001:2022, for organizations that are currently ISO/IEC 27001:2013 certified, will take three years.
  2. Transition Requirements for Organization – They outline the steps that must be taken in order for organizations that are already certified to ISO/IEC 27001:2013 as well as those who are thinking about certification in the future to transition to and/or obtain certification against the ISO/IEC 27001:2022 standard.
  3. Transition Requirement for Accreditation and Certification Bodies – The document also specifies the transition procedures that accreditation bodies (ABs) and their accredited certification bodies (CBs) must follow to upgrade their accreditations to reflect the ISO 27001 standard’s 2022 revision.
  4. Updated Control Set – The primary modification made by the update was the substitution of the control set from ISO/IEC 27002:2022 for the previous control set from ISO/IEC 27001 (known as “Annex A”) in that standard.

Steps for the organization already certified – 

The following are the primary actions to take as part of the subsequent steps:

  • Purchasing the revised Standard.
  • Examine the control modifications in the new ISO 27001 Standard.
  • Make a risk assessment or analysis. 
  • The most appropriate controls should be chosen to reduce any risks that have been identified, and your ISMS policies, standards, etc. should be updated as necessary.
  • Keep your Statement of Applicability current.

Boost your attitude toward information security

Adopting cyber resilience helps organizations gain a competitive edge and swiftly become industry leaders. The new ISO/IEC 27001 ensures that your entire organization, not just your infosec team, is covered, supports your digitization plan, lowers the risk of breaches, and increases customer confidence in your brand and information resilience in your organization.

When it comes to assisting you with understanding the changes, determining their influence on the security goals of your company, providing implementation advice, and migrating your certification, Kratikal’s CERT-IN Empanelled platform and tools are ready to help you right away. We offer security auditing for Compliance, including PCI-DSS, ISO/IEC 27001, GDPR, HIPAA, and others, in addition to our VAPT services.

Activate your compliance advantage right away!

Leave a comment

Your email address will not be published. Required fields are marked *