Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Revisions released around internationally recognized information security standards

By Christopher Denton
ISO 27002.jpg

Image by vectorjuice via Freepik

July 15, 2022

With standards bodies represented from more than 160 countries, the International Organization for Standardization, more commonly referred to ISO, is often seen as a gold standard for certifications. What many might not know is that the ISO seeks to update standards around its frameworks every five to seven years after a comprehensive review. The process takes several years to complete.


A review of ISO 27002 began in March 2018 and the draft international standard (DIS) was released in January 2021. After much review, the full standard was released on February 15, 2022 and supersedes ISO 27002:2013.


What is ISO 27002 all about? 

Most organizations have heard of ISO 27001, which is a standard designed to manage and monitor information security management systems while mitigating risk. While ISO 27001 is a standard that an organization can be certified against, ISO 27002 is supplementary guidance and a set of best practices for controls that can be implemented as part of an ISO 27001 program.


Up until the update earlier this year, ISO 27002 provided a normative set of controls that aligned with Annex A of ISO 27001.


What Changed? 

While the overall structure of ISO 27002 has changed greatly since the previous release in 2013, the intent of the guidance remains the same and is now even more focused on supporting ISO 27001.

Some of the key differences of ISO 27002:2022 from ISO 27002:2013 are:


1. A reduction in the total control count: Previously 114, the control count in the new guidance is only 93.


2. An introduction of several new controls: To be precise, 11 new controls were introduced to address the ever-changing IT landscape. They include:

  • 5.7 Threat intelligence
  • 5.23 Information security for use of cloud services
  • 5.30 ICT readiness for business continuity
  • 7.4 Physical security monitoring
  • 8.9 Configuration management
  • 8.10 Information deletion
  • 8.11 Data masking
  • 8.12 Data leakage prevention
  • 8.16 Monitoring activities
  • 8.23 Web filtering
  • 8.28 Secure coding


3. Redundant/similar controls were merged: This is most visible with information security policies, asset management, media, access control, logging, and change control.


4. Reorganization of controls: The controls throughout the guidance were reorganized into four categories instead of the 14 domains that existed previously.

  • Clause 5: Organizational
  • Clause 6: People
  • Clause 7: Physical
  • Clause 8: Technological


In addition, every control within ISO 27002:2022 contains a purpose for applying the control, and attributes that allow them to be organized and filtered in such a way that is useful to the organization, as is outlined here:

  • Control types: Preventive, Detective, and Corrective
  • Information security properties: Confidentiality, Integrity, and Availability
  • Cybersecurity concepts: Identify, Protect, Detect, Respond, and Recover
  • Operational capabilities: Governance, Asset Management, Information Protection, Human Resource Security, Physical Security, System And Network Security, Application Security, Secure Configuration, Identity and Access Management, Threat and Vulnerability Management, Continuity, Supplier Relationships Security, Legal and Compliance, Information Security Event Management, and Information Security Assurance
  • Security Domains: Governance and Ecosystem, Protection, Defense, And Resilience


Connectivity to ISO 27017/27018/27701

If your organization already complies with ISO 27017, 27018, and/or 27701, you might wonder what these updates mean for you.


The updates made to ISO 27002:2022 do not prevent organizations from being assessed against these other supplements and standards; however, some work is needed to map them to ISO 27002:2022 until those standards are also updated.


You should keep an eye open for updates to those standards but, generally, you will have time to comply with any revisions without risking the loss of your certification.


Looking Ahead

Stay in contact with your certification body for updates. As mentioned at the start of this article, reviews take substantial lengths of time, so organizations should not be surprised that new guidance is likely to emerge.


Furthermore, if your organization is currently assessing against ISO 27001:2013, continue to do so while preparing for the 11 new controls. This will ensure that the transition is not as drastic.

If you are just at the beginning of your journey with ISO, consider adopting the ISO 27002:2022 controls using Annex B as a guide in order to be as proactive as you can in securing one of your organization’s most valuable assets — its information.


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: compliance cyber security information security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher Denton, CISA, ISO Practice Lead at Marcum LLP, a national accounting and advisory services firm, can be reached at christopher.denton@marcumllp.com for any questions or comments.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ISF aligned tools

    Information Security Forum launches Aligned Tools Suite 2020 to help ensure compliance standards

    See More
  • Department of Veterans Affairs Generally Meets Information Security Standards

    See More
  • The Long and Winding Road to Cyber Recovery

    A call for industry coordination around DLT security

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing