RequirementsGLOBAL

ISO 27001 Requirements

Clauses 4 to 10, Annex A, and the Statement of Applicability explained with an evidence-first lens.

Use this page to see what the standard requires and what proof an operating ISMS should generate.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
5

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ISO/IEC 27001:2022 is easiest to implement when you read it as a chain of decisions and evidence. Scope decisions determine the audit boundary. Risk decisions determine which controls are necessary. The Statement of Applicability captures the treatment logic. Monitoring, internal audit, and management review prove the ISMS keeps working. This page breaks that down clause by clause.

Section 1

Clauses 4 and 5: context, scope, policy, and accountability

Clause 4 requires you to understand the organization, relevant interested parties, and the boundaries and applicability of the ISMS. The scope must be available as documented information. Clause 5 then requires leadership commitment, policy, and clear roles, responsibilities, and authorities.

These clauses are easy to under-build because they look administrative. In reality, they are what make later risk and control evidence coherent.

  • Evidence examples: documented scope, context assessment, interested-party requirements, policy approval, governance structure, role assignments
  • Audit question: does the same scope appear consistently across the risk register, SoA, supplier records, and sampled control evidence
Section 2

Clause 6: planning, risk assessment, risk treatment, and objectives

Clause 6.1.2 requires the organization to define and apply an information security risk assessment process that produces valid, consistent, and comparable results. Clause 6.1.3 then requires the risk treatment process, including determining necessary controls, comparing them to Annex A, producing the Statement of Applicability, creating the treatment plan, and obtaining residual risk approvals.

This clause is where most implementations either become disciplined or become decorative.

  • Evidence examples: risk criteria, risk assessment method, risk register, treatment decisions, Statement of Applicability, treatment plan, residual risk approvals
  • Grounding point: comparison against Annex A exists so necessary reference controls are not omitted by mistake
  • 2022 context: the reference set aligns to the 93-control structure of ISO/IEC 27002:2022
Section 3

Clauses 7 and 8: support and operation

Clause 7 covers resources, competence, awareness, communication, and documented information. These are operational enablers. If they are weak, the ISMS will depend on heroics rather than system behavior.

Clause 8 requires operational planning and control plus recurring information security risk assessment and information security risk treatment. The standard expects this work to happen at planned intervals and when significant changes occur.

  • Evidence examples: training records, awareness outputs, communications rules, document control records, change-driven risk reviews, treatment execution records
  • Operational test: can the organization show that major changes trigger risk review and treatment updates
Section 4

Clauses 9 and 10: performance evaluation and improvement

Clause 9 requires monitoring, measurement, analysis, and evaluation, internal audit, and management review. Clause 10 requires continual improvement plus nonconformity and corrective action. Together, these clauses turn the ISMS into a living system.

Most audit pain in this area comes from management review that is too generic, internal audits that do not challenge the system, or corrective actions that are logged but never meaningfully closed.

  • Evidence examples: dashboards, internal audit programmes and reports, management review inputs and outputs, nonconformity records, corrective action closure evidence
  • Operating rule: every meaningful weakness should have an owner, deadline, and proof of closure or escalation
Section 5

What Annex A does and does not do

Annex A is a normative information security controls reference. It supports treatment comparison and the Statement of Applicability, but it is not a substitute for risk treatment logic. The ISMS still has to decide what is necessary in the organization's context.

That is why a control cannot be marked implemented just because the organization likes the idea of it. It has to make sense in the treatment model and be supportable in evidence.

  • Use Annex A as the reference set for comparison, not as a generic to-do list
  • Use the SoA to explain inclusion, exclusion, and implementation status
  • Use ISO/IEC 27002 to deepen implementation where teams need control design guidance
Recommended next step

Turn ISO 27001 Requirements into an operational assessment

Assessment Autopilot can take ISO 27001 Requirements from turning the requirements into assigned actions to a reusable workflow inside Sorena. Teams working on ISO 27001 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

Related guides

Explore more topics