Opsio - Cloud and AI Solutions
SecurityCompliance5 min readΒ· 957 words

ISO 27001:2022 Update: What Changed and What It Means for Your ISMS

Published: Β·Updated: Β·Reviewed by Opsio Engineering Team
Debolina Guha

Consultant Manager

Six Sigma White Belt (AIGPE), Internal Auditor - Integrated Management System (ISO), Gold Medalist MBA, 8+ years in cloud and cybersecurity content

ISO 27001:2022 Update: What Changed and What It Means for Your ISMS

ISO 27001:2022 was published in October 2022, replacing ISO 27001:2013 (technically corrected in 2014). The transition deadline for organisations holding 2013-edition certificates was 31 October 2025 β€” past which point all certificates issued reference the 2022 edition. If your last audit was against 2013 and you haven't transitioned, your certificate is no longer valid.

This article covers what actually changed between the editions, why the changes matter for the operating model of your ISMS, and the transition pattern we have run with customers across the deadline window.

What Changed in the Main Body (Clauses 4-10)?

The main body changes are smaller than most marketing makes them out to be. Clauses 4-10 retained their structure and most of their requirements. The notable updates:

  • Clause 4.4 now explicitly requires the ISMS to include processes for identifying necessary processes and their interactions β€” slightly stronger language than 2013
  • Clause 6.2 added a requirement that information security objectives be monitored, communicated, and updated β€” strengthening the previous "establish" wording
  • Clause 6.3 is new: planning of changes to the ISMS must be done in a planned manner
  • Clause 8.1 requires criteria for processes and control of those processes β€” explicit operational discipline

For organisations whose 2013 ISMS was operating well, these changes typically require minor documentation tweaks rather than fundamental redesign.

The Big Change: Annex A Restructuring

Annex A is where the 2022 revision is genuinely different. The control set was reorganised from 14 control domains and 114 controls into 4 themes and 93 controls. The four themes:

ThemeControl countExamples
5. Organisational37Policies, threat intelligence, identity management, supplier relationships
6. People8Screening, awareness, disciplinary process, remote working
7. Physical14Physical security perimeters, equipment siting, secure disposal
8. Technological34Endpoint protection, cryptography, secure development, monitoring

The total dropped from 114 to 93 by merging 24 controls into 11 consolidated ones, retiring 1, and adding 11 new controls β€” net change of negative-21. The new controls are the most consequential part of the update for most organisations.

Free Expert Consultation

Need expert help with iso 27001?

Our cloud architects can help you with iso 27001 β€” from strategy to implementation. Book a free 30-minute advisory call with no obligation.

Solution ArchitectAI ExpertSecurity SpecialistDevOps Engineer
50+ certified engineersAWS Advanced Partner24/7 support
Completely free β€” no obligationResponse within 24h

The 11 New Annex A Controls

These are the controls that didn't exist in 2013 and that most organisations need to design specifically for the transition:

  1. 5.7 Threat intelligence β€” collect, analyse, and produce information about threats relevant to the organisation
  2. 5.23 Information security for use of cloud services β€” explicit cloud-service security requirements
  3. 5.30 ICT readiness for business continuity β€” IT continuity tied to business continuity
  4. 7.4 Physical security monitoring β€” monitor premises continuously
  5. 8.1 User endpoint devices (consolidated) β€” endpoint protection across managed and BYOD
  6. 8.9 Configuration management β€” establish, document, monitor, review configurations
  7. 8.10 Information deletion β€” delete information when no longer required
  8. 8.11 Data masking β€” apply masking to limit exposure of sensitive data
  9. 8.12 Data leakage prevention β€” DLP controls applied to in-scope information
  10. 8.16 Monitoring activities β€” continuous monitoring of network, system, and application behaviour
  11. 8.23 Web filtering β€” control external website access from corporate devices
  12. 8.28 Secure coding β€” secure coding principles applied to software development

(That's 12 listed because 8.1 is a consolidation, not a strictly new control; the official ISO count is 11 new + 1 consolidated.)

What This Means for Your SoA

The Statement of Applicability is the document that names every Annex A control and either declares it applicable or justifies its exclusion. Transitioning from 2013 to 2022 SoA requires:

  1. Mapping every existing 2013 SoA control to its 2022 equivalent (mostly mechanical via the official ISO mapping)
  2. Adding the 11 new controls and deciding applicability
  3. Re-running risk assessment for the new controls β€” they exist because risk landscape changed
  4. Updating policy and procedure documents to reference the new control numbers
  5. Briefing the management team on changes in scope and any newly-implemented controls

For most organisations the new controls weren't completely absent in 2013 β€” threat intelligence, cloud security, monitoring, and secure coding were generally implemented under broader 2013 control wording. The 2022 update makes them explicit and auditable.

The Five Attributes Tagged on Each Annex A Control

The 2022 edition introduced a tagging system for Annex A controls. Each control carries five attribute tags:

  • Control type: preventive / detective / corrective
  • Information security properties: confidentiality / integrity / availability
  • Cybersecurity concept: identify / protect / detect / respond / recover (NIST CSF alignment)
  • Operational capabilities: governance / asset management / etc.
  • Security domain: governance and ecosystem / protection / defence / resilience

The tags do not change requirements; they make the control set easier to filter and report against. For organisations that already align their security programme to NIST CSF, the tags simplify the cross-mapping.

Transition Pattern That Actually Works

Across the customer transitions we've run, the pattern that delivered cleanly within the 31 Oct 2025 deadline:

  1. Q1 of transition year: Gap analysis against 2022 controls, especially the 11 new ones
  2. Q2: Update policies, procedures, and the SoA to reference 2022 controls. Implement any genuinely new controls
  3. Q3: Internal audit against the updated ISMS. Management review with explicit transition decision
  4. Q4: Stage 1 / Stage 2 transition audit by the certification body

The transition audit can usually be combined with a regular surveillance audit, reducing the additional CB cost. Plan it 6-9 months ahead with the CB.

How Opsio Helps

Opsio runs ISO 27001:2022 transition programmes for customers carrying forward 2013-edition certificates and for first-time certifications under 2022. Our ISMS implementation services service includes the full SoA mapping, design and implementation of the 11 new controls in cloud-native environments, and CB-aligned audit preparation. We tie the new 5.23 Cloud Services and 8.16 Monitoring controls into existing managed cloud security and how Opsio delivers elk stack infrastructure rather than running parallel processes.

About the Author

Debolina Guha
Debolina Guha

Consultant Manager at Opsio

Six Sigma White Belt (AIGPE), Internal Auditor - Integrated Management System (ISO), Gold Medalist MBA, 8+ years in cloud and cybersecurity content

Editorial standards: This article was written by a certified practitioner and peer-reviewed by our engineering team. We update content quarterly to ensure technical accuracy. Opsio maintains editorial independence β€” we recommend solutions based on technical merit, not commercial relationships.