The international standard for information security management, ISO/IEC 27001, received a significant update in October 2022.

The international standard for information security management received a significant update in October 2022. If your organisation is still working from the 2013 version — or you're starting ISO 27001 for the first time — this guide explains what changed, what it means in practice, and what you need to do.

Important note on transition: The three-year transition period ended on 31 October 2025. All ISO 27001 certifications are now issued against the 2022 version only. If you were certified to 2013 and haven't transitioned, your certificate will no longer be valid. Contact your certification body to discuss your options.


At a Glance: The Key Differences

FeatureISO 27001:2013ISO 27001:2022
Number of controls114 controls93 controls
Control categories14 domains (A.5–A.18)4 themes (Organisational, People, Physical, Technological)
New controls11 new controls added
Modern threatsLimited coverageExplicitly covers cloud, threat intelligence, data leakage
Core ISMS structureClauses 4–10Unchanged
Certification processThird-party auditUnchanged

The core of the standard — the ISMS requirements in Clauses 4 to 10, the risk-based approach, and the Plan-Do-Check-Act cycle — is unchanged. The main differences are in Annex A.


What Changed in Annex A

Controls Consolidated from 114 to 93

The 114 controls across 14 domains have been reorganised into 93 controls across 4 themes. This isn't just cosmetic — many controls were merged, some were split, and 11 are genuinely new.

The four themes are:

  • Organisational (37 controls) — policies, roles, responsibilities, supplier relationships, incident management
  • People (8 controls) — screening, terms of employment, awareness, training, disciplinary process
  • Physical (14 controls) — physical security perimeters, equipment, clear desk/screen, supporting utilities
  • Technological (34 controls) — access control, cryptography, vulnerability management, secure coding, monitoring

What Happened to the Old Controls

2013 StatusCount
Unchanged and carried forward24
Merged into other controls57
Renamed or updated11
Split into multiple controls1
New in 202211
Total 2022 controls93

No controls were deleted outright — the 57 that were "merged" still exist as concepts within the consolidated controls.


The 11 New Controls

These are the controls that didn't exist as standalone requirements in 2013. If you were certified to 2013, these are the primary gaps to assess:

ControlTitleWhat it requires
A.5.7Threat intelligenceCollecting and analysing information about cyber threats relevant to your organisation
A.5.23Information security for use of cloud servicesFormal security requirements for acquiring, using, and managing cloud services
A.5.30ICT readiness for business continuityEnsuring IT systems can support business continuity requirements
A.6.8Information security event reportingClear processes for staff to report security events
A.7.4Physical security monitoringMonitoring of sensitive physical areas
A.8.9Configuration managementManaging secure configurations for hardware, software, and networks
A.8.10Information deletionSecure deletion of data when no longer required
A.8.11Data maskingMasking sensitive data in systems, particularly test environments
A.8.12Data leakage preventionControls to prevent unauthorised data exfiltration
A.8.16Monitoring activitiesContinuous monitoring of networks and systems for anomalies
A.8.23Web filteringRestricting access to malicious or inappropriate websites
A.8.28Secure codingApplying security principles throughout the software development lifecycle

For most SMBs, the highest-effort new controls are A.5.7 (threat intelligence), A.5.23 (cloud security), and A.8.28 (secure coding) — these typically require new processes rather than just documentation updates.


What Hasn't Changed

It's worth being clear on this because the transition sounds more daunting than it is for most organisations. The following are unchanged:

  • Clauses 4–10 — the core ISMS requirements around context, leadership, planning, support, operations, performance evaluation, and improvement
  • The risk-based approach — you still identify risks, assess them, and select controls to treat them
  • The Statement of Applicability (SoA) — still required, though it needs updating to reflect the new control structure
  • The certification process — still a third-party audit by an accredited certification body
  • Surveillance audits — still annual, still required to maintain certification

Transition: What You Actually Need to Do

If you were certified to 2013 and haven't yet transitioned, speak to your certification body as your first step — the transition window has closed and your situation will depend on your last audit date and your certification body's approach.

For organisations currently pursuing ISO 27001 for the first time, you're implementing 2022 from the start — there's no transition to worry about.

For organisations mid-transition or planning their ISMS, here's the practical checklist:

1. Run a gap analysis against the 11 new controls Assess each new control against your current practices. Some you may already satisfy informally — document the evidence. Others will require new processes or technologies.

2. Update your Statement of Applicability Your SoA needs to reference the 2022 control numbers and structure. Every control needs a justified inclusion or exclusion decision.

3. Remap your existing controls If you have existing control documentation referencing 2013 Annex A numbers, update them to 2022 references. This is mostly administrative but needs to be done before your transition audit.

4. Update your risk treatment plan Re-run or review your risk assessment to ensure the new controls are considered where relevant threats exist.

5. Update internal audit procedures Your internal auditors need to be auditing against 2022 requirements. Update audit checklists and schedules accordingly.

6. Brief key stakeholders Management review, control owners, and internal auditors all need to understand the changes — particularly the 11 new controls and their responsibilities.


Common Mistakes During Transition

Treating it as a complete rebuild. Most of your 2013 ISMS is still valid. This is an update, not a replacement. Focus your effort on the gaps.

Updating documentation without implementing controls. The 11 new controls need to be genuinely implemented, not just added to your SoA. Auditors will look for evidence of operation.

Leaving the SoA update too late. The SoA is one of the first documents your auditor will review. Get it updated early.

Not involving control owners. Changes to controls like threat intelligence (A.5.7) and secure coding (A.8.28) affect IT and development teams directly. Don't let compliance handle it in isolation.


Managing the Transition with a GRC Platform

The most time-consuming part of transitioning is remapping your existing controls from the 2013 structure to 2022 — updating your SoA, cross-referencing old and new control numbers, and identifying genuine gaps versus administrative renames.

SnapGRC pre-maps controls to ISO 27001:2022 out of the box, so your compliance status automatically reflects the current standard. If you're transitioning from a spreadsheet-based ISMS, it's a good time to move to a platform that won't need manually updating every time a standard changes.

See how SnapGRC supports ISO 27001:2022 →


SnapGRC is a compliance management platform for SMBs and MSPs. ISO 27001, Cyber Essentials, SOC 2, GDPR, NIS2 and 40+ other frameworks — without the enterprise price tag. Learn more →