New feature release, internal Vulnerabilities –

Explore Supported Frameworks

ISO/IEC 27001/2 : 2022 Combined

Select from a range of over 50 supported frameworks

### ISO/IEC 27001/2: 2022 Combined: A Comprehensive Guide for CISOs, Security Professionals, and IT Managers

#### Overview of the ISO/IEC 27001/2: 2022 Combined

The ISO/IEC 27001/2: 2022 Combined is the latest iteration in a suite of standards dedicated to information security management systems (ISMS), produced by the International Organisation for Standardisation (ISO) and the International Electrotechnical Commission (IEC). Its purpose is to provide organisations with a framework for establishing, implementing, maintaining, and continuously improving an ISMS. This framework is designed to help businesses manage their information security by addressing risks and ensuring confidentiality, integrity, and availability of information. It is especially relevant for Chief Information Security Officers (CISOs), security professionals, IT managers, and any organisational stakeholders concerned with protecting their information assets.

#### Key Components/Pillars

The main pillars of the ISO/IEC 27001/2: 2022 Combined include:

– **Risk Assessment and Treatment**: Identifying and treating information security risks tailored to the business needs.
– **Security Policy Management**: Setting up policies that establish a clear direction of security in alignment with business objectives.
– **Organisational Structure**: Assigning roles and responsibilities to ensure proper governance and accountability in security matters.
– **Continuous Improvement**: Incorporating regular reviews and updates to the ISMS to cope with the evolving security landscape.

#### Guidelines/Controls

The framework provides a comprehensive set of controls and guidelines across various security domains, including but not limited to:

– **Governance and Risk Management**: Offers guidance on establishing a bespoke risk management process that is integral to the organisation’s governance structure.
– **Personnel Security**: Recommends best practices for ensuring that employees, contractors, and third-party users understand their responsibilities and are suitable for the roles they are considered for, thus reducing the risk of theft, fraud, or misuse of facilities.
– **Physical Security**: Outlines strategies to protect an organisation’s physical assets from a range of threats.
– **System Hardening and Configuration**: Suggests measures for ensuring that IT systems are configured securely and consistently.
– **Access Control**: Details controls for managing access to information and systems, minimising the risk of unauthorised access.
– **Cryptography**: Provides principles for applying cryptographic controls for protecting the confidentiality, authenticity, and integrity of information.
– **Incident Response**: Contains guidance on preparing for, managing, and recovering from information security incidents to minimise impact and ensure business continuity.

#### Implementation and Compliance

The ISO/IEC 27001/2: 2022 Combined advocates for a risk-based approach towards implementation and compliance, encouraging organisations to tailor their ISMS based on the specific challenges and risks they face. Organisations looking to demonstrate their commitment to information security can pursue ISO/IEC 27001 certification through a recognised certification body, after successfully implementing the standard and passing the audit process.

#### Additional Resources

The ISO and IEC provide a variety of supplementary resources, tools, and training programs to assist organisations in implementing and maintaining their ISMS in accordance with the ISO/IEC 27001/2: 2022 standards. For more information and resources, visit the official ISO website: [https://www.iso.org/standard/76110.html](https://www.iso.org/standard/76110.html)

#### Benefits and Adoption

Adopting the ISO/IEC 27001/2: 2022 Combined enables organisations to:

– Protect information assets against threats
– Comply with legal, regulatory, and contractual requirements
– Foster customer and stakeholder confidence in the organisation’s security practices
– Achieve operational excellence in the management of information security

Sectors ranging from finance, healthcare, to technology, and both public and private sector organisations globally, have widely adopted or mandated this framework, underscoring its importance and effectiveness in managing information security risks in today’s digital world.

### Conclusion

The ISO/IEC 27001/2: 2022 Combined sets a global benchmark for information security, offering a systematic approach to managing and protecting an organisation’s information assets. By following its comprehensive guidelines and controls, organisations can demonstrate their commitment to cybersecurity, enhance their reputation, and build trust with customers, stakeholders, and partners alike.

TESTIMONIALS

What our clients are saying

50+ FRAMEWORKS

and growing, all mapped back to a common set of controls

GUIDE

70% of Organisations Faced Major Business Disruption from a Breach Last Year

A security incident is no longer just an IT issue. With 7 in 10 organisations experiencing significant or very significant disruption due to a breach, the need for a structured and strategic approach to cyber risk is more urgent than ever.

Our Ultimate Guide to Creating a Security Improvement Strategy provides a practical 12-step framework to help you assess risk, prioritise actions and build a resilient security posture that protects your operations, reputation and bottom line.

*Cost of a Data Breach Report 2024, IBM

Security Improvement Strategy