Back to HomeISO 27001

ISO 27001:2022 Update Guide: Control Changes & Transition Timeline Complete Analysis

12 min min read
#ISO 27001#2022#Update#Transition#Controls#New Version#Security Standards#ISMS#Compliance

ISO 27001:2022 Update Guide: Control Changes & Transition Timeline Complete Analysis

ISO 27001:2022 Update Guide: Control Changes & Transition Timeline Complete Analysis

In October 2022, ISO 27001 released a major update after 9 years.

If your company holds a 2013 version certificate, you must complete the transition by October 31, 2025.

Time is running out.

This article will tell you what changed in the 2022 version and how to prepare for the transition.

For a complete introduction to ISO 27001, see ISO 27001 Complete Guide.


Update Background and Timeline

Why the Update

ISO 27001:2013 has been in use for 9 years.

During these 9 years, the security threat landscape has changed dramatically:

2013 Situation2022 Situation
Cloud was just startingCloud is mainstream
Mobile devices not widespreadRemote work is normal
Ransomware was rareRansomware attacks are rampant
Data breaches were occasionalData breaches are frequent
Supply chain attacks were rareSupply chain attacks are major threats

The old controls could no longer effectively address new types of threats.

Update Timeline

DateEvent
February 2022ISO 27002:2022 released first
October 2022ISO 27001:2022 officially released
April 2023Certification bodies start offering 2022 version audits
October 31, 2025All 2013 version certificates become invalid

Transition Deadline (October 2025)

This is the most important date: October 31, 2025.

Before this date:

  • All 2013 version certificates must be converted to 2022 version
  • Or certificates will automatically become invalid

Impact on organizations:

  • Customers may no longer recognize your certificate
  • Cannot participate in tenders requiring ISO 27001
  • Need to go through full certification process again (more expensive)

Recommended timeline:

Your Current StatusRecommendation
Haven't started preparingStart immediately
Certificate expires in 2025Can transition during recertification
Certificate expires after 2025Can apply for transition audit early

Main Changes to Clause Text

The clause text (Clause 4-10) changes are minor, mainly adjustments and clarifications.

Clause 4-10 Key Adjustments

ClauseChanges
Clause 4.2Added requirement that "interested party needs can be addressed through ISMS"
Clause 4.4Explicitly mentions need to consider "processes and their interactions"
Clause 5.3Enhanced explanation of "ISMS-related role responsibilities"
Clause 6.2Objectives planning requires more monitoring capability
Clause 6.3New: Planning of ISMS changes
Clause 7.4"How to communicate" requirements more explicit
Clause 8.1Emphasizes "process criteria" and "change control"
Clause 9.3Management review input adds "changes in interested party needs"
Clause 10.1Combines nonconformity handling with continual improvement

Key point: The clause text changes mainly simplify and clarify wording; the core framework hasn't changed.

New "Planning for Changes" Requirement

Clause 6.3 is a completely new requirement.

Key content:

When ISMS needs changes, organizations must make changes in a "planned manner."

Items to consider:

  • Purpose of the change and potential consequences
  • ISMS integrity
  • Resource availability
  • Allocation of responsibilities and authorities

Plain language: You can't just change things at will; you need planning and assessment before acting.

Enhanced Risk Treatment Explanation

Clause 6.1.3 risk treatment requirements are more explicit.

2022 version requirements:

  1. Risk treatment options must link to risk assessment results
  2. When selecting controls, "consider" Annex A (not "compare against")
  3. Controls can come from any source, not limited to Annex A

Meaning: Organizations can more flexibly choose controls, as long as they effectively address risks.


Annex A Control Changes

This is the biggest change in the 2022 version.

Four Theme Reclassification

The 2013 version organized 114 controls into 14 chapters. The 2022 version reclassifies them into 4 major themes.

ThemeNumber of ControlsCoverage
Organizational Controls37Policies, roles, assets, access, suppliers
People Controls8Screening, training, awareness, termination
Physical Controls14Physical security, equipment, media
Technological Controls34Authentication, encryption, network, development, monitoring
Total93

Why this classification?

  • More intuitive: Classified by "who is responsible"
  • Better management: Four clear lines—organizational, people, physical, technological
  • Easier to map to actual work

11 New Controls Detailed

The 2022 version added 11 new controls, reflecting the latest security threats:

NumberControlDescription
5.7Threat IntelligenceProactively collect and analyze security threat information
5.23Cloud Services SecurityAcquisition, use, management, and exit of cloud services
5.30ICT Readiness for Business ContinuityICT systems supporting business continuity readiness
7.4Physical Security MonitoringContinuous monitoring of sensitive areas
8.9Configuration ManagementSecurity configuration management of hardware, software, services
8.10Information DeletionSecure deletion of information, ensuring it cannot be recovered
8.11Data MaskingMasking of sensitive data
8.12Data Leakage Prevention (DLP)Measures to prevent sensitive data leakage
8.16Monitoring ActivitiesMonitoring of system activities to detect anomalies
8.23Web FilteringAccess filtering for external websites
8.28Secure CodingSecurity practices in software development

Key item analysis:

Threat Intelligence (5.7) Not just passive defense—actively understand the latest threats. Example: Subscribe to CERT alerts, participate in security intelligence sharing communities.

Cloud Services Security (5.23) Dedicated controls for cloud usage. Manage from selecting providers, usage management, to exiting cloud services.

Data Leakage Prevention (8.12) DLP tool deployment, monitoring sensitive data flow.

Deleted and Merged Controls

The 2022 version didn't "delete" any controls; it "merged" them.

Merge example:

2013 Version2022 Version
A.8.2.1 Information classificationMerged into 5.12 Information classification
A.8.2.2 Information labelling
A.8.2.3 Asset handling

Why merge?

  • Reduce duplication
  • Simplify management
  • Better match practical use

2013 vs 2022 Comparison Table

Due to space limitations, here's a partial important comparison:

Theme2013 Version2022 Version
Access controlA.9 (14 items)Distributed to organizational + technological controls
CryptographyA.10 (2 items)8.24 Use of cryptography
Physical securityA.11 (15 items)Physical controls (14 items)
Operations securityA.12 (14 items)Distributed to technological controls
Communications securityA.13 (7 items)8.20, 8.21, 8.22
Supplier relationshipsA.15 (5 items)5.19-5.22

For detailed clause interpretation, see ISO 27001 Clause Detailed Guide.

Not sure which controls need adjustment? Book a gap analysis and let experts help you assess.


Organization Transition Guide

Transition Steps (5 Steps)

Step 1: Understand the Differences

First understand the differences between the 2013 and 2022 versions.

  • Read this article (you're already doing it)
  • Attend transition seminars
  • Obtain ISO 27001:2022 standard document

Step 2: Conduct Gap Analysis

Inventory your current ISMS gaps against 2022 version requirements.

Items to review:

  • Clause text correspondence
  • Annex A control correspondence
  • Statement of Applicability (SoA) updates
  • Documentation system adjustment needs

Step 3: Develop Transition Plan

Based on gap analysis results, create an action plan.

ItemContent
Scope confirmationIs transition scope the same as original certification
Timeline planningCompletion time for each phase
Responsibility assignmentWho is responsible for what
Resource allocationHow much manpower and budget needed

Step 4: Implement Improvements

Execute according to plan:

  • Update documents (policies, procedures, SOPs)
  • Implement new controls
  • Update Statement of Applicability
  • Conduct training

Step 5: Transition Audit

Apply to certification body for transition audit.

  • Can be done together with surveillance audit
  • Or apply for separate transition audit
  • After passing audit, receive 2022 version certificate

Recommended Transition Timeline

Recommended timeline (mid-sized organization):

PhaseDurationWork Content
Gap analysis4-6 weeksInventory status, identify gaps
Plan development2-4 weeksPlan timeline, allocate resources
Document updates6-8 weeksRevise policies, procedures, SoA
Control implementation8-12 weeksImplement new controls
Internal audit2-4 weeksVerify improvement effectiveness
Transition audit2-4 weeksCertification body audit
Total6-9 months

Transition Budget Planning

Transition costs are lower than initial certification, but budget is still needed.

Cost ItemCost RangeNotes
Consulting guidance$3,000-10,000If external assistance needed
Employee timeInternal costDocument updates, training, etc.
Audit fees70-100% of original audit feeDepends on audit method
Tools/systems$0-6,000If new tools needed (e.g., DLP)

Cost-saving tips:

  • Transition during surveillance or recertification audit (save one audit fee)
  • Self-prepare to reduce consultant dependency
  • Prioritize essential items, improve others gradually

For detailed cost estimates, see ISO 27001 Implementation Cost Guide.

Common Transition Questions

Q1: Is a transition audit mandatory?

Yes. A transition audit by a certification body is required to receive the 2022 version certificate.

Q2: Can I skip surveillance audit and directly transition?

Yes, but confirm with your certification body. Usually recommended to transition during surveillance audit—it's more cost-effective.

Q3: Must all 11 new controls be implemented?

Not necessarily. Each control needs applicability assessment; if not applicable, explain the reason in the SoA.

Q4: Do I need cloud security controls if I have no cloud services?

If your company doesn't use any cloud services at all, you can mark it as "not applicable," but this is rare in modern organizations.


ISO 27002:2022 Supporting Update

Relationship Between 27002 and 27001

Many people confuse these two standards.

ItemISO 27001ISO 27002
NatureRequirements standardGuidance standard
CertifiableYesNo
ContentISMS framework + control listControl implementation guidance
PagesAbout 30About 150

Simply put:

  • ISO 27001 tells you "what to do"
  • ISO 27002 tells you "how to do it"

For more comparisons, see ISO 27001 vs 27002 Comparison.

27002 Update Highlights

ISO 27002:2022 was released in February 2022 (8 months before 27001).

Main changes:

  1. Control Attribute Tags

    Each control has attribute tags for easy searching and classification:

    • Control types: Preventive, Detective, Corrective
    • Security properties: Confidentiality, Integrity, Availability
    • Cybersecurity concepts: Identify, Protect, Detect, Respond, Recover
    • Operational capabilities: Governance, Asset management, Information protection, etc.
    • Security domains: Governance and ecosystem, Protection, Defense, Resilience
  2. Updated Implementation Guidance

    Each control has more detailed:

    • Purpose statement
    • Guidance explanation
    • Additional information
  3. Complete Explanation of New Controls

    The 11 new controls have complete implementation guidance in 27002.

How to Use Together

Practical recommendations:

  1. Planning phase

    • Use ISO 27001 as framework
    • Reference ISO 27002 to understand control intent
  2. Implementation phase

    • Use ISO 27002 guidance to design specific approaches
    • No need to copy exactly; adjust based on company situation
  3. Audit phase

    • Audit basis is ISO 27001
    • But auditors reference 27002 to assess if your approach is reasonable

FAQ: Common Update Questions

Q1: When does ISO 27001:2022 become mandatory?

After October 31, 2025, all 2013 version certificates become invalid. Before then, both 2013 and 2022 versions are valid.

Q2: How long does a transition audit take?

Depends on organization size:

  • Small/medium organizations: 1-2 days
  • Large organizations: 2-4 days

Usually shorter than initial certification.

Q3: Controls went from 114 to 93—did it get easier?

No. Controls were "merged" not "deleted," and 11 new ones were added. Actual work may increase.

Q4: Can I go directly for 2022 version without 2013 certificate?

Yes. If you're newly implementing, go directly for 2022 version; no need to get 2013 first.

Q5: Is 2022 version friendly to small organizations?

Some improvements:

  • More intuitive control classification
  • Clearer clause wording
  • But new controls may increase burden

Next Steps

The October 2025 transition deadline is approaching.

If you haven't started preparing, now is the best time.

Book a transition consultation to help you conduct gap analysis and plan your transition timeline.


Further Reading


References

Need Professional Cloud Advice?

Whether you're evaluating cloud platforms, optimizing existing architecture, or looking for cost-saving solutions, we can help

Book Free Consultation

Related Articles