Back to HomeISO 27001

ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

14 min min read
#ISO 27001#Clauses#ISMS#Controls#Documentation#PDCA#Statement of Applicability#SoA#Audit

ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

The ISO 27001 standard document is only about 30 pages.

But it's hard to understand.

The clauses read like legal text—you recognize every word, but together they don't make sense.

This article explains each clause in plain language, helping you truly understand what ISO 27001 requires.

For a complete introduction to ISO 27001, see ISO 27001 Complete Guide.


ISO 27001 Structure Overview

Clause Text (Clauses 4-10)

The main body of ISO 27001 has two parts:

  1. Clause text (Clauses 4-10): Tells you how to build the management system
  2. Annex A: Lists 93 controls

Clause text structure:

ClauseNameKey Content
Clause 4Context of the organizationUnderstanding internal and external environment
Clause 5LeadershipTop management commitment and responsibility
Clause 6PlanningRisk assessment, objective setting
Clause 7SupportResources, competence, document management
Clause 8OperationActual implementation of controls
Clause 9Performance evaluationMonitoring, internal audit, management review
Clause 10ImprovementNonconformity handling, continual improvement

Annex A (Controls)

Annex A lists 93 controls, divided into four themes:

ThemeCountExamples
Organizational controls37Information security policy, roles and responsibilities
People controls8Personnel screening, awareness training
Physical controls14Physical security, equipment protection
Technological controls34Access control, encryption, backup

PDCA Cycle Mapping

ISO 27001 is built on the PDCA (Plan-Do-Check-Act) cycle.

PDCACorresponding ClausesMeaning
PlanClauses 4, 5, 6Understand environment, get commitment, plan how to do it
DoClauses 7, 8Prepare resources, actually implement
CheckClause 9Monitor effectiveness, audit verification
ActClause 10Handle problems, continually improve

Key point: This is a cycle, not a one-time thing. It must be continuously executed every year.


Clause-by-Clause Interpretation

Clause 4: Context of the Organization

Original point: Understanding the organization and its context

In plain language:

Before building your ISMS, you need to figure out a few things:

4.1 Understanding the organization and its context

Ask yourself:

  • What is the company's business?
  • What internal challenges do you face? (Insufficient staff, limited budget)
  • What external challenges? (Regulatory requirements, market competition)

4.2 Understanding the needs and expectations of interested parties

Interested PartyPossible Needs
CustomersData security, service availability
EmployeesClear policies, proper training
RegulatorsRegulatory compliance
ShareholdersRisk management, reputation protection

4.3 Determining the scope of the ISMS

Not the entire company needs to be included. Decide:

  • Which departments?
  • Which services?
  • Which locations?
  • Which systems?

4.4 ISMS and its processes

Establish, implement, maintain, and continually improve the ISMS.

Clause 5: Leadership

Original point: Leadership and commitment

In plain language:

Without management support, ISMS won't succeed.

5.1 Leadership and commitment

What top management must do:

  • Publicly express support for ISMS
  • Ensure sufficient resources (people, money, time)
  • Integrate security into daily operations
  • Support relevant personnel in performing their duties

5.2 Policy

Establish an "Information Security Policy":

  • State the company's commitment to security
  • Include objectives or framework for setting objectives
  • Commit to meeting requirements and continual improvement
  • Make sure all employees know this policy

5.3 Roles, responsibilities, and authorities

Clearly assign:

  • Who is responsible for overall ISMS operation
  • Who reports to top management
  • Security responsibilities for each department/person

Clause 6: Planning

Original point: Actions to address risks and opportunities

In plain language:

This is the core of ISMS—risk assessment.

6.1 Actions to address risks and opportunities

6.1.1 General

Identify:

  • What factors might prevent ISMS from achieving objectives (risks)
  • What factors can help achieve objectives (opportunities)

6.1.2 Information security risk assessment

This is the most important step:

StepContent
1. Identify assetsList information assets to protect
2. Identify threatsEvents that could harm assets
3. Identify vulnerabilitiesWeaknesses that could be exploited by threats
4. Assess impactHow serious if it happens
5. Assess likelihoodHow likely to happen
6. Calculate risk valueImpact × Likelihood
7. PrioritizeDecide which risks to address first

6.1.3 Information security risk treatment

For each risk, you can choose:

TreatmentDescriptionExample
MitigateImplement controls to reduce riskInstall firewall
TransferTransfer risk to othersBuy cyber insurance
AvoidDon't do this activityDon't offer certain services
AcceptAccept the risk existsRisk is very low, don't address

6.2 Information security objectives and planning to achieve them

Set specific security objectives, such as:

  • Reduce security incidents by X%
  • 100% employee training completion rate
  • 99.9% system availability

6.3 Planning of changes (New in 2022 version)

When ISMS needs changes, make them in a planned manner.

Clause 7: Support

Original point: Resources needed for ISMS operation

In plain language:

With a plan, you need resources to execute.

7.1 Resources

The company must provide sufficient:

  • Manpower
  • Budget
  • Time
  • Tools

7.2 Competence

People responsible for security work must have adequate competence:

  • Obtained through education, training, experience
  • Maintain evidence of competence (certificates, training records)

7.3 Awareness

All employees must know:

  • The company's information security policy
  • Their role in the ISMS
  • Consequences of non-compliance

7.4 Communication

Decide:

  • What to communicate (content)
  • When to communicate (timing)
  • With whom to communicate (audience)
  • Who communicates (responsible person)
  • How to communicate (method)

7.5 Documented information

ISMS needs documents for support:

  • Documents required by the standard
  • Documents the organization deems necessary
  • Documents must be controlled (version, review, release)

Clause 8: Operation

Original point: Operational planning and control

In plain language:

Everything before was planning; this is actually doing it.

8.1 Operational planning and control

Implement what was planned in Clause 6:

  • Execute risk treatment plan
  • Implement selected controls
  • Control planned changes
  • Manage outsourced processes

8.2 Information security risk assessment

Re-execute risk assessment periodically:

  • At least once a year
  • When significant changes occur
  • After security incidents

8.3 Information security risk treatment

Execute risk treatment plan, keep records of treatment results.

Clause 9: Performance Evaluation

Original point: Monitoring and measurement

In plain language:

After doing, check if it's working.

9.1 Monitoring, measurement, analysis, and evaluation

Monitor:

  • Whether security objectives are achieved
  • Whether controls are effective
  • Whether ISMS processes operate normally

9.2 Internal audit

Periodically audit yourself:

ItemRequirement
FrequencyAt least once a year
ScopeCover all ISMS processes
AuditorsMust be independent (can't audit your own work)
ResultsMust be recorded, improvement must be tracked

9.3 Management review

Top management must periodically review ISMS:

Inputs (data to review):

  • Follow-up items from previous review
  • Internal and external changes
  • Audit results
  • Security performance
  • Improvement opportunities

Outputs (decisions to make):

  • Whether ISMS needs changes
  • Whether resources are sufficient
  • Next steps

Clause 10: Improvement

Original point: Nonconformity and continual improvement

In plain language:

When problems are found, fix them. Even without problems, make things better.

10.1 Nonconformity and corrective action

When nonconformity is found:

  1. Immediate response: Control the problem, reduce impact
  2. Analyze cause: Find the root cause
  3. Take corrective action: Prevent recurrence
  4. Verify effectiveness: Confirm correction worked
  5. Update documents: Update risk assessment, ISMS if needed

10.2 Continual improvement

ISMS must continuously improve, not just maintain status quo.


Four-Tier Documentation System

ISO 27001 produces many documents, usually organized in four tiers.

Tier 1: Policies

Nature: Highest-level documents, explaining "why" and "direction"

Examples:

  • Information Security Policy
  • Access Control Policy
  • Password Policy
  • Remote Work Policy

Characteristics:

  • Approved by top management
  • Content is brief and principle-based
  • Rarely changed

Tier 2: Procedures

Nature: Explaining "what to do" and "who does it"

Examples:

  • Risk Assessment Procedure
  • Incident Management Procedure
  • Access Control Procedure
  • Change Management Procedure

Characteristics:

  • Applicable across departments
  • Describes process steps
  • Defines roles and responsibilities

Tier 3: Work Instructions

Nature: Detailed steps on "how to do it"

Examples:

  • Backup SOP
  • Account Request SOP
  • Firewall Configuration Guide
  • Incident Reporting Guide

Characteristics:

  • For specific tasks
  • Detailed specific steps
  • Includes screenshots, examples

Tier 4: Records

Nature: Evidence that you did it

Examples:

  • Risk Register
  • Audit Records
  • Training Sign-in Sheets
  • Change Request Forms
  • Incident Handling Records

Characteristics:

  • Records for every activity
  • Auditors will review
  • Must be properly stored

Required Documents List

Documents explicitly required by ISO 27001:

ClauseRequired Document
4.3ISMS scope document
5.2Information security policy
6.1.2Risk assessment procedure
6.1.3Risk treatment plan
6.1.3Statement of Applicability (SoA)
6.2Information security objectives
7.2Evidence of competence
7.5Documented information
8.1Operational planning and control
8.2Risk assessment results
8.3Risk treatment results
9.1Monitoring and measurement results
9.2Internal audit records
9.3Management review records
10.1Nonconformity and corrective action records

Annex A Control Highlights

The 2022 version divides 93 controls into four themes.

Organizational Controls (37 items)

Covering organizational-level management controls:

NumberControlKey Point
5.1Information security policiesMust have, publish, regularly review
5.2Roles and responsibilitiesClearly assign
5.3Segregation of dutiesAvoid one person controlling too much
5.7Threat intelligenceProactively collect threat info (New)
5.9Inventory of information and assetsList all assets
5.15Access controlWho can access what
5.23Cloud services securityCloud usage management (New)

People Controls (8 items)

Covering personnel-related controls:

NumberControlKey Point
6.1ScreeningBackground checks
6.2Terms of employmentInclude security responsibilities in contracts
6.3Security awareness trainingEveryone must understand
6.4Disciplinary processViolations have consequences
6.5Termination/change of employmentRevoke access
6.6Confidentiality agreementsNDAs

Physical Controls (14 items)

Covering physical environment controls:

NumberControlKey Point
7.1Physical security perimetersAccess control
7.2Physical entryWho can enter
7.4Physical security monitoringCameras, sensors (New)
7.8Equipment sitingPlace in secure locations
7.10Storage mediaUSB, hard drive management
7.14Secure disposalClear data when disposing

Technological Controls (34 items)

Covering technical controls:

NumberControlKey Point
8.1User endpoint devicesLaptop, mobile security
8.5Secure authenticationLogin verification
8.7Protection against malwareAntivirus
8.8Technical vulnerability managementPatch vulnerabilities
8.9Configuration managementSystem settings management (New)
8.12Data leakage preventionDLP (New)
8.13BackupData backup
8.15LoggingSystem log recording
8.24Use of cryptographyEncryption

For more 2022 version change details, see ISO 27001:2022 Update Guide.


Statement of Applicability (SoA) Writing

What is SoA

SoA (Statement of Applicability) is one of ISO 27001's most important documents.

Purpose:

  • List all 93 Annex A controls
  • State whether each is applicable
  • Explain reasons for non-applicability
  • Describe implementation status for applicable ones

How to Determine Applicability

For each control, ask:

  1. Is it risk-related? Can this control address risks we identified?

  2. Is it legally required? Do regulations or contracts require this control?

  3. Is it business-needed? Does business operation need this control?

If any answer above is "yes," this control is applicable.

Valid Reasons for Excluding Controls

Controls that don't apply need valid reasons.

Acceptable reasons:

ReasonExample
Technology doesn't existCompany has no wireless network, so wireless security controls don't apply
Business doesn't involveCompany has no software development, so secure development controls don't apply
OutsourcedData center managed by provider, physical security is their responsibility
Risk acceptableRisk assessment shows risk is extremely low

Unacceptable reasons:

  • "No budget"
  • "Too troublesome"
  • "Don't know how to do it"

SoA Example Format

NumberControlApplicableReason/Implementation Status
5.1Information security policiesYesEstablished and published, reviewed annually
5.7Threat intelligenceYesSubscribed to CERT alerts
7.6Working in secure areasNoCompany has no secure areas
8.28Secure codingNoCompany has no software development

FAQ: Common Clause Questions

Q1: Must I buy the ISO 27001 standard document?

Not mandatory, but highly recommended.

  • Official standard costs about $200
  • Many unofficial versions online, but may be incomplete or outdated
  • If certifying, recommend buying the official version

Q2: Can I use existing documents?

Yes. ISO 27001 doesn't require specific formats.

If existing documents already cover required content, use them directly; no need to create new ones.

Q3: Will auditors check clause by clause?

Yes. Auditors will audit each clause and applicable controls.

But they won't go deep on everything—they'll decide depth based on risk and sampling.

Q4: What if I can't complete all controls?

Handle in phases:

  1. First identify high-risk items that must be done immediately
  2. Put others in improvement plan, complete gradually
  3. Auditors will check if you have a plan, not require everything complete

Q5: Do small companies need this many documents?

Not necessarily.

ISO 27001 doesn't specify document quantity or format. Small companies can simplify, as long as content covers requirements.

Example: Multiple policies can be combined into one "Information Security Policy."


Next Steps

ISO 27001 clauses look complex, but once you understand the logic, you'll find it's a very systematic framework.

If you're preparing for implementation or certification, recommended:

  1. First understand the intent of clauses
  2. Compare with current company status for gap analysis
  3. Develop action plan
  4. Gradually build documents and implement controls

Too many clauses, don't know where to start? Contact us to help interpret clauses and plan your implementation strategy.


Further Reading


References

Need Professional Cloud Advice?

Whether you're evaluating cloud platforms, optimizing existing architecture, or looking for cost-saving solutions, we can help

Book Free Consultation

Related Articles