As an experienced ISO professional in quality, environment, and OH&S, I find myself stepping into new territory—ISO 27001 Information Security. It’s a whole new world for me, and I’ve been wondering whether my background in other ISO standards can help me add this one to my toolkit.
Last week’s Lead the Standard took a closer look at the question: Do you really need IT experience to work with ISO 27001? The consensus from experts pointed to one key challenge: while IT experience might not be essential, understanding Annex A and the controls in ISO 27001 is critical.
Armed with this insight, I’ve focused this week’s ISO 27001: Beginner for Beginners article on exploring Annex A and what it means for someone like me just starting out in this space.
Our very own Information Security Expert, Dr. Georg Thomas, gave a short answer of Anything related to a third party and backed it up with.
"There are many controls that can be difficult to implement, because every environment is different in risk profile, size, and complexity; the larger and more complex generally being more difficult. Having said that, if there had to be a common winner, it would have to be controls that are related to third parties.
With third parties, the ability to influence and get controls implemented to meet your organisations security requirement outside of your own organisation, comes with it’s own set of challenges and can be very difficult to implement and manage."
Most other ISO standards provide a framework for management systems but don’t go as far as prescribing specific controls in this way. So, what exactly is in Annex A? Think of it as the ultimate security checklist—4 categories with 93 controls covering everything an organization needs to protect its information. If ISO 27001 were a fortress, Annex A would be the blueprint for its defenses.
Now, before you panic at the thought of implementing all 93 security controls, here’s the good news—you don’t have to! Annex A isn’t a checklist where you tick off every item; it’s more like a menu of security measures. You choose the ones that make sense for your organization based on your risk assessment and business needs.
This is different from something like a hierarchy of controls, which I’m already familiar with from my experience in ISO 45001 (OH&S) and ISO 14001 (Environment). In those standards, risk is controlled using a structured approach—eliminate the hazard if possible, then substitute, engineer, or put administrative controls in place before relying on personal protective measures.
While ISO 27001 doesn’t structure Annex A as a strict hierarchy, that same thinking still applies. The idea is to prioritize controls that provide the greatest level of protection with the least dependence on reactive measures. For example:
So, while Annex A isn’t a step-by-step hierarchy, my background in risk-based decision-making helps me approach it strategically. Instead of applying every control blindly, I can assess which ones provide the best protection with the least effort and impact.
Rather than viewing it as an overwhelming list, think of it as four key areas that work together to safeguard information:
Each of these areas has its own set of controls, but at the end of the day, they all work together to protect information—whether it's online, on paper, or even just spoken in a meeting.
Our soon to be released ISO 27001 course is authored by our Information Security expert, Dr. Georg Thomas. In his article, "An ethical hacker can help you beat a malicious one," Georg discusses the role of ethical hackers in identifying and addressing system vulnerabilities before malicious actors can exploit them.
He explains the distinctions between black hat, grey hat, and white hat hackers, emphasizing how ethical hackers (white hats) use their skills to strengthen organizational security.
This model shows how the four Annex A categories influence both strategic and operational levels (up and down) as well as technical and non-technical domains (side to side). It helps to connect the dots and shows how all the pieces work together to build a strong information security framework. As an ISO professional stepping into this new standard, creating this model has been a game-changer for me.
It’s helped me take the complexity of ISO 27001 and break it down into something familiar and relatable by linking the Annex A controls to what I already know from other ISO standards. Not only has it made ISO 27001 clearer for me, but it’s also given me a practical tool I can use and share with others exploring this space.
Take some time to review the 93 controls in Annex A and think about how they might apply to your organization or projects. Start by focusing on the controls most relevant to your industry or role.
Reflect on your experience with other ISO standards and identify areas where your existing knowledge overlaps with ISO 27001. Consider where you might need to build new skills, like understanding technical controls or conducting a risk assessment.
Whether it's enrolling in an ISO 27001 course, attending a webinar, or exploring online tools, commit to deepening your understanding of this standard. For those ready to dive in, our soon-to-be-released ISO 27001 course is a great place to start!