ISO 27001 Requirements Explained

Build resilient information security: A practical guide to ISO 27001 clauses, controls and NIS 2 alignment

8 mins read

ISO 27001 remains the globally recognised benchmark for building, maintaining and improving an Information Security Management System (ISMS). Yet many organisations misunderstand what the standard truly requires in practice. Implementation is often approached as a checklist exercise, but ISO 27001 is fundamentally a governance and risk management framework that supports long-term resilience.

This article explains the requirements in a clear and comprehensive way. It covers Clauses 4 to 10, breaks down Annex A controls, clarifies which controls matter most for different types of organisations and outlines how these elements support NIS 2 compliance across the European Union.

 

What Is ISO 27001?

A comprehensive introduction for EU organisations.

Read the article

 

Understanding clauses 4 to 10 in simple terms

Clauses 4 to 10 form the core of the ISO 27001 standard. They define how an organisation must design, operate and continuously improve its ISMS.

Below is a detailed interpretation of what each clause means in practice.

Clause 4: Context of the organisation

This clause requires organisations to deeply understand the environment in which they operate. It involves identifying internal and external issues, understanding the needs of stakeholders and defining the scope of the Information Security Management System.

In practice, this means:
  • assessing legal obligations
  • identifying strategic risks
  • determining boundaries of the ISMS
  • recognising dependencies on infrastructure, third parties and technology
  • assessing whether climate change and environmental hazards could affect information assets

Failure to define the scope correctly, including climate-related risks, creates blind spots that weaken the entire ISMS and constitute a non-conformity

Clause 5: Leadership

Leadership involvement is a cornerstone of ISO 27001. This clause requires demonstrable commitment from executive management. They must approve policies, allocate resources and define security roles.
They also must show evidence of accountability through:
  • participation in reviews
  • oversight of risk decisions
  • alignment of security objectives with business goals
  • understanding their responsibilities and role within the ISMS, supported by formal training on information security and ISMS basics

This aligns well with NIS 2, which explicitly holds leadership accountable for cybersecurity decisions. Clause 5 ensures security is integrated into governance rather than delegated without oversight.

Clause 6: Planning

Clause 6 introduces the risk management process. Organisations must define how they identify, analyse and treat risks. They must also establish security objectives that are measurable, evidence-based and aligned with business needs.

This involves:

  • selecting a risk assessment methodology
  • analysing threats and vulnerabilities
  • prioritising risks based on impact and likelihood
  • choosing and documenting risk treatment plans

This clause forms the backbone of the ISMS. It ensures that controls are not implemented blindly but selected based on actual risk exposure.

Clause 7: Support

Clause 7 focuses on the resources that make the ISMS function. It requires organisations to ensure that people, technology and documented information support the ISMS objectives.

This includes:

  • defining competence requirements
  • providing training
  • maintaining communication plans
  • documenting all relevant information

Documentation must be controlled, kept up to date and accessible. Many organisations underestimate the effort required to maintain accurate records. In audits, lack of documentation is one of the most common areas of nonconformity.

Clause 8: Operation

Clause 8 describes the day-to-day activities required to run the ISMS. It includes the operational implementation of controls, management of suppliers, handling of incidents and execution of risk treatment actions.

Key activities include:

  • operationalising policies and procedures
  • collecting evidence of control performance
  • performing change management
  • executing the incident response plan
  • monitoring third-party risks

This clause forces organisations to demonstrate that security is not theoretical. There must be observable evidence that controls function properly.

Clause 9: Performance evaluation

Clause 9 requires organisations to continuously evaluate the performance of the ISMS. This includes monitoring, internal audits and management reviews.

Activities include:

  • defining metrics
  • reviewing control performance
  • conducting internal audits
  • reporting findings to leadership

Performance evaluation ensures the ISMS remains relevant, effective and aligned with organisational goals.

Clause 10: Improvement

Clause 10 requires a structured approach to continual improvement. Organisations must address nonconformities, correct root causes and ensure lessons are incorporated into future processes.

This continuous improvement mindset keeps the ISMS aligned with evolving threats and organisational changes.

Annex A controls: what they really mean for your organisation

Annex A contains 93 controls split across four themes. These controls provide the operational and technical foundation that supports the ISMS. Many organisations assume that Annex A is a checklist. In reality, controls must be selected based on risk.

Below is a high-level explanation of what each control domain represents.

A.5: Organisational controls

These controls focus on governance, policies, supplier management, roles and responsibilities. They ensure that the organisation has structure and clear accountability.

Examples include:

  • information security policies
  • roles and responsibilities
  • supplier risk management
  • secure project management

These controls create the organisational foundation required for effective cybersecurity governance.

A.6: People controls

These controls ensure that employees, contractors and third parties understand their responsibilities and act securely.

Examples include:

  • screening and vetting
  • training
  • disciplinary measures
  • segregation of duties

People controls reduce the likelihood of human error or insider threats.

A.7: Physical controls

These controls protect physical access to facilities, equipment and sensitive areas. 

Examples include:

  • physical access management
  • secure disposal
  • protection against environmental threats

Despite modern cloud adoption, physical security remains essential for compliance and risk reduction.

A.8: Technological controls

These controls manage the security of systems, applications and networks.

Examples include:

  • configuration management
  • logging and monitoring
  • cryptography
  • secure development
  • identity and access management
  • vulnerability management

These are often the most resource-intensive controls and require strong technical governance.

How to Implement ISO 27001

A step-by-step guide for EU Organisations

Read the article

 

Which ISO 27001 controls matter most for SMEs, enterprises and governments

All organisations must apply a risk-based approach. However, certain controls commonly have a greater impact depending on the organisation type.

For SMEs

SMEs benefit most from controls that create structure and prevent common incidents. Priority controls typically include:

  • access control
  • asset management
  • patching and vulnerability management
  • incident response
  • supplier management
  • backup and recovery

SMEs often lack dedicated security teams, which makes consistency in these areas essential.

For enterprises

Large organisations require a blend of governance and advanced technical management. Key emphasis areas include:

  • secure development practices
  • change management
  • threat intelligence
  • continuous monitoring
  • delegated responsibilities
  • forensic readiness

Enterprises must also manage large, diverse supplier ecosystems, which increases third-party risk.

For government organisations

Public sector bodies must manage higher levels of accountability and often face nation-state threats. They require stronger governance, documentation and resilience capabilities.

Critical controls include:

  • business continuity
  • incident reporting
  • role-based access control
  • physical security
  • redundancy and availability measures
  • compliance-specific documentation

Government organisations often align with additional national frameworks, such as Belgium’s CyFun®.

Mandatory ISO 27001 documentation

ISO 27001 requires several documents that must be maintained and controlled. Key mandatory documents include:

  • scope of the ISMS
  • risk assessment and treatment methodology
  • Statement of Applicability
  • risk treatment plan
  • information security objectives
  • procedures for incident management
  • evidence of competence and training
  • audit reports
  • management review minutes

Documentation provides the evidence needed to demonstrate compliance to auditors and regulators.

Common misconceptions about ISO 27001 requirements

Many organisations approach ISO 27001 with incorrect assumptions. Common misconceptions include:

1. ISO 27001 requires all 93 controls

This is not correct. Organisations are not obliged to use any of the Annex A controls. Controls must be selected based on risk assessment and proportional to organisational context. Organisations are free to choose their own controls or apply alternative frameworks, such as CyFun®, as long as the selection is justified through documented risk assessment.

2. ISO 27001 is only for large enterprises

SMEs can benefit greatly from structured governance and reduced operational risk.

3. ISO 27001 is purely technical

Most of the standard is governance and process-oriented rather than technical.

4. Certification ensures security

Certification verifies the management system. It does not guarantee immunity from threats.

How these requirements map to NIS 2

NIS introduces legal obligations for cybersecurity. ISO 27001 supports these requirements by providing measurable governance, structure and evidence. While the frameworks are not identical, there is strong alignment across several areas.

Examples include:

  • governance expectations align with Clause 5
  • risk management aligns with Clause 6
  • operational controls support NIS 2 security measures
  • incident response aligns with response obligations
  • supplier management aligns with supply chain expectations
  • business continuity aligns with resilience requirements

ISO 27001 does not replace NIS 2 but creates a structured foundation for meeting the directive’s obligations.

Next step: building an implementation plan

A successful ISO 27001 implementation requires structure, prioritisation and clarity. Organisations can begin with the following approach:

1. Define ISMS scope

2. Perform a risk assessment

3. Select applicable controls

4. Document policies and procedures

5. Implement controls operationally

6. Provide training and awareness

7. Conduct internal audits

8. Prepare for external certification

A phased method reduces complexity and improves adoption.

  1.  

 

Ready to streamline your ISO 27001 journey?

See how Maiky helps CISOs automate compliance and InfoSec