ISO 27002: Information Security Controls Explained

Key Takeaways

  • ISO/IEC 27002 is the international code of practice for information security controls, providing detailed guidance on selecting, implementing, and maintaining InfoSec controls.
  • The 2022 update reorganized the standard into four control themes (organizational, people, physical, and technological) and defines 93 controls, modernizing guidance for cloud security, zero-trust architectures, supply-chain risk, and other emerging threats.
  • Organizations can map ISO/IEC 27002 controls to frameworks such as NIST SP 800-53 and use platforms like Splunk to automate monitoring, reporting, and continuous improvement of their security posture.

In the race to execute digital transformation strategies, the rear-view mirror never fails to shake off the looming cyber threats that are a significant stumbling block to any organizational objectives.

Today, nearly 48% of organizations are experiencing more cyberattacks than the previous year. Considering that the impacts go beyond data unavailability — looking at you, reputation damage and regulatory penalties — the need to secure information and the related IT systems continues to be a critical endeavor.

Addressing risks to information security requires the right set of controls that are geared towards effectively preventing or mitigating the afore listed impacts.

The ISO 27002 standard is one of the world’s leading guidelines for determining and implementing commonly accepted information security controls (measures to modify or maintain risks) that have been selected in accordance to an organization’s information risk treatment strategy. These controls include policies, processes, technology systems and other measures — all designed to preserve the confidentiality, integrity and availability of an enterprise’s information assets.

In this article, we will look at the origin story of the ISO 27002 standard, as well as its structure, and how to apply the guidelines.

History of ISO 27002

ISO 27002 began its journey as a British standard BS 7799:1995 that outlined how to setup an information security management infrastructure. It comprised two parts:

The code of practice described operational, technical and people centric controls ranging from policies, systems access, processes and compliance among others. This standard was updated in 1999, to cover developments in networks and communications, as well as provide greater emphasis on business involvement in and responsibility for information security.

Origin timeline of the ISO 27002 Standard

The following year, Part 1 of BS 7799 was then adopted under a special “fast-track procedure” as an ISO standard ISO/IEC 17799:20000, which established guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. It included a generic chapter on information risk management, grouping the controls into 11 broad topics as shown below.

A list of controls groupings in ISO/IEC 17799

This standard was then updated in 2005, then a decision was made to change its reference number from 17779 to 27002 which created the ISO/IEC 27002:2005 whose technical content was identical.

The ISO 27002 standard was then updated in 2013, and subsequently in 2022, with greater emphasis on addressing risks related to information security, introducing modern controls while also guiding organizations seeking to comply with the requirements of the ISO 27001 standard for establishing and maintaining information security management systems.

(Read all about ISO 27001, the companion to this standard.)

Structure of ISO 27002

The ISO 27002 standard provides a practical blueprint for organizations aiming to effectively safeguard their information assets against cyber threats.

Its third edition introduced a fundamental change in the grouping of the information security controls, presenting them using a simple taxonomy and associated attributes. The 93 controls were grouped into four main themes:

ISO/IEC 27002:2022 Controls Themes

In addition to the themes, each ISO 27002 control is assigned attributes as a way of creating different views that can cater for the perspectives of different stakeholders. These attributes can be used to sort, filter or present controls for presentation to selected audiences. The five attributes are as follow:

Attribute
Description
Values
Control Type
A view of how the control modifies the risk with regard to the occurrence of an information security incident.
Preventative; Detective; Corrective
Information Security Properties
A view of which characteristic of information that the control will contribute to preserving.
Confidentiality; Integrity; Availability
Cybersecurity Concepts
The association of controls to cybersecurity concepts defined in the ISO/IEC TS 27110 cybersecurity framework.
Identify; Protect; Detect; Respond; Recover
Operational Capabilities
A view of the practitioner’s perspective of information security capabilities.

Governance; Asset management;

Information protection; Human resource security; Physical security; System and network security; Application security; Secure configuration; Identity and access management; Threat and vulnerability management; Continuity; Supplier relationships security; Legal and compliance; Information security event management; Information security assurance

Security Domains
A view of the controls from the perspective of information security domains.
Governance and Ecosystem; Protection; Defence; Business Resilience

The attributes are generic, and organizations are encouraged to adapt them to their own context and even create their own attributes and views.

An example of how the attributes apply to a security control is shown in the table below. The hashtags are used to facilitate easy search across the standard.

Control Name
Control Type
Information Security Properties
Cybersecurity Concepts
Operational Capabilities
Security Domains
Physical security perimeters
#Preventive

#Confidentiality

#lntegrity

#Availability

#Protect

#Physical_

security

#Protection

The ISO 27002 standard presents each control in the following layout:

Applying the ISO 27002 guidelines: 3 use cases

Applicable to any organizational size or industry, the ISO 27002 standard serves as a reference for three main use cases.

Implementing controls to meet ISO 27001

First, use ISO 27002 to better enable your ISO 27001 alignment. You can determine and implement controls for information security treatment in an ISMS based on the ISO 27001 standard. The statement of applicability that an organization creates to meet the ISO 27001 requirements can borrow heavily from the list of controls in the ISO 27002 standard.

Implementing controls for compliance requirements

It can also be used as guidance for implementing commonly accepted information security controls for any compliance need such as PCI-DSS, HIPAA or GDPR.

Supporting risk-contextualized InfoSec

Finally, you can use this standard to support the development of industry and organizational-specific information security management guidelines, by considering their risk context.

Getting started with ISO 27002: prioritize your risks

Importantly, one should note that the ISO 27002 standard does not give a start point for implementing the controls. Organizations should use their risk management framework to do two things:

  1. Identify the priority risks that need to be addressed.
  2. Pick the applicable controls that can address the said risks.

The decisions on implementing the listed controls also have to be informed by the resources and investment versus the business value. There is no point investing millions of dollars to buy the latest and greatest security technology, while the value of the business data being protected is nowhere near that worth.

As the old Chinese saying goes “Don’t use a cannon to kill a mosquito.” The selection of controls should be a balanced approach that considers cost effectiveness and business impact in the even a security incident materializes.

FAQs about ISO 27002?

What is ISO 27002?
ISO 27002 is an international standard that provides guidelines and best practices for information security controls within an information security management system (ISMS).
How does ISO 27002 relate to ISO 27001?
ISO 27002 provides detailed guidance on the controls listed in ISO 27001, helping organizations implement the requirements of ISO 27001 more effectively.
What are the main sections of ISO 27002?
The main sections of ISO 27002 include organizational controls, people controls, physical controls, and technological controls.
Who should use ISO 27002?
Organizations of any size or industry that want to establish, implement, maintain, or improve information security controls can use ISO 27002.
What is the latest version of ISO 27002?
The latest version of ISO 27002 was published in 2022.
Is ISO 27002 certifiable?
No, organizations cannot be certified against ISO 27002. Certification is available for ISO 27001, while ISO 27002 serves as a guidance document.

Related Articles

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices
Learn
7 Minute Read

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices

Learn how to use LLMs for log file analysis, from parsing unstructured logs to detecting anomalies, summarizing incidents, and accelerating root cause analysis.
Beyond Deepfakes: Why Digital Provenance is Critical Now
Learn
5 Minute Read

Beyond Deepfakes: Why Digital Provenance is Critical Now

Combat AI misinformation with digital provenance. Learn how this essential concept tracks digital asset lifecycles, ensuring content authenticity.
The Best IT/Tech Conferences & Events of 2026
Learn
5 Minute Read

The Best IT/Tech Conferences & Events of 2026

Discover the top IT and tech conferences of 2026! Network, learn about the latest trends, and connect with industry leaders at must-attend events worldwide.
The Best Artificial Intelligence Conferences & Events of 2026
Learn
4 Minute Read

The Best Artificial Intelligence Conferences & Events of 2026

Discover the top AI and machine learning conferences of 2026, featuring global events, expert speakers, and networking opportunities to advance your AI knowledge and career.
The Best Blockchain & Crypto Conferences in 2026
Learn
5 Minute Read

The Best Blockchain & Crypto Conferences in 2026

Explore the top blockchain and crypto conferences of 2026 for insights, networking, and the latest trends in Web3, DeFi, NFTs, and digital assets worldwide.
Log Analytics: How To Turn Log Data into Actionable Insights
Learn
11 Minute Read

Log Analytics: How To Turn Log Data into Actionable Insights

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
The Best Security Conferences & Events 2026
Learn
6 Minute Read

The Best Security Conferences & Events 2026

Discover the top security conferences and events for 2026 to network, learn the latest trends, and stay ahead in cybersecurity — virtual and in-person options included.
Top Ransomware Attack Types in 2026 and How to Defend
Learn
9 Minute Read

Top Ransomware Attack Types in 2026 and How to Defend

Learn about ransomware and its various attack types. Take a look at ransomware examples and statistics and learn how you can stop attacks.
How to Build an AI First Organization: Strategy, Culture, and Governance
Learn
6 Minute Read

How to Build an AI First Organization: Strategy, Culture, and Governance

Adopting an AI First approach transforms organizations by embedding intelligence into strategy, operations, and culture for lasting innovation and agility.