ISO 27001:2022

ISO 27001:2022. From preparation to certification.

CyberHeed manages your entire ISO 27001 journey - preparation, evidence, surveillance, recertification. We're certified ourselves.

93 Annex A Controls
4 Control Themes
18 Documents Generated
3 yr Certification Cycle
ISO/IEC 27001:2022 Certified
Prescient Security LLC
AI Awards Finalist 2025
Cyber Awards Finalist 2026
Australian Data Residency
What ISO 27001 Is

An information security management system. Not a folder of documents.

ISO 27001:2022 is the international gold standard for information security management. Certification proves you have built, implemented, and continuously improved an ISMS - a complete system for managing information security risk. It is recognised in over 160 countries and increasingly required by enterprise customers, government agencies, and regulators.

Who Needs ISO 27001?

ISO 27001 applies to organisations of any size, in any industry. But it is particularly critical for:

Technology Companies

SaaS providers, cloud platforms, and IT service companies. Enterprise customers increasingly mandate ISO 27001 certification before signing contracts. Without it, you lose deals.

Financial Services

Banks, insurers, fintechs, and payment processors. Regulators expect robust information security frameworks. ISO 27001 is often the foundation on which APRA CPS 234, PCI-DSS, and NIST CSF compliance is built.

Healthcare

Health data processors, digital health platforms, and hospital systems. Patient data protection is non-negotiable. ISO 27001 provides the management framework to meet privacy and security obligations.

Government Suppliers

Any organisation providing services to government agencies. ISO 27001 is frequently a prerequisite in government procurement. Without certification, you are excluded before evaluation begins.

The Certification Journey

ISO 27001 certification is not a one-time event. It is a three-year cycle with continuous obligations:

1. Gap Assessment

Identify where your current security practices fall short of ISO 27001 requirements. Understand the scope of work required.

2. ISMS Implementation

Build the management system: policies, risk assessments, Statement of Applicability, control implementations, training, and awareness programmes.

3. Internal Audit

Conduct a thorough internal audit to verify your ISMS meets all requirements before the external auditor arrives. Fix nonconformities proactively.

4. Stage 1 Audit (Documentation)

The certification body reviews your documentation - policies, SoA, risk assessment, and management system records. They confirm readiness for Stage 2.

5. Stage 2 Audit (Implementation)

The auditor verifies that your ISMS is implemented and operating effectively. They interview staff, sample evidence, and test controls in practice.

6. Year 1 & 2 Surveillance

Annual surveillance audits verify continued compliance. The auditor samples controls and checks for improvement. Evidence must be current, not stale.

7. Year 3 Recertification

Full recertification audit. The entire ISMS is reassessed. The cycle begins again for another three years.

The Management System

Clauses 4 to 10: the structure that makes controls meaningful

Controls without a management system are just a checklist. ISO 27001's clauses establish the governance structure that ensures information security is led, measured, and improved - not just implemented.

Clause 4 - Context of the Organisation

Understand your organisation's internal and external context, the needs and expectations of interested parties, and define the scope of your ISMS. This determines the boundaries of everything that follows.

Clause 5 - Leadership

Top management must demonstrate leadership and commitment. Establish an information security policy. Assign roles, responsibilities, and authorities. Without executive buy-in, the ISMS fails.

Clause 6 - Planning

Identify risks and opportunities. Conduct information security risk assessment. Define risk treatment plans. Set measurable information security objectives. This is where your risk-based approach takes shape.

Clause 7 - Support

Provide resources, ensure competence, build awareness, establish communication channels, and manage documented information. The people, skills, and infrastructure your ISMS needs to operate.

Clause 8 - Operation

Implement and control the processes needed to meet information security requirements. Execute risk assessments and risk treatment plans. This is where planning becomes action.

Clause 9 - Performance Evaluation

Monitor, measure, analyse, and evaluate your ISMS. Conduct internal audits. Perform management reviews. This clause ensures you know whether your ISMS is actually working.

Clause 10 - Improvement

Address nonconformities with corrective actions. Drive continual improvement. The ISMS is never finished - it evolves with your organisation and the threat landscape.

Annex A Controls

93 controls across four themes. Every one mapped in CyberHeed.

The 2022 revision reorganised the control set from 114 controls across 14 domains into 93 controls across four themes. Every control must be considered in your Statement of Applicability, and those you include must be implemented with evidence.

Organisational Controls (37 Controls)

Policies, roles, responsibilities, asset management, access control, supplier relationships, incident management, business continuity, compliance obligations, threat intelligence, and information security in project management. These are the governance foundations - the controls that establish how your organisation manages security at an institutional level.

Key controls: A.5.1 Information Security Policies, A.5.9 Inventory of Assets, A.5.15 Access Control, A.5.19 Supplier Security, A.5.24 Incident Management Planning, A.5.29 Business Continuity.

People Controls (8 Controls)

Screening before employment, terms and conditions of employment, information security awareness and training, disciplinary process, responsibilities after termination, confidentiality agreements, and remote working security. People are the most common attack vector - these controls address the human element directly.

Key controls: A.6.1 Screening, A.6.3 Security Awareness Training, A.6.5 Responsibilities After Termination, A.6.7 Remote Working.

Physical Controls (14 Controls)

Physical security perimeters, physical entry controls, securing offices and facilities, physical security monitoring, protection against environmental threats, working in secure areas, clear desk and clear screen, equipment siting, secure disposal, and cabling security. The physical layer that underpins digital security.

Key controls: A.7.1 Physical Security Perimeters, A.7.2 Physical Entry Controls, A.7.7 Clear Desk Clear Screen, A.7.14 Secure Disposal.

Technological Controls (34 Controls)

Endpoint security, privileged access management, information access restriction, authentication, malware protection, vulnerability management, configuration management, data deletion, data masking, DLP, monitoring, network security, web filtering, cryptography, secure development lifecycle, security testing, and separation of environments.

Key controls: A.8.2 Privileged Access, A.8.5 Secure Authentication, A.8.7 Malware Protection, A.8.8 Vulnerability Management, A.8.9 Configuration Management, A.8.24 Cryptography.

ISO 27001 is not a point-in-time exercise. It requires continuous improvement - surveillance audits every year, recertification every three years. Your ISMS must be a living system, not a project you complete and shelve.

Prepare - Comply - Manage

How CyberHeed handles each phase of your ISO 27001 journey

Every phase of ISO 27001 compliance - from initial preparation through ongoing surveillance - managed in one platform.

1. Prepare with SmartPrep

15 AI-guided conversations covering every ISO 27001 domain. Access control, incident response, risk management, business continuity, asset management, supplier relationships - each session adapts based on your answers, follows up on gaps, and captures how your organisation actually operates.

At the end, your complete documentation suite is generated from what your team said. Not templates filled in - documents that reflect your reality.

2. Comply with Evidence Validation

Upload evidence for any of the 93 Annex A controls. AI reads each document, assesses whether it satisfies the requirement, and tells you specifically what's strong and what an auditor would flag. Scored 0-5 with actionable feedback.

AutoMatch reads hundreds of documents at once and maps each one to the right controls. Hours of manual cross-referencing, handled automatically across your entire Statement of Applicability.

3. Manage for Surveillance

Surveillance audits become routine, not scrambles. Evidence is continuously monitored. Recurring tasks are tracked with owners and deadlines. Gaps are flagged before auditors find them.

When Year 2 and Year 3 come around, your posture is current. When recertification arrives, you're already ahead.

Complete Documentation Suite

Every document your auditor expects. Generated from your answers.

SmartPrep produces the full documentation suite required for ISO 27001:2022 certification. Each document is generated from your team's actual responses - branded, professional, and audit-ready.

1. Information Security Policy - Top-level policy establishing the ISMS scope, objectives, and management commitment.

2. Statement of Applicability - All 93 controls documented with justification for inclusion or exclusion.

3. Risk Assessment Report - Identified risks, likelihood and impact ratings, treatment decisions, and residual risk acceptance.

4. Risk Treatment Plan - Controls selected for each identified risk, implementation status, and ownership.

5. Access Control Policy - User access management, privileged access, authentication requirements, and review processes.

6. Incident Response Plan - Detection, reporting, assessment, response procedures, evidence preservation, and lessons learned.

7. Business Continuity Plan - BIA, recovery objectives, continuity procedures, testing schedules, and communication plans.

8. Asset Register - Information assets, owners, classification, handling requirements, and lifecycle management.

9. Supplier Management Policy - Supplier risk assessment, security requirements, monitoring, and contract obligations.

10. Data Classification Policy - Classification levels, labelling, handling procedures, and declassification criteria.

11. Acceptable Use Policy - Rules for information assets, email, internet, mobile devices, and removable media.

12. Change Management Policy - Change control processes, impact assessment, approval workflow, and rollback procedures.

13. Physical Security Policy - Perimeter controls, entry management, equipment security, and clear desk requirements.

14. HR Security Policy - Screening, terms of employment, security awareness, disciplinary process, and termination.

15. Internal Audit Programme - Audit schedule, scope, criteria, methodology, competence requirements, and reporting.

16. Management Review Agenda - Inputs, outputs, decisions, actions, and records for management review meetings.

17. Corrective Action Register - Nonconformities, root cause analysis, corrective actions, verification, and closure.

18. Cryptography Policy - Encryption standards, key management, certificate lifecycle, and approved algorithms.

Multi-Framework Advantage

ISO 27001 is often the first framework. It shouldn't be the last.

What you demonstrate for ISO 27001 counts toward other frameworks. When you add a second framework, roughly 60% of the work is already done. CyberHeed maps controls across frameworks automatically.

~65% - Essential Eight

ISO 27001 technological controls map directly to Essential Eight mitigation strategies. Patch management, access control, MFA, and application hardening overlap substantially.

~60% - NIST CSF

NIST CSF's five functions - Identify, Protect, Detect, Respond, Recover - align closely with ISO 27001's control structure and risk-based approach.

~55% - CPS 234

APRA's CPS 234 requirements for information security capability, policy frameworks, and incident management overlap with ISO 27001 organisational and technological controls.

Other frameworks: [Links to: essential-eight.html], [Links to: cps-234.html], [Links to: cps-230.html], [Links to: nist-csf.html], [Links to: pci-dss.html], [Links to: desc-isr.html], [Links to: nca-ecc.html], [Links to: dfsa.html]

We Practice What We Preach

We're ISO 27001:2022 certified ourselves.

CyberHeed isn't just a platform that helps organisations achieve ISO 27001 certification. We've been through the process ourselves. We use our own platform to manage our own compliance. Our ISMS is certified by Prescient Security LLC under the ISO/IEC 27001:2022 standard.

- ISO 27001:2022 - Certified Standard

- Prescient Security - Certification Body

- Our Own Platform - Used Internally

We built CyberHeed because we saw what compliance looks like from the other side of the table - 18 years regulating 750 financial institutions. We know what good looks like, and we built a platform that gets organisations there. Then we used it ourselves to prove it works.

Start your ISO 27001 journey.

From preparation to certification. One platform. AI that does the heavy lifting.

Book a Demo