HomeBlogAboutPricingContact🌐 中文
Back to HomeISO 27001
ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

📑 Table of Contents

ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

ISO 27001 Clause Guide: Documentation Hierarchy, Controls & Implementation Guide [Complete Edition]

The ISO 27001 standard document is only about 30 pages.

But it's hard to understand.

The clauses read like legal text—you recognize every word, but together they don't make sense.

This article explains each clause in plain language, helping you truly understand what ISO 27001 requires.

For a complete introduction to ISO 27001, see ISO 27001 Complete Guide.



ISO 27001 Structure Overview

Clause Text (Clauses 4-10)

The main body of ISO 27001 has two parts:

  1. Clause text (Clauses 4-10): Tells you how to build the management system
  2. Annex A: Lists 93 controls

Clause text structure:

ClauseNameKey Content
Clause 4Context of the organizationUnderstanding internal and external environment
Clause 5LeadershipTop management commitment and responsibility
Clause 6PlanningRisk assessment, objective setting
Clause 7SupportResources, competence, document management
Clause 8OperationActual implementation of controls
Clause 9Performance evaluationMonitoring, internal audit, management review
Clause 10ImprovementNonconformity handling, continual improvement

Annex A (Controls)

Annex A lists 93 controls, divided into four themes:

ThemeCountExamples
Organizational controls37Information security policy, roles and responsibilities
People controls8Personnel screening, awareness training
Physical controls14Physical security, equipment protection
Technological controls34Access control, encryption, backup

PDCA Cycle Mapping

ISO 27001 is built on the PDCA (Plan-Do-Check-Act) cycle.

PDCACorresponding ClausesMeaning
PlanClauses 4, 5, 6Understand environment, get commitment, plan how to do it
DoClauses 7, 8Prepare resources, actually implement
CheckClause 9Monitor effectiveness, audit verification
ActClause 10Handle problems, continually improve

Key point: This is a cycle, not a one-time thing. It must be continuously executed every year.



Clause-by-Clause Interpretation

Clause 4: Context of the Organization

Original point: Understanding the organization and its context

In plain language:

Before building your ISMS, you need to figure out a few things:

4.1 Understanding the organization and its context

Ask yourself:

4.2 Understanding the needs and expectations of interested parties

Interested PartyPossible Needs
CustomersData security, service availability
EmployeesClear policies, proper training
RegulatorsRegulatory compliance
ShareholdersRisk management, reputation protection

4.3 Determining the scope of the ISMS

Not the entire company needs to be included. Decide:

4.4 ISMS and its processes

Establish, implement, maintain, and continually improve the ISMS.

Clause 5: Leadership

Original point: Leadership and commitment

In plain language:

Without management support, ISMS won't succeed.

5.1 Leadership and commitment

What top management must do:

5.2 Policy

Establish an "Information Security Policy":

5.3 Roles, responsibilities, and authorities

Clearly assign:

Clause 6: Planning

Original point: Actions to address risks and opportunities

In plain language:

This is the core of ISMS—risk assessment.

6.1 Actions to address risks and opportunities

6.1.1 General

Identify:

6.1.2 Information security risk assessment

This is the most important step:

StepContent
1. Identify assetsList information assets to protect
2. Identify threatsEvents that could harm assets
3. Identify vulnerabilitiesWeaknesses that could be exploited by threats
4. Assess impactHow serious if it happens
5. Assess likelihoodHow likely to happen
6. Calculate risk valueImpact × Likelihood
7. PrioritizeDecide which risks to address first

6.1.3 Information security risk treatment

For each risk, you can choose:

TreatmentDescriptionExample
MitigateImplement controls to reduce riskInstall firewall
TransferTransfer risk to othersBuy cyber insurance
AvoidDon't do this activityDon't offer certain services
AcceptAccept the risk existsRisk is very low, don't address

6.2 Information security objectives and planning to achieve them

Set specific security objectives, such as:

6.3 Planning of changes (New in 2022 version)

When ISMS needs changes, make them in a planned manner.

Clause 7: Support

Original point: Resources needed for ISMS operation

In plain language:

With a plan, you need resources to execute.

7.1 Resources

The company must provide sufficient:

7.2 Competence

People responsible for security work must have adequate competence:

7.3 Awareness

All employees must know:

7.4 Communication

Decide:

7.5 Documented information

ISMS needs documents for support:

Clause 8: Operation

Original point: Operational planning and control

In plain language:

Everything before was planning; this is actually doing it.

8.1 Operational planning and control

Implement what was planned in Clause 6:

8.2 Information security risk assessment

Re-execute risk assessment periodically:

8.3 Information security risk treatment

Execute risk treatment plan, keep records of treatment results.

Clause 9: Performance Evaluation

Original point: Monitoring and measurement

In plain language:

After doing, check if it's working.

9.1 Monitoring, measurement, analysis, and evaluation

Monitor:

9.2 Internal audit

Periodically audit yourself:

ItemRequirement
FrequencyAt least once a year
ScopeCover all ISMS processes
AuditorsMust be independent (can't audit your own work)
ResultsMust be recorded, improvement must be tracked

9.3 Management review

Top management must periodically review ISMS:

Inputs (data to review):

Outputs (decisions to make):

Clause 10: Improvement

Original point: Nonconformity and continual improvement

In plain language:

When problems are found, fix them. Even without problems, make things better.

10.1 Nonconformity and corrective action

When nonconformity is found:

  1. Immediate response: Control the problem, reduce impact
  2. Analyze cause: Find the root cause
  3. Take corrective action: Prevent recurrence
  4. Verify effectiveness: Confirm correction worked
  5. Update documents: Update risk assessment, ISMS if needed

10.2 Continual improvement

ISMS must continuously improve, not just maintain status quo.



Four-Tier Documentation System

ISO 27001 produces many documents, usually organized in four tiers.

Tier 1: Policies

Nature: Highest-level documents, explaining "why" and "direction"

Examples:

Characteristics:

Tier 2: Procedures

Nature: Explaining "what to do" and "who does it"

Examples:

Characteristics:

Tier 3: Work Instructions

Nature: Detailed steps on "how to do it"

Examples:

Characteristics:

Tier 4: Records

Nature: Evidence that you did it

Examples:

Characteristics:

Required Documents List

Documents explicitly required by ISO 27001:

ClauseRequired Document
4.3ISMS scope document
5.2Information security policy
6.1.2Risk assessment procedure
6.1.3Risk treatment plan
6.1.3Statement of Applicability (SoA)
6.2Information security objectives
7.2Evidence of competence
7.5Documented information
8.1Operational planning and control
8.2Risk assessment results
8.3Risk treatment results
9.1Monitoring and measurement results
9.2Internal audit records
9.3Management review records
10.1Nonconformity and corrective action records


Annex A Control Highlights

The 2022 version divides 93 controls into four themes.

Organizational Controls (37 items)

Covering organizational-level management controls:

NumberControlKey Point
5.1Information security policiesMust have, publish, regularly review
5.2Roles and responsibilitiesClearly assign
5.3Segregation of dutiesAvoid one person controlling too much
5.7Threat intelligenceProactively collect threat info (New)
5.9Inventory of information and assetsList all assets
5.15Access controlWho can access what
5.23Cloud services securityCloud usage management (New)

People Controls (8 items)

Covering personnel-related controls:

NumberControlKey Point
6.1ScreeningBackground checks
6.2Terms of employmentInclude security responsibilities in contracts
6.3Security awareness trainingEveryone must understand
6.4Disciplinary processViolations have consequences
6.5Termination/change of employmentRevoke access
6.6Confidentiality agreementsNDAs

Physical Controls (14 items)

Covering physical environment controls:

NumberControlKey Point
7.1Physical security perimetersAccess control
7.2Physical entryWho can enter
7.4Physical security monitoringCameras, sensors (New)
7.8Equipment sitingPlace in secure locations
7.10Storage mediaUSB, hard drive management
7.14Secure disposalClear data when disposing

Technological Controls (34 items)

Covering technical controls:

NumberControlKey Point
8.1User endpoint devicesLaptop, mobile security
8.5Secure authenticationLogin verification
8.7Protection against malwareAntivirus
8.8Technical vulnerability managementPatch vulnerabilities
8.9Configuration managementSystem settings management (New)
8.12Data leakage preventionDLP (New)
8.13BackupData backup
8.15LoggingSystem log recording
8.24Use of cryptographyEncryption

For more 2022 version change details, see ISO 27001:2022 Update Guide.



Statement of Applicability (SoA) Writing

What is SoA

SoA (Statement of Applicability) is one of ISO 27001's most important documents.

Purpose:

How to Determine Applicability

For each control, ask:

  1. Is it risk-related? Can this control address risks we identified?

  2. Is it legally required? Do regulations or contracts require this control?

  3. Is it business-needed? Does business operation need this control?

If any answer above is "yes," this control is applicable.

Valid Reasons for Excluding Controls

Controls that don't apply need valid reasons.

Acceptable reasons:

ReasonExample
Technology doesn't existCompany has no wireless network, so wireless security controls don't apply
Business doesn't involveCompany has no software development, so secure development controls don't apply
OutsourcedData center managed by provider, physical security is their responsibility
Risk acceptableRisk assessment shows risk is extremely low

Unacceptable reasons:

SoA Example Format

NumberControlApplicableReason/Implementation Status
5.1Information security policiesYesEstablished and published, reviewed annually
5.7Threat intelligenceYesSubscribed to CERT alerts
7.6Working in secure areasNoCompany has no secure areas
8.28Secure codingNoCompany has no software development


FAQ: Common Clause Questions

Q1: Must I buy the ISO 27001 standard document?

Not mandatory, but highly recommended.

Q2: Can I use existing documents?

Yes. ISO 27001 doesn't require specific formats.

If existing documents already cover required content, use them directly; no need to create new ones.

Q3: Will auditors check clause by clause?

Yes. Auditors will audit each clause and applicable controls.

But they won't go deep on everything—they'll decide depth based on risk and sampling.

Q4: What if I can't complete all controls?

Handle in phases:

  1. First identify high-risk items that must be done immediately
  2. Put others in improvement plan, complete gradually
  3. Auditors will check if you have a plan, not require everything complete

Q5: Do small companies need this many documents?

Not necessarily.

ISO 27001 doesn't specify document quantity or format. Small companies can simplify, as long as content covers requirements.

Example: Multiple policies can be combined into one "Information Security Policy."



Next Steps

ISO 27001 clauses look complex, but once you understand the logic, you'll find it's a very systematic framework.

If you're preparing for implementation or certification, recommended:

  1. First understand the intent of clauses
  2. Compare with current company status for gap analysis
  3. Develop action plan
  4. Gradually build documents and implement controls

Too many clauses, don't know where to start? Contact us to help interpret clauses and plan your implementation strategy.



Further Reading



References

Need Professional Cloud Advice?

Whether you're evaluating cloud platforms, optimizing existing architecture, or looking for cost-saving solutions, we can help

Book Free Consultation

ISO 27001AWS
Previous
ISO 27001 Implementation Cost Guide: Enterprise Certification Budget Planning & Cost-Saving Strategies [2025]
Next
ISO 27001 Certification Guide: Lead Auditor Costs, Exam Preparation & Course Recommendations [2025]