ISO 27001:2022 Statement of Applicability (SoA) – Template

This Statement of Applicability (SoA) template supports organisations implementing ISO/IEC 27001:2022 by documenting the selection and justification of information security controls. It includes all 93 controls from Annex A, grouped by control category (Organisational, People, Physical, and Technological). For each control, organisations should indicate whether it is applicable, justify inclusions or exclusions, and provide a status update on implementation. The SoA is a mandatory document for ISO 27001 certification and should reflect the current state of the Information Security Management System (ISMS).

Control GroupControl ID and NameApplicable? (Yes/No)JustificationImplementation StatusNotes
Organisational Controls5.1 Policies for information security
Organisational Controls5.2 Information security roles and responsibilities
Organisational Controls5.3 Segregation of duties
Organisational Controls5.4 Management responsibilities
Organisational Controls5.5 Contact with authorities
Organisational Controls5.6 Contact with special interest groups
Organisational Controls5.7 Threat intelligence
Organisational Controls5.8 Information security in project management
Organisational Controls5.9 Inventory of information and other associated assets
Organisational Controls5.10 Acceptable use of information and other associated assets
Organisational Controls5.11 Return of assets
Organisational Controls5.12 Classification of information
Organisational Controls5.13 Labelling of information
Organisational Controls5.14 Information transfer
Organisational Controls5.15 Access control
Organisational Controls5.16 Identity management
Organisational Controls5.17 Authentication information
Organisational Controls5.18 Access rights
Organisational Controls5.19 Information security in supplier relationships
Organisational Controls5.20 Addressing information security within supplier agreements
Organisational Controls5.21 Managing information security in the ICT supply chain
Organisational Controls5.22 Monitoring, review and change management of supplier services
Organisational Controls5.23 Information security for use of cloud services
Organisational Controls5.24 Information security incident management planning and preparation
Organisational Controls5.25 Assessment and decision on information security events
Organisational Controls5.26 Response to information security incidents
Organisational Controls5.27 Learning from information security incidents
Organisational Controls5.28 Collection of evidence
Organisational Controls5.29 Information security during disruption
Organisational Controls5.30 ICT readiness for business continuity
Organisational Controls5.31 Legal, statutory, regulatory and contractual requirements
Organisational Controls5.32 Intellectual property rights
Organisational Controls5.33 Protection of records
Organisational Controls5.34 Privacy and protection of personally identifiable information (PII)
Organisational Controls5.35 Independent review of information security
Organisational Controls5.36 Compliance with policies, rules and standards for information security
Organisational Controls5.37 Documented operating procedures
People Controls6.1 Screening
People Controls6.2 Terms and conditions of employment
People Controls6.3 Information security awareness, education and training
People Controls6.4 Disciplinary process
People Controls6.5 Responsibilities after termination or change of employment
People Controls6.6 Confidentiality or non-disclosure agreements
People Controls6.7 Remote working
People Controls6.8 Information security event reporting
Physical Controls7.1 Physical security perimeter
Physical Controls7.2 Physical entry
Physical Controls7.3 Securing offices, rooms and facilities
Physical Controls7.4 Physical security monitoring
Physical Controls7.5 Protection against physical and environmental threats
Physical Controls7.6 Working in secure areas
Physical Controls7.7 Clear desk and clear screen
Physical Controls7.8 Equipment siting and protection
Physical Controls7.9 Security of assets off-premises
Physical Controls7.10 Storage media
Physical Controls7.11 Supporting utilities
Physical Controls7.12 Cabling security
Physical Controls7.13 Equipment maintenance
Physical Controls7.14 Secure disposal or reuse of equipment
Technological Controls8.1 User endpoint devices
Technological Controls8.2 Privileged access rights
Technological Controls8.3 Information access restriction
Technological Controls8.4 Access to source code
Technological Controls8.5 Secure authentication
Technological Controls8.6 Capacity management
Technological Controls8.7 Protection against malware
Technological Controls8.8 Management of technical vulnerabilities
Technological Controls8.9 Configuration management
Technological Controls8.10 Information deletion
Technological Controls8.11 Data masking
Technological Controls8.12 Data leakage prevention
Technological Controls8.13 Information backup
Technological Controls8.14 Redundancy of information processing facilities
Technological Controls8.15 Logging
Technological Controls8.16 Monitoring activities
Technological Controls8.17 Clock synchronisation
Technological Controls8.18 Use of privileged utility programs
Technological Controls8.19 Installation of software on operational systems
Technological Controls8.20 Networks security
Technological Controls8.21 Security of network services
Technological Controls8.22 Segregation of networks
Technological Controls8.23 Web filtering
Technological Controls8.24 Use of cryptography
Technological Controls8.25 Secure development life cycle
Technological Controls8.26 Application security requirements
Technological Controls8.27 Secure system architecture and engineering principles
Technological Controls8.28 Secure coding
Technological Controls8.29 Security testing in development and acceptance
Technological Controls8.30 Outsourced development
Technological Controls8.31 Separation of development, test and production environments

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *