Skip to main content

ISO 27001 Compliance with Gover

ISO 27001 is the international standard for information security management systems (ISMS).

Overview

AttributeValue
Full NameISO/IEC 27001:2022
TypeInternational Standard
PublisherISO/IEC
CertificationAvailable through accredited bodies

Structure

Main Clauses (4-10)

  • Context of the organization
  • Leadership
  • Planning
  • Support
  • Operation
  • Performance evaluation
  • Improvement

Annex A Controls

93 controls organized in 4 themes:

  • Organizational controls (37)
  • People controls (8)
  • Physical controls (14)
  • Technological controls (34)

Key Requirements

ISMS Requirements

  • Define scope
  • Establish policy
  • Risk assessment
  • Risk treatment
  • Statement of Applicability
  • Continuous improvement

Annex A Control Domains

DomainControls
A.5 OrganizationalPolicies, roles, responsibilities
A.6 PeopleScreening, awareness, training
A.7 PhysicalPerimeters, equipment, utilities
A.8 TechnologicalAccess, cryptography, operations

Using Gover for ISO 27001

1. Add the Framework

  1. Go to FrameworksAdd Framework
  2. Select ISO 27001:2022 from templates
  3. Add to your workspace

2. Define Your Scope

Document your ISMS scope:

  • Organizational boundaries
  • Information assets
  • Locations
  • Technologies

3. Perform Risk Assessment

Use Gover's risk management:

  1. Identify information security risks
  2. Assess likelihood and impact
  3. Determine risk levels
  4. Plan treatment

4. Create Statement of Applicability

Map controls to requirements:

  • Mark applicable controls
  • Document justification for exclusions
  • Link to implemented controls

5. Implement Controls

For each Annex A control:

  1. Create or map existing controls
  2. Link evidence documents
  3. Assign owners
  4. Track implementation

Certification Journey

  1. Gap Analysis — Assess current state against ISO 27001
  2. Risk Assessment — Identify and assess risks
  3. Control Implementation — Address gaps
  4. Documentation — Create required documents
  5. Internal Audit — Verify compliance
  6. Certification Audit — External assessment

Key Documents

DocumentPurpose
ISMS PolicyHigh-level security commitment
Risk AssessmentDocumented risk analysis
Statement of ApplicabilityControl applicability
Risk Treatment PlanHow risks are addressed
Internal Audit ReportsAudit findings

Resources

Next Steps