ISO/IEC 27001:2022 introduced 11 new controls in Annex A that did not exist in the 2013 edition. These new controls reflect the evolution of the cybersecurity threat landscape — particularly cloud adoption, supply chain attacks, and data leakage risks. Every organisation implementing or transitioning to ISO 27001:2022 must evaluate all 11 in their Statement of Applicability.
1. A.5.7 — Threat Intelligence (Organisational)
Organisations must collect, analyse, and produce threat intelligence relating to information security threats. This includes: subscribing to threat intelligence feeds (CERT-In alerts, ISAC feeds, commercial threat intel), integrating threat intelligence into vulnerability management and incident response processes, and producing or consuming sector-specific threat intelligence. For Indian organisations, CERT-In's alerts and advisories satisfy part of this requirement. Automation through a SIEM/SOAR platform is common implementation.
2. A.5.23 — Information Security for Use of Cloud Services (Organisational)
A dedicated control for cloud security — establishing processes for acquisition, use, management, and exit from cloud services. Covers: cloud risk assessment before adoption, cloud provider security assessment, shared responsibility model documentation, cloud-specific access controls, data residency and sovereignty requirements (critical for Indian organisations — DPDPA 2023 and RBI data localisation requirements), encryption of data in cloud, and cloud exit procedures.
3. A.5.30 — ICT Readiness for Business Continuity (Organisational)
ICT readiness planning and implementation to support business continuity objectives. Covers: defining RTO and RPO for critical information systems, implementing backup and replication, testing recovery procedures, integrating ICT continuity into the broader Business Continuity Plan (BCP). Aligns with ISO 22301 for organisations pursuing combined ISMS + BCMS certification.
4. A.7.4 — Physical Security Monitoring (Physical)
Continuous monitoring of premises for unauthorised physical access. This encompasses: CCTV systems with coverage of server rooms, data centres, and secure areas; access control event logging and alert monitoring; guard presence where appropriate; physical intrusion detection systems. CCTV footage retention requirements and access log review frequency must be defined.
5. A.8.9 — Configuration Management (Technological)
Configurations of hardware, software, services, and networks must be established, documented, implemented, monitored, and reviewed. This is among the most operationally demanding new controls — requiring: defined security baselines for all system types (server, endpoint, network, cloud), automated compliance checking (SCCM, Ansible, CIS-CAT), configuration change management with authorisation, and detection and remediation of configuration drift.
6. A.8.10 — Information Deletion (Technological)
Information stored in information systems, devices, or other storage media must be deleted when no longer required. Addresses: data retention schedules, secure deletion procedures (data wiping standards — NIST 800-88, DoD 5220.22-M), deletion from cloud services and backup tapes, and deletion verification records. Critical for DPDPA 2023 compliance — the right to erasure creates a legal obligation that requires a functioning deletion process.
7. A.8.11 — Data Masking (Technological)
Data masking must be used in accordance with the organisation's access control policy and information handling requirements. Covers: masking of sensitive data in non-production environments (test, development, staging), dynamic data masking in applications to restrict sensitive data from unauthorised personnel, anonymisation and pseudonymisation as privacy-enhancing techniques aligned with DPDPA 2023 and GDPR obligations.
8. A.8.12 — Data Leakage Prevention (Technological)
Data leakage prevention (DLP) measures must be applied to systems, networks, and devices that process, store, or transmit sensitive information. Requires: DLP tool deployment (endpoint DLP, network DLP, email DLP, cloud DLP), data classification as the foundation for DLP policy, monitoring of data exfiltration channels (USB, email, cloud upload, printing), alert and response procedures for DLP incidents.
9. A.8.16 — Monitoring Activities (Technological)
Networks, systems, and applications must be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents. This is the operational SIEM/SOC requirement — log aggregation, normalisation, correlation rules, alerting, triage, and incident response. For Indian organisations, CERT-In's April 2022 directions mandate 6-hour incident reporting and extensive log retention — making SIEM/log management a regulatory as well as ISO 27001 requirement.
10. A.8.23 — Web Filtering (Technological)
Access to external websites must be managed to reduce exposure to malicious content. Web filtering should block: known malicious URLs and IP addresses, categories of inappropriate content, phishing sites and command-and-control (C2) infrastructure. Implementation: proxy/next-generation firewall web filtering, DNS filtering (e.g., Cisco Umbrella), browser-based filtering for remote workers, whitelist/blacklist management.
11. A.8.28 — Secure Coding (Technological)
Secure coding principles must be applied to software development. Covers: secure coding standards adoption (OWASP, CERT Secure Coding Standards), developer secure coding training, static application security testing (SAST), dynamic application security testing (DAST), code review procedures including security review, software composition analysis (SCA) for open-source vulnerabilities, and security requirements in the SDLC from design phase.