ISO 27001:2022 Complete Checklist | Het Mehta
Skip to content

ISO 27001:2022 Complete Implementation Checklist

By Het Mehta | Published: 2025-06-03 | Last Updated: 3/17/2026 | Standard: ISO/IEC 27001:2022

Introduction

This is the complete reference checklist for implementing and certifying an Information Security Management System (ISMS) against ISO/IEC 27001:2022. The 2022 revision restructured the standard from 114 controls across 14 domains to 93 controls across 4 themes — Organizational, People, Physical, and Technological — while adding 11 new controls to address modern threats including cloud security, threat intelligence, and data leakage prevention.

Use this checklist to track implementation progress, prepare for internal audits, and build your Statement of Applicability (SoA). Every checkbox state is saved in your browser so progress persists across sessions.

Overall Progress 0 / 118 complete
✅ Completed: 0 ⏳ Remaining: 118 📋 Annex A: 93 controls 🆕 New in 2022: 11

📋 Mandatory Clauses 4–10

These clauses form the core ISMS management framework and are mandatory for all organisations seeking certification. Unlike Annex A controls, no clause requirement can be excluded. Clauses 4–10 cover how you manage the ISMS; Annex A covers what controls you implement.

Clause 4 — Context of the Organisation

Clause 5 — Leadership

Clause 6 — Planning

Clause 7 — Support

Clause 8 — Operation

Clause 9 — Performance Evaluation

Clause 10 — Improvement

🏢 Annex A.5 — Organisational Controls (37)

The governance layer of the ISMS — policies, asset management, access control, supplier relationships, incident management, and business continuity. These controls provide the administrative backbone that all technical controls build upon.

A.5.1–5.4 — Policies & Governance

A.5.5–5.8 — Contact, Threat Intelligence & Projects

A.5.9–5.13 — Asset Management

A.5.14–5.18 — Access Control & Identity

A.5.19–5.23 — Supplier & Cloud Relationships

A.5.24–5.28 — Incident Management

A.5.29–5.37 — Business Continuity, Compliance & Operations

👤 Annex A.6 — People Controls (8)

Controls focused on the human factor — consistently the most frequently exploited attack vector. Covers pre-employment screening, employment terms, security awareness training, discipline, post-employment responsibilities, NDAs, remote working, and incident reporting culture.

🏗️ Annex A.7 — Physical Controls (14)

Controls that protect tangible assets, facilities, and physical environments from unauthorised access, theft, natural disasters, and deliberate damage. Often underestimated but directly audited — auditors physically walk facilities during certification.

A.7.1–7.5 — Perimeter & Entry

A.7.6–7.14 — Equipment & Environment

💻 Annex A.8 — Technological Controls (34)

The largest and most technical section — 34 controls covering user endpoints, privileged access, secure authentication, malware defences, vulnerability management, logging, cryptography, network security, and secure development. This is where IT and security engineering teams will focus most of their implementation effort.

A.8.1–8.5 — Endpoints & Access Management

A.8.6–8.8 — Capacity, Malware & Vulnerabilities

A.8.9–8.11 — Configuration, Deletion & Masking (3 new controls)

A.8.12–8.16 — DLP, Backups, Redundancy & Monitoring (1 new control)

A.8.17–8.19 — Clocks, Utilities & Software Installation

A.8.20–8.24 — Network Security

A.8.25–8.31 — Secure Development

A.8.32–8.34 — Change Management, Test Data & Audit (1 new control)

📄 Download This Checklist

Your checkbox progress is included. In the print dialog, choose Save as PDF to get a clean, print-ready version.

📚 References & Further Reading

Conclusion

ISO 27001:2022 represents a mature, internationally recognised framework for managing information security risk. The shift to 93 controls across 4 themes makes the standard more manageable and better aligned with modern threats — particularly around cloud services, threat intelligence, and secure coding. Remember that the goal is not to tick every control, but to tick the right controls for your organisation's risk profile, and to document your justification for every inclusion and exclusion in your Statement of Applicability.