ISO 27002: A UK Business Guide to Information Security Controls

  • iso 27002
  • Published by: André Hammer on Apr 04, 2024
Group classes

In today’s digital economy, UK organisations are prime targets for a relentless barrage of cyber threats. Establishing a formal Information Security Management System (ISMS) has become a strategic necessity, not just for compliance but for survival. While ISO 27001 provides the blueprint for this system, how do you select and implement the specific safeguards?

This is where ISO 27002 comes in. It serves as the detailed catalogue of best-practice security controls that bring your ISMS to life. This guide will explore how UK businesses can leverage ISO 27002 to build a practical and effective cyber defence.

ISO 27001 vs. ISO 27002: The What vs. The How

A common point of confusion is the relationship between ISO 27001 and ISO 27002. Think of it this way: ISO 27001 is the management standard that defines the *requirements* for creating, operating, and continually improving an ISMS. It tells you *what* you need to do to be compliant and achieve certification.

ISO 27002, on the other hand, is a supplementary standard that provides detailed guidance on *how* to implement the information security controls listed in ISO 27001’s Annex A. It’s a code of practice, offering best-practice advice and implementation directions for hundreds of potential safeguards. You don’t get certified against ISO 27002, but you use its guidance to meet the requirements of ISO 27001.

The information security landscape is in constant flux, and the standards evolve to keep pace. The latest version, ISO/IEC 27002:2022, introduced significant changes to modernise the guidance and make it more user-friendly.

The most notable change is the restructuring of controls into four key themes:

  1. Organisational Controls: Covering the high-level policies, procedures, and governance of information security.
  2. People Controls: Focusing on controls related to human factors, such as security awareness and remote working.
  3. Physical Controls: Addressing the security of tangible assets and premises.
  4. Technological Controls: Detailing the cybersecurity tools and configurations needed to protect systems and data.

This thematic structure simplifies the process of identifying and applying relevant controls. The 2022 revision also introduced 11 new controls to address modern challenges like threat intelligence, cloud service security, and data leakage prevention, while merging and updating others for relevance.

Implementing Key Controls: A Practical Overview

ISO/IEC 27002 provides a wealth of guidance. Let’s explore how some of its controls apply to critical business functions, helping to protect an organisation’s confidentiality, integrity, and availability of information.

Strengthening Organisational Resilience

At the governance level, controls guided by ISO 27002 are fundamental. This involves establishing a clear framework for risk management and asset management. For example, the standard provides best practices for classifying information, ensuring that your most critical data receives the highest level of protection. The new control for threat intelligence encourages a proactive approach, pushing organisations to gather and analyse information about emerging threats to anticipate and mitigate attacks.

Securing Your Workforce

Your employees are your first line of defence, but they can also be a significant vulnerability. The "People" controls in ISO 27002 offer guidance on everything from pre-employment screening to ongoing security awareness training. This area helps ensure that personnel understand their responsibilities in upholding the organisation’s security policies. It also provides a framework for managing access rights throughout an employee’s lifecycle, from onboarding to termination, preventing unauthorised access by former staff.

Managing Technology and Access

Effective access control is a cornerstone of information security. ISO 27002 gives detailed advice on implementing policies and technical measures to ensure that users only have access to the information and systems they absolutely need. This covers everything from password policies to the use of privileged utility programmes. By applying these technological controls, you can significantly reduce the risk of both internal and external data breaches and ensure your systems are used appropriately.

The Role of ISO 27002 in Achieving Certification

While organisations pursue certification against ISO 27001, success is heavily dependent on the effective implementation of controls as guided by ISO 27002. During the ISO 27001 process, you will create a Statement of Applicability (SoA), which documents which controls from Annex A you have chosen to implement and why. ISO 27002 is the primary resource you will use to select these controls and plan their implementation, ensuring they are appropriate for mitigating your identified risks.

Therefore, even though ISO 27002 is not a certification standard itself, it is an indispensable companion on the journey to ISO 27001 compliance. It provides the practical detail needed to build a robust and defensible ISMS.

Get an 81% Headstart with ISMS.online

ISMS.online platform accelerating ISO compliance

Building an ISMS based on ISO 27001 and ISO 27002 can be a complex undertaking. The ISMS.online platform provides a significant advantage, offering what many users feel is an 81% headstart on the process. It comes pre-loaded with a set of adoptable policies and controls that align directly with the ISO/IEC 27002:2022 standard.

This platform offers structured implementation guidance and best practices for asset management, risk assessments, and governance, helping your organisation streamline its path to compliance. By leveraging ISMS.online, you can efficiently operationalise the security techniques outlined in the ISO 27000 family, ensuring you can protect your information assets while moving towards your certification goals much faster.

Your Questions Answered: ISO 27002 FAQ

Can my organisation get certified to ISO 27002?

No, ISO 27002 is a supporting standard that provides guidance and best practices. Organisations pursue certification for their Information Security Management System (ISMS) against the requirements of ISO 27001. ISO 27002 is the tool used to help achieve this.

What are the main benefits of using the ISO 27002 framework?

The primary benefit is access to a comprehensive, internationally recognised set of best-practice information security controls. Using this guidance helps organisations reduce cyber risks, build stakeholder trust, and provides a clear pathway to meeting the control requirements for ISO 27001 certification.

How does ISO 27002 help with UK GDPR compliance?

While not a GDPR compliance guide, implementing controls from ISO 27002 (like those for access control, encryption, and data leakage prevention) demonstrates that you have put technical and organisational measures in place to protect personal data. This directly supports the requirements of regulations like the UK General Data Protection Regulation (GDPR).

Who in an organisation should use ISO 27002?

Anyone involved in managing, implementing, or auditing information security will find ISO 27002 invaluable. This includes IT and security teams, risk managers, compliance officers, and internal auditors who need to understand best practices for security controls.

Building a Secure Foundation

Ultimately, ISO 27002 is more than just a document; it’s a practical toolkit for building cyber resilience. By providing a common language and a detailed framework for security controls, it empowers organisations to effectively protect their information assets, manage risks, and build a trusted reputation in an uncertain world. It is the essential companion to ISO 27001, turning high-level requirements into tangible security measures.

Readynez delivers a broad portfolio of ISO Courses and Certifications, giving you the training and support required to prepare for your exams and certifications. All our other ISO courses are part of our unique Unlimited Security Training offer, where you can access ISO programmes and over 60 other security courses for just €249 per month—the most flexible and affordable way to achieve your security certifications.

Please get in touch with us if you have any questions or wish to discuss your opportunities with ISO certifications and the best way to achieve them.

Two people monitoring systems for security breaches

Unlimited Security Training

Get Unlimited access to ALL the LIVE Instructor-led Security courses you want - all for the price of less than one course. 

  • 60+ LIVE Instructor-led courses
  • Money-back Guarantee
  • Access to 50+ seasoned instructors
  • Trained 50,000+ IT Pro's

Basket

{{item.CourseTitle}}

Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}