Many organisations use the controls listed in Annex A as a menu or checklist of best practice controls to be implemented in order to provide a level of information security.
However, URM recommends that your risk assessment is used to determine which controls are relevant, as some of them may not be applicable to your organisation.
We would also recommend that you don’t use Annex A in isolation as ISO 27002 provides very good additional guidance on how controls should be implemented.
It should also be noted that following your risk assessment, you may identify risks that cannon be adequately mitigated using the supplied controls. The standard provides the flexibility to permit the creation or introduction of additional controls from other sources which you may wish to implement to address unique risks.

Transitioning to ISO 27001:2022
If your organisation is looking to transition to ISO 27001:2022, URM’s blog provides practical and invaluable guidance on meeting the new requirements.
URM’s blog explains how the principles of confidentiality, integrity and availability (CIA) can help align your information security controls with best practice
URM’s blog explores ISO 27001 Clause 9.1, what it requires and practical guidance on how to implement this Clause in full conformance with the Standard.
URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.

