Can I use Annex A as an information security controls checklist?

Many organisations use the controls listed in Annex A as a menu or checklist of best practice controls to be implemented in order to provide a level of information security.  

However, URM recommends that your risk assessment is used to determine which controls are relevant, as some of them may not be applicable to your organisation.  

We would also recommend that you don’t use Annex A in isolation as ISO 27002 provides very good additional guidance on how controls should be implemented.  

It should also be noted that following your risk assessment, you may identify risks that cannon be adequately mitigated using the supplied controls.  The standard provides the flexibility to permit the creation or introduction of additional controls from other sources which you may wish to implement to address unique risks.

We would like to pass on our gratitude to our consultant for all his hard work and advice during our 3-year re-certification and assessment against the new Standard. After seven days of auditing, we have two OFIs that the assessors have put forward from the audits. This pays testament to our URM consultant, his hard work, eye for detail and advice given, both during the audits and during all the works beforehand.
Waste management company
Contact the ISO 27001 Experts Today

ISO 27001 Clause 7.5: Documented Information Explained

Published on
27 Apr
2026

URM’s blog breaks down ISO 27001 Clause 7.5 requirements, with practical guidance on how to achieve conformance to this Clause & what external assessors expect.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
15/4/2026
ISO 27001 – Clause 6.3: The Importance of Planned ISMS Change Management

URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
2/4/2026
Transitioning to ISO 27001:2022

If your organisation is looking to transition to ISO 27001:2022, URM’s blog provides practical and invaluable guidance on meeting the new requirements.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
2/4/2026
What is the CIA Security Triad? Confidentiality, Integrity and Availability Explained

URM’s blog explains how the principles of confidentiality, integrity and availability (CIA) can help align your information security controls with best practice

Read more
"
Our URM consultant was most helpful. Very constructive with her thoughts. She completely understood the technology we are using to monitor the ISMS, which allowed her to fully appreciate the documentation.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.