Important international standards at a glance

Standards are the concentrated expertise of people who have deep knowledge in their industry and understand the requirements of the organizations they represent: manufacturers, suppliers, clients, users, professional associations, and authorities. Based on this shared wealth of experience, norms and requirements are created that help to work more systematically and successfully.

Discover some of the best-known and most widely used standards, as well as those that address current challenges and changes that affect us all.

ISO/IEC 27001:2022Information Security Management Systems – Requirements

(Information security management systems – Requirements)

ISO/IEC 27001 is the world's best-known and most recognized standard for Information Security Management Systems (ISMS). It was jointly developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) and defines the requirements an ISMS must meet to be considered effective.

In contrast to ISO/IEC 27000 (which explains the terminology) and ISO/IEC 27002 (which describes practical controls), ISO/IEC 27001 is the only standard in the 27000 family for which certification is possible. This means: Organizations can have independent auditors verify whether their ISMS meets international Best Practices and receive an official certificate.

What is ISO/IEC 27001:2022?

What does ISO/IEC 27001:2022 cover?

The standard is based on a risk-based approach and covers three central security goals:

  • Confidentiality: Only authorized persons have access to information.

  • Integrity: Data remains complete, accurate, and unchanged.

  • Availability: Information is available when it is needed.

ISO/IEC 27001:2022 requires organizations to:

  1. Understand context and stakeholders (What are our risks? Who is affected?).

  2. Establish an ISMS framework (Policies, processes, responsibilities).

  3. Systematically assess risks (What can go wrong? How likely is it?).

  4. Implement security controls (Technical, organizational, and personnel measures).

  5. Monitor performance (Audits, reviews, KPIs).

  6. Improve continually (Learn from incidents, adapt to new threats).

The standard follows the PDCA cycle (Plan-Do-Check-Act), which ensures that information security is not a one-time project, but a continuous process.

Benefits for Your Business

Cybercrime is one of the greatest threats to companies worldwide. According to studies, an average data breach costs 4.88 million USD (2024). For many small and medium-sized enterprises, a single serious security incident is existential.

ISO/IEC 27001:2022 helps organizations become risk-aware and proactively identify and fix vulnerabilities—before they are exploited. The standard promotes a holistic approach: people, processes, and technology are considered equally.

Especially for online service providers, ISO/IEC 27001 is indispensable:

  • Online Academies store sensitive learning data, payment information, and access data.

  • E-Learning Platforms must protect content from theft and manipulation.

  • Coaches and Consultants process confidential client and business information.

  • Creatives and Freelancers must secure their intellectual property and project data.

A security incident can not only cause financial damage but also permanently destroy customer trust. ISO/IEC 27001:2022 provides a structured framework to manage such risks systematically.

Important drivers for ISO/IEC 27001 certification:

  • Customer requirements: Many large customers (especially in the B2B sector) demand ISO/IEC 27001 certificates from their suppliers.

  • Compliance: Laws such as the GDPR (DSGVO), NIS2 Directive, and industry-specific regulations demand robust information security.

  • Cyber Insurance: Many insurers require proof of security measures – ISO/IEC 27001 fulfills these requirements.

  • Competitive advantage: Certification is a differentiator that builds trust and opens up new business opportunities.

Summary of the most important benefits

  • ✓ Up to 48 % lower costs for data breaches

  • ✓ Increased customer trust and strengthened market reputation

  • ✓ Access to enterprise customers and public tenders

  • ✓ Fulfillment of legal and regulatory requirements (GDPR, NIS2)

  • ✓ Structured, measurable risk management

  • ✓ More efficient security processes and faster reaction times

  • ✓ Stronger security culture and fewer human errors

  • ✓ Competitive advantage through internationally recognized certification

For whom is ISO/IEC 27001:2022 relevant?

ISO/IEC 27001:2022 is relevant for all organizations that process information — regardless of size, industry, or location:

  • IT companies and SaaS providers (Cloud services, software development, hosting providers)

  • E-Learning and Online Academies (Protection of learner data, payment data, course content)

  • Coaches, Consultants, Service Providers (Confidential customer data, business secrets)

  • E-Commerce and Online Shops (Payment data, customer information)

  • Healthcare (Patient data, medical records)

  • Financial Service Providers (Banks, insurance companies, Fintech startups)

  • Creatives and Freelancers (Protection of intellectual property, project data, customer data)

  • Public Administration (Citizen data, critical infrastructure)

  • Small and medium-sized enterprises (SMEs) (ISO/IEC 27001 is scalable and can also be implemented for smaller organizations)

How does EAS™ support you with ISO/IEC 27001:2022?

The European Attestation Standard™ (EAS™) is oriented towards the core principles of ISO/IEC 27001:2022 and ensures that your online and digital services meet the same high security standards — without you necessarily having to be ISO-certified yourself.

By using EAS™ criteria, you can:

  • Build a risk-based Information Security Management System.

  • Implement security controls according to ISO standards.

  • Prepare your organization for a future ISO/IEC 27001 certification.

  • Build trust among learners, female customers, and partners.

  • Prove compliance with GDPR (DSGVO) and other data protection laws.

  • Communicate professionally with female auditors, regulatory authorities, and major customers.

_______________________________________

📌 Learn more: Visit the ISO website or contact an EAS™-certified auditor for comprehensive advice regarding your specific situation.

What exactly does ISO/IEC 27001:2022 cover?

The standard is divided into 10 main clauses (Clauses) and an Annex A (list of 93 security controls):

Clauses 4–10: The ISMS Framework

  • Clause 4: Context of the organization

    • Understand internal and external factors that influence your information security

    • Identify relevant stakeholders (customers, regulatory authorities, suppliers)

    • Define the scope of your ISMS

  • Clause 5: Leadership

    • Top management must take responsibility and define the security policy

    • Roles and responsibilities must be clearly defined

  • Clause 6: Planning

    • Systematically identify and assess risks and opportunities

    • Establish information security objectives and create plans for target achievement

  • Clause 7: Support

    • Provide resources (budget, personnel, technology)

    • Train employees and create awareness

    • Establish and maintain documentation

  • Clause 8: Operation

    • Implement and operate security controls

    • Implement the risk management process

  • Clause 9: Performance evaluation

    • Conduct monitoring, measurement, audits, and management reviews

    • Evaluate the effectiveness of the ISMS

  • Clause 10: Improvement

    • Correct non-conformities

    • Ensure continuous improvement

Annex A: 93 Security Controls Annex A lists specific security measures in 4 categories:

  • A.5 Organizational Controls (37 controls)

    • Information security policies

    • Roles and responsibilities

    • Supplier management

    • Incident management

    • Business Continuity

  • A.6 People Controls (8 controls)

    • Background checks

    • Training and awareness-raising

    • Disciplinary procedures

  • A.7 Physical Controls (14 controls)

    • Access control to rooms

    • Security monitoring

    • Protection against environmental threats (fire, water)

  • A.8 Technological Controls (34 controls)

    • Access control and authentication

    • Encryption

    • Secure software development

    • Network security

    • Backup and recovery

    • Monitoring and logging

Organizations select from these 93 controls those that are relevant for their risks. Not all controls have to be implemented — but every decision must be documented and justified.

New controls in ISO/IEC 27001:2022:

  • A.5.7 Threat Intelligence (Proactive threat detection)

  • A.5.23 Information Security in Cloud Services

  • A.8.8 Management of technical vulnerabilities

  • A.8.10 Data masking (Protection of sensitive data in test and development environments)

  • A.8.16 Monitoring of activities

  • A.8.28 Secure Coding (Secure Coding Practices)

Why is ISO/IEC 27001:2022 important?

Protection against financial losses

Organizations with ISO/IEC 27001 certification can reduce the costs of data breaches by up to 48 %. Often, avoiding a single major incident justifies the investment in the ISMS.

Customer trust and market reputation

ISO/IEC 27001 certification signals to customers and partners: "We take security seriously." This is particularly important in sectors such as Fintech, Healthcare, E-Learning, and Cloud Services, where data protection and security are decisive.

Access to new markets and customers

Many large corporations and public authorities require ISO/IEC 27001 certificates as a minimum requirement. Without certification, you may not be able to win certain tenders or contracts. A SaaS provider reported: "After certification, our sales cycles were significantly shortened, and we gained several enterprise customers."

Compliance with legal requirements

ISO/IEC 27001 helps in fulfilling data protection laws (GDPR/DSGVO), industry regulations (e.g., financial sector), and national cybersecurity requirements. Auditors and regulatory authorities recognize the standard as proof of robust security practices.

More efficient security processes

Through the implementation of ISO/IEC 27001, security processes are structured, documented, and measurable. This leads to fewer ad-hoc decisions, shorter reaction times in the event of incidents, and overall higher efficiency.

Risk management as a strategic instrument

ISO/IEC 27001 forces organizations to systematically identify, assess, and treat risks. This leads to better decisions at the management level and prevents important risks from being overlooked.

Employee engagement and security culture

The implementation creates awareness for information security throughout the entire company. Employees understand their roles and responsibilities — which reduces human error (a main cause of security incidents).

Preparation for new threats

The standard requires continuous monitoring and improvement. Organizations thus remain up-to-date and can react more quickly to new threats (e.g., Ransomware, Supply-Chain attacks).

The Way to ISO/IEC 27001 Certification

  1. Gap Analysis

    Evaluate your current security situation in comparison to ISO/IEC 27001 requirements.

  2. ISMS Planning

    Define the scope, policies, roles, and responsibilities.

  3. Risk Assessment

    Identify and evaluate your information security risks.

  4. Implementation of Controls

    Implement relevant security measures from Annex A.

  5. Documentation

    Create required policies, procedures, and records.

  6. Training and Awareness Building

    Train your female employees and create a security culture.

  7. Internal Audit

    Review your ISMS internally before external female auditors arrive.

  8. Certification Audit

    Have your ISMS reviewed by an accredited certification body.

  9. Continual Improvement

    After certification: surveillance audits, regular reviews, adaptations.

The Version 2022 – What is new?

ISO/IEC 27001 was updated in 2022 (previous version: 2013). The most important changes are:

  • Annex A was reduced from 114 to 93 controls (Consolidation and modernization).

  • 11 new controls were added, addressing modern threats (Cloud Security, Threat Intelligence, ICT Readiness, Secure Software Development, Data Masking).

  • Clearer structure with 4 categories instead of 14 domains (Organizational, People, Physical, Technological).

  • Stronger focus on risk management as a strategic instrument.

  • Integration with other ISO standards (Annex SL – uniform structure for all management systems).