The leading certifiable global standard for managing information security—centered
on an ISMS (a management system of policies, processes, people, tech, and continual
improvement).
Opens enterprise doors, shortens security reviews, reduces breach risk, and aligns your org
to a recognized global benchmark (often a fast path to trust alongside or after SOC 2).
Controls modernized (e.g., threat
intelligence, cloud services, DLP, web
filtering). Annex A restructured into 4
themes with 93 controls (down from 114).
A certificate issued by an accredited
certification body, after Stage 1 & Stage 2
audits, with annual surveillance audits.
You define the boundaries (products, locations, cloud, teams)
A living program to identify risks, implement controls, measure effectiveness, and
improve continuously.
Clauses 4–10 (requirements for your ISMS: context, leadership, planning, support,
operation, performance evaluation, improvement).
Annex A (a catalog of control objectives/controls to treat risks—select what’s relevant and
justify in your Statement of Applicability).
You don’t implement controls blindly; you
justify them based on risk.
Your master table listing which
Annex A controls you adopt or
exclude, with rationale, status, and
links to evidence.
Plan → Do → Check → Act
(PDCA).
Right-sized, controlled
docs and records
(policies, procedures,
logs, tickets, metrics).