What is the primary goal of ISO/IEC 27001?
To establish, implement, maintain, and continuously improve an Information Security Management System (ISMS) that protects the confidentiality, integrity, and availability of information.
Is ISO/IEC 27001 certifiable?
Yes — organizations can be officially certified through accredited audits.
Which three core principles does ISO 27001 protect?
Confidentiality, Integrity, and Availability (CIA).
What type of approach does ISO 27001 use to manage information security?
A risk-based approach — identifying, assessing, and treating information security risks systematically.
What are the main phases of implementing an ISMS?
Establish → Implement → Operate → Monitor → Review → Maintain → Improve.
What does “Annex A” of ISO 27001 provide?
A list of security controls (93 in the 2022 version) covering organizational, people, physical, and technological domains.
Which other ISO standard gives detailed guidance on Annex A controls?
A: ISO/IEC 27002.
What is the PDCA model in ISO 27001?
Plan-Do-Check-Act — the continual improvement cycle for managing and refining the ISMS.
What documents are required under ISO 27001?
Scope statement, information security policy, risk assessment and treatment plan, Statement of Applicability (SoA), internal audit results, and management review records.
Who oversees ISO/IEC 27001 globally?
The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
What is the purpose of ISO/IEC 27002?
To provide guidance and best practices for implementing the security controls listed in ISO/IEC 27001’s Annex A.
Is ISO/IEC 27002 a certifiable standard?
No — it’s advisory, meant to support ISO/IEC 27001 implementation.
What are the four control categories in ISO/IEC 27002:2022?
Organizational, People, Physical, and Technological.
How many controls are included in the 2022 version of ISO/IEC 27002?
93 controls, organized into four control themes.
What are examples of Organizational controls?
Information security policies, supplier security, risk management, and project security.
What are examples of People controls?
Background screening, awareness training, and user responsibilities.
What are examples of Technological controls?
Access control, cryptography, logging, and malware protection.
What are examples of Physical controls?
Securing facilities, equipment protection, and access control to physical areas.
What is the relationship between ISO 27002 and NIST SP 800-53?
Both provide security control catalogs, but ISO 27002 is global, while NIST SP 800-53 is primarily U.S. federal.
What is ISO/IEC 27035 about?
It defines the framework and process for detecting, reporting, assessing, and responding to information security incidents.
How does ISO/IEC 27002 help implement ISO 27001?
It provides implementation guidance for each control listed in ISO 27001’s Annex A.
What are the key stages of the ISO/IEC 27035 incident lifecycle?
Preparation → Detection & Reporting → Assessment → Response → Lessons Learned.
What is the goal of incident assessment?
To determine whether an event is an actual security incident and assess its impact and urgency.
What does ISO/IEC 27035 emphasize after resolving incidents?
Lessons learned — identifying root causes and improving processes.