It serves as a valuable framework for IT audit practices by providing a systematic approach to managing information security risks. It can be leveraged to assess organizations’ information security management systems and identify control deficiencies.
Information Security Management System (ISMS) standard for managing information security risks. Information Security Management System (ISMS) checklist:
- Is there a business continuity plan in place to ensure that critical business functions can continue in the event of a disruption?
- Are security incidents logged, monitored, and analyzed to detect and respond to security threats?
- Are regular security assessments and penetration tests conducted to identify vulnerabilities in the IT infrastructure?
- Are employees provided with regular training and awareness programs to educate them about information security risks and best practices?
The 2022 version has 93 controls, which is 22 fewer than the 2013 version, and organizes them into four themes instead of 14 sections. The themes are people, organizational, technological, and physical. The 2022 version also includes 11 new controls, merges 57 controls, renames 23 controls, and removes 3 controls. framework for best practices in information security management to address current and emerging threats
The 2022 revision merges 57 controls, resulting in a streamlined structure with 24 combined controls. Additionally, 11 new controls have been introduced to address contemporary threats like cloud security and supply chain risks.
The new controls focus on crucial areas such as:
- Threat intelligence: Gathering and analyzing information about potential threats.
- Information security for use of cloud services: Addressing security concerns specific to cloud environments.
- Inventory of information assets: Maintaining a comprehensive list of all information assets and their criticality.
- Vulnerability management: Implementing a systematic process to identify, assess, and remediate vulnerabilities.
- Cybersecurity incident management: Establishing a structured approach to handling security incidents.
Technically, no controls were removed. Instead, they’ve been merged with others based on thematic coherence. This consolidation aims to simplify the implementation process and make the controls more relevant to current threats.
Difference between 2022 and 2013
The 2022 revision emphasizes a more dynamic and risk-based approach to information security management. It encourages organizations to consider their specific context, threats, and vulnerabilities when implementing controls. Additionally, the revised standard emphasizes the importance of continual improvement and leadership commitment to information security.
The 2022 version merges 24 controls that were deemed inseparable or closely related. This consolidation aims to simplify implementation while maintaining the overall security posture. For example, the separate controls for mobile device and teleworking security have been combined into one control, reflecting the convergence of these technologies.
The 11 new controls have been added to address emerging threats and trends. These include controls for threat intelligence, information security for use of cloud services, and managing vulnerabilities in the supply chain.