ISO 27001:2022 - A.5 Organisational Controls (Business Continuity)

Mark O'Kane
|
Consultant at URM
|
|
PUBLISHED on
18
July
2025

ISO/IEC 27001:2022 offers a structured approach to managing the wide range of information security risks faced by organisations, and the Annex A controls provide a catalogue of 93 controls grouped into four categories: organisational, people, physical, and technological.

Two of the organisational controls describe the measures needed to ensure the confidentiality, integrity and availability (CIA) of information assets during a severe business disruption.

  • A.5.29 – Information security during disruption
  • A.5.30 – ICT readiness during disruption

In this blog, we will consider why business continuity is important with respect to information security, and how you can implement the ISO 27001 business continuity controls to ensure that you are able to protect, maintain access to, and recover your critical information assets during disruption.

Why are the ISO 27001 business continuity controls important?

In a previous blog on ISO 27001:2022 - A.5 Organisational Controls (Incident Management), we looked at how incident management plays an integral role in helping organisations to effectively manage and prioritise information security incidents.  This prioritisation is important because, whilst incidents do occur all the time, not all incidents have the same level of impact.  When incidents are relatively benign, they can often be resolved quickly and with little impact.  However, some incidents are so severe that they can seriously impact an organisation’s ability to deliver its products and services.  To prepare for this possibility, organisations need to determine what types of incidents could cause an unplanned disruption to their business, how they will continue their core operations if these disruptions occur, and what steps are required to recover from those disruptions.

Whilst every organisation is different, some of the most common disruptions organisations prepare for include:

  • Loss of a member of the senior management team or individual critical to operations
  • Loss or destruction of physical premises
  • Loss of critical IT systems
  • A cyber attack
  • A supply chain attack
  • Loss of staff due to a pandemic.

When organisations are determining which disruptions they need to prepare for, they also need to consider the impact a disruption could have on the security (i.e., the CIA) of their business data, and what they need to do to restore these three properties to a desirable level.  The purpose of Annex A controls 5.29 and 5.30 is to help you achieve this by protecting your organisation’s information and related assets, and ensure their availability during a disruption.

What are the different types of business continuity controls?

According to ISO 27002:2022, A.5.29 is categorised as both a preventive control and a corrective control. A.5.30 is categorised as a corrective control.

  • Preventive controls are intended to stop an information security incident from occurring or at least reduce the likelihood of an incident.
  • Corrective controls are intended to close off or resolve a security incident or issue that has already occurred.

Hints and tips on implementing the A.5 business continuity controls

A.5.29 – Information security during disruption

During a business disruption, it is highly likely that the confidentiality, integrity, and particularly the availability of your organisation’s data will be significantly diminished or even lost.  This control requires you to prepare for this possibility by planning how you will maintain a minimal level or restore the security of your data whilst the disruption is still ongoing.  This includes considering how your security measures will be affected, and any additional security risks or measures that will need to be identified or put in place to mitigate that risk.  These additional measures should also be documented in your business continuity plan (BCP).  To take an example – if your physical premises is destroyed due to a natural disaster:

  • Will your staff have a secure internet connection they can use to work from home?
  • Will they all have a suitable environment in which to work?
  • How will your onsite assets and operations be affected (e.g., equipment, documents, work activities)? Will you have redundancy available if these are destroyed or damaged?

Another important requirement is to define how your information security management system (ISMS) processes and regular activities will be carried out during a disruption.  Can they be executed in the same way as before, or will they need to be adjusted during the disruption?  For example, if you are onboarding new employees whilst awaiting a new premises, you should refer to your onboarding process and define whether inductions will be conducted remotely or at another location.  Whatever your requirements are, it is recommended that you incorporate these into your BCP.

A.5.30 – ICT readiness for business continuity

As an extension to A.5.29, this control requires you to ensure in advance that the ICT resources you need to continue during (and recover from) a major disruption are available and well-tested on a regular basis.

Once your business impact assessment (BIA) has been completed and a BCP created, your ICT function needs to determine how your required ICT resources will be maintained or recovered if a disruption occurs.  Following this, you need to ensure they are appropriately implemented in your organisation and that each resource has a defined recovery time objective (RTO).  This is often documented in a disaster recovery plan (DRP), which should complement your BCP.  The BCP scenarios (including those that are ICT-related) should also be tested regularly, to ensure that the ICT and information security requirements of your ICT resources are being upheld.

Closing thoughts

Business continuity is an essential business practice; it determines whether or not an organisation can continue to operate during a disruption and recover from that disruption.  Furthermore, when a business disruption occurs, regardless of the scenario, the security of your information will be at stake.

By preparing for serious disruption and considering the information security implications it could have, your organisation can reduce the impact of such disruption on its data.  In doing so, you will be much better placed to maintain and restore the CIA of your organisation’s critical data, and ensure as seamless and controlled a recovery as possible.

How URM can Help

Consultancy

With more than 400 successful ISO 27001 implementation projects behind us over the course of 2 decades, URM is the ideal partner to support your organisation in its efforts to achieve or maintain conformance/certification to the Standard.  Our team of experienced and highly qualified consultants can offer your organisation a range of tailored ISO 27001 support services to help you meet the Standard’s requirements in full.  

To establish your current level of conformance and which areas require improvement, we can begin by conducting an ISO 27001 gap analysis.   We can also assist you to conduct your ISO 27001 risk assessment using our proven risk assessment tool, Abriska™ 27001, and work with you to develop policies, processes and ISMS infrastructure that are both ISO 27001 conformant and aligned with your organisation’s unique culture and needs.  Once the ISMS has been implemented, URM can provide a range of ISO 27001 internal audit services, including conducting an internal audit ahead of your certification assessment to ensure conformance, planning and implementing a full 3-year audit programme that is aligned with the Standard’s requirements, or auditing more specific aspects of the ISMS.

URM can also provide tailored business continuity guidance and expertise, including BIA support with our business continuity management tool, Abriska™ 22301, helping to you produce BCPs, creating and facilitating BC exercises, and supporting your conformance/certification to ISO 22301, the International Standard for Business Continuity Management.

Training

In addition to our consultancy services, URM also regularly delivers a range of ISO 27001-related training courses.  Our Introduction to ISO 27001 Course explores all aspects of information security and the importance of ISO 27001 in protecting information, whilst our 2-day ISO/IEC 27001:2022 Transition Course covers both the changes seen in the latest version of the Standard and how to implement them.  Or, to gain an industry-recognised information security qualification, attend URM’s Certificate in Information Security Management Principles (CISMP) Training Course, which will fully prepare you to sit and pass the BCS invigilated examination.

Mark O'Kane
Consultant at URM
Mark is an Information Security Consultant at URM with significant experience working with ISO 27001 and other GRC security frameworks and services.
Read more

Do you need any help with ISO 27001 certificate?

URM can help you achieve ISO 27001 certification
Thumbnail of the Blog Illustration
Information Security
Published on
27/7/2022
How Do You Go About Your ISO 27001 Information Classification?

This blog talks about information classification. So, what exactly do we mean by information classification?

Read more
Thumbnail of the Blog Illustration
Internal Audit
Published on
18/10/2024
Internal Auditing of Management Systems

URM’s blog explains how to plan and execute effective and conformant internal audits of management systems at each stage of the internal audit process.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
19/7/2022
How Do You Meet the Asset Management Requirements of IS0 27001?

In order to meet the requirements of ‘Asset management’ A.8 from Annex A of ISO 27001, it is necessary to identify organisational assets and define protection

Read more
URM is extremely trustworthy and reliable. We rely on URM for multiple services throughout the year, including penetration testing and PCI DSS audit services. As a smaller business, we have to be organised in our approach to compliance obligations and URM is a dependable partner which makes the difference.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.