Many organisations use the controls listed in Annex A as a menu or checklist of best practice controls to be implemented in order to provide a level of information security.
However, URM recommends that your risk assessment is used to determine which controls are relevant, as some of them may not be applicable to your organisation.
We would also recommend that you don’t use Annex A in isolation as ISO 27002 provides very good additional guidance on how controls should be implemented.
It should also be noted that following your risk assessment, you may identify risks that cannon be adequately mitigated using the supplied controls. The standard provides the flexibility to permit the creation or introduction of additional controls from other sources which you may wish to implement to address unique risks.

ISO 27001 Clause 5.1: Leadership and Commitment Explained
URM’s blog explores Clause 5.1 of ISO 27001, what you must do to meet its requirements, and why leadership & commitment are vital to an effective ISMS.

URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.

URM’s blog breaks down the ISO 27001 certification process, the roles of certification bodies and UKAS, what auditors look for during assessments, and more.

URM’s blog explores the ISO 27001 business continuity controls, why they matter, & how they can be effectively implemented to ensure conformance to the Standard