The major change to ISO 27001, with the publication of the 2022 version, was the incorporation of the control set from ISO 27002:2022 into Annex A of ISO 27001:2022.  With ISO 27002:2022, there was a a significant revision of the set of information security controls with the previous 114 being reduced to 93.   Of those 93 controls:

  • 58 have been updated
  • 24 controls represent merging of 57 of the previous controls
  • 11 new controls have been introduced.

More information on ISO 27002:2022 can be found here.

A number of changes to the management system clauses were made in ISO/IEC 27001:2022 with the goal of making some of the requirements more explicit and improving the alignment with other Annex SL standards, such as ISO 9001 and ISO 22301, e.g. sub clause titles, terms and definitions.

URM has played a vital role in helping us and our clients achieve Cyber Essentials, Cyber Essentials Plus, and ISO 27001 certifications. URM's expertise and dedication have been key to the success of this process, and their assistance has enabled us to enhance our cybersecurity posture significantly and provide our clients with the highest level of protection against cyber threats.
IT consultancy
Contact the ISO 27001 Experts Today

ISO 27001:2022 - A.5 Organisational Controls (Access Management)

Published on
18 Dec
2025

URM’s blog explores why the access controls in ISO 27001 matter, and how to implement each control in full conformance with both the Standard and best practice.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
16/12/2025
ISO 27001 Control 8.17: Why Clock Synchronisation Is Critical for Security and Conformance

Read URM’s blog, where we explore the importance of clock synchronisation for cyber security and resilience, and how to meet the requirements of Control 8.17.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
8/9/2025
ISO 27001 Clause 5.1: Leadership and Commitment Explained

URM’s blog explores Clause 5.1 of ISO 27001, what you must do to meet its requirements, and why leadership & commitment are vital to an effective ISMS.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
29/8/2025
Critical Cyber Security Practices to Defend Against Ransomware Attacks

URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.

Read more
"
The whole gap analysis process was very informative for all departments of the business. Our URM consultant was great at explaining the SOC2 audit process and what evidence may be required for each area. As a business, it has really assisted us in our implementation strategy and improving our compliance programme as a whole.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.