Cybersecurity
DETAIL

ISO/IEC 27002:2013 — Code of Practice for Information Security Controls

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

ISO/IEC27002:2013 is an international code of practice for informationsecurity controls that helps organizations select, implement, andmanage security measures to protect sensitive information and supportrisk management efforts.

Published by theInternational Organization for Standardization (ISO) and theInternational Electrotechnical Commission (IEC), ISO/IEC 27002provides guidance on a broad set of cybersecurity controls coveringareas such as access management, cryptography, physical security,operations security, and incident response. The framework is widelyadopted across various industries by organizations seeking tostrengthen their cybersecurity posture and align with best practicesfor data protection and regulatory compliance.

Organizationstypically use ISO/IEC 27002 to guide the development of internalsecurity controls within their information security managementsystems (ISMS), often alongside ISO/IEC 27001 certification programs.The framework supports risk assessments, control selection, and thecontinuous improvement of security practices to help meet complianceobligations and mitigate evolving cyber threats.

Why it Matters

ISO/IEC27002:2013 provides comprehensive guidance for establishing effectiveinformation security controls to safeguard organizational data andsupport regulatory obligations.

Key benefitsinclude:

•  Strengthen information security governance

Enableorganizations to systematically manage and oversee cybersecurityrisks through structured control selection and management processes.

•  Enhance compliance readiness

Supportalignment with global regulatory requirements and industry standards,simplifying compliance reporting and external audit processes.

•  Improve incident response capabilities

Facilitatetimely identification and effective management of security incidents,reducing potential impact on business operations.

•  Support continuous improvement

Encourageongoing assessment and refinement of security practices as threatsevolve and organizational needs change.

•  Promote protection of sensitive data

Implement robustmeasures to protect proprietary, personal, and confidentialinformation against unauthorized access, misuse, or disclosure.

How it Works

ISO/IEC27002:2013 organizes information security guidance into a catalog ofsecurity controls grouped across fourteen domains, aligning with theISO 27000 series and supporting an ISMS under ISO/IEC 27001. Itoutlines control objectives and implementation guidance across areassuch as access control, asset management, cryptography, operations,supplier relationships, and incident management, and structuresselection of safeguards around risk management and governancerequirements.

Organizationsapply ISO/IEC 27002:2013 by mapping its controls to their riskassessment and treatment plans, establishing policies, andimplementing technical and procedural security practices. Typicalactivities include control implementation, gap analysis, continuousmonitoring, evidence collection for compliance, periodic audits, andintegration with incident response and business continuity processesto maintain an auditable security posture.

In SmartSuite,teams operationalize ISO/IEC 27002:2013 using control libraries andconfigurable risk registers to link controls to assets and risks,policy governance modules for versioned procedures, automatedevidence collection, compliance tracking, and remediation workflows.Dashboards and reporting support audit readiness, monitoring ofcontrol effectiveness, and coordination of governance and complianceactivities.

Key Elements

•  Information Security Policy Domain

Establishesorganizational rules, guidelines, and objectives for managing andsafeguarding information assets.

•  Human Resource Security Controls

Describesmeasures addressing personnel responsibilities through all phases ofemployment regarding information security.

•  Asset Management Practices

Specifiesprotocols for identifying, classifying, and handling informationsystems, hardware, and data resources.

•  Access Control Structures

Organizesrequirements for managing user permissions, authenticationmechanisms, and restricting data access.

•  Cryptography Management

Definesstandards for encryption, key management, and secure communication ofsensitive data.

•  Physical and Environmental Security

Outlinesprotective measures for physical premises, equipment, and supportinginfrastructure.

•  Operations Security Processes

Describesprocedures for managing technical operations, monitoring systems, andensuring operational resilience.

Framework Scope

ISO/IEC27002:2013 is commonly implemented by companies seeking structuredinformation security management and data protection across enterprisesystems, cloud solutions, and sensitive information assets. Theframework is typically applied when improving cybersecuritypractices, addressing risk management requirements, and supportingassurance programs within compliance and regulatory environments.

Framework Objectives

ISO/IEC27002:2013 provides comprehensive guidance for organizations toestablish effective information security controls and improve riskmanagement.

•  Enhance cybersecurity risk management through structuredselection of security controls

•  Safeguard sensitive data and maintain high standards of dataprotection

•  Strengthen security governance and enable ongoing monitoring ofinformation assets

•  Support compliance with regulatory and industry requirements forinformation security

•  Promote operational resilience by mitigating threats andminimizing incidents

•  Demonstrate audit readiness through clear documentation andcontinuous control improvement ISO/IEC 27002:2013 offers controlguidance complementing ISO/IEC 27001 and is often mapped toframeworks such as NIST SP 800-53 and CIS Controls. Organizations use27002 to select and implement controls for ISO 27001 certification,regulatory compliance, security governance, and operational securityimprovements across IT and privacy programs.

Common Framework Mappings

Organizationsmap ISO/IEC 27002 controls to complementary frameworks to streamlinegovernance, demonstrate multi-regime compliance, and harmonizecontrol implementation and auditability.

Mappedframeworks include:

CIS CriticalSecurity Controls

ISO/IEC 27001

ISO/IEC 27003

ISO/IEC 27017

ISO/IEC 27018

ISO/IEC 27701

NISTCybersecurity Framework

NIST SP 800-53

SOC 2Cybersecurity

At a Glance
ISO/IEC 27002:2013
  • checklist
    Classicifation
    Category
    info
    Cybersecurity
    Domain
    info
    Cybersecurity
    Framework Family
    info
    ISO 27000 Series
  • info
    Regulatory Context
    Type
    info
    Standard
    Legal Instrument
    info
    Standard
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    Global
    Region Detail
    info
    International
    Publisher
    info
    International Organization for Standardization (ISO)
  • published_with_changes
    Versioning
    Version
    info
    2013
    Effective Date
    info
    2013
    Issue Date
    info
    June 2013
  • graph_3
    Adoption
    Adoption Model
    info
    Risk Management
    Implementation Complexity
    info
    High
  • captive_portal
    Official Reference
License Information
License included / downloadable: No ISO/IEC 27002:2013 requires purchase via the ISO/IEC standards catalog. License not included with platform
Official Resources
ISO/IEC 27002:2013 Standard
Provides a comprehensive set of guidelines for information security controls.
chevron_forward
ISO/IEC 27001 and ISO/IEC 27002 Overview
Describes the relationship and purpose of key ISO information security standards.
chevron_forward
SMARTSUITE

How SmartSuite Supports ISO 27002

Operationalize ISO 27002 security controls by linking policies, risks, evidence, and control ownership within a centralized security governance platform.

Control Catalog and Implementation Guidance

Organize ISO 27002 control domains with defined owners, procedures, and implementation documentation.

Risk and Asset Linkage

Connect security controls to risks, assets, and mitigation strategies to prioritize security investments.

Evidence Collection and Review Cadence

Capture evidence demonstrating control operation and schedule recurring reviews across security processes.

Exception and Compensating Control Tracking

Document control exceptions, approvals, and compensating safeguards with full traceability.

Cross-Framework Control Mapping

Map ISO 27002 controls to frameworks such as NIST, CIS Controls, and SOC reporting requirements.

Security Governance and Reporting

Generate dashboards showing control coverage, open issues, remediation progress, and overall security posture.

Related frameworks

ISO 27000

ISO/IEC 27000 provides foundational concepts and terminology for establishing and operating an information security management system.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27017

ISO/IEC 27017 provides cloud-specific security controls to help organizations protect data and manage cloud-related risks.

Learn More
arrow_forward
ISO 27018

ISO/IEC 27018 provides guidelines for protecting personally identifiable information processed in public cloud services.

Learn More
arrow_forward
ISO 27701

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For ISO/IEC 27002:2013 (Code of Practice for Information Security Controls)

What is ISO/IEC 27002:2013 used for?

ISO/IEC 27002:2013 is used to guide organizations in selecting, implementing, and managing information security controls to protect sensitive data and mitigate security risks. It serves as a detailed reference for best practices in developing an effective information security management system.

Is ISO/IEC 27002:2013 certifiable or mandatory?

ISO/IEC 27002:2013 itself is not certifiable and is not legally mandatory, but it is often used alongside ISO/IEC 27001, which is certifiable. Organizations use ISO/IEC 27002 to inform their control selection and implementation when seeking ISO/IEC 27001 certification.

Who should use ISO/IEC 27002:2013, and what is its scope?

ISO/IEC 27002:2013 is applicable to organizations of all sizes and sectors that need to manage information security risks. Its scope includes guidance on controls across 14 security domains, making it relevant for organizations seeking to formalize or benchmark their security strategies.

What are the key concepts and artifacts required by ISO/IEC 27002:2013?

Key concepts within ISO/IEC 27002:2013 include control objectives, security control selection, risk treatment, and continual improvement. Artifacts typically required include documented policies, risk assessments, control implementation records, and evidence of ongoing monitoring.

How should organizations implement ISO/IEC 27002:2013?

Implementation involves mapping the controls in ISO/IEC 27002:2013 to identified risks within the organization, developing and enforcing appropriate policies and procedures, and performing regular reviews and updates. Ongoing employee training and technical security measures are required for effective adoption.

How does ISO/IEC 27002:2013 relate to ISO/IEC 27001 and other security frameworks?

ISO/IEC 27002:2013 provides detailed implementation guidance for the controls referenced in ISO/IEC 27001, supporting its ISMS requirements. It can be cross-mapped with other frameworks like NIST CSF or SOC 2 to facilitate integrated compliance strategies.

What are the ongoing compliance requirements for ISO/IEC 27002:2013?

Ongoing compliance requires continuous monitoring of controls, regular reviews and updates to policies, periodic risk assessments, and documenting evidence of control effectiveness. Periodic internal audits and management reviews help ensure sustained alignment with ISO/IEC 27002:2013 guidance.

How would SmartSuite support ISO/IEC 27002:2013?

SmartSuite supports ISO/IEC 27002:2013 by providing control libraries, configurable risk registers, and automated evidence collection tools, enabling organizations to map controls to risks and track compliance. The platform facilitates audit readiness with policy management modules, real-time dashboards, and reporting features, streamlining control management and compliance tracking across teams.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward