ISO/IEC 27002:2013 — Code of Practice for Information Security Controls

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
ISO/IEC 27002:2013 is an international code of practice for information security controls that helps organizations select, implement, and manage security measures to protect sensitive information and support risk management efforts.
Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO/IEC 27002 provides guidance on a broad set of cybersecurity controls covering areas such as access management, cryptography, physical security, operations security, and incident response. The framework is widely adopted across various industries by organizations seeking to strengthen their cybersecurity posture and align with best practices for data protection and regulatory compliance.
Organizations typically use ISO/IEC 27002 to guide the development of internal security controls within their information security management systems (ISMS), often alongside ISO/IEC 27001 certification programs. The framework supports risk assessments, control selection, and the continuous improvement of security practices to help meet compliance obligations and mitigate evolving cyber threats.
Why it Matters
ISO/IEC 27002:2013 provides comprehensive guidance for establishingeffective information security controls to safeguard organizationaldata and support regulatory obligations.
Key benefits include:
- Strengthen information security governance
Enableorganizations to systematically manage and oversee cybersecurityrisks through structured control selection and management processes.
- Enhance compliance readiness
Support alignmentwith global regulatory requirements and industry standards,simplifying compliance reporting and external audit processes.
- Improve incident response capabilities
Facilitate timelyidentification and effective management of security incidents,reducing potential impact on business operations.
- Support continuous improvement
Encourage ongoingassessment and refinement of security practices as threats evolve andorganizational needs change.
- Promote protection of sensitive data
Implement robustmeasures to protect proprietary, personal, and confidentialinformation against unauthorized access, misuse, or disclosure.
How it Works
ISO/IEC 27002:2013 organizes information security guidance into acatalog of security controls grouped across fourteen domains,aligning with the ISO 27000 series and supporting an ISMS underISO/IEC 27001. It outlines control objectives and implementationguidance across areas such as access control, asset management,cryptography, operations, supplier relationships, and incidentmanagement, and structures selection of safeguards around riskmanagement and governance requirements.
Organizations apply ISO/IEC 27002:2013 by mapping its controls totheir risk assessment and treatment plans, establishing policies, andimplementing technical and procedural security practices. Typicalactivities include control implementation, gap analysis, continuousmonitoring, evidence collection for compliance, periodic audits, andintegration with incident response and business continuity processesto maintain an auditable security posture.
In SmartSuite, teams operationalize ISO/IEC 27002:2013 using controllibraries and configurable risk registers to link controls to assetsand risks, policy governance modules for versioned procedures,automated evidence collection, compliance tracking, and remediationworkflows. Dashboards and reporting support audit readiness,monitoring of control effectiveness, and coordination of governanceand compliance activities.
Key Elements
- Information Security Policy Domain
Establishesorganizational rules, guidelines, and objectives for managing andsafeguarding information assets.
- Human Resource Security Controls
Describesmeasures addressing personnel responsibilities through all phases ofemployment regarding information security.
- Asset Management Practices
Specifiesprotocols for identifying, classifying, and handling informationsystems, hardware, and data resources.
- Access Control Structures
Organizesrequirements for managing user permissions, authenticationmechanisms, and restricting data access.
- Cryptography Management
Defines standardsfor encryption, key management, and secure communication of sensitivedata.
- Physical and Environmental Security
Outlinesprotective measures for physical premises, equipment, and supportinginfrastructure.
- Operations Security Processes
Describesprocedures for managing technical operations, monitoring systems, andensuring operational resilience.
Framework Scope
ISO/IEC 27002:2013 is commonly implemented by companies seekingstructured information security management and data protection acrossenterprise systems, cloud solutions, and sensitive informationassets. The framework is typically applied when improvingcybersecurity practices, addressing risk management requirements, andsupporting assurance programs within compliance and regulatoryenvironments.
Framework Objectives
ISO/IEC 27002:2013 provides comprehensive guidance for organizationsto establish effective information security controls and improve riskmanagement.
Enhance cybersecurity risk management through structured selection ofsecurity controls
Safeguard sensitive data and maintain high standards of dataprotection
Strengthen security governance and enable ongoing monitoring ofinformation assets
Support compliance with regulatory and industry requirements forinformation security
Promote operational resilience by mitigating threats and minimizingincidents
Demonstrate audit readiness through clear documentation andcontinuous control improvement ISO/IEC 27002:2013 offers controlguidance complementing ISO/IEC 27001 and is often mapped toframeworks such as NIST SP 800-53 and CIS Controls. Organizations use27002 to select and implement controls for ISO 27001 certification,regulatory compliance, security governance, and operational securityimprovements across IT and privacy programs.
Framework in Context
ISO/IEC 27002:2013offers control guidance complementing ISO/IEC 27001 and is oftenmapped to frameworks such as NIST SP 800-53 and CIS Controls.Organizations use 27002 to select and implement controls for ISO27001 certification, regulatory compliance, security governance, andoperational security improvements across IT and privacy programs.
Common Framework Mappings
Organizations map ISO/IEC 27002 controls to complementary frameworksto streamline governance, demonstrate multi-regime compliance, andharmonize control implementation and auditability.
Mapped frameworks include:
CIS Critical Security Controls
ISO/IEC 27001
ISO/IEC 27003
ISO/IEC 27017
ISO/IEC 27018
ISO/IEC 27701
NIST Cybersecurity Framework
NIST SP 800-53
SOC 2 Cybersecurity
- ClassificationCategoryCybersecurityDomainCybersecurityFramework FamilyISO 27000 Series
- Regulatory ContextTypeStandardLegal InstrumentStandardSectorCross-SectorIndustryCross-Industry
- Region / PublisherRegionGlobalRegion DetailInternationalPublisherInternational Organization for Standardization (ISO)
- VersioningVersion2013Effective Date2013Issue DateJune 2013
- AdoptionAdoption ModelRisk ManagementImplementation ComplexityHigh
- Official ReferenceOpen Link in New TabSource
How SmartSuite Supports ISO 27002
Operationalize ISO 27002 security controls by linking policies, risks, evidence, and control ownership within a centralized security governance platform.
Control Catalog and Implementation Guidance
Organize ISO 27002 control domains with defined owners, procedures, and implementation documentation.
Risk and Asset Linkage
Connect security controls to risks, assets, and mitigation strategies to prioritize security investments.
Evidence Collection and Review Cadence
Capture evidence demonstrating control operation and schedule recurring reviews across security processes.
Exception and Compensating Control Tracking
Document control exceptions, approvals, and compensating safeguards with full traceability.
Cross-Framework Control Mapping
Map ISO 27002 controls to frameworks such as NIST, CIS Controls, and SOC reporting requirements.
Security Governance and Reporting
Generate dashboards showing control coverage, open issues, remediation progress, and overall security posture.
Related frameworks

ISO/IEC 27000 provides foundational concepts and terminology for establishing and operating an information security management system.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27017 provides cloud-specific security controls to help organizations protect data and manage cloud-related risks.

ISO/IEC 27018 provides guidelines for protecting personally identifiable information processed in public cloud services.

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.
Frequently Asked Questions For ISO/IEC 27002:2013 (Code of Practice for Information Security Controls)
ISO/IEC 27002:2013 is used to guide organizations in selecting, implementing, and managing information security controls to protect sensitive data and mitigate security risks. It serves as a detailed reference for best practices in developing an effective information security management system.
ISO/IEC 27002:2013 itself is not certifiable and is not legally mandatory, but it is often used alongside ISO/IEC 27001, which is certifiable. Organizations use ISO/IEC 27002 to inform their control selection and implementation when seeking ISO/IEC 27001 certification.
ISO/IEC 27002:2013 is applicable to organizations of all sizes and sectors that need to manage information security risks. Its scope includes guidance on controls across 14 security domains, making it relevant for organizations seeking to formalize or benchmark their security strategies.
Key concepts within ISO/IEC 27002:2013 include control objectives, security control selection, risk treatment, and continual improvement. Artifacts typically required include documented policies, risk assessments, control implementation records, and evidence of ongoing monitoring.
Implementation involves mapping the controls in ISO/IEC 27002:2013 to identified risks within the organization, developing and enforcing appropriate policies and procedures, and performing regular reviews and updates. Ongoing employee training and technical security measures are required for effective adoption.
ISO/IEC 27002:2013 provides detailed implementation guidance for the controls referenced in ISO/IEC 27001, supporting its ISMS requirements. It can be cross-mapped with other frameworks like NIST CSF or SOC 2 to facilitate integrated compliance strategies.
Ongoing compliance requires continuous monitoring of controls, regular reviews and updates to policies, periodic risk assessments, and documenting evidence of control effectiveness. Periodic internal audits and management reviews help ensure sustained alignment with ISO/IEC 27002:2013 guidance.
SmartSuite supports ISO/IEC 27002:2013 by providing control libraries, configurable risk registers, and automated evidence collection tools, enabling organizations to map controls to risks and track compliance. The platform facilitates audit readiness with policy management modules, real-time dashboards, and reporting features, streamlining control management and compliance tracking across teams.
Manage controls, risks, evidence, and audits in one platform designed for modern governance, risk, and compliance.

