ISO/IEC 27002:2013 — Code of Practice for Information Security Controls

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
ISO/IEC27002:2013 is an international code of practice for informationsecurity controls that helps organizations select, implement, andmanage security measures to protect sensitive information and supportrisk management efforts.
Published by theInternational Organization for Standardization (ISO) and theInternational Electrotechnical Commission (IEC), ISO/IEC 27002provides guidance on a broad set of cybersecurity controls coveringareas such as access management, cryptography, physical security,operations security, and incident response. The framework is widelyadopted across various industries by organizations seeking tostrengthen their cybersecurity posture and align with best practicesfor data protection and regulatory compliance.
Organizationstypically use ISO/IEC 27002 to guide the development of internalsecurity controls within their information security managementsystems (ISMS), often alongside ISO/IEC 27001 certification programs.The framework supports risk assessments, control selection, and thecontinuous improvement of security practices to help meet complianceobligations and mitigate evolving cyber threats.
Why it Matters
ISO/IEC27002:2013 provides comprehensive guidance for establishing effectiveinformation security controls to safeguard organizational data andsupport regulatory obligations.
Key benefitsinclude:
• Strengthen information security governance
Enableorganizations to systematically manage and oversee cybersecurityrisks through structured control selection and management processes.
• Enhance compliance readiness
Supportalignment with global regulatory requirements and industry standards,simplifying compliance reporting and external audit processes.
• Improve incident response capabilities
Facilitatetimely identification and effective management of security incidents,reducing potential impact on business operations.
• Support continuous improvement
Encourageongoing assessment and refinement of security practices as threatsevolve and organizational needs change.
• Promote protection of sensitive data
Implement robustmeasures to protect proprietary, personal, and confidentialinformation against unauthorized access, misuse, or disclosure.
How it Works
ISO/IEC27002:2013 organizes information security guidance into a catalog ofsecurity controls grouped across fourteen domains, aligning with theISO 27000 series and supporting an ISMS under ISO/IEC 27001. Itoutlines control objectives and implementation guidance across areassuch as access control, asset management, cryptography, operations,supplier relationships, and incident management, and structuresselection of safeguards around risk management and governancerequirements.
Organizationsapply ISO/IEC 27002:2013 by mapping its controls to their riskassessment and treatment plans, establishing policies, andimplementing technical and procedural security practices. Typicalactivities include control implementation, gap analysis, continuousmonitoring, evidence collection for compliance, periodic audits, andintegration with incident response and business continuity processesto maintain an auditable security posture.
In SmartSuite,teams operationalize ISO/IEC 27002:2013 using control libraries andconfigurable risk registers to link controls to assets and risks,policy governance modules for versioned procedures, automatedevidence collection, compliance tracking, and remediation workflows.Dashboards and reporting support audit readiness, monitoring ofcontrol effectiveness, and coordination of governance and complianceactivities.
Key Elements
• Information Security Policy Domain
Establishesorganizational rules, guidelines, and objectives for managing andsafeguarding information assets.
• Human Resource Security Controls
Describesmeasures addressing personnel responsibilities through all phases ofemployment regarding information security.
• Asset Management Practices
Specifiesprotocols for identifying, classifying, and handling informationsystems, hardware, and data resources.
• Access Control Structures
Organizesrequirements for managing user permissions, authenticationmechanisms, and restricting data access.
• Cryptography Management
Definesstandards for encryption, key management, and secure communication ofsensitive data.
• Physical and Environmental Security
Outlinesprotective measures for physical premises, equipment, and supportinginfrastructure.
• Operations Security Processes
Describesprocedures for managing technical operations, monitoring systems, andensuring operational resilience.
Framework Scope
ISO/IEC27002:2013 is commonly implemented by companies seeking structuredinformation security management and data protection across enterprisesystems, cloud solutions, and sensitive information assets. Theframework is typically applied when improving cybersecuritypractices, addressing risk management requirements, and supportingassurance programs within compliance and regulatory environments.
Framework Objectives
ISO/IEC27002:2013 provides comprehensive guidance for organizations toestablish effective information security controls and improve riskmanagement.
• Enhance cybersecurity risk management through structuredselection of security controls
• Safeguard sensitive data and maintain high standards of dataprotection
• Strengthen security governance and enable ongoing monitoring ofinformation assets
• Support compliance with regulatory and industry requirements forinformation security
• Promote operational resilience by mitigating threats andminimizing incidents
• Demonstrate audit readiness through clear documentation andcontinuous control improvement ISO/IEC 27002:2013 offers controlguidance complementing ISO/IEC 27001 and is often mapped toframeworks such as NIST SP 800-53 and CIS Controls. Organizations use27002 to select and implement controls for ISO 27001 certification,regulatory compliance, security governance, and operational securityimprovements across IT and privacy programs.
Common Framework Mappings
Organizationsmap ISO/IEC 27002 controls to complementary frameworks to streamlinegovernance, demonstrate multi-regime compliance, and harmonizecontrol implementation and auditability.
Mappedframeworks include:
CIS CriticalSecurity Controls
ISO/IEC 27001
ISO/IEC 27003
ISO/IEC 27017
ISO/IEC 27018
ISO/IEC 27701
NISTCybersecurity Framework
NIST SP 800-53
SOC 2Cybersecurity
- ClassicifationCategoryCybersecurityDomainCybersecurityFramework FamilyISO 27000 Series
- Regulatory ContextTypeStandardLegal InstrumentStandardSectorCross-SectorIndustryCross-Industry
- Region / PublisherRegionGlobalRegion DetailInternationalPublisherInternational Organization for Standardization (ISO)
- VersioningVersion2013Effective Date2013Issue DateJune 2013
- AdoptionAdoption ModelRisk ManagementImplementation ComplexityHigh
- Official ReferenceOpen Link in New TabSource
How SmartSuite Supports ISO 27002
Operationalize ISO 27002 security controls by linking policies, risks, evidence, and control ownership within a centralized security governance platform.
Control Catalog and Implementation Guidance
Organize ISO 27002 control domains with defined owners, procedures, and implementation documentation.
Risk and Asset Linkage
Connect security controls to risks, assets, and mitigation strategies to prioritize security investments.
Evidence Collection and Review Cadence
Capture evidence demonstrating control operation and schedule recurring reviews across security processes.
Exception and Compensating Control Tracking
Document control exceptions, approvals, and compensating safeguards with full traceability.
Cross-Framework Control Mapping
Map ISO 27002 controls to frameworks such as NIST, CIS Controls, and SOC reporting requirements.
Security Governance and Reporting
Generate dashboards showing control coverage, open issues, remediation progress, and overall security posture.
Related frameworks

ISO/IEC 27000 provides foundational concepts and terminology for establishing and operating an information security management system.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27017 provides cloud-specific security controls to help organizations protect data and manage cloud-related risks.

ISO/IEC 27018 provides guidelines for protecting personally identifiable information processed in public cloud services.

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.
Frequently Asked Questions For ISO/IEC 27002:2013 (Code of Practice for Information Security Controls)
ISO/IEC 27002:2013 is used to guide organizations in selecting, implementing, and managing information security controls to protect sensitive data and mitigate security risks. It serves as a detailed reference for best practices in developing an effective information security management system.
ISO/IEC 27002:2013 itself is not certifiable and is not legally mandatory, but it is often used alongside ISO/IEC 27001, which is certifiable. Organizations use ISO/IEC 27002 to inform their control selection and implementation when seeking ISO/IEC 27001 certification.
ISO/IEC 27002:2013 is applicable to organizations of all sizes and sectors that need to manage information security risks. Its scope includes guidance on controls across 14 security domains, making it relevant for organizations seeking to formalize or benchmark their security strategies.
Key concepts within ISO/IEC 27002:2013 include control objectives, security control selection, risk treatment, and continual improvement. Artifacts typically required include documented policies, risk assessments, control implementation records, and evidence of ongoing monitoring.
Implementation involves mapping the controls in ISO/IEC 27002:2013 to identified risks within the organization, developing and enforcing appropriate policies and procedures, and performing regular reviews and updates. Ongoing employee training and technical security measures are required for effective adoption.
ISO/IEC 27002:2013 provides detailed implementation guidance for the controls referenced in ISO/IEC 27001, supporting its ISMS requirements. It can be cross-mapped with other frameworks like NIST CSF or SOC 2 to facilitate integrated compliance strategies.
Ongoing compliance requires continuous monitoring of controls, regular reviews and updates to policies, periodic risk assessments, and documenting evidence of control effectiveness. Periodic internal audits and management reviews help ensure sustained alignment with ISO/IEC 27002:2013 guidance.
SmartSuite supports ISO/IEC 27002:2013 by providing control libraries, configurable risk registers, and automated evidence collection tools, enabling organizations to map controls to risks and track compliance. The platform facilitates audit readiness with policy management modules, real-time dashboards, and reporting features, streamlining control management and compliance tracking across teams.
Put CRI Profile into action with SmartSuite
Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

