Cybersecurity
DETAIL

ISO/IEC 27002:2013 — Code of Practice for Information Security Controls

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

arrow_back
arrow_forward

Overview

ISO/IEC 27002:2013 is an international code of practice for information security controls that helps organizations select, implement, and manage security measures to protect sensitive information and support risk management efforts.

Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO/IEC 27002 provides guidance on a broad set of cybersecurity controls covering areas such as access management, cryptography, physical security, operations security, and incident response. The framework is widely adopted across various industries by organizations seeking to strengthen their cybersecurity posture and align with best practices for data protection and regulatory compliance.

Organizations typically use ISO/IEC 27002 to guide the development of internal security controls within their information security management systems (ISMS), often alongside ISO/IEC 27001 certification programs. The framework supports risk assessments, control selection, and the continuous improvement of security practices to help meet compliance obligations and mitigate evolving cyber threats.

Why it Matters

ISO/IEC 27002:2013 provides comprehensive guidance for establishingeffective information security controls to safeguard organizationaldata and support regulatory obligations.

Key benefits include:

  • Strengthen information security governance

Enableorganizations to systematically manage and oversee cybersecurityrisks through structured control selection and management processes.

  • Enhance compliance readiness

Support alignmentwith global regulatory requirements and industry standards,simplifying compliance reporting and external audit processes.

  • Improve incident response capabilities

Facilitate timelyidentification and effective management of security incidents,reducing potential impact on business operations.

  • Support continuous improvement

Encourage ongoingassessment and refinement of security practices as threats evolve andorganizational needs change.

  • Promote protection of sensitive data

Implement robustmeasures to protect proprietary, personal, and confidentialinformation against unauthorized access, misuse, or disclosure.

How it Works

ISO/IEC 27002:2013 organizes information security guidance into acatalog of security controls grouped across fourteen domains,aligning with the ISO 27000 series and supporting an ISMS underISO/IEC 27001. It outlines control objectives and implementationguidance across areas such as access control, asset management,cryptography, operations, supplier relationships, and incidentmanagement, and structures selection of safeguards around riskmanagement and governance requirements.

Organizations apply ISO/IEC 27002:2013 by mapping its controls totheir risk assessment and treatment plans, establishing policies, andimplementing technical and procedural security practices. Typicalactivities include control implementation, gap analysis, continuousmonitoring, evidence collection for compliance, periodic audits, andintegration with incident response and business continuity processesto maintain an auditable security posture.

In SmartSuite, teams operationalize ISO/IEC 27002:2013 using controllibraries and configurable risk registers to link controls to assetsand risks, policy governance modules for versioned procedures,automated evidence collection, compliance tracking, and remediationworkflows. Dashboards and reporting support audit readiness,monitoring of control effectiveness, and coordination of governanceand compliance activities.

Key Elements

  • Information Security Policy Domain

Establishesorganizational rules, guidelines, and objectives for managing andsafeguarding information assets.

  • Human Resource Security Controls

Describesmeasures addressing personnel responsibilities through all phases ofemployment regarding information security.

  • Asset Management Practices

Specifiesprotocols for identifying, classifying, and handling informationsystems, hardware, and data resources.

  • Access Control Structures

Organizesrequirements for managing user permissions, authenticationmechanisms, and restricting data access.

  • Cryptography Management

Defines standardsfor encryption, key management, and secure communication of sensitivedata.

  • Physical and Environmental Security

Outlinesprotective measures for physical premises, equipment, and supportinginfrastructure.

  • Operations Security Processes

Describesprocedures for managing technical operations, monitoring systems, andensuring operational resilience.

Framework Scope

ISO/IEC 27002:2013 is commonly implemented by companies seekingstructured information security management and data protection acrossenterprise systems, cloud solutions, and sensitive informationassets. The framework is typically applied when improvingcybersecurity practices, addressing risk management requirements, andsupporting assurance programs within compliance and regulatoryenvironments.

Framework Objectives

ISO/IEC 27002:2013 provides comprehensive guidance for organizationsto establish effective information security controls and improve riskmanagement.

Enhance cybersecurity risk management through structured selection ofsecurity controls

Safeguard sensitive data and maintain high standards of dataprotection

Strengthen security governance and enable ongoing monitoring ofinformation assets

Support compliance with regulatory and industry requirements forinformation security

Promote operational resilience by mitigating threats and minimizingincidents

Demonstrate audit readiness through clear documentation andcontinuous control improvement ISO/IEC 27002:2013 offers controlguidance complementing ISO/IEC 27001 and is often mapped toframeworks such as NIST SP 800-53 and CIS Controls. Organizations use27002 to select and implement controls for ISO 27001 certification,regulatory compliance, security governance, and operational securityimprovements across IT and privacy programs.

Framework in Context

ISO/IEC 27002:2013offers control guidance complementing ISO/IEC 27001 and is oftenmapped to frameworks such as NIST SP 800-53 and CIS Controls.Organizations use 27002 to select and implement controls for ISO27001 certification, regulatory compliance, security governance, andoperational security improvements across IT and privacy programs.

Common Framework Mappings

Organizations map ISO/IEC 27002 controls to complementary frameworksto streamline governance, demonstrate multi-regime compliance, andharmonize control implementation and auditability.

Mapped frameworks include:

CIS Critical Security Controls

ISO/IEC 27001

ISO/IEC 27003

ISO/IEC 27017

ISO/IEC 27018

ISO/IEC 27701

NIST Cybersecurity Framework

NIST SP 800-53

SOC 2 Cybersecurity

At a Glance
ISO/IEC 27002:2013
  • checklist
    Classification
    Category
    info
    Cybersecurity
    Domain
    info
    Cybersecurity
    Framework Family
    info
    ISO 27000 Series
  • info
    Regulatory Context
    Type
    info
    Standard
    Legal Instrument
    info
    Standard
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    Global
    Region Detail
    info
    International
    Publisher
    info
    International Organization for Standardization (ISO)
  • published_with_changes
    Versioning
    Version
    info
    2013
    Effective Date
    info
    2013
    Issue Date
    info
    June 2013
  • graph_3
    Adoption
    Adoption Model
    info
    Risk Management
    Implementation Complexity
    info
    High
  • captive_portal
    Official Reference
License Information
License included / downloadable: No ISO/IEC 27002:2013 requires purchase via the ISO/IEC standards catalog. License not included with platform
Official Resources
ISO/IEC 27002:2013 Standard
Provides a comprehensive set of guidelines for information security controls.
chevron_forward
ISO/IEC 27001 and ISO/IEC 27002 Overview
Describes the relationship and purpose of key ISO information security standards.
chevron_forward
SMARTSUITE

How SmartSuite Supports ISO 27002

Operationalize ISO 27002 security controls by linking policies, risks, evidence, and control ownership within a centralized security governance platform.

Control Catalog and Implementation Guidance

Organize ISO 27002 control domains with defined owners, procedures, and implementation documentation.

Risk and Asset Linkage

Connect security controls to risks, assets, and mitigation strategies to prioritize security investments.

Evidence Collection and Review Cadence

Capture evidence demonstrating control operation and schedule recurring reviews across security processes.

Exception and Compensating Control Tracking

Document control exceptions, approvals, and compensating safeguards with full traceability.

Cross-Framework Control Mapping

Map ISO 27002 controls to frameworks such as NIST, CIS Controls, and SOC reporting requirements.

Security Governance and Reporting

Generate dashboards showing control coverage, open issues, remediation progress, and overall security posture.

Related frameworks

ISO 27000

ISO/IEC 27000 provides foundational concepts and terminology for establishing and operating an information security management system.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27017

ISO/IEC 27017 provides cloud-specific security controls to help organizations protect data and manage cloud-related risks.

Learn More
arrow_forward
ISO 27018

ISO/IEC 27018 provides guidelines for protecting personally identifiable information processed in public cloud services.

Learn More
arrow_forward
ISO 27701

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For ISO/IEC 27002:2013 (Code of Practice for Information Security Controls)

What is ISO/IEC 27002:2013 used for?

ISO/IEC 27002:2013 is used to guide organizations in selecting, implementing, and managing information security controls to protect sensitive data and mitigate security risks. It serves as a detailed reference for best practices in developing an effective information security management system.

Is ISO/IEC 27002:2013 certifiable or mandatory?

ISO/IEC 27002:2013 itself is not certifiable and is not legally mandatory, but it is often used alongside ISO/IEC 27001, which is certifiable. Organizations use ISO/IEC 27002 to inform their control selection and implementation when seeking ISO/IEC 27001 certification.

Who should use ISO/IEC 27002:2013, and what is its scope?

ISO/IEC 27002:2013 is applicable to organizations of all sizes and sectors that need to manage information security risks. Its scope includes guidance on controls across 14 security domains, making it relevant for organizations seeking to formalize or benchmark their security strategies.

What are the key concepts and artifacts required by ISO/IEC 27002:2013?

Key concepts within ISO/IEC 27002:2013 include control objectives, security control selection, risk treatment, and continual improvement. Artifacts typically required include documented policies, risk assessments, control implementation records, and evidence of ongoing monitoring.

How should organizations implement ISO/IEC 27002:2013?

Implementation involves mapping the controls in ISO/IEC 27002:2013 to identified risks within the organization, developing and enforcing appropriate policies and procedures, and performing regular reviews and updates. Ongoing employee training and technical security measures are required for effective adoption.

How does ISO/IEC 27002:2013 relate to ISO/IEC 27001 and other security frameworks?

ISO/IEC 27002:2013 provides detailed implementation guidance for the controls referenced in ISO/IEC 27001, supporting its ISMS requirements. It can be cross-mapped with other frameworks like NIST CSF or SOC 2 to facilitate integrated compliance strategies.

What are the ongoing compliance requirements for ISO/IEC 27002:2013?

Ongoing compliance requires continuous monitoring of controls, regular reviews and updates to policies, periodic risk assessments, and documenting evidence of control effectiveness. Periodic internal audits and management reviews help ensure sustained alignment with ISO/IEC 27002:2013 guidance.

How would SmartSuite support ISO/IEC 27002:2013?

SmartSuite supports ISO/IEC 27002:2013 by providing control libraries, configurable risk registers, and automated evidence collection tools, enabling organizations to map controls to risks and track compliance. The platform facilitates audit readiness with policy management modules, real-time dashboards, and reporting features, streamlining control management and compliance tracking across teams.

Operationalize ISO 27002:2013 with Connected Workflows

Manage controls, risks, evidence, and audits in one platform designed for modern governance, risk, and compliance.

Schedule a Demo
chevron_forward
Demo Library
chevron_forward