ISO 27001 Annex A controls: how to choose what’s relevant (and why)

Learn systematic approach to selecting relevant ISO 27001 Annex A controls from 93 options without resource waste.

Selecting the right ISO 27001 Annex A controls can feel overwhelming when you’re staring at 93 different security controls. Many organisations struggle with this critical decision, either implementing too many controls and stretching resources thin, or selecting too few and leaving security gaps. The key lies in understanding that not every control applies to every organisation.

Effective ISO 27001 control selection requires a systematic approach that considers your specific business context, risk profile, and regulatory requirements. This strategic decision directly impacts the effectiveness of your information security management system and your organisation’s ability to maintain ISO 27001 compliance whilst managing resources efficiently.

In this article, we’ll explore how to navigate the 14 control categories, conduct proper relevance assessments, avoid common selection pitfalls, and implement your chosen controls within a robust ISMS framework.

Understanding ISO 27001 Annex A control categories

ISO 27001 Annex A organises its 93 controls into 14 distinct categories, each addressing specific aspects of information security management. These categories range from organisational security policies to supplier relationship security, creating a comprehensive cybersecurity framework.

The categories work in an interconnected way rather than in isolation. For instance, access control measures (A.9) directly relate to human resource security (A.7) and physical security (A.11). Understanding these relationships helps organisations see how their selected controls support each other within their broader information security controls strategy.

Each category serves a specific purpose within your ISMS controls structure. Cryptography controls (A.10) protect data confidentiality, whilst incident management (A.16) ensures proper response procedures. This systematic organisation helps organisations identify which areas require attention based on their specific risk landscape and business operations.

How to conduct an effective control relevance assessment

An effective control relevance assessment begins with thorough risk assessment integration. Your organisation’s risk register should directly inform which ISO 27001 Annex A controls become relevant. Controls that don’t address identified risks or support risk treatment plans typically aren’t applicable.

Business context analysis forms another crucial evaluation criterion. A manufacturing company’s control needs differ significantly from those of a financial services firm. Consider your industry requirements, organisational size, technology infrastructure, and operational processes when evaluating control applicability.

Documentation requirements mandate that organisations justify their control selection decisions. This includes explaining why certain controls were deemed not applicable and how selected controls address specific risks. Granite’s information security management tools support this documentation process, ensuring your justifications meet audit requirements whilst maintaining clear traceability between risks and controls.

Common control selection mistakes organisations make

Over-implementation represents one of the most frequent errors in ISO 27001 control selection. Organisations often assume that implementing more controls equals better security, leading to resource strain and reduced focus on truly critical areas. This approach dilutes security effectiveness rather than strengthening it.

Under-assessment of risks creates the opposite problem. Some organisations dismiss controls too quickly without proper risk evaluation, leaving significant security gaps. This often happens when organisations focus solely on obvious technology risks whilst overlooking human factors or supplier-related vulnerabilities.

Inadequate justification documentation frequently causes compliance issues during audits. Poor control selection impacts both compliance effectiveness and resource allocation, creating unnecessary costs whilst potentially missing critical security requirements that could prevent incidents.

Implementing selected controls within your ISMS framework

Translating control selection decisions into operational security measures requires systematic implementation planning. This involves developing specific policies and procedures for each selected control, assigning responsibilities, and establishing timelines that align with your organisation’s capabilities and priorities.

Resource allocation must consider both initial implementation costs and ongoing maintenance requirements. Security control implementation succeeds when organisations realistically assess their capacity for sustained compliance rather than focusing solely on initial deployment.

Monitoring and measurement requirements ensure your selected controls remain effective over time. Regular reviews help identify when business changes might affect control relevance or when new risks emerge that require additional controls.

Granite’s comprehensive GRC platform transforms how organisations approach ISO 27001 requirements. Our solution eliminates spreadsheet-based compliance management through automated reporting capabilities and structured workflows that support systematic control implementation. Whether you’re conducting initial control selection or managing ongoing compliance, our platform provides the visibility and documentation needed for effective information security management. Book a meeting with our professionals to discover how we can streamline your ISO 27001 compliance journey.

Related Articles