Currently, there are fifty-seven (57) standards, guidelines and other documents in the ISO 27000 Family on information security
The total number is regularly changing with the occasional withdrawal of some standards and the regular addition of others (several drafts of new standards have not been included here). How then is one to know which ones are mandatory and which are guidelines/advisory? The answer to this question has evolved from our research for ISO 27001 courses and can be found below.
The first step towards understanding the ISO 27001 series of standards is to divide them by type. The 8 types and their application are as follows:
These Standards, such as ISO 27001, set out the requirements that must be fulfilled in order to achieve compliance with the Standard. Evidence of such compliance is gathered and recorded by Certification Bodies as the basis of their issuing Certifications of Compliance.
Standards here, such as ISO 27000, define the terms and definitions and explain the concepts associated with Information Security. They are advisory by their nature and do not constitute requirements.
A code of practice is a document that complements a requirements standard so as to provide detailed practical guidance on how to comply with those requirements. While not itself constituting a set of requirements, the Code should be followed unless another solution with the same or better outcome is in place.
For a given topic or situation these provide detailed practical guidance on how to comply with requirements. Again, they do not constitute requirements but do generate an expectation that, if they are applicable to the given circumstances, they will be applied.
For sectors with particular requirements regarding information security, e.g. telecommunications organizations, these provide detailed practical guidance on how to comply with requirements.
They also identify additional vulnerabilities associated with the sector and identify controls to address the threats arising. They do not constitute requirements but do generate an expectation that, if they are applicable to the given circumstances, they will be applied.
For assets with particular vulnerabilities or circumstances regarding information security, e.g. network security and software application security, these guidelines provide detailed practical guidance on how to meet the requirements.
Again, they do not constitute requirements but do generate an expectation that, where applicable, they will be applied.
A technical discussion document on a topic of interest and/or relevance.
A set of requirements that are advisory in nature, i.e. they do not constitute formal requirements.
Standards other than requirements standards offer non-mandatory guidance and establish concepts and definitions that help in establishing and maintaining effective information security systems.
Such documents are used by external auditors to direct their evidence gathering and to provide a logical basis for their findings.
In circumstances where they might have been followed but were not, you can expect auditors to challenge you to demonstrate how by alternative means a corresponding level of control and security is being achieved.
Based on the eight types of standards, we have analyzed all 56 documents. A color-coded legend, shown below, was used in developing the Table of Standards.
While the table is 11 pages long, it can be quickly reviewed to establish a comprehensive list of all the Standards that may apply to your circumstances. Enjoy!
This is a Sample Page: Click the button to download a complete copy of the 11-page Table.
As mentioned above, several new Standards in the series are at the draft stage. We will monitor progress and, as new Standards are added, we will update the table above and advise our Subscribers interested in ISMS and ISO 27001 of these developments.
Note; Originally published in Dec 2019; revised and updated in July 2023.
In
We have chosen ISO 21001 certification because, unlike IRCA and Exemplar badges (which in our opinion are commercially compromised), it is based on independent third-party assessment. It is a ‘university grade’ standard in use globally by schools, colleges, and universities to demonstrate their competence.