Skip to content

ISO 27001 Controls Mapping for SOC Operations

Map SOC operational processes to ISO/IEC 27001:2022 Annex A controls.

Use this document to demonstrate compliance during audits and identify coverage gaps.


1. Overview

ISO/IEC 27001:2022 is the international standard for Information Security Management Systems (ISMS). This mapping shows how SOC Standard Operating Procedures align with the 93 Annex A controls grouped into 4 themes.

Compliance Score

pie title ISO 27001 Annex A Coverage
    "Fully Covered" : 34
    "Partially Covered" : 18
    "Not SOC Scope" : 41

52 of 93 Annex A controls are directly or partially addressed by SOC operations.


2. Organizational Controls (A.5)

Control Title SOC Coverage SOC Document
A.5.1 Policies for information security ✅ Full Access Control
A.5.2 Information security roles ✅ Full SOC Team Structure
A.5.4 Management responsibilities ✅ Full SOC Metrics & KPIs
A.5.5 Contact with authorities ✅ Full Escalation Matrix
A.5.7 Threat intelligence ✅ Full TI Lifecycle
A.5.8 Information security in project management 🟡 Partial Change Management
A.5.23 Information security for cloud services ✅ Full Cloud Security Monitoring
A.5.24 Incident management planning ✅ Full IR Framework
A.5.25 Assessment and decision on events ✅ Full Severity Matrix, Incident Classification
A.5.26 Response to incidents ✅ Full 50 Playbooks, Tier Runbooks
A.5.27 Learning from incidents ✅ Full Lessons Learned
A.5.28 Collection of evidence ✅ Full Evidence Collection, Forensic Investigation
A.5.29 Information security during disruption ✅ Full Disaster Recovery / BCP
A.5.30 ICT readiness for business continuity 🟡 Partial DR/BCP
A.5.35 Independent review of information security ✅ Full SOC Maturity Assessment, SOC Assessment Checklist
A.5.36 Compliance with policies 🟡 Partial Compliance Gap Analysis
A.5.37 Documented operating procedures ✅ Full This entire repository

3. People Controls (A.6)

Control Title SOC Coverage SOC Document
A.6.1 Screening 🟡 Partial SOC Team Structure (interview guide)
A.6.2 Terms and conditions of employment ⬜ Not SOC scope
A.6.3 Information security awareness & training ✅ Full Training Checklist, Analyst Onboarding
A.6.4 Disciplinary process 🟡 Partial Insider Threat Program
A.6.7 Remote working 🟡 Partial VPN Abuse Playbook

4. Physical Controls (A.7)

Control Title SOC Coverage SOC Document
A.7.9 Security of assets off-premises ✅ Full Lost Device Playbook, Mobile Compromise
A.7.10 Storage media 🟡 Partial USB Removable Media Playbook

5. Technological Controls (A.8)

Control Title SOC Coverage SOC Document
A.8.1 User endpoint devices ✅ Full Malware Playbook, EDR monitoring
A.8.2 Privileged access rights ✅ Full Privilege Escalation PB, Access Control
A.8.3 Information access restriction ✅ Full Access Control
A.8.5 Secure authentication ✅ Full Brute Force PB, MFA Bypass PB
A.8.7 Protection against malware ✅ Full Malware PB, Ransomware PB
A.8.8 Management of technical vulnerabilities ✅ Full Vulnerability Management
A.8.15 Logging ✅ Full Log Source Matrix, Log Source Onboarding
A.8.16 Monitoring activities ✅ Full Network Security Monitoring, Alert Tuning
A.8.17 Clock synchronization 🟡 Partial Log Source Matrix
A.8.20 Network security ✅ Full Network Security Monitoring
A.8.21 Security of network services 🟡 Partial DDoS PB
A.8.22 Segregation of networks 🟡 Partial Lateral Movement PB
A.8.23 Web filtering 🟡 Partial Web Attack PB
A.8.25 Secure development life cycle 🟡 Partial Detection Rule Testing
A.8.26 Application security requirements 🟡 Partial SQL Injection PB, API Abuse PB
A.8.28 Secure coding 🟡 Partial SQL Injection PB

6. Gap Analysis Summary

Areas with Strong Coverage (✅)

  • Incident Management (A.5.24–A.5.28) — Full lifecycle covered by IR Framework + 50 Playbooks
  • Threat Intelligence (A.5.7) — Dedicated TI Lifecycle + TI Feeds Integration
  • Logging & Monitoring (A.8.15–A.8.16) — Log Source Matrix + Network/Cloud Monitoring
  • Vulnerability Management (A.8.8) — Dedicated SOP
  • Business Continuity (A.5.29) — DR/BCP plan

Areas Needing Attention (🟡)

  • A.5.8 Project Management — Add security review checklist for SOC tool deployments
  • A.8.17 Clock Sync — Add NTP configuration guide to Log Source Onboarding
  • A.8.22 Network Segregation — Add network zone documentation

Out of SOC Scope (⬜)

  • Physical security controls (A.7.1–A.7.8) — Facility management responsibility
  • HR controls (A.6.2, A.6.5, A.6.6) — HR department responsibility
  • Cryptography (A.8.24) — Development team responsibility