ISO 27001 Controls: A Practical Guide to Compliance in Australia

Blog

First Published:

October 22, 2025

Content Written For:

Small & Medium Businesses

Large Organisations & Infrastructure

Government

Read Similar Articles

ISO 27001 controls are the practical safeguards that underpin an effective information security management system (ISMS). While policies and documentation provide structure, real ISO 27001 compliance in Australia depends on how these controls operate day to day in real-world environments.

These controls demonstrate how organisations protect information assets, manage cyber and operational risk, and maintain governance over time. As a result, ISO 27001 controls sit at the centre of audit outcomes and play a decisive role in achieving, maintaining, and renewing certification.

This practical guide explains how ISO 27001 controls work under the ISO/IEC 27001:2022 standard, how Australian organisations apply them in practice, and what auditors typically expect to see during certification and surveillance assessments.

What are ISO 27001 controls?

ISO/IEC 27001:2022 defines a structured set of information security controls in Annex A. Rather than mandating every control, the standard requires organisations to select and implement controls based on risk.

This risk-based design allows organisations to tailor their ISMS to their size, operating model, and threat landscape, while still meeting internationally recognised security expectations.

The 2022 revision of ISO 27001 includes 93 controls, grouped into four domains:

  • Organisational controls
  • People controls
  • Physical controls
  • Technological controls

Together, these domains provide layered protection and consistent governance across people, process, and technology.

ISO 27001 controls and the path to compliance

ISO 27001 controls connect governance activities directly to certification outcomes. Policies alone are not enough. Auditors assess whether selected controls operate effectively and are supported by evidence.

Compliance requires organisations to demonstrate that controls are:

  • Selected based on documented risk
  • Implemented consistently
  • Monitored and reviewed over time
  • Improved as threats and business conditions change

Certification is granted when auditors confirm that the ISMS, including its controls, meets ISO/IEC 27001 requirements. Without effective implementation and oversight, certification outcomes are difficult to sustain.

Organisational ISO 27001 controls

Organisational controls establish governance, accountability, and management oversight. They define how information security is directed, reviewed, and improved across the organisation.

These controls typically address:

  • Information security policies and objectives
  • Defined roles, responsibilities, and authorities
  • Asset management and classification
  • Risk assessment and risk treatment processes
  • Supplier and third-party security
  • Incident management and reporting
  • Business continuity and resilience
  • Legal, regulatory, and contractual obligations

By design, organisational controls ensure information security is embedded into leadership and operational decision-making rather than treated as a purely technical issue.

What auditors review for organisational controls

Auditors typically expect to see approved and current policies, evidence of management involvement, risk registers, incident records, supplier assessments, and a clearly maintained Statement of Applicability (SoA) explaining why controls are included or excluded.

People ISO 27001 controls

People controls address risks associated with employees, contractors, and third-party personnel. Human behaviour remains one of the most common contributors to security incidents, which is why this control group receives close audit attention.

Typical people-focused controls include:

  • Pre-employment screening and onboarding checks
  • Confidentiality and acceptable use obligations
  • Security awareness and training programs
  • Clearly defined security responsibilities
  • Disciplinary processes for policy breaches
  • Access changes during role transitions
  • Secure remote and hybrid working practices

Many of these controls align closely with Australian guidance such as the ACSC Essential Eight, making them particularly relevant for organisations operating in regulated environments.

Physical ISO 27001 controls

Physical controls protect facilities, equipment, and supporting infrastructure from unauthorised access, damage, or environmental threats.

Common physical safeguards include:

  • Physical access controls and secure areas
  • Visitor management and logging
  • Clear desk and clear screen practices
  • Equipment protection and secure storage
  • Secure disposal or reuse of assets
  • Environmental protections such as power, fire, and temperature controls

Although sometimes underestimated, physical controls are essential for demonstrating end-to-end security governance during audits.

Technological ISO 27001 controls

Technological controls cover the technical safeguards used to protect systems, networks, and data from compromise.

Key areas include:

  • Access control and authentication mechanisms
  • Encryption and key management
  • Secure configuration and patch management
  • Logging, monitoring, and alerting
  • Malware protection and endpoint security
  • Vulnerability management and remediation
  • Backup, recovery, and resilience measures
  • Network security controls
  • Secure software development practices

Auditors expect these controls to be actively managed rather than simply configured. In practice, organisations often support effectiveness through independent assurance activities such as penetration testing and security monitoring.

Selecting ISO 27001 controls using a risk-based approach

ISO 27001 requires organisations to select controls through structured risk assessment rather than applying Annex A as a checklist.

This process typically involves:

  • Identifying information assets
  • Assessing threats and vulnerabilities
  • Evaluating likelihood and business impact
  • Selecting appropriate controls
  • Documenting decisions in the Statement of Applicability

Auditors assess not only whether a control exists, but whether it clearly addresses an identified risk and remains effective over time.

For organisations adopting automated or AI-driven systems, similar risk-based principles now apply under ISO/IEC 42001, allowing governance to align with existing ISO 27001 control frameworks.

Maintaining ISO 27001 controls over time

ISO 27001 controls must operate continuously, not only at audit time. Sustained compliance depends on ongoing oversight and improvement.

Key activities include:

  • Internal audits and control testing
  • Management reviews
  • Monitoring and measurement of control performance
  • Updating controls as risks and business operations change

Many organisations maintain consistency more effectively by embedding oversight through Managed Compliance Services, rather than relying on ad hoc preparation before audits.

In addition, continuous monitoring and response capabilities delivered through Managed Security Services often strengthen control effectiveness and audit confidence.

Common ISO 27001 control implementation issues

During audits, organisations frequently encounter challenges such as:

  • Implementing controls without assessing relevance
  • Failing to assign clear ownership
  • Neglecting ongoing monitoring and review
  • Excluding controls without documented justification
  • Underestimating supplier and third-party risk
  • Treating the ISMS as a documentation exercise rather than an operating system

Most audit findings relate to governance and execution gaps rather than missing technical safeguards.

Final thoughts on ISO 27001 controls

ISO 27001 controls form the foundation of effective information security governance. When selected using a risk-based approach and maintained over time, they support compliance, simplify audits, and enable sustainable certification for Australian organisations.

About CyberPulse

CyberPulse is a security-first compliance partner helping organisations reduce cyber risk, build resilience, and achieve certification with confidence. Founded by former CISOs and security leaders, we combine technical depth with real-world context to deliver measurable outcomes across advisory, managed services, compliance, and threat defence.

Ready to evaluate your ISO 27001 controls?

Book a consultation with a CyberPulse ISO specialist to review your control maturity, identify gaps, and receive tailored recommendations for your certification roadmap.

External Resources