What it is
A management system standard for information security. It tells you what processes and governance you must have to manage security risk over time.
Key points
- Defines ISMS requirements: governance, risk assessment and treatment, and continual improvement.
- Risk based: controls are selected based on assessed risk and documented in a Statement of Applicability.
- Supports certification, so evidence and repeatable processes matter as much as technical controls.
- Annex A aligns to ISO/IEC 27002, which groups 93 controls across organizational, people, physical, and technological themes.
Concrete example
A technology company uses ISO 27001 to formalize ownership and evidence for security controls. Risk treatment drives investments in identity hardening and backup recovery, while internal audits catch drift in configuration and access reviews.