Claude-Skills information-security-manager-iso27001

install
source · Clone the upstream repo
git clone https://github.com/borghei/Claude-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/borghei/Claude-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/ra-qm-team/information-security-manager-iso27001" ~/.claude/skills/borghei-claude-skills-information-security-manager-iso27001 && rm -rf "$T"
manifest: ra-qm-team/information-security-manager-iso27001/SKILL.md
source content

Information Security Manager - ISO 27001

Implement and manage Information Security Management Systems (ISMS) aligned with ISO 27001:2022 and healthcare regulatory requirements.


Table of Contents


Trigger Phrases

Use this skill when you hear:

  • "implement ISO 27001"
  • "ISMS implementation"
  • "security risk assessment"
  • "information security policy"
  • "ISO 27001 certification"
  • "security controls implementation"
  • "incident response plan"
  • "healthcare data security"
  • "medical device cybersecurity"
  • "security compliance audit"

Quick Start

Run Security Risk Assessment

python scripts/risk_assessment.py --scope "patient-data-system" --output risk_register.json

Check Compliance Status

python scripts/compliance_checker.py --standard iso27001 --controls-file controls.csv

Generate Gap Analysis Report

python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output gaps.md

Tools

risk_assessment.py

Automated security risk assessment following ISO 27001 Clause 6.1.2 methodology.

Usage:

# Full risk assessment
python scripts/risk_assessment.py --scope "cloud-infrastructure" --output risks.json

# Healthcare-specific assessment
python scripts/risk_assessment.py --scope "ehr-system" --template healthcare --output risks.json

# Quick asset-based assessment
python scripts/risk_assessment.py --assets assets.csv --output risks.json

Parameters:

ParameterRequiredDescription
--scope
YesSystem or area to assess
--template
NoAssessment template:
general
,
healthcare
,
cloud
--assets
NoCSV file with asset inventory
--output
NoOutput file (default: stdout)
--format
NoOutput format:
json
,
csv
,
markdown

Output:

  • Asset inventory with classification
  • Threat and vulnerability mapping
  • Risk scores (likelihood × impact)
  • Treatment recommendations
  • Residual risk calculations

compliance_checker.py

Verify ISO 27001/27002 control implementation status.

Usage:

# Check all ISO 27001 controls
python scripts/compliance_checker.py --standard iso27001

# Gap analysis with recommendations
python scripts/compliance_checker.py --standard iso27001 --gap-analysis

# Check specific control domains
python scripts/compliance_checker.py --standard iso27001 --domains "access-control,cryptography"

# Export compliance report
python scripts/compliance_checker.py --standard iso27001 --output compliance_report.md

Parameters:

ParameterRequiredDescription
--standard
YesStandard to check:
iso27001
,
iso27002
,
hipaa
--controls-file
NoCSV with current control status
--gap-analysis
NoInclude remediation recommendations
--domains
NoSpecific control domains to check
--output
NoOutput file path

Output:

  • Control implementation status
  • Compliance percentage by domain
  • Gap analysis with priorities
  • Remediation recommendations

Workflows

Workflow 1: ISMS Implementation

Step 1: Define Scope and Context

Document organizational context and ISMS boundaries:

  • Identify interested parties and requirements
  • Define ISMS scope and boundaries
  • Document internal/external issues

Validation: Scope statement reviewed and approved by management.

Step 2: Conduct Risk Assessment

python scripts/risk_assessment.py --scope "full-organization" --template general --output initial_risks.json
  • Identify information assets
  • Assess threats and vulnerabilities
  • Calculate risk levels
  • Determine risk treatment options

Validation: Risk register contains all critical assets with assigned owners.

Step 3: Select and Implement Controls

Map risks to ISO 27002 controls:

python scripts/compliance_checker.py --standard iso27002 --gap-analysis --output control_gaps.md

Control categories:

  • Organizational (policies, roles, responsibilities)
  • People (screening, awareness, training)
  • Physical (perimeters, equipment, media)
  • Technological (access, crypto, network, application)

Validation: Statement of Applicability (SoA) documents all controls with justification.

Step 4: Establish Monitoring

Define security metrics:

  • Incident count and severity trends
  • Control effectiveness scores
  • Training completion rates
  • Audit findings closure rate

Validation: Dashboard shows real-time compliance status.

Workflow 2: Security Risk Assessment

Step 1: Asset Identification

Create asset inventory:

Asset TypeExamplesClassification
InformationPatient records, source codeConfidential
SoftwareEHR system, APIsCritical
HardwareServers, medical devicesHigh
ServicesCloud hosting, backupHigh
PeopleAdmin accounts, developersVaries

Validation: All assets have assigned owners and classifications.

Step 2: Threat Analysis

Identify threats per asset category:

AssetThreatsLikelihood
Patient dataUnauthorized access, breachHigh
Medical devicesMalware, tamperingMedium
Cloud servicesMisconfiguration, outageMedium
CredentialsPhishing, brute forceHigh

Validation: Threat model covers top-10 industry threats.

Step 3: Vulnerability Assessment

python scripts/risk_assessment.py --scope "network-infrastructure" --output vuln_risks.json

Document vulnerabilities:

  • Technical (unpatched systems, weak configs)
  • Process (missing procedures, gaps)
  • People (lack of training, insider risk)

Validation: Vulnerability scan results mapped to risk register.

Step 4: Risk Evaluation and Treatment

Calculate risk:

Risk = Likelihood × Impact

Risk LevelScoreTreatment
Critical20-25Immediate action required
High15-19Treatment plan within 30 days
Medium10-14Treatment plan within 90 days
Low5-9Accept or monitor
Minimal1-4Accept

Validation: All high/critical risks have approved treatment plans.

Workflow 3: Incident Response

Step 1: Detection and Reporting

Incident categories:

  • Security breach (unauthorized access)
  • Malware infection
  • Data leakage
  • System compromise
  • Policy violation

Validation: Incident logged within 15 minutes of detection.

Step 2: Triage and Classification

SeverityCriteriaResponse Time
CriticalData breach, system downImmediate
HighActive threat, significant risk1 hour
MediumContained threat, limited impact4 hours
LowMinor violation, no impact24 hours

Validation: Severity assigned and escalation triggered if needed.

Step 3: Containment and Eradication

Immediate actions:

  1. Isolate affected systems
  2. Preserve evidence
  3. Block threat vectors
  4. Remove malicious artifacts

Validation: Containment confirmed, no ongoing compromise.

Step 4: Recovery and Lessons Learned

Post-incident activities:

  1. Restore systems from clean backups
  2. Verify integrity before reconnection
  3. Document timeline and actions
  4. Conduct post-incident review
  5. Update controls and procedures

Validation: Post-incident report completed within 5 business days.


Reference Guides

When to Use Each Reference

references/iso27001-controls.md

  • Control selection for SoA
  • Implementation guidance
  • Evidence requirements
  • Audit preparation

references/risk-assessment-guide.md

  • Risk methodology selection
  • Asset classification criteria
  • Threat modeling approaches
  • Risk calculation methods

references/incident-response.md

  • Response procedures
  • Escalation matrices
  • Communication templates
  • Recovery checklists

Validation Checkpoints

ISMS Implementation Validation

PhaseCheckpointEvidence Required
ScopeScope approvedSigned scope document
RiskRegister completeRisk register with owners
ControlsSoA approvedStatement of Applicability
OperationMetrics activeDashboard screenshots
AuditInternal audit doneAudit report

Certification Readiness

Before Stage 1 audit:

  • ISMS scope documented and approved
  • Information security policy published
  • Risk assessment completed
  • Statement of Applicability finalized
  • Internal audit conducted
  • Management review completed
  • Nonconformities addressed

Before Stage 2 audit:

  • Controls implemented and operational
  • Evidence of effectiveness available
  • Staff trained and aware
  • Incidents logged and managed
  • Metrics collected for 3+ months

Compliance Verification

Run periodic checks:

# Monthly compliance check
python scripts/compliance_checker.py --standard iso27001 --output monthly_$(date +%Y%m).md

# Quarterly gap analysis
python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output quarterly_gaps.md

Worked Example: Healthcare Risk Assessment

Scenario: Assess security risks for a patient data management system.

Step 1: Define Assets

python scripts/risk_assessment.py --scope "patient-data-system" --template healthcare

Asset inventory output:

Asset IDAssetTypeOwnerClassification
A001Patient databaseInformationDBA TeamConfidential
A002EHR applicationSoftwareApp TeamCritical
A003Database serverHardwareInfra TeamHigh
A004Admin credentialsAccessSecurityCritical

Step 2: Identify Risks

Risk register output:

Risk IDAssetThreatVulnerabilityLIScore
R001A001Data breachWeak encryption3515
R002A002SQL injectionInput validation4416
R003A004Credential theftNo MFA4520

Step 3: Determine Treatment

RiskTreatmentControlTimeline
R001MitigateImplement AES-256 encryption30 days
R002MitigateAdd input validation, WAF14 days
R003MitigateEnforce MFA for all admins7 days

Step 4: Verify Implementation

python scripts/compliance_checker.py --controls-file implemented_controls.csv

Verification output:

Control Implementation Status
=============================
Cryptography (A.8.24): IMPLEMENTED
  - AES-256 at rest: YES
  - TLS 1.3 in transit: YES

Access Control (A.8.5): IMPLEMENTED
  - MFA enabled: YES
  - Admin accounts: 100% coverage

Application Security (A.8.26): PARTIAL
  - Input validation: YES
  - WAF deployed: PENDING

Overall Compliance: 87%

ISO 27001:2022 Annex A Controls — Complete Reference

The 2022 revision restructured controls from 14 domains (114 controls) to 4 themes (93 controls). All organizations must update their Statement of Applicability (SoA) accordingly.

Theme 1: Organizational Controls (37 controls)

ControlTitlePriority
A.5.1Policies for information securityHigh
A.5.2Information security roles and responsibilitiesHigh
A.5.3Segregation of dutiesHigh
A.5.4Management responsibilitiesMedium
A.5.5Contact with authoritiesMedium
A.5.6Contact with special interest groupsLow
A.5.7Threat intelligenceHigh
A.5.8Information security in project managementMedium
A.5.9Inventory of information and other associated assetsHigh
A.5.10Acceptable use of information and other associated assetsMedium
A.5.11Return of assetsLow
A.5.12Classification of informationHigh
A.5.13Labelling of informationMedium
A.5.14Information transferHigh
A.5.15Access controlHigh
A.5.16Identity managementHigh
A.5.17Authentication informationHigh
A.5.18Access rightsHigh
A.5.19Information security in supplier relationshipsHigh
A.5.20Addressing information security within supplier agreementsHigh
A.5.21Managing information security in the ICT supply chainHigh
A.5.22Monitoring, review and change management of supplier servicesMedium
A.5.23Information security for use of cloud servicesHigh
A.5.24Information security incident management planning and preparationHigh
A.5.25Assessment and decision on information security eventsMedium
A.5.26Response to information security incidentsHigh
A.5.27Learning from information security incidentsMedium
A.5.28Collection of evidenceMedium
A.5.29Information security during disruptionHigh
A.5.30ICT readiness for business continuityHigh
A.5.31Legal, statutory, regulatory and contractual requirementsHigh
A.5.32Intellectual property rightsMedium
A.5.33Protection of recordsMedium
A.5.34Privacy and protection of PIIHigh
A.5.35Independent review of information securityMedium
A.5.36Compliance with policies, rules and standards for information securityMedium
A.5.37Documented operating proceduresMedium

Theme 2: People Controls (8 controls)

ControlTitlePriority
A.6.1ScreeningHigh
A.6.2Terms and conditions of employmentHigh
A.6.3Information security awareness, education and trainingHigh
A.6.4Disciplinary processMedium
A.6.5Responsibilities after termination or change of employmentMedium
A.6.6Confidentiality or non-disclosure agreementsHigh
A.6.7Remote workingHigh
A.6.8Information security event reportingHigh

Theme 3: Physical Controls (14 controls)

ControlTitlePriority
A.7.1Physical security perimetersHigh
A.7.2Physical entryHigh
A.7.3Securing offices, rooms and facilitiesMedium
A.7.4Physical security monitoringMedium
A.7.5Protecting against physical and environmental threatsMedium
A.7.6Working in secure areasMedium
A.7.7Clear desk and clear screenMedium
A.7.8Equipment siting and protectionMedium
A.7.9Security of assets off-premisesMedium
A.7.10Storage mediaHigh
A.7.11Supporting utilitiesMedium
A.7.12Cabling securityLow
A.7.13Equipment maintenanceMedium
A.7.14Secure disposal or re-use of equipmentHigh

Theme 4: Technological Controls (34 controls)

ControlTitlePriority
A.8.1User endpoint devicesHigh
A.8.2Privileged access rightsHigh
A.8.3Information access restrictionHigh
A.8.4Access to source codeMedium
A.8.5Secure authenticationHigh
A.8.6Capacity managementMedium
A.8.7Protection against malwareHigh
A.8.8Management of technical vulnerabilitiesHigh
A.8.9Configuration managementHigh
A.8.10Information deletionMedium
A.8.11Data maskingMedium
A.8.12Data leakage preventionHigh
A.8.13Information backupHigh
A.8.14Redundancy of information processing facilitiesMedium
A.8.15LoggingHigh
A.8.16Monitoring activitiesHigh
A.8.17Clock synchronizationLow
A.8.18Use of privileged utility programsMedium
A.8.19Installation of software on operational systemsMedium
A.8.20Networks securityHigh
A.8.21Security of network servicesHigh
A.8.22Segregation of networksHigh
A.8.23Web filteringMedium
A.8.24Use of cryptographyHigh
A.8.25Secure development life cycleHigh
A.8.26Application security requirementsHigh
A.8.27Secure system architecture and engineering principlesHigh
A.8.28Secure codingHigh
A.8.29Security testing in development and acceptanceHigh
A.8.30Outsourced developmentMedium
A.8.31Separation of development, test and production environmentsHigh
A.8.32Change managementHigh
A.8.33Test informationMedium
A.8.34Protection of information systems during audit testingLow

New Controls in ISO 27001:2022

11 controls are entirely new in the 2022 revision:

ControlTitleWhy It Was Added
A.5.7Threat intelligenceProactive threat awareness
A.5.23Information security for use of cloud servicesCloud adoption governance
A.5.30ICT readiness for business continuityIT-specific continuity planning
A.7.4Physical security monitoringEnhanced surveillance requirements
A.8.9Configuration managementBaseline security configurations
A.8.10Information deletionData lifecycle and privacy
A.8.11Data maskingPrivacy-preserving techniques
A.8.12Data leakage preventionDLP as explicit requirement
A.8.16Monitoring activitiesActive security monitoring
A.8.23Web filteringWeb-based threat mitigation
A.8.28Secure codingDevelopment security practices

Cross-Reference: SOC 2 Control Mapping

Map ISO 27001:2022 controls to SOC 2 Trust Services Criteria for organizations requiring both certifications:

SOC 2 Trust CriteriaISO 27001:2022 ControlsNotes
CC1 — Control EnvironmentA.5.1, A.5.2, A.5.4, A.6.2Governance and organizational structure
CC2 — Communication and InformationA.5.14, A.6.3, A.6.8, A.5.37Internal/external communication
CC3 — Risk AssessmentA.5.7, Clause 6.1.2 (risk assessment)Threat identification and analysis
CC4 — Monitoring ActivitiesA.8.15, A.8.16, A.5.35, A.5.36Logging, monitoring, compliance
CC5 — Control ActivitiesA.5.15-A.5.18, A.8.1-A.8.5Access control and authentication
CC6 — Logical and Physical AccessA.5.15, A.7.1, A.7.2, A.8.2, A.8.3Access management
CC7 — System OperationsA.8.7, A.8.8, A.8.9, A.8.32Change management, malware, vulnerability management
CC8 — Change ManagementA.8.25, A.8.32, A.8.31SDLC, change control, environment separation
CC9 — Risk MitigationA.5.19-A.5.22, A.8.30Vendor/supplier risk management
AvailabilityA.5.29, A.5.30, A.8.6, A.8.14Business continuity, capacity, redundancy
ConfidentialityA.5.12, A.5.13, A.8.11, A.8.12, A.8.24Classification, DLP, encryption
Processing IntegrityA.8.25-A.8.29, A.8.33Secure development, testing
PrivacyA.5.34, A.8.10, A.8.11PII protection, deletion, masking

See also:

../soc2-compliance-specialist/SKILL.md
for full SOC 2 compliance workflows.


Cross-Reference: NIS2 Directive Alignment

The NIS2 Directive (EU 2022/2555) mandates cybersecurity measures for essential and important entities, including healthcare organizations. ISO 27001 provides a strong foundation for NIS2 compliance:

NIS2 Requirement (Art. 21)ISO 27001:2022 ControlsGap Analysis
(a) Risk analysis and IS policiesClause 6.1.2, A.5.1Fully covered
(b) Incident handlingA.5.24-A.5.28Add NIS2 reporting timelines (24h/72h)
(c) Business continuity and crisis managementA.5.29, A.5.30Add crisis management procedures
(d) Supply chain securityA.5.19-A.5.22Strengthen ICT supply chain assessment
(e) Security in network and IS acquisitionA.8.25-A.8.29Add vulnerability handling and disclosure
(f) Policies for assessing cybersecurity effectivenessA.5.35, A.5.36Add metrics-based effectiveness measurement
(g) Basic cyber hygiene and trainingA.6.3, A.6.8Covered
(h) Policies on use of cryptography and encryptionA.8.24Covered
(i) Human resources security and access controlA.5.15-A.5.18, A.6.1-A.6.8Covered
(j) Multi-factor authentication and secure communicationsA.8.5, A.8.20-A.8.22Ensure MFA enforced for all critical systems

NIS2-specific additions beyond ISO 27001:

  • Incident reporting: 24-hour early warning to CSIRT, 72-hour incident notification, 1-month final report
  • Management accountability: Senior management must approve cybersecurity measures and undergo training
  • Penalties: Up to EUR 10M or 2% of global turnover for essential entities
  • Supply chain: Must assess each direct supplier's cybersecurity practices

See also:

../nis2-compliance-specialist/SKILL.md
for complete NIS2 implementation workflows.


Cloud Security Controls

AWS-Specific Controls

ISO 27001 ControlAWS ImplementationService
A.5.23 Cloud servicesAWS Organizations, SCPsAWS Organizations
A.8.2 Privileged accessIAM roles, permission boundariesAWS IAM
A.8.3 Access restrictionResource policies, VPC endpointsIAM, VPC
A.8.5 Secure authenticationIAM Identity Center, MFAIAM
A.8.9 Configuration managementAWS Config rules, conformance packsAWS Config
A.8.12 Data leakage preventionMacie, S3 Block Public AccessMacie
A.8.13 Information backupAWS Backup, cross-region replicationAWS Backup
A.8.15 LoggingCloudTrail, CloudWatch LogsCloudTrail
A.8.16 MonitoringGuardDuty, Security HubGuardDuty
A.8.20 Network securitySecurity Groups, NACLs, WAFVPC, WAF
A.8.22 Network segregationVPC subnets, Transit GatewayVPC
A.8.24 CryptographyKMS, CloudHSM, ACMKMS

Azure-Specific Controls

ISO 27001 ControlAzure ImplementationService
A.5.23 Cloud servicesManagement Groups, Azure PolicyAzure Policy
A.8.2 Privileged accessPIM, RBAC, Conditional AccessEntra ID
A.8.5 Secure authenticationEntra ID MFA, passwordlessEntra ID
A.8.9 Configuration managementAzure Policy, BlueprintsAzure Policy
A.8.12 Data leakage preventionMicrosoft Purview DLPPurview
A.8.15 LoggingAzure Monitor, Log AnalyticsMonitor
A.8.16 MonitoringMicrosoft Defender for CloudDefender
A.8.20 Network securityNSGs, Azure Firewall, Front Door WAFNetwork
A.8.24 CryptographyAzure Key Vault, Managed HSMKey Vault

GCP-Specific Controls

ISO 27001 ControlGCP ImplementationService
A.5.23 Cloud servicesOrganization policies, Resource ManagerResource Manager
A.8.2 Privileged accessIAM, Workload IdentityCloud IAM
A.8.5 Secure authenticationIdentity Platform, 2-Step VerificationIdentity
A.8.9 Configuration managementSecurity Health Analytics, Assured WorkloadsSCC
A.8.12 Data leakage preventionCloud DLP (Sensitive Data Protection)DLP
A.8.15 LoggingCloud Audit Logs, Cloud LoggingLogging
A.8.16 MonitoringSecurity Command Center, Chronicle SIEMSCC
A.8.20 Network securityVPC firewall rules, Cloud ArmorVPC, Cloud Armor
A.8.24 CryptographyCloud KMS, Cloud HSM, CMEKCloud KMS

Zero Trust Architecture Integration

Align ISO 27001 controls with Zero Trust principles (NIST SP 800-207):

Zero Trust Pillars Mapped to ISO 27001

Zero Trust PillarPrincipleISO 27001 ControlsImplementation
IdentityVerify explicitlyA.5.16, A.5.17, A.8.5MFA everywhere, continuous authentication, identity governance
DevicesValidate device healthA.8.1, A.8.7, A.8.9Endpoint detection and response (EDR), device compliance checks
NetworksSegment and encryptA.8.20-A.8.22, A.8.24Microsegmentation, mTLS, encrypted tunnels
ApplicationsSecure by designA.8.25-A.8.29SAST/DAST, runtime protection, API security
DataClassify and protectA.5.12, A.5.13, A.8.11, A.8.12Data classification, DLP, rights management
VisibilityMonitor and analyzeA.8.15, A.8.16, A.5.7SIEM/SOAR, threat intelligence, behavioral analytics

Zero Trust Implementation Roadmap

Phase 1: Foundation (0-6 months)
├── Implement identity provider with MFA for all users
├── Deploy EDR on all endpoints
├── Enable centralized logging and SIEM
└── Classify critical data assets

Phase 2: Enhancement (6-12 months)
├── Implement network microsegmentation
├── Deploy conditional access policies
├── Enable continuous device compliance monitoring
└── Implement DLP for classified data

Phase 3: Maturation (12-18 months)
├── Deploy zero-trust network access (ZTNA) replacing VPN
├── Implement just-in-time (JIT) privileged access
├── Enable automated threat response (SOAR)
└── Continuous verification with behavioral analytics

Hardware Security Key Requirements

FIDO2/WebAuthn Implementation

For high-assurance authentication per A.5.17 and A.8.5:

RequirementSpecificationPriority
Admin accountsHardware security key (YubiKey 5, Titan) mandatoryCritical
Developer accountsHardware key or platform authenticatorHigh
All employeesHardware key recommended; MFA minimumMedium
Service accountsCertificate-based or workload identityHigh

Supported standards:

  • FIDO2 / WebAuthn (passwordless primary authentication)
  • FIDO U2F (second-factor authentication)
  • PIV/Smart Card (legacy enterprise systems)
  • TOTP (fallback only — hardware keys preferred)

Deployment checklist:

  • Procure minimum 2 hardware keys per critical user (primary + backup)
  • Register keys with identity provider (Entra ID, Okta, Google Workspace)
  • Enforce phishing-resistant MFA policy for privileged access
  • Disable SMS/voice MFA for admin accounts
  • Document key recovery procedures
  • Test break-glass procedures with backup keys

Supply Chain Security Controls

ICT Supply Chain Risk Management (A.5.19-A.5.22)

Control AreaRequirementsEvidence
Supplier assessmentSecurity questionnaire + evidence reviewCompleted assessment scorecard
Contractual requirementsSecurity clauses in all vendor agreementsSigned agreements with security schedule
Software supply chainSBOM requirements, dependency scanningSBOM in CycloneDX/SPDX format
Continuous monitoringMonitor supplier security posture changesQuarterly supplier security reviews
Incident notificationRequire supplier breach notification within 24 hoursContractual clause + test exercises

Software Bill of Materials (SBOM) Requirements

ElementDescriptionStandard
Component inventoryAll direct and transitive dependenciesCycloneDX or SPDX
Vulnerability trackingMap components to known CVEsOSV, NVD integration
License complianceTrack all open-source licensesSPDX license identifiers
Update cadenceRegenerate SBOM on every releaseCI/CD integration
SharingProvide SBOM to customers on requestMachine-readable format

Third-Party Risk Tiers

TierAccess LevelAssessment FrequencyAssessment Depth
CriticalProcesses/stores sensitive data, system accessAnnual on-site + continuous monitoringFull security audit, penetration test review
HighAccess to internal systems or non-sensitive dataAnnual questionnaire + evidenceSecurity questionnaire + SOC 2 report review
MediumLimited access, SaaS toolsBiennial questionnaireSecurity questionnaire
LowNo data access, no system accessOn onboardingBasic due diligence

Cross-Framework Mapping Table

Requirement AreaISO 27001:2022SOC 2 TSCNIST CSF 2.0NIS2 (Art. 21)
GovernanceA.5.1-A.5.4CC1.1-CC1.5GV.OC, GV.RMArt. 20
Risk managementClause 6.1.2, A.5.7CC3.1-CC3.4ID.RAArt. 21(2)(a)
Access controlA.5.15-A.5.18, A.8.2-A.8.5CC6.1-CC6.8PR.AAArt. 21(2)(i)
Incident managementA.5.24-A.5.28CC7.3-CC7.5RS.MA, RS.ANArt. 21(2)(b), Art. 23
Business continuityA.5.29-A.5.30A1.1-A1.3RC.RPArt. 21(2)(c)
Supply chainA.5.19-A.5.22CC9.1-CC9.2GV.SCArt. 21(2)(d)
CryptographyA.8.24CC6.1, CC6.7PR.DSArt. 21(2)(h)
Network securityA.8.20-A.8.22CC6.6PR.IRArt. 21(2)(e)
Vulnerability managementA.8.8CC7.1ID.RA-01Art. 21(2)(e)
Awareness and trainingA.6.3CC1.4PR.ATArt. 21(2)(g)
Logging and monitoringA.8.15-A.8.16CC7.2DE.CM, DE.AEArt. 21(2)(f)
Data protectionA.5.34, A.8.10-A.8.12P1-P8PR.DSArt. 21(2)(e)
Secure developmentA.8.25-A.8.29CC8.1PR.DSArt. 21(2)(e)
Asset managementA.5.9-A.5.11CC6.1ID.AMArt. 21(2)(a)

Cross-references: See

../gdpr-dsgvo-expert/SKILL.md
for GDPR privacy controls mapping, and
../risk-management-specialist/SKILL.md
for ISO 14971 risk management integration with ISO 27001.


ISO 27001:2022 Enhanced Controls & Cross-Framework Integration

Annex A Control Themes (93 Controls)

ThemeControlsKey Areas
Organizational (37)A.5.1-A.5.37Policies, roles, threat intelligence, asset management, access, supplier security
People (8)A.6.1-A.6.8Screening, T&C, awareness, disciplinary, termination, remote work, reporting
Physical (14)A.7.1-A.7.14Perimeters, entry, offices, monitoring, utilities, cabling, equipment, storage media
Technological (34)A.8.1-A.8.34Endpoints, access, authentication, code, config, data, backup, logging, networks, web

Hardware Security Key Requirements

  • YubiKey 5 Series: Required for admin accounts, cloud console access, VPN, code signing
  • FIDO2/WebAuthn: Phishing-resistant MFA for all users within 90 days of ISMS deployment
  • Policy: SMS/voice MFA PROHIBITED (SIM swapping risk). TOTP acceptable as interim for non-admin
  • Backup Keys: Minimum 2 hardware keys per user (primary + backup stored securely)
  • Recovery: Manager approval + identity verification required for key replacement

Zero Trust Architecture Integration

  • Never Trust, Always Verify: All access decisions based on identity, device, and context
  • Microsegmentation: Network segmentation at workload level, not just network perimeter
  • Least Privilege: Just-in-time access, time-bounded permissions, automated deprovisioning
  • Continuous Verification: Session-level authentication, device health checks, behavioral analytics

Cross-Framework Mapping (ISO 27001 ↔ SOC 2 ↔ NIST CSF ↔ NIS2)

ISO 27001SOC 2 TSCNIST CSF 2.0NIS2 Art.21
A.5.1 PoliciesCC1.1GV.POArt.21.2.a
A.5.23 Cloud securityCC6.7PR.DSArt.21.2.e
A.5.24 Incident mgmtCC7.4RS.MAArt.21.2.b
A.6.3 AwarenessCC1.4PR.ATArt.21.2.g
A.8.5 AuthenticationCC6.1PR.AAArt.21.2.j
A.8.9 Config mgmtCC8.1PR.PSArt.21.2.e
A.8.15 LoggingCC7.2DE.CMArt.21.2.b
A.8.24 CryptographyCC6.7PR.DSArt.21.2.h

Supply Chain Security Controls

  • Supplier Risk Assessment: Due diligence before onboarding, annual reassessment
  • Contractual Security Clauses: Data protection, incident reporting, audit rights, exit terms
  • Continuous Monitoring: Vendor security ratings, certificate expiry alerts, breach notifications
  • SBOM Requirements: Software Bill of Materials for all third-party software components

Troubleshooting

ProblemPossible CauseResolution
Compliance checker shows low score despite documented policiesControls documented but not implemented or operating effectively; evidence of operation missingFocus on evidence of control operation (logs, reports, screenshots) rather than just policy documents; run
compliance_checker.py --gap-analysis
to identify implementation gaps
Risk assessment generates excessive number of high/critical risksAsset classification overly conservative or threat likelihood ratings not calibrated to organization contextCalibrate likelihood and impact scales to actual organizational experience; review threat catalog against industry benchmarks; use
--template healthcare
or
--template cloud
for context-appropriate threat catalogs
Stage 1 audit identifies significant documentation gapsISMS documentation not aligned with ISO 27001:2022 clause structure or missing mandatory documented informationReview the 2022 mandatory documentation list (information security policy, SoA, risk assessment methodology, risk treatment plan); ensure clause 4-10 documentation uses the 2022 structure
Transitioning from ISO 27001:2013 -- controls do not map2022 revision restructured 114 controls into 93 across 4 themes; some controls merged or renamedUse the 11 new controls list as starting point; map merged controls; update Statement of Applicability to reflect 4-theme structure (Organizational, People, Physical, Technological)
Cloud security controls insufficient for multi-cloud environmentGeneric controls applied without cloud-provider-specific implementationMap ISO 27001 controls to provider-specific services (AWS: GuardDuty, Config; Azure: Defender, Policy; GCP: SCC, DLP); use the cloud-specific control tables in this skill
Zero Trust implementation conflicts with existing network architectureLegacy perimeter-based security model incompatible with microsegmentationFollow the phased Zero Trust roadmap (Foundation 0-6mo, Enhancement 6-12mo, Maturation 12-18mo); start with identity and MFA before network changes
Supply chain security assessment overwhelmed by vendor countNo vendor risk tiering applied; all vendors assessed at same depthApply the Third-Party Risk Tiers (Critical, High, Medium, Low); focus full security audits on Critical tier; use questionnaires for Medium/Low

Success Criteria

  • Overall compliance score above 85% -- as measured by
    compliance_checker.py
    , with all high-priority controls implemented and operating effectively
  • Risk register complete with assigned owners for all high/critical risks -- every risk assessed using Likelihood x Impact methodology with documented treatment plans and target remediation dates
  • Statement of Applicability current and approved -- covering all 93 Annex A controls with justification for inclusion/exclusion, aligned with the 2022 four-theme structure
  • Internal audit conducted annually -- covering all ISMS clauses (4-10) and all Annex A controls within the 3-year certification cycle, with findings documented and corrective actions tracked
  • Management review completed with documented outputs -- including ISMS performance metrics, audit findings, risk treatment status, and improvement decisions
  • Security awareness training completion rate above 95% -- all personnel trained annually with records maintained; specialized training for security and IT staff
  • Incident response tested and validated -- at least one tabletop exercise or simulation annually; post-incident reviews conducted for all actual incidents; lessons learned documented and implemented

Scope & Limitations

In Scope:

  • ISO 27001:2022 ISMS implementation guidance including all 93 Annex A controls across 4 themes
  • Security risk assessment following ISO 27001 Clause 6.1.2 methodology with configurable threat catalogs (general, healthcare, cloud)
  • Compliance checking and gap analysis against ISO 27001 and ISO 27002 controls
  • Cross-framework mapping to SOC 2 TSC, NIST CSF 2.0, and NIS2 Directive
  • Cloud-specific security controls for AWS, Azure, and GCP
  • Zero Trust architecture integration with phased implementation roadmap
  • Hardware security key (FIDO2/WebAuthn) requirements and deployment guidance
  • Supply chain security controls including SBOM requirements and vendor risk tiering

Out of Scope:

  • ISO 27001 certification audit execution -- this skill provides preparation guidance, not audit services
  • Implementation of specific security tools (SIEM, EDR, DLP, WAF) -- this skill maps requirements to tool categories
  • Penetration testing or vulnerability scanning execution -- use
    infrastructure-compliance-auditor
    for technical checks
  • ISO 27701 (privacy information management), ISO 27017 (cloud security), or ISO 27018 (cloud privacy) implementation beyond cross-reference
  • Physical security system design or installation beyond control requirements

Important Notes:

  • The ISO 27001:2013 to 2022 transition deadline was October 2025; all certifications must now conform to the 2022 edition
  • The 2022 revision introduced 11 entirely new controls, notably A.5.7 (Threat intelligence), A.5.23 (Cloud services), A.8.9 (Configuration management), A.8.16 (Monitoring activities), and A.8.28 (Secure coding)
  • Integration with other standards (ISO 27701, ISO 42001, ISO 9001) via the harmonized Annex SL structure is becoming standard practice

Integration Points

SkillIntegrationWhen to Use
isms-audit-expert
Internal and external ISMS audit management; control testing and finding managementWhen planning or executing ISO 27001 audits and tracking corrective actions
infrastructure-compliance-auditor
Technical infrastructure checks validate ISO 27001 Annex A technological controlsWhen assessing actual infrastructure security posture against ISO 27001 requirements
soc2-compliance-expert
SOC 2 Trust Services Criteria mapped to ISO 27001 controls for dual complianceWhen organization requires both ISO 27001 certification and SOC 2 Type II report
gdpr-dsgvo-expert
GDPR Art. 32 security of processing aligned with ISO 27001 controls; A.5.34 PII protectionWhen ISMS must support GDPR compliance requirements
nist-csf-specialist
NIST CSF 2.0 functions mapped to ISO 27001 for organizations with US operationsWhen building unified security framework across ISO 27001 and NIST CSF
dora-compliance-expert
ISO 27001 controls support DORA Pillar 1 (ICT Risk Management) requirements for financial entitiesWhen financial entity uses ISO 27001 as foundation for DORA compliance

Tool Reference

risk_assessment.py

Automated security risk assessment following ISO 27001 Clause 6.1.2 methodology.

FlagRequiredDescription
--scope <name>
Yes (unless
--assets
)
System or area to assess (e.g.,
cloud-infrastructure
,
ehr-system
,
patient-data-system
)
--template <type>
NoAssessment template:
general
(default),
healthcare
,
cloud
-- each provides context-appropriate threat catalogs
--assets <file>
NoCSV file with asset inventory (columns: asset_id, name, type, owner, classification)
--output <file>
NoOutput file path (default: stdout)
--format <fmt>
NoOutput format:
json
(default),
csv
,
markdown

Output: Asset inventory with classification, threat and vulnerability mapping, risk scores (Likelihood x Impact on 1-5 scale), treatment recommendations per risk level, and residual risk calculations.

compliance_checker.py

Verifies ISO 27001/27002 control implementation status with gap analysis and remediation recommendations.

FlagRequiredDescription
--standard <std>
YesStandard to check:
iso27001
,
iso27002
,
hipaa
--controls-file <file>
NoCSV file with current control implementation status
--gap-analysis
NoInclude detailed remediation recommendations in output
--domains <domains>
NoComma-separated specific control domains to check (e.g.,
access-control,cryptography
)
--output <file>
NoOutput file path for compliance report

Output: Control implementation status per domain, compliance percentage by theme/domain, gap analysis with priorities (when

--gap-analysis
flag used), and remediation recommendations mapped to ISO 27002 control guidance.