Skip to Content

ISO 27001

What it is — ISO/IEC 27001 is the international standard for information security management systems (ISMS), published by ISO . It provides a systematic approach to managing sensitive information through risk assessment, security controls, and continuous improvement. The current version is ISO/IEC 27001:2022, which restructured the Annex A controls.

Appsec relevance — Annex A of ISO 27001:2022 includes controls directly related to vulnerability management (A.8.8), configuration management (A.8.9), secure development (A.8.25–A.8.31), and monitoring (A.8.16). Organizations seeking or maintaining ISO 27001 certification must demonstrate they manage technical vulnerabilities in their web applications and APIs.

How Detectify Supports ISO 27001

ControlWhat it requiresDetectify CapabilityCoverage
A.8.8 — Technical vulnerability managementObtain information about technical vulnerabilities of information systems in use, evaluate the organization’s exposure, and take appropriate measuresApplication Scanning, API Scanning, Internal Scanning, and Surface Monitoring provide continuous vulnerability identification across multiple CWEs, with CVSS-based prioritization. Covers web application, API, and external infrastructure vulnerabilitiesPartial
A.8.9 — Configuration managementEstablish, document, implement, monitor, and review security configurations across the technology stackSecurity misconfiguration detection (CWE-16 ), default credential testing, HTTP security header validationFull
A.5.9 — Inventory of assetsIdentify and maintain an inventory of information and other associated assets, including ownersSurface Monitoring discovers and catalogs internet-facing assets (domains, subdomains, IPs, ports, technologies)Partial
A.8.16 — Monitoring activitiesMonitor networks, systems, and applications for anomalous behaviour and take appropriate action24/7 Surface Monitoring with change detection and alerting via integrations (Slack, PagerDuty, Teams)Partial
A.8.25 — Secure development lifecycleEstablish and apply rules for the secure development of software and systemsAPI-triggered scanning in CI/CD pipelines and Internal Scanning for pre-production testing support secure development practicesPartial
A.8.28 — Secure codingApply secure coding principles to software developmentDetects coding-related vulnerabilities (injection, XSS, path traversal) but does not perform static code analysisPartial
A.8.12 — Data leakage preventionApply data leakage prevention measures to systems, networks, and devices that process or store sensitive informationInformation exposure detection (CWE-200 ) identifies data leakage in web applicationsPartial
A.5.23 — Cloud servicesEstablish processes for acquiring, using, managing, and exiting cloud services in line with security requirementsSurface Monitoring discovers cloud-hosted assets; scanning tests cloud-hosted applications for vulnerabilitiesPartial
A.5.7 — Threat intelligenceCollect and analyse information about information security threats to produce threat intelligenceCrowdsource network of over 400 ethical hackers provides real-world vulnerability research; Alfred AI generates test modules from public CVE disclosuresPartial

What Detectify Covers

Detectify provides strong support for the web application and API components of ISO 27001’s technical vulnerability management (A.8.8) and configuration management (A.8.9) controls, which are among the most frequently cited during audits. Note that A.8.8 covers all technical vulnerabilities — OS, database, network device, and infrastructure vulnerabilities require additional scanning tools. Surface Monitoring supports asset inventory (A.5.9) and monitoring (A.8.16) requirements. CI/CD integration supports secure development lifecycle controls (A.8.25).

ISO 27001 is a broad management system standard — the majority of Annex A controls address organizational, people, and physical security measures outside DAST scope. Detectify addresses the application security and vulnerability management components within a broader ISMS implementation.

Complementary Tools You May Need

  • Infrastructure vulnerability scanner — For OS, database, and network device vulnerabilities under A.8.8
  • GRC platform — For ISMS documentation, risk treatment plans, and audit management
  • SAST / SCA — For A.8.28 secure coding verification at the source code level
  • Endpoint protection — For A.8.1 user endpoint device controls
  • Network security — For A.8.20–A.8.22 network controls
  • IAM — For A.8.2–A.8.5 access management controls
  • Security awareness training — For A.6.3 training requirements
  • Incident response platform — For A.5.24–A.5.28 incident management

References

Last updated on