Your trusted partner in security and compliance.


What is ISO/IEC 27001:2022?
ISO/IEC 27001:2022 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). The 2022 update reinforces requirements around risk-based security controls, identity-centric access for both human and machine identities, strong credential governance, and continuous monitoring of privileged activity.
The revised standard introduces heightened expectations for managing ephemeral or short-lived credentials, enforcing consistent identity and access governance, securing privileged accounts, and ensuring unified, traceable auditability across hybrid and cloud-based infrastructures. These changes increase the need for modern solutions that can support dynamic, distributed IT environments.
This mapping summarizes where and how Devolutions products can help organizations address the technical aspects of ISO/IEC 27001:2022 controls—particularly those related to secure remote access, privileged credential management, identity governance, and comprehensive auditability. It is not a replacement for implementing a full ISMS, but it provides guidance on how Devolutions tools can support your compliance efforts.
5. Organizational Controls
5.3 Segregation of duties
5.9 Inventory of information and other associated assets
5.15 Access control
5.16 Identity management
5.17 Authentication information
5.18 Access rights
5.23 Information security for use of cloud services
5.24 Information security incident management planning and preparation
5.25 Assessment and decision on information security events
5.26 Response to information security incidents
5.27 Learning from information security incidents
5.28 Collection of evidence
6. People Controls
6.7 Remote working
7. Physical Controls
7.10 Storage media
8. Technological controls
8.1 User end point devices
8.2 Privileged access rights
8.3 Information access restriction
8.4 Access to source code
8.5 Secure authentication
8.7 Protection against malware
8.9 Configuration management
8.11 Data masking
8.12 Data leakage prevention
8.13 Information backup
8.15 Logging
8.16 Monitoring activities
8.18 Use of privileged utility programs
8.22 Segregation of networks
8.24 Use of cryptography
8.25 Secure development life cycle
8.29 Security testing in development and acceptance
8.31 Separation of development, test and production environments
8.32 Change management
8.33 Test information
Resources
Explore more insights and tools to help you stay on top of your IT security game.
Understanding CVEs: A key element in protecting your organization

Closing IT security gaps with IT-led PAM

Join our Newsletter
Join our mailing lists to receive industry news, product updates, quick tips, special offers, and more.