ISO 27001

Statement of Applicability (SoA): Complete Guide for ISO 27001

SoA is one of the most important documents for ISO 27001 certification. Learn what it should contain, how to create it, and avoid common mistakes.

  1. 93
    controls in ISO 27001:2022 Annex A
    ISO
  2. SoA
    SoA required under ISO 27001 clause 6.1.3
    ISO 27001
  3. Most
    Most common audit non-conformity: Inadequate SoA justification
    Certification Bodies

What is a Statement of Applicability?

Statement of Applicability (SoA) is a central document in ISO 27001. It lists all controls in Annex A and states for each control:

  1. Whether it is applicable or not
  2. Justification for the decision
  3. Implementation status

Insight: The SoA is not a checklist to tick off. It is a strategic document that shows the organisation has made conscious, risk-based choices about its security work.

Why is the SoA important?

The SoA serves several functions:

  • Certification requirement — Mandatory under ISO 27001 clause 6.1.3
  • Communication — Shows stakeholders which controls you have implemented
  • Reference — Starting point for internal audit and control monitoring
  • Traceability — Links risk assessment to concrete measures
  • Transparency — Documents conscious choices and priorities

Without an SoA:

  • No ISO 27001 certification possible
  • Difficult to demonstrate systematic security work
  • Risk of arbitrary control selection

ISO 27001:2022 Annex A structure

The 93 controls are organised into four themes:

ThemeNumber of controlsFocus
A.5 Organisational37Policies, roles, suppliers
A.6 People8Employment, training, termination
A.7 Physical14Premises, equipment, environment
A.8 Technological34Systems, networks, encryption

SoA process step by step

  1. Conduct risk assessment first The SoA is based on your risk assessment. Identify what risks exist, which assets need protection and which threats are relevant. Without risk assessment, the SoA becomes arbitrary.
  2. List all Annex A controls Create a table with all 93 controls. Include control number, name and description. This becomes the foundation for your SoA.
  3. Assess applicability For each control: Is it relevant to your operations and risk profile? Answer yes or no. Remember that "not applicable" requires strong justification.
  4. Justify every decision Regardless of whether the control is applicable or not — document why. Link to the risk assessment. "Implement to handle risk X" or "Not applicable as we do not have Y".
  5. Document implementation status For applicable controls: Is it implemented? Partially? Planned? State status and any deadline.
  6. Link to documentation Connect each control to relevant policy, procedure or technical implementation. This facilitates audit.
  7. Review and approve The SoA should be approved by management. This shows ownership and responsibility for security choices.

Example SoA structure

ControlDescriptionApplicableJustificationStatusDocumentation
A.5.1Policies for information securityYesFundamental governance requiredImplementedPOL-001
A.5.9Inventory of information assetsYesRisk: Unidentified assetsImplementedPROC-012
A.7.3Securing offices and facilitiesYesPhysical office premises existImplementedPOL-015
A.7.4Physical security monitoringNoHandled by property owner, contract existsNot applicableCNT-023
A.8.20Networks securityYesCritical infrastructurePartialPROJ-007

Valid and invalid justifications

Valid justifications for exclusion

• The risk does not exist (e.g. no physical servers = no physical server security)
• Handled by another control
• Outsourced to supplier with contract
• The business lacks relevant process (e.g. no system development)

Invalid justifications

• "We cannot afford it"
• "We do not have time"
• "It is too complicated"
• "No one has asked for it"
• No justification at all

Common controls often excluded

Controls often (legitimately) excluded:

ControlCommon justification
A.5.23 Information security for cloud servicesNo cloud usage
A.7.4 Physical security monitoringHandled by property owner
A.8.25 Secure development life cycleNo internal development
A.8.26 Application security requirementsNo internal development
A.8.28 Secure codingNo internal development
A.8.31 Separation of development environmentsNo internal development

Important: Even if you do not develop internally, you may use software that requires secure configuration. Consider carefully.

Auditor’s perspective

What the auditor looks at:

  1. Completeness — All 93 controls must be included
  2. Consistency — Justifications must be logical and consistent
  3. Risk connection — Decisions should link to risk assessment
  4. Implementation — Applicable controls should actually exist
  5. Documentation — References should lead to correct documents
  6. Currency — SoA should be up to date

Common non-conformities:

  • Missing controls
  • Inadequate justifications
  • Applicable controls that are not implemented
  • Old SoA that does not reflect current state

SoA and NIS2 requirements

The SoA can be extended to cover NIS2 requirements that go beyond ISO 27001:

NIS2 requirementRelevant ISO 27001 controlsSoA note
Incident reporting 24hA.5.24-A.5.28Extended procedure for time requirements
Supply chain securityA.5.19-A.5.22Enhanced due diligence
Business continuityA.5.29-A.5.30Testing frequency per NIS2
Management trainingA.6.3Specific content for management

Maintaining the SoA

  1. Annual review Go through the entire SoA at least annually. Is the control status correct? Has the business changed? Are there new risks?
  2. Update on changes New business, new systems, organisational changes — all can affect the SoA. Update proactively.
  3. Link to internal audit Internal audit should verify that the SoA reflects reality. Non-conformities lead to updates.
  4. Version control Keep track of changes. Who changed what and why? Save history.

SoA checklist

Before certification audit:

  • All 93 Annex A controls listed
  • Applicability stated for each control
  • Justification documented for each decision
  • Exclusions have valid reasons
  • Implementation status updated
  • References to policy/procedure exist
  • Connection to risk assessment clear
  • Approved by management
  • Version control in place
  • Last updated date specified

How Securapilot can help

Securapilot simplifies SoA management:

  • Pre-built structure — All 93 controls predefined
  • Justification templates — Examples and guidance
  • Status tracking — See implementation progress
  • Document linking — Connect to policies and procedures
  • Version history — Full traceability of changes
  • Audit reports — Export for external audit

Book a demo and see how we simplify your SoA work.


Frequently asked questions

Must all 93 controls be included in the SoA?

Yes, all 93 controls in Annex A must be listed in the SoA. For each control you must state whether it is applicable or not, and justify the decision.

Can I exclude controls?

Yes, but every exclusion must be justified. Valid reasons include that the risk does not exist (e.g. no mobile working) or that it is handled by another control. 'We cannot afford it' is not a valid justification.

How often should the SoA be updated?

The SoA should be a living document that is updated when there are changes in operations, risk landscape or control implementation. It should be reviewed at least annually.

What does the auditor look at in the SoA?

The auditor checks: 1) That all controls are listed, 2) That justifications are reasonable, 3) That applicable controls are actually implemented, 4) Connection to risk assessment.


#ISO 27001#SoA#Statement of Applicability#certification#Annex A#controls

We use anonymous statistics without cookies to improve the website. Read more