When it comes to all the different documents, scopes, procedures, and implementations that are required for your ISO 27001 certification, none are more important than your statement of applicability. In fact, most companies downplay the importance of the statement, much to their detriment, thinking that it’s a duplication of their efforts in previous steps and documents, but this is not so. It’s far more than that. Technically, to be fair, all of the steps in the audit and certification process are equally important, but this step of defining the applicability of your choice in security controls is the connective process between planning and implementation.
Your Statement of Applicability (SoA, for short) is the critical document that defines how you will implement a large portion of your information security plan. As the main link between the risk assessment methodology & treatment plan that you’ve already defined and the actual implementation of your information security, your SoA defines which controls from the ISO Annex A suits your ISMS.
As a refresher, the purpose of going through the key steps of getting your ISO 27001 certification is to ensure that you’re protecting 3 key touch points about the information in your possession. They are:
By the time you’ve defined the scope of your ISO project, established an ISMS policy, a security policy, and sorted out your risk assessments and risk treatments, you’re technically ready to clearly outline your plan by:
If you’ve been keeping up with the previous blogs we’ve shared regarding your ISO 27001 certification, then none of this should be new information.
But something that hasn’t been explored in previous blogs is that while the controls listed in Annex A seem to be fairly comprehensive, they’re not exhaustive by any means. Hence, you may need to consider other sources for controls as well. Which is where breaking down the importance of this statement comes into play.
Given that you’ve already developed your mandatory Risk Assessment Report, which outlines which controls you’ll be utilizing moving forward to mitigate said risks, why is this document even necessary? It’s necessary, because being ISO certified is more than just about being protected from and prepared for risk. Your ISO certification should be a holistic plan for not only protection, but for compliance and governance, accounting for every facet of your organization’s ISMS, from endpoint to endpoint. There are also several other key reasons why you need your SoA:
When it comes time for your certification audit, the auditor will take your SoA and walk around the company to ensure that you’ve implemented the controls the way that was described in your SoA. This is their key guiding document during their on-site audit.
An additional key consideration is that if you develop the time to generate a thorough Statement, it could decrease the number of other documents. For example, if you want to document a certain control, but the description of the procedure for that control is relatively short, it can live in your SoA, rather than in a separate document.
Consider this document an exercise in putting together an action plan that has real world connections. It’s one thing to generate volumes of documents on what the potential risks and dangers are, and how your organization can mitigate those risks and protect the sensitive data. But that’s just an exercise in hypotheticals. It needs real-world practically. Your SoA takes those esoteric ideas and puts them into tangible actions, procedures, and accountabilities.
Hence, when putting this together, you’ll find that you’ll spend more time on implementing your ISMS according to ISO 27001 and writing this document, than you’ll anticipate. Once you’re going down the list of applicable controls, you need to actually think about how you will put it into practice. For example:
These are important and potentially expensive decisions that must be made. This is why it takes a long time to reach a definitive decision. The good element is that your SoA forces you and your organization to do this job in a systematic way, thus ensuring that all the conditions and controls are addressed, and nothing is missed.
Therefore, this isn’t one of those documents you need to generate just to make the auditor happy, and mark it off on your ISO 27001 checklist. This is a practical exercise that has real world implications. By defining what you want to do with your organization’s information security, and how you’ll do it, you’ll walk away with the perfect overview of your information security procedures - a detailed document that lists what controls you’re adhering to, a justification for your choice of controls, and a description of how it’s being done.
By answering the basic questions of what, why, and how, you’re boosting your organization's information security capacity, and overcoming the largest hurdle in your ISO 27110 audit.