Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the ISO 27001 security standard?

The ISO/IEC 27001 standard provides requirements for information security management systems (ISMS). Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), the ISO 27001 security standard is a set of best practices that support organizations in managing their information security by addressing people, processes, and technology. The standard applies to organizations of any size or type and is technology- and vendor-neutral.


‍The ISO/IEC 27001 standard engages a risk-based approach to information security, requiring organizations to identify information security risks pertinent to their organization and the space in which they operate, and to select the appropriate controls to address those risks.


‍ISO 27001 comprises 114 controls divided into 14 categories. There is no requirement to implement the full list of ISO 27001’s controls; rather, they are possibilities for an organization to consider based on its particular needs. The 14 categories are:


  • Information security policies
  • Organization of information security and assignment of responsibility
  • Human resource security
  • Information asset management
  • Employee access control
  • Encryption and management of sensitive information
  • Physical and environmental security
  • Operations security
  • Communications security
  • System acquisition, development, and maintenance
  • Supplier relationships
  • Information security incident management
  • Information security aspects of business continuity management
  • Compliance

‍ISO 27001 is a world-class standard that can support an organization in proving its security practices to potential customers. The full standard provides a wide range of controls an organization can utilize to ensure its approach to information security is comprehensive.

Additional resources you might like:

Product updates
Event
What's New in Vanta: June

Are you curious about new Vanta features? Register for our "What's New in Vanta: June" webinar.

Security
Blog
The state of trust in an AI world: VantaCon UK recap

Security and compliance experts share their insights and analysis of key findings from Vanta’s State of Trust Report in this VantaCon UK panel.

Company news
Blog
VantaCon UK highlights: See the future of trust in an AI world

From product announcements to panel discussions, watch highlights and recordings from VantaCon UK.

Additional resources you might like:

Product updates
Event
What's New in Vanta: June

Are you curious about new Vanta features? Register for our "What's New in Vanta: June" webinar.

Security
Blog
The state of trust in an AI world: VantaCon UK recap

Security and compliance experts share their insights and analysis of key findings from Vanta’s State of Trust Report in this VantaCon UK panel.

Company news
Blog
VantaCon UK highlights: See the future of trust in an AI world

From product announcements to panel discussions, watch highlights and recordings from VantaCon UK.

SOC 2
Event
Ask Me (Almost) Anything: Post-Audit Planning and Excellence

Navigate post-audit success with Vanta & A-LIGN. Get expert advice on leveraging findings for growth. Register for access or recording.

Security
Guide
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Security
Event
Building security programs that reduce risk

In today’s evolving threat landscape, compliance is only the first step—resilience is the ultimate goal. That’s why Vanta and Huntress have teamed up to help you achieve true cybersecurity resilience.

Security
Blog
How to protect your physical infrastructure with AWS and Vanta

In this blog, we’ll cover physical and environmental infrastructure, explaining what AWS does to protect the cloud centers that store your data and what other security steps you need to take.

Security
Blog
From automated compliance to AI: How investors are prioritizing security

AI and cybersecurity are top strategic priorities for companies at every scale. See how investors are thinking about security in our increasingly-AI driven world.

Security
Blog
What is continuous security monitoring?

What is continuous security monitoring and why is it crucial to your business? Learn about continuous monitoring and best practices for ensuring security within your organization.

Get compliant and
build trust, fast.

Two wind turbines on a white background.
Get compliant and build trust,
fast.
Get started