ONLINE
THREATS: 4
1
1
1
1
0
1
0
1
1
0
0
1
0
1
0
1
1
0
1
0
0
1
1
0
1
1
0
1
0
1
0
1
0
0
0
1
1
1
0
1
1
0
1
1
1
0
1
0
1
1
ISO27001

ISO 27001 Statement of Applicability (SoA): Creation and Management

Loading advertisement...
135

I still remember the moment during my first ISO 27001 audit when the lead auditor asked to see our Statement of Applicability. I confidently handed over a 47-page document that my team had spent three months creating. She flipped through it, raised an eyebrow, and said something that changed how I approach compliance forever:

"This is comprehensive. But can anyone actually use it?"

That question hit me like a freight train. We'd created a document that checked all the boxes but served no practical purpose. It was a compliance artifact, not a living tool. Over the next fifteen years, I've helped over 60 organizations create SoAs that actually work—documents that guide security decisions, survive audits, and evolve with the business.

Let me show you how to do it right.

What Is a Statement of Applicability (And Why Most People Get It Wrong)

The Statement of Applicability is your organization's declaration of which ISO 27001 Annex A controls you've implemented, which ones you haven't, and—critically—why you made those decisions.

Think of it as your security program's constitution. It's the single document that explains your entire approach to information security.

Here's the official definition: The SoA is a mandatory documented information requirement in ISO 27001 that lists all controls from Annex A, states whether they're applicable or not, documents the justification for inclusion or exclusion, and shows whether they're already implemented.

But here's what nobody tells you: the SoA isn't really for the auditors. It's for you.

"A great Statement of Applicability is a roadmap that shows where you are, where you're going, and why you chose that particular journey."

The Four Critical Elements Every SoA Must Have

After reviewing hundreds of SoAs, I've found that effective ones always include these four elements:

Element

Purpose

Common Mistakes

Control Reference

Links to ISO 27001 Annex A control numbers

Using outdated control numbering, missing new controls

Applicability Status

States if control is applicable or not

Vague status (e.g., "partially applicable"), inconsistent terminology

Justification

Explains WHY the decision was made

Generic justifications, copy-pasted text, no real reasoning

Implementation Status

Shows current implementation level

No timeline, unclear ownership, unrealistic targets

I learned the hard way that missing any of these elements will either fail your audit or—worse—create a document that provides zero value to your organization.

The Painful Truth About ISO 27001 Annex A Controls

ISO 27001:2022 contains 93 controls across four themes (Organizational, People, Physical, and Technological). The 2013 version had 114 controls across 14 domains. If you're updating from the old standard, you've got work to do.

Let me break down what you're dealing with:

ISO 27001:2022 Control Structure

Theme

Number of Controls

Focus Area

Typical Applicability Rate

Organizational Controls

37

Policies, procedures, asset management

85-95% applicable

People Controls

8

HR security, awareness, training

95-100% applicable

Physical Controls

14

Facility security, equipment protection

60-90% applicable (varies by industry)

Technological Controls

34

Network security, access control, encryption

80-95% applicable

Here's a reality check from my experience: most organizations will find 85-92% of controls applicable. If you're marking more than 15% as "not applicable," you're either in a very unique situation, or you're trying to cut corners.

I once audited a financial services company that marked 28 controls as not applicable. Their justification? "We're a small company." That's not a justification—it's an excuse. Size doesn't exempt you from access control or incident management. They failed their certification audit spectacularly.

Creating Your SoA: The Method That Actually Works

Let me walk you through the process I've refined over fifteen years and dozens of successful certifications.

Phase 1: Scoping and Context (Weeks 1-2)

Before you touch a single control, you need to understand your organization's context. I've seen companies waste months creating SoAs for the wrong scope.

Critical questions to answer:

  1. What's in scope for your ISMS?

    • Which locations?

    • Which departments?

    • Which systems and data?

    • Which processes?

  2. What are your business objectives?

    • Growth plans

    • Market positioning

    • Customer requirements

    • Regulatory obligations

  3. What's your risk appetite?

    • How much risk can you accept?

    • What are your critical assets?

    • What are your biggest threats?

I worked with a healthcare SaaS company in 2022 that initially scoped their entire organization—12 locations, 400 employees. After context analysis, we narrowed it to their production environment and customer data handling processes. They achieved certification in 8 months instead of 18, and with one-third the cost.

"Scope creep kills compliance projects. Start focused, prove success, then expand. Don't try to boil the ocean on day one."

Phase 2: Risk Assessment Integration (Weeks 3-5)

Here's where most people mess up: they treat the SoA as separate from risk assessment. The SoA should be driven by your risk assessment results.

Here's my process:

Step 1: Conduct Your Risk Assessment

  • Identify assets and their value

  • Identify threats and vulnerabilities

  • Assess likelihood and impact

  • Determine risk levels

Step 2: Map Risks to Controls

  • Which controls mitigate which risks?

  • Are there risks requiring multiple controls?

  • Are there controls addressing risks outside your top priorities?

Step 3: Make Applicability Decisions

  • If a control mitigates a high or medium risk → Applicable

  • If a control is legally/contractually required → Applicable

  • If a control addresses only low risks and isn't required → Consider excluding (carefully)

Let me show you a real example. I worked with a fully remote company with no physical offices. Here's how they handled Physical Controls:

Control

Decision

Justification

7.2 Physical entry

Not Applicable

Organization is fully remote with no physical offices. All infrastructure is cloud-based (AWS). Employees work from home offices which are outside scope.

7.3 Securing offices, rooms and facilities

Not Applicable

Same justification as 7.2. Cloud provider (AWS) maintains physical security of data centers per shared responsibility model.

7.4 Physical security monitoring

Not Applicable

No physical facilities to monitor. AWS provides physical monitoring of infrastructure per SOC 2 Type II report.

7.7 Clear desk and clear screen

Applicable

While no physical offices exist, policy requires employees to lock screens when away from computers and secure sensitive information at home offices.

7.8 Equipment siting and protection

Applicable

Policy requires employees to protect company equipment in home offices. Encryption required on all devices.

Notice the specificity? That's what auditors want to see. Not "we don't have offices," but "we're fully remote, here's where our infrastructure lives, and here's how we handle the remaining physical risks."

Phase 3: Control-by-Control Analysis (Weeks 6-10)

This is where the rubber meets the road. You need to go through every single control and make a decision.

Here's my template for control analysis:

Control Analysis Framework

For each control, document:

  1. Control Description - What does the control require?

  2. Current State - What are we doing today?

  3. Gap Analysis - What's missing?

  4. Risk Context - What risks does this address?

  5. Business Context - How does this align with business needs?

  6. Decision - Applicable or Not?

  7. Justification - Why did we make this decision?

  8. Implementation Plan - If applicable, how/when will we implement?

Let me show you real examples from organizations I've worked with:

Example 1: Access Control (Technological Control 5.15 - Access Control)

Element

Details

Control Description

Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements.

Current State

We have basic access controls via Active Directory and AWS IAM. No formal access control policy exists. Access reviews are ad-hoc.

Gap Analysis

Need: Access control policy, role-based access definitions, quarterly access reviews, privileged access management, documented approval process.

Risk Context

Mitigates risks: Unauthorized access (High), Insider threats (Medium), Data exfiltration (High), Compliance violations (High).

Business Context

Critical for customer trust, SOC 2 requirements, and EU customer GDPR requirements.

Decision

APPLICABLE

Justification

Essential control for protecting customer data, meeting contractual obligations, and managing identified high-risk scenarios. Required by multiple stakeholders and regulations.

Implementation Plan

Q1 2025: Policy development. Q2 2025: RBAC implementation. Q3 2025: Quarterly review process. Owner: CISO. Budget: $45K.

Example 2: Equipment Maintenance (Physical Control 7.13)

Element

Details

Control Description

Information processing facilities shall be maintained to ensure their continuing availability and integrity.

Current State

Cloud-only infrastructure (AWS). No on-premise servers or equipment requiring maintenance. End-user devices are managed through MDM.

Gap Analysis

N/A - Control is not relevant to our infrastructure model.

Risk Context

Risk of equipment failure is managed by AWS per their SOC 2 report. End-user device failure is addressed through backup/recovery controls.

Business Context

Strategic decision to remain cloud-native eliminates traditional equipment maintenance requirements.

Decision

NOT APPLICABLE

Justification

Organization maintains no information processing facilities. All infrastructure is managed by AWS (SOC 2 Type II certified). AWS maintains physical equipment per shared responsibility model. End-user device management is covered under separate controls (8.1, 8.7).

Implementation Plan

N/A. Reassess if infrastructure model changes.

Notice the difference in detail? The applicable control has a complete implementation plan. The non-applicable control has a thorough explanation of why it doesn't apply and what addresses the underlying risk instead.

The Justification Trap: What Auditors Actually Look For

I've seen auditors reject SoAs because of poor justifications more than any other reason. Let me show you what works and what doesn't.

Bad Justifications (That Will Fail Your Audit)

Control

Bad Justification

Why It Fails

Physical entry controls

"Not applicable - not relevant"

No explanation of why it's not relevant

Supplier security

"We don't have suppliers"

Impossible for most organizations; shows poor analysis

Asset management

"Too small to need this"

Size is not a valid exclusion reason

Backup controls

"Not applicable at this time"

"At this time" suggests it should apply; vague reasoning

Information classification

"We will implement later"

Confuses applicability with implementation status

Good Justifications (That Pass Audits)

Control

Good Justification

Why It Works

Physical entry controls

"Organization is fully remote with no physical offices or data centers. All IT infrastructure is hosted in AWS cloud environment. Physical security of AWS facilities is AWS's responsibility per shared responsibility model, verified through AWS SOC 2 Type II report. Employee home offices are outside ISMS scope."

Specific, shows understanding of control intent, explains alternative risk management

Supplier security

"While organization has suppliers for non-IT services (office supplies, legal), no suppliers have access to information systems or process information within ISMS scope. All IT services are provided by AWS and Microsoft 365, addressed under control 5.19 (supplier relationships)."

Acknowledges suppliers exist but explains why control doesn't apply to them

Physical security monitoring

"No physical facilities exist within ISMS scope. Data center monitoring is performed by AWS per their security controls. Endpoint device security is addressed through EDR solution (Control 8.7) which provides logging and monitoring capabilities."

Shows risk is managed through different controls

"A justification should tell a story: Here's what the control is trying to achieve, here's our situation, here's why the control doesn't apply to us, and here's how we're managing the underlying risk anyway."

Implementation Status: The Timeline That Actually Works

Once you've determined a control is applicable, you need to show implementation status. Here's how I categorize it:

Implementation Status Levels

Status

Definition

What Auditors Expect

Typical Timeline

Implemented

Control is fully operational with evidence

Policies, procedures, technical controls in place, evidence of ongoing operation (logs, records, audit trails)

N/A - already done

Partially Implemented

Some elements in place but gaps remain

Clear documentation of what's done, specific gaps identified, remediation plan with dates

1-6 months to full implementation

Planned

Control identified but not yet started

Detailed implementation plan, assigned owner, budget allocation, realistic timeline

3-12 months to implementation

Not Implemented

Control needed but no plan exists

Only acceptable in Stage 1 audit; must have plan before Stage 2

Must have plan before certification

Here's a reality check from 15 years of experience: For certification, you need 100% of applicable controls either fully implemented or partially implemented with a credible remediation plan.

You cannot certify with "not implemented" controls unless they're genuinely not applicable.

The Implementation Roadmap I Use

When working with clients, I create a visual roadmap that shows implementation status and timeline:

Sample Implementation Dashboard (Q1 2025 - Q4 2025)

Control Category

Total Controls

Implemented

Partial

Planned

Target Date

Organizational (5.1-5.37)

35 applicable

22 (63%)

10 (29%)

3 (8%)

Q2 2025

People (6.1-6.8)

8 applicable

6 (75%)

2 (25%)

0 (0%)

Q1 2025

Physical (7.1-7.14)

8 applicable

5 (63%)

3 (37%)

0 (0%)

Q2 2025

Technological (8.1-8.34)

31 applicable

18 (58%)

9 (29%)

4 (13%)

Q3 2025

TOTAL

82 applicable

51 (62%)

24 (29%)

7 (9%)

Q3 2025

This gives leadership a clear picture of progress and helps prioritize resources.

The Living Document: Managing Your SoA Over Time

Here's where most organizations fail: they treat the SoA as a one-time deliverable. They spend months creating it, pass their audit, then put it on a shelf and forget about it.

Your SoA should be reviewed and updated at least quarterly, and definitely whenever:

  • Your organization's scope changes (new locations, services, or systems)

  • You conduct a risk assessment and identify new risks

  • Your business model evolves significantly

  • Regulatory requirements change

  • Technology infrastructure changes substantially

  • Audit findings require control modifications

The Quarterly Review Process That Works

I implement this process with every client:

Quarter 1 (January-March): Deep Review

  • Full risk assessment review

  • Complete SoA review against current state

  • Update implementation status for all controls

  • Identify gaps and create remediation plans

  • Budget planning for next 12 months

Quarter 2 (April-June): Implementation Focus

  • Progress check on remediation plans

  • Update status for controls under implementation

  • Review any business changes affecting scope

  • Prepare for mid-year management review

Quarter 3 (July-September): Validation

  • Internal audit of control effectiveness

  • Evidence collection for implemented controls

  • Gap analysis for surveillance audit

  • Address any non-conformities

Quarter 4 (October-December): Preparation

  • External surveillance audit preparation

  • Final evidence package compilation

  • SoA updates for auditor review

  • Annual metrics and reporting

Change Management for Your SoA

I worked with a fast-growing fintech company that went from 50 to 300 employees in 18 months. Their original SoA became obsolete within months. We implemented a change management process:

SoA Change Request Process:

Trigger Event

Review Requirement

Approval Level

Timeline

New product/service launch

Full control applicability review

CISO + DPO

Before launch

Acquisition/merger

Complete SoA reassessment

Executive team

Within 60 days

New regulatory requirement

Affected control review

CISO

Within 30 days

Major infrastructure change

Technical control review

CISO + CTO

Before implementation

Annual risk assessment

Complete SoA review

CISO

After RA completion

Audit findings

Specific control updates

CISO

Per corrective action plan

This keeps the SoA current without requiring constant full reviews.

Common SoA Mistakes (And How to Avoid Them)

After reviewing hundreds of SoAs, I see the same mistakes repeatedly. Let me save you the pain:

Mistake #1: Copy-Paste from Templates

I can spot a templated SoA from a mile away. Generic justifications like "This control ensures security of our assets" tell me nothing about your organization.

The Fix: Every justification should be specific to YOUR organization. Mention your technology stack, your business model, your specific risks.

Mistake #2: Confusing Applicability with Implementation

I see this constantly:

  • "Control is not applicable because we haven't implemented it yet"

  • "Control is applicable but we'll implement it later"

These show a fundamental misunderstanding of the SoA.

The Fix:

  • Applicability = Does this control make sense for our organization?

  • Implementation = Have we actually put this control in place?

They're completely separate questions.

Mistake #3: No Risk Connection

Many SoAs list controls without explaining which risks they mitigate. This makes the whole document feel arbitrary.

The Fix: Link every applicable control back to specific risks from your risk assessment. This shows auditors you're making risk-based decisions.

Mistake #4: Vague Implementation Plans

"We plan to implement this control in the future" is worthless.

The Fix: Include:

  • Specific implementation date (Quarter/Year minimum)

  • Assigned owner

  • Budget allocation

  • Dependencies

  • Success criteria

Mistake #5: Excluding Too Many Controls

If you've marked 20+ controls as not applicable, auditors will scrutinize every single one.

The Fix: Be conservative. If you're unsure, mark it applicable and implement. It's better to have a strong control program than to argue about exclusions.

Tools and Technology: What Actually Helps

You don't need fancy software to create a great SoA, but the right tools can make management much easier.

Options I've Used Successfully

Tool Type

Pros

Cons

Best For

Excel/Google Sheets

Free, flexible, everyone knows how to use

Version control nightmare, collaboration difficult, scales poorly

Small orgs, initial drafts

GRC Platforms (Vanta, Drata, Secureframe)

Automated evidence collection, continuous monitoring, integration with tech stack

Expensive ($1K-5K+/month), can be overkill, less flexibility

Fast-growing tech companies

Specialized ISMS Tools (ISMS.online, Cyber Navigator)

Built for ISO 27001, guides you through process, includes templates

Learning curve, still requires manual work, medium cost ($200-1K/month)

Organizations serious about ISO 27001

Document Management (SharePoint, Confluence)

Good version control, collaboration features, most orgs already have

Requires setup and structure, not purpose-built

Medium to large organizations

My Recommendation: Start with Excel/Sheets for your first draft. Once you've been through the process and understand what you need, evaluate whether a specialized tool adds value.

I worked with a 40-person company that spent $60K on a GRC platform before they understood their requirements. They ended up using 20% of the features and still needed spreadsheets for actual work.

The SoA Template That Works

After creating dozens of SoAs, here's the structure I use:

Document Structure

1. Introduction
   1.1 Purpose and Scope
   1.2 Document Control Information
   1.3 Approval and Review Schedule
2. ISMS Overview 2.1 Organization Context 2.2 ISMS Scope 2.3 Risk Assessment Approach 2.4 Control Selection Methodology
3. Control Applicability Summary 3.1 Overview Statistics 3.2 Organizational Controls Summary 3.3 People Controls Summary 3.4 Physical Controls Summary 3.5 Technological Controls Summary
4. Detailed Control Analysis [For each control:] - Control Reference and Description - Applicability Decision - Justification - Implementation Status - Responsible Party - Related Risks - Supporting Documentation
Loading advertisement...
5. Implementation Roadmap 5.1 Current State Summary 5.2 Planned Implementations 5.3 Resource Requirements 5.4 Timeline
6. Review and Maintenance 6.1 Review Schedule 6.2 Change Management Process 6.3 Version History
7. Appendices A. Risk Assessment Summary B. Control Implementation Evidence C. Acronyms and Definitions

Real-World Example: The SoA That Saved a Certification

Let me tell you about a company that almost lost their certification because of a poor SoA.

A manufacturing company came to me three weeks before their surveillance audit. Their SoA was a mess—copy-pasted justifications, vague implementation status, no connection to their actual security practices.

We did an emergency overhaul in 10 days:

Day 1-3: Context and Risk Review

  • Interviewed stakeholders to understand actual practices

  • Reviewed their risk register

  • Mapped current controls to risks

Day 4-7: Control-by-Control Rebuild

  • Documented what they were actually doing

  • Created specific justifications based on their infrastructure

  • Updated implementation status with evidence references

  • Linked controls to risk mitigation

Day 8-10: Evidence Package

  • Created evidence map showing where proof exists for each control

  • Updated policies to match SoA commitments

  • Prepared auditor presentation

Result: They passed their surveillance audit with only two minor observations. The lead auditor specifically noted the quality of their SoA.

The lesson? Your SoA should reflect reality, not aspiration. It's better to document what you actually do well than to claim things you don't.

The Hard Truth About SoA Quality

After fifteen years, here's what I know: A great SoA is boring to read but invaluable to use.

It's not supposed to be exciting. It's not supposed to win writing awards. It's supposed to be:

  • Accurate - Reflects what you actually do

  • Specific - Uses your terminology, your systems, your risks

  • Actionable - Guides implementation decisions

  • Maintainable - Can be updated without complete rewrites

  • Auditable - Provides clear evidence trail

If your SoA checks these boxes, you've succeeded.

"The best Statement of Applicability is one that your security team references weekly, not just when auditors come calling."

Your Action Plan: Creating an SoA in 90 Days

If you're starting from scratch, here's the realistic timeline I use:

90-Day SoA Development Plan

Week

Activities

Deliverables

Effort

1-2

Context establishment, scope definition, stakeholder interviews

Scope document, context analysis

40 hours

3-5

Risk assessment, asset identification, threat analysis

Risk register, risk treatment plan

60 hours

6-8

Control applicability analysis (Organizational + People)

First draft SoA sections

50 hours

9-11

Control applicability analysis (Physical + Technological)

Complete draft SoA

50 hours

12

Internal review, stakeholder feedback, revisions

Reviewed draft

20 hours

13

Gap analysis, implementation planning

Implementation roadmap

30 hours

Total Effort: ~250 hours over 13 weeks

For a dedicated team of 2-3 people, this is achievable. For a solo CISO wearing multiple hats, extend to 16-20 weeks.

Final Thoughts: The SoA as Strategic Asset

Here's something that took me years to fully appreciate: Your Statement of Applicability is actually a strategic document.

It tells the story of how your organization thinks about security. It shows your risk priorities. It demonstrates your commitment to protecting what matters.

I've seen SoAs help organizations:

  • Win enterprise contracts by demonstrating security maturity

  • Negotiate better cyber insurance rates

  • Streamline vendor security assessments

  • Guide security budget allocation

  • Onboard new security team members

  • Make build-vs-buy decisions for security tools

The companies that treat their SoA as a living strategic document see it become the backbone of their security program. The ones that treat it as an audit checklist wonder why their security program feels disjointed and reactive.

Your choice.

What's Next?

Creating a Statement of Applicability is just one piece of the ISO 27001 puzzle. In upcoming articles, I'll dive deep into:

  • Risk assessment methodologies that actually work

  • Building an effective internal audit program

  • Management review: turning compliance into business value

  • Surveillance audits: what auditors really look for

But start with your SoA. Get it right, and everything else becomes easier.

Because at the end of the day, your SoA is your security program's promise to the world. Make it a promise you can keep.


Need help creating or improving your Statement of Applicability? At PentesterWorld, we provide practical, experience-based guidance on ISO 27001 implementation. Subscribe to our newsletter for templates, checklists, and real-world examples from 15+ years in the trenches.

Loading advertisement...
135

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.