ISO 27001:2022 Annex A 5.8 – Information Security in Project Management Explained

Many security weaknesses are introduced during change, not day-to-day operations.

Annex A 5.8 exists to ensure that information security is considered as part of project management, rather than treated as a separate or downstream activity once decisions have already been made.

This control recognises that projects often introduce new systems, processes, suppliers, and ways of working — all of which can materially affect information security risk.

ISO 27001

Quick Guide: Annex A 5.8 at a Glance

Annex A 5.8 of ISO 27001:2022 focuses on integrating information security into project management.

At a practical level, this means:

  • Considering information security risks as part of projects
  • Identifying security requirements early in the project lifecycle
  • Addressing security risks introduced by project activities
  • Ensuring security remains relevant as projects evolve
  • Avoiding “bolt-on” security after key decisions are made

The control does not prescribe a specific project management methodology or require formal security gates for every project. Instead, it expects a consistent, proportionate approach to ensuring security is considered whenever projects introduce change.

The intent is prevention — catching security issues early, when they are cheaper and easier to address.

In-Depth Guide to Annex A 5.8

What Is Annex A 5.8 and Why Does It Matter?

Projects are a common source of information security risk because they often involve:

  • New technology or systems
  • Changes to business processes
  • New suppliers or integrations
  • Tight delivery timelines

When security is only considered after a solution has been selected or built, organisations are left with limited and costly options.

Annex A 5.8 ensures that information security is embedded into project decision-making, rather than treated as an afterthought.

From a security perspective, this reduces the likelihood of:

  • Insecure system designs
  • Non-compliant solutions
  • Increased attack surface
  • Expensive rework

From a business perspective, it supports smoother delivery and fewer late-stage blockers.

How to Implement Annex A 5.8 Effectively

A pragmatic approach to Annex A 5.8 typically includes the following elements.

1. Identify Projects That Affect Information Security

Not all projects carry the same level of security risk.

Projects that commonly trigger security consideration include those involving:

  • New or changed information systems
  • Processing of sensitive or personal data
  • External suppliers or cloud services
  • Changes to access, integration, or connectivity

Clarity here avoids unnecessary overhead while ensuring relevant projects are covered.

2. Consider Security Early in the Project Lifecycle

Security is most effective when considered before key decisions are locked in.

This may include:

  • Identifying information assets involved
  • Understanding legal and regulatory constraints
  • Assessing potential threats and risks
  • Defining high-level security requirements

Early consideration supports better design choices and avoids rework.

3. Define and Agree Security Requirements

Where security requirements are identified, they should be agreed and documented at an appropriate level.

These requirements may relate to:

  • Confidentiality, integrity, and availability
  • Access control and authentication
  • Data protection and privacy
  • Logging, monitoring, or resilience

The level of detail should be proportionate to the project’s risk and complexity.

4. Address Security Risks Throughout the Project

Security risk does not remain static during delivery.

Projects often evolve, introducing:

  • Scope changes
  • New integrations
  • Adjusted timelines

Periodic review helps ensure that security considerations remain aligned with reality, not just the original plan.

5. Validate Security Outcomes Where Appropriate

For higher-risk projects, organisations may choose to:

  • Review security controls before go-live
  • Validate that agreed requirements have been addressed
  • Capture lessons learned for future projects

This reinforces accountability without imposing unnecessary formality.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Common Challenges and How to Overcome Them

  • Treating security as a final checklist item
  • Introduce security considerations early in the project
  • Assuming projects are “temporary” and low risk
  • Focus on the long-term impact of project outcomes
  • Over-engineering security for small changes
  • Apply proportionate controls based on risk
  • Security teams blocking delivery late in the process
  • Involve security at the right time, not the last minute

Most issues arise when security is disconnected from project governance.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 5.8 is about building security into change, not slowing projects down.

When information security is integrated into project management:

  • Risks are identified earlier
  • Solutions are more resilient
  • Delivery friction is reduced
  • Compliance follows naturally

Projects shape the future state of the organisation. Treating security as part of that future — rather than an afterthought — is the outcome Annex A 5.8 is designed to achieve.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls