ISO 27001 Statement of Applicability: How to Write One That Passes Certification Audit | Lorikeet Security Skip to main content
Back to Blog

ISO 27001 Statement of Applicability: How to Write One That Passes Certification Audit

Lorikeet Security Team March 8, 2026 11 min read

The Statement of Applicability is the single most important document in your ISO 27001 implementation. It is the document that connects your risk assessment to your control implementation. It is the first thing most auditors request during a certification audit, and it is the document they will reference continuously throughout the assessment.

Despite its importance, the SoA is frequently treated as a checkbox exercise. Organizations download a template, mark every control as "applicable," write vague implementation descriptions, and move on. This approach creates problems during certification because auditors know exactly what a rushed SoA looks like, and it triggers deeper questioning in every area where the documentation is thin.

This guide explains what the SoA is, how it connects to your risk assessment, how to handle exclusions without raising audit flags, and the specific mistakes that cause organizations to receive nonconformities during certification.


What the Statement of Applicability Is and Why It Matters

Clause 6.1.3 of ISO 27001 requires the organization to produce a Statement of Applicability that contains the necessary controls, justification for their inclusion, whether they are implemented or not, and justification for excluding any Annex A controls. This is a mandatory documented information requirement, meaning you cannot achieve certification without it.

The SoA serves three distinct purposes in the ISMS:

  1. It documents your control selection decisions. The 93 Annex A controls are a reference set, not a mandatory checklist. The SoA records which controls you have determined are necessary based on your risk assessment, which you have excluded, and why.
  2. It provides traceability from risk to control. Each applicable control should trace back to one or more risks in your risk assessment. This traceability is how you demonstrate that your control selection is risk-based rather than arbitrary.
  3. It defines the audit scope. The auditor uses the SoA to plan which controls to examine. If a control is marked as applicable and implemented, the auditor will verify that claim. If a control is excluded, the auditor will evaluate whether the exclusion is justified.

Critical point: The SoA is not a standalone document. It must be consistent with your risk assessment and risk treatment plan. If your risk assessment identifies a risk related to physical access but your SoA excludes all physical security controls, the auditor has an immediate finding. The three documents form a coherent chain: risks identified, controls selected to treat those risks, and the SoA documenting those selections.


Structure of an Effective SoA

There is no prescribed format for the SoA, but effective ones share a common structure. The document should be organized by the four Annex A themes (Organizational, People, Physical, Technological) and include the following columns for each of the 93 controls.

Column Purpose What Auditors Look For
Control Reference Annex A control number and title All 93 controls listed, none missing
Applicable (Yes/No) Whether the control is relevant to your ISMS scope Exclusions are reasonable given the scope
Justification Why the control is included or excluded Exclusion justifications are specific and risk-based
Implementation Status Fully implemented, partially implemented, planned, not implemented Honest assessment; partially implemented controls have a plan
Implementation Description How the control is implemented in your environment Specific to your organization, not generic ISO language
Risk Reference Link to the risk(s) this control treats Traceability to the risk assessment
Evidence Reference Where to find evidence of implementation Points to specific policies, procedures, or systems

Version Control and Approval

The SoA must include version control metadata: version number, date, author, reviewer, and approver. The approver should be someone with authority over the ISMS, typically the information security manager or a member of senior management. Auditors check that the SoA has been formally approved and that the approval is current.


How the SoA Connects to Risk Assessment

The relationship between the risk assessment and the SoA is where many implementations go wrong. The standard requires a specific sequence: identify risks, assess risks, determine risk treatment options, select controls from Annex A (and any additional controls needed), then document the selections in the SoA.

In practice, this means your risk assessment should be completed before the SoA is finalized. Each control marked as applicable in the SoA should correspond to at least one risk in your risk treatment plan. This does not mean every control needs a one-to-one mapping to a specific risk. Some controls address multiple risks, and some risks are treated by multiple controls.

What Happens When the Chain Breaks


How to Justify Control Exclusions

Exclusions are where auditors spend the most time, because an unjustified exclusion means the organization has a gap in its control framework that it has chosen not to address. The standard permits exclusions, but only with justification, and that justification must withstand auditor scrutiny.

Valid Exclusion Justifications

Invalid Exclusion Justifications

Practical guidance: When in doubt, mark a control as applicable rather than excluded. It is easier to demonstrate partial implementation with a plan to improve than to defend an exclusion that the auditor disagrees with. An exclusion that the auditor rejects becomes a nonconformity, whereas a partially implemented control with a documented improvement plan is typically an observation.


Common SoA Controls That Organizations Struggle With

Certain controls consistently create difficulty in the SoA, either because organizations are unsure whether they apply, or because the implementation description does not match what the auditor finds during assessment.

Control Common Issue How to Address It
A.5.7 Threat Intelligence Organizations unsure what "threat intelligence" means at their scale Does not require a dedicated TI program. Subscribing to vendor security advisories and monitoring CVE databases counts.
A.5.23 Cloud Services Marked as not applicable despite using cloud infrastructure If you use any cloud service (AWS, Azure, GCP, SaaS tools), this control applies. Document how you manage cloud security.
A.7.4 Physical Security Monitoring Remote-first companies unsure how to handle physical controls If employees work from home, some physical controls shift to endpoint security. Document the rationale clearly.
A.8.11 Data Masking SoA says "implemented" but no masking exists in non-production environments If you use production data in test environments, this control applies. Document masking or anonymization procedures.
A.8.16 Monitoring Activities Vague implementation description: "we monitor our systems" Be specific: what is monitored, what tools are used, who reviews alerts, what is the response process.
A.8.28 Secure Coding Excluded despite the organization developing software If you write code that runs in your ISMS scope, this control applies. Document secure coding standards, code review, and testing.

Writing Implementation Descriptions That Satisfy Auditors

The implementation description column is where most SoAs fall short. Generic descriptions copied from the standard provide no useful information to the auditor and suggest that the organization has not actually thought about how the control operates in their specific environment.

Bad vs. Good Implementation Descriptions

Control Bad Description Good Description
A.5.15 Access Control "Access control policy is in place." "Access is managed through Okta SSO with RBAC. Access requests require manager approval via Jira workflow. Quarterly access reviews performed by team leads, tracked in Access Review Log."
A.8.9 Configuration Management "System configurations are managed." "Infrastructure defined in Terraform with state stored in S3. Application config in AWS Parameter Store. Changes require PR approval and pass CI pipeline. Baseline configs documented in Confluence."
A.8.15 Logging "Logs are collected and reviewed." "Application and infrastructure logs shipped to Datadog via Fluentd. Security events trigger PagerDuty alerts. Log retention: 90 days hot, 1 year cold storage in S3 Glacier. Weekly log review for anomalies by security team."
A.5.29 Business Continuity "Business continuity plan exists." "BCP documented in ISMS-BCP-001, tested via tabletop exercise Q1 2026. DR procedures for RDS and EKS documented separately. RTO: 4 hours for Tier 1 services. Last failover test: January 2026."

Notice the pattern: good descriptions name specific tools, reference specific documents, include measurable parameters, and demonstrate that the control is genuinely operational. The auditor reading a good description can immediately plan what evidence to request. A bad description forces the auditor to ask open-ended questions, which extends the audit and often uncovers deeper issues.


Common Audit Findings Related to the SoA

These are the nonconformities and observations we see most frequently during ISO 27001 certification audits related to the Statement of Applicability.


Maintaining the SoA After Certification

The SoA is not a one-time document. It must be maintained as a living document throughout the certification cycle. Surveillance auditors review the SoA at every visit and expect to see evidence of ongoing maintenance.

When to Update the SoA

If you are managing both ISO 27001 and SOC 2 compliance, your SoA maintenance process should be coordinated with your dual certification approach. Many controls overlap, and keeping both frameworks synchronized reduces the total maintenance burden.


SoA Best Practices for Different Organization Types

SaaS Companies

SaaS organizations typically apply the vast majority of technological controls and exclude some physical controls. Pay particular attention to A.5.23 (cloud services), A.8.11 (data masking), A.8.23 (web filtering), and A.8.25-A.8.28 (secure development). If you are expanding into European markets, your SoA should also address data residency and cross-border transfer controls.

Professional Services Firms

Professional services firms often have a narrower technology footprint but more complex people and organizational controls. Focus on A.5.10 (acceptable use), A.5.14 (information transfer), A.6.1-A.6.8 (people controls), and A.5.19-A.5.23 (supplier relationships). Client confidentiality requirements may drive stricter implementation of access control and data handling controls.

Organizations Using Compliance Automation

If you use a compliance automation platform like Drata, Vanta, or Secureframe, the platform likely generates a draft SoA based on your integrations. This is a useful starting point, but treat it as a draft. Automated SoAs tend to be generic in their implementation descriptions and may not accurately reflect your exclusion justifications. Review and customize every line before presenting it to an auditor.


Pre-Certification SoA Review Checklist

Before submitting your SoA to the certification body, verify each of these items. Every item on this list represents a check that experienced auditors perform.

Need help with your ISO 27001 Statement of Applicability?

We review and develop SoAs that pass certification audits on the first attempt. From risk assessment alignment to exclusion justification, we cover every detail auditors examine.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!