International Standard Active

ISO 27001:2022

The international gold standard for Information Security Management Systems (ISMS), with Annex A control 8.24 mandating cryptographic key lifecycle management and certificate governance.

Quick Facts

Status
Active
Type
International Standard
Scope
All organizations
Last revision
2022
Key control
Annex A 8.24

Overview

ISO/IEC 27001:2022 is the globally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company information so that it remains secure.

The 2022 revision restructured Annex A controls, with control 8.24 (Cryptography) directly addressing cryptographic key management and certificate governance. Organizations certified to ISO 27001 must demonstrate robust processes for key generation, distribution, storage, rotation, revocation, and destruction.

The standard applies to any organization regardless of size or sector, making it the most widely adopted information security framework worldwide. With the growing importance of digital certificates in modern infrastructure, Annex A 8.24 has become a critical control for auditors and certification bodies.

Key Requirements

ISMS Framework (Plan-Do-Check-Act)

Establish, implement, maintain, and continually improve an Information Security Management System using the PDCA cycle with clear scope, leadership, and objectives.

Annex A 8.24 — Cryptography

Define and implement rules for cryptographic key management including generation, distribution, storage, rotation, revocation, and destruction of keys and certificates.

Annex A 5.17 — Authentication Information

Manage authentication information (including certificates and credentials) with controls for allocation, handling, and secure storage throughout their lifecycle.

Risk Assessment & Treatment (Clause 6)

Perform systematic risk assessments identifying threats to cryptographic assets, and define risk treatment plans that include appropriate certificate management controls.

Annex A 8.5 — Secure Authentication

Implement secure authentication mechanisms including certificate-based authentication, multi-factor authentication, and identity verification for system access.

Continuous Improvement & Audit (Clause 10)

Monitor, measure, and continually improve ISMS effectiveness through internal audits, management reviews, and corrective actions for nonconformities.

Key Milestones

05
2005

ISO 27001:2005 first published

The original international standard for ISMS is published, establishing the foundational framework for information security management worldwide.

13
2013

ISO 27001:2013 major revision

Significant restructuring of the standard with updated Annex A controls, improved alignment with other ISO management system standards.

22
2022

ISO 27001:2022 published

The latest revision published in October 2022, restructuring Annex A controls and introducing control 8.24 for cryptographic key lifecycle management.

24
2024

Transition deadline

Organizations with existing ISO 27001:2013 certifications must transition to the 2022 version by the deadline set by certification bodies.

25
2025 Current

Post-quantum considerations

Continued evolution of cryptographic controls to address post-quantum readiness, with growing emphasis on crypto agility in ISMS frameworks.

Impact on PKI & Certificates

ISO 27001:2022 places cryptographic controls at the heart of information security. Here are the critical areas where PKI is directly impacted:

1

Complete Cryptographic Key Lifecycle Management

Annex A 8.24 requires documented processes for the entire key lifecycle — generation, distribution, storage, rotation, revocation, and destruction — with full audit trails.

2

Certificate Inventory for Risk Assessment

A comprehensive certificate inventory is essential for risk assessment (Clause 6) and serves as critical audit evidence during certification and surveillance audits.

3

Policy-Driven Certificate Governance

ISMS controls demand policy-driven certificate governance including algorithm standards, validity periods, and approval workflows integrated into the management system.

4

Integration into ISMS Documentation

PKI controls must be formally documented within the ISMS, including certificate policies, procedures, and records that demonstrate continuous compliance.

How we help

Evertrust & ISO 27001

Annex A 8.24 compliance — Horizon maps directly to Annex A 8.24 cryptographic controls, providing the tooling auditors expect for key and certificate lifecycle management.

Complete certificate inventory — Discover every certificate across your infrastructure to build the comprehensive inventory needed for ISO 27001 risk assessment and audit evidence.

Automated key lifecycle — Automate the entire lifecycle from generation to destruction, eliminating manual processes and reducing the risk of non-conformities during audits.

ISMS-aligned policy enforcement — Built-in policy engine enforces certificate standards aligned with your ISMS risk treatment plans, ensuring continuous compliance.