ISO/IEC 27001:2022 evidence at the per-Annex-A-code level — the way ISO Lead Auditors actually walk Stage 2.

NSAuditor AI EE generates ISO/IEC 27001:2022 (October 2022; 2013 edition retired October 31, 2025) pre-audit gap reports mapped at the auditor-canonical per-Annex-A-code level. Signed artifacts, RFC 3161 trusted timestamps, SHA-256 chain-of-custody, suppression workflow, honest OOS framing on ISMS Clauses 4-10 (entire Management System — Information Security Policy, risk treatment plan, internal audit, management review — all operator-side) — and Zero Data Exfiltration, so ISMS-scoped customers can scan inside their own boundary without sending sensitive infrastructure data to a third-party SaaS scanner.

✓ 17 Annex A controls covered ⚠ 14 partial ⊘ 62 explicit OOS ⚡ ISMS Clauses 4-10 OOS-by-design Latest: EE 0.12.0 · 2026-05-24 · 93 controls · SoA discipline · 11 NEW 2022 · 5-attribute taxonomy

NEW · 0.12.0 · 2026-05-24 Fifth Track 3 framework EE 0.12.0 + CE 0.1.74 + agent-skill 0.1.41

ISO/IEC 27001:2022 introduction — Statement of Applicability discipline + ISMS Clauses 4-10 OOS framing + 11 NEW 2022 controls + 5-attribute taxonomy

Per-Annex-A-code mapping at 17 covered + 14 partial + 62 OOS = 93 — the complete Annex A universe across 4 themes (A.5 Organizational 37 + A.6 People 8 + A.7 Physical 14 + A.8 Technological 34). Auditor-canonical citation unit per ISO/IEC 17021-1 certification body assessors walking Stage 1 (documentation) / Stage 2 (implementation) / annual surveillance / 3-year recertification.

Statement of Applicability (SoA) per Clause 6.1.3.d discipline — every control carries soaApplicability field (always-applicable / risk-based-applicable / excludable-with-justification). Renderer surfaces SoA-pairing prompt near cover page — engine produces substrate for INCLUDED controls; the SoA inclusion/exclusion decisions are operator-side. Stage 1 assessors review the SoA FIRST before any technical evidence.

ISMS management-system Clauses 4-10 OOS-by-design — Context (Clause 4) + Leadership (5) + Planning (6) + Support (7) + Operation (8) + Performance Evaluation (9) + Improvement (10) entirely operator-side. Schema invariant rejects Clause-format keys. The 7 Major Nonconformity classes enumerated in renderer cover-page disclaimer (any one = auto-fail Stage 2): missing Information Security Policy / risk assessment / risk treatment plan / SoA / internal audit / management review / documented information.

11 NEW 2022 controls explicitly addressed — A.5.7 Threat intelligence · A.5.23 Cloud services · A.5.30 ICT readiness for BC · A.7.4 Physical security monitoring · A.8.9 Configuration management · A.8.10 Information deletion · A.8.11 Data masking · A.8.12 DLP · A.8.16 Monitoring activities · A.8.23 Web filtering · A.8.28 Secure coding. Distribution: 3 COVERED + 2 PARTIAL + 6 OOS with named operator-side platform pairings.

5-attribute taxonomy per Annex A control (NEW in 2022 edition) — controlType (preventive/detective/corrective) · informationSecurityProperties (C/I/A) · cybersecurityConcepts (identify/protect/detect/respond/recover — 5 categories, NOT 6 like NIST CSF 2.0) · operationalCapabilities (15 named) · securityDomains (4 named: Governance_and_ecosystem, Protection, Defence, Resilience).

2013-to-2022 transition discipline — transition deadline passed October 31, 2025; all active certificates must now be 2022 edition. Per-control iso2013Source field documents migration mapping (35 unchanged + 23 renamed + 57 merged-into-24 + 11 NEW = 93). Schema validation rejects 2013-edition Annex A codes.

Plugin count UNCHANGED at 24; SOC 2 + HIPAA + NIST CSF + PCI DSS matrices UNCHANGED. Pure additive framework introduction.

npm install -g nsauditor-ai@0.1.74 @nsasoft/nsauditor-ai-ee@0.12.0

ISO/IEC 27001:2022 published October 25, 2022 by ISO + IEC; supersedes ISO/IEC 27001:2013 (transition deadline October 31, 2025 passed). Structure: 7 management-system Clauses (Clauses 4-10) + 93 Annex A controls across 4 themes. Most-requested next framework after SOC 2 + HIPAA + NIST CSF 2.0 + PCI DSS v4.0.1 for EU + financial services + healthcare + global enterprise operators. NSAuditor's engine is framework-agnostic — see the SOC 2 coverage matrix, HIPAA §164.312 coverage matrix, NIST CSF 2.0 coverage matrix, and PCI DSS v4.0.1 coverage matrix for the companion frameworks.

TL;DR — what this does for ISO/IEC 27001:2022

NSAuditor AI EE generates ISO/IEC 27001:2022 per-Annex-A-code-level evidence — at the same institutional grade as SOC 2, HIPAA, NIST CSF 2.0, and PCI DSS. It maps cloud infrastructure findings (AWS, Azure, GCP) and network scan results to specific Annex A codes (A.5.15, A.8.5, A.8.24, etc.), produces signed evidence artifacts (cover-page Scope Attestation, SHA-256 chain-of-custody sidecars, RFC 3161 trusted-timestamps, cryptographic suppression signing), and ships ISO 27001 reports in machine-readable form suitable for ISO-aware GRC platform ingestion + ISO/IEC 17021-1 certification body assessor workflow.

It is not a Statement of Applicability (SoA per Clause 6.1.3.d is operator-side). It is not an ISMS management-system audit (Clauses 4-10 entirely OOS; engine produces zero substrate). It is not an internal audit per Clause 9.2 (MANDATORY operator-side; independence requirement). It is not a management review per Clause 9.3 (MANDATORY operator-side; top management). It is not a risk treatment plan (Clause 6.1.3 operator-side methodology + register). It is not a complete ISO 27001:2022 attestation (93 Annex A controls total; engine evidences 31 at MVP density).

What it IS: the per-Annex-A-code technical-evidence layer covering A.5.15-A.5.18 identity + access + cryptography substrate, A.5.23 cloud services NEW 2022 substrate, A.5.28 evidence collection (CloudTrail), A.5.33-A.5.34 records protection + PII substrate, A.5.36 compliance monitoring (Config drift), A.8.2-A.8.5 privileged access + secure auth, A.8.8 vulnerability management (CVE pipeline), A.8.9 configuration management NEW 2022 (Config recorder substrate), A.8.13 backup (AWS Backup substrate), A.8.15 logging (CloudTrail substrate), A.8.16 monitoring NEW 2022 (GuardDuty substrate), A.8.20-A.8.22 network security + segregation, A.8.24 use of cryptography (KMS substrate) — complete and assessor-ready. Compatible with operator-side ISO 27001 SoA preparation, internal audit program execution, management review cycle, and accredited certification body (BSI, DNV, BVQI, Schellman, Coalfire, A-LIGN, TÜV, SGS) Stage 1 + Stage 2 + annual surveillance workflow. Honest about what infrastructure scanning fundamentally cannot evidence (ISMS Clauses 4-10, internal audit execution, management review, risk treatment methodology) — saves you from the textbook ISO-canonical overclaim findings.

The market split: ISO-aware GRC platforms (Drata ISO 27001, Vanta ISO 27001, AuditBoard, OneTrust ISMS, Secureframe ISO 27001) automate SoA workflow + ISMS Clauses 4-10 + risk register + internal audit + management review + supplier risk management but lack deep cloud-infrastructure scanning at the per-Annex-A-code-evidence level. Legacy compliance scanners produce voluminous CVE reports but don't map findings to Annex A controls at the auditor-canonical per-code level. NSAuditor's wedge is the bridge — deep cloud + network scanning + ISO 27001:2022 per-Annex-A-code-mapped output + same Zero Data Exfiltration architecture used for SOC 2 + HIPAA + NIST CSF + PCI DSS (sensitive data never leaves customer infrastructure; air-gapped deployment for operator threat models requiring controlled boundary per Clause 4.3 ISMS scope).

Why per-Annex-A-code-level mapping

ISO/IEC 27001:2022 Annex A has a 2-level hierarchy:

ISO Lead Auditors walk Stage 2 + annual surveillance per-Annex-A-code against the operator's Statement of Applicability inclusions. Auditor-canonical evidence is per-Annex-A-code. Theme-level claims (e.g., "we cover A.8 Technological") don't survive institutional ISO Lead Auditor review — A.8 alone spans 34 controls; the assessor will ask which specific Annex A codes with what evidence.

NSAuditor maps at the per-Annex-A-code level. Per-control fields in data/compliance/iso-27001.json:

FieldTypePurpose
idstringAnnex A code in canonical ISO form: A.X.Y (e.g., A.5.15, A.8.9).
themeenumOne of A.5 Organizational / A.6 People / A.7 Physical / A.8 Technological — the parent theme group.
annexACodestringFull Annex A code (regex-validated ^A\.[5-8]\.[0-9]{1,2}$).
controlObjectivestringISO/IEC 27002:2022 implementation-guidance outcome statement (the auditor-citation-source-of-truth).
soaApplicabilityenumEither always-applicable, risk-based-applicable, or excludable-with-justification — per-control SoA-pairing discipline gating inclusion decision per Clause 6.1.3.d.
isoEditionstringAlways "2022" (the only active edition since transition deadline passed October 31, 2025); 2013-edition codes rejected at schema layer.
iso2013Sourcestring|null2013-edition Annex A source code(s) for migration cross-reference; null for the 11 NEW 2022 controls.
attributes.controlTypeenum[]Array containing preventive, detective, and/or corrective — 5-attribute taxonomy NEW in 2022.
attributes.informationSecurityPropertiesenum[]Array of confidentiality / integrity / availability — CIA properties.
attributes.cybersecurityConceptsenum[]Array of identify / protect / detect / respond / recover5 categories (NOT 6 like NIST CSF 2.0).
attributes.operationalCapabilitiesenum[]Array of 15 named values (Governance, Asset_management, Information_protection, etc.).
attributes.securityDomainsenum[]Array of Governance_and_ecosystem / Protection / Defence / Resilience (4 domains per ISO/IEC TS 27110).
cloudProviderAttestationobjectPer-cloud-provider ISO 27001:2022 Certificate reference: {aws, azure, gcp}. Cited names current as of 2026-Q1. Annual currency-review cadence institutionalized.
informativeReferencesstring[]ISO/IEC 27002:2022 + NIST SP 800-53 Rev. 5 + NIST CSF 2.0 + CIS Controls v8 cross-refs.

The 6 load-bearing schema enrichments (theme + annexACode + controlObjective + soaApplicability + isoEdition + iso2013Source) + the 5-attribute taxonomy + cloudProviderAttestation defend against 17 ship-blocker classes surfaced by the EE 0.12.0 P0 skill-research synthesis (Skill #18 audit-iso-27001-2022-statement-of-applicability + audit-soc2-evidence-sufficiency + audit-hipaa-risk-analysis-ocr + audit-nist-csf-2-implementation-tiers + audit-pci-dss-qsa-perspective lenses applied PRE-author at tasks/audit-iso-27001-2026-05-24.md). A schema-additive-fields propagation test enforces these fields reach the rendered report.

Statement of Applicability discipline (Clause 6.1.3.d)

The Statement of Applicability per Clause 6.1.3.d is THE central artifact of an ISMS conformant to ISO/IEC 27001:2022. For each of the 93 Annex A controls, the operator's SoA documents:

  1. Control reference — the Annex A code (e.g., A.5.15) + the control title from ISO/IEC 27001:2022 Annex A
  2. Inclusion or exclusion decision — "Included" or "Excluded"
  3. Justification — anchored to the operator's risk assessment per Clause 6.1.2, legal/regulatory/contractual requirements per Clause 4.2 + A.5.31, and ISMS scope statement per Clause 4.3
  4. Implementation status — Planned / In progress / Implemented / Not applicable
  5. Reference to documentation — pointer to policies / procedures / runbooks / technical configuration evidence

Stage 1 certification body assessors review the SoA FIRST — before any technical evidence. The SoA must address every Annex A control; exclusions need particularly strong justification.

How NSAuditor pairs with the SoA

NSAuditor outputSoA pairing per Clause 6.1.3.d
Covered control (e.g., A.5.15: covered)SoA shows control as Included, implementation status = Implemented, with this report as documentation reference
Partial control (e.g., A.5.17: partial)SoA shows control as Included, implementation status = In progress, with documented remediation plan
OOS — operator-side substrate (e.g., A.6.3 Awareness training: OOS — KnowBe4)SoA shows control as Included, implementation status pointing to operator's LMS evidence
OOS — structurally-OOS (e.g., A.7.1 Physical security perimeters for cloud-hosted operator)SoA shows control as Excluded with justification "operator uses [AWS / Azure / GCP] shared-responsibility model; [Provider] ISO 27001:2022 Certificate covers physical perimeter"

SoA discipline checklist: Completeness (all 93 controls addressed; no skips) · Justification quality (exclusions particularly scrutinized) · Internal consistency (risk register → risk treatment decisions per Clause 6.1.3 → SoA inclusions) · Edition currency (2022 codes, not 2013) · 11 NEW controls each explicitly addressed · Documentation traceability (implementation references producible on demand). If the SoA fails Stage 1, Stage 2 does NOT proceed — operator must remediate before scheduling Stage 2.

ISMS Clauses 4-10 — OOS-by-design

ISO/IEC 27001:2022 certification requires BOTH dimensions:

  1. Annex A control implementation (93 controls — engine produces substrate per this report)
  2. ISMS management-system Clauses 4-10 (operator-side processes — OOS-by-design for any infrastructure scanner)

This report evidences (1) only. For (2), pair with your GRC platform.

ClauseTitleWhy OOSOperator-side pairing
Clause 4Context of the organizationExternal/internal issues + interested parties + ISMS scopeISMS Manual (Confluence / Notion)
Clause 5LeadershipBoard-approved Information Security Policy per Clause 5.2 + RACI per Clause 5.3Board minutes + signed policy artifact
Clause 6PlanningRisk-assessment methodology + risk register + risk-treatment plan + SoA per Clause 6.1.3.dRisk-management platform (LogicGate, Resolver, Riskonnect) + GRC SoA-management surface
Clause 7SupportResources + competence + awareness + communication + documented informationHR system + LMS (KnowBe4 / Proofpoint / SANS) + document-control DMS
Clause 8OperationExecution of Clause 6 risk-assessment + risk-treatment processesPeriodic execution records in GRC platform
Clause 9Performance EvaluationMonitoring + measurement + internal audit per Clause 9.2 (MANDATORY) + management review per Clause 9.3 (MANDATORY)AuditBoard / OneTrust / Drata internal-audit module + structured management-review meeting cadence
Clause 10ImprovementCorrective-action records + continual-improvement logCAPA system + GRC continual-improvement tracking

The 7 Major Nonconformity classes (any one = auto-fail Stage 2)

  1. No Information Security Policy (Clause 5.2) — operator has no board-approved policy
  2. No risk assessment process (Clause 6.1.2) — operator has no documented methodology
  3. No risk treatment plan (Clause 6.1.3) — operator has not produced one
  4. No Statement of Applicability (Clause 6.1.3.d) — operator has not produced the SoA
  5. No internal audit program (Clause 9.2) — operator has never conducted an internal audit
  6. No management review (Clause 9.3) — operator's top management has never formally reviewed the ISMS
  7. No documented information (Clause 7.5) — operator's policies/procedures are undocumented or unmaintained

These 7 classes account for the majority of first-time Stage 2 failures. Verify operator-side artifacts BEFORE scheduling Stage 2 audit with your accredited certification body.

Coverage matrix by theme

Source of truth is data/compliance/iso-27001.json; this matrix mirrors it. The anchor-drift defense test asserts every (source, titlePattern) pair in iso-27001.json exists in soc2.json (inheritance contract — closes the silent false-CLEAN class at the ISO 27001 mapping layer, parallel to HIPAA + NIST CSF + PCI DSS inheritance defenses).

ThemeTotalCoveredPartialOOSNotes
A.5 Organizational 37 5 9 23 Strong fit on identity + access + cryptography substrate. Heavy OOS on policy / governance / TPRM / IR (operator-side).
A.6 People 8 0 0 8 Entirely OOS — workforce-lifecycle dimensions. Pair with HR system + LMS + endpoint-management.
A.7 Physical 14 0 0 14 Entirely OOS — facility-tier. Cloud-hosted operators inherit from cloud-provider ISO 27001:2022 Certificate.
A.8 Technological 34 12 5 17 Strongest substrate match. Covered: privileged access + secure auth + vulnerability mgmt + config mgmt + backup + logging + monitoring + network security + cryptography. OOS: SDLC + endpoint-management + application-tier.
TOTAL 93 17 14 62 Complete Annex A universe addressed.

How to run an ISO 27001 scan

$ nsauditor-ai scan <target> --compliance iso-27001 # Output: reports/compliance/iso-27001-<scan-id>.md + .html + .json # + chain-of-custody envelope + SHA-256 sidecars + RFC 3161 .tsr sidecars

Penta-framework: SOC 2 + HIPAA + NIST CSF + PCI DSS + ISO 27001 in one scan

The engine is framework-agnostic — single scan, five compliance reports, zero duplicate scanning effort:

$ nsauditor-ai scan <target> --compliance soc2,hipaa,nist-csf,pci-dss,iso-27001 # Output: 5 framework-specific reports from 1 finding stream # reports/compliance/soc2-<scan-id>.md + .html + .json # reports/compliance/hipaa-<scan-id>.md + .html + .json # reports/compliance/nist-csf-<scan-id>.md + .html + .json # reports/compliance/pci-dss-<scan-id>.md + .html + .json # reports/compliance/iso-27001-<scan-id>.md + .html + .json # All share the same chain-of-custody envelope + signed artifacts

Cross-framework citation isolation defended by test: ISO 27001 renderer output cites only Annex A codes (A.X.Y format); SOC 2 / HIPAA / NIST CSF / PCI DSS citations never leak into ISO 27001 reports (10-pair-direction cross-framework defense matrix).

What you get — output artifacts

Covered Annex A controls (17)

Strongest substrate match — engine evidences full implementation:

A.5 Organizational (5)

A.8 Technological (12)

Partial Annex A controls (14)

Substrate present, operator-side completion needed:

A.5 Organizational (9)

A.8 Technological (5)

Theme A.6 People + A.7 Physical — entirely OOS (22 controls)

22 of 93 Annex A controls = entirely OOS for cloud-hosted operators. Theme A.6 People (8 controls) is workforce-lifecycle; Theme A.7 Physical (14 controls) is facility-tier. For cloud-hosted operators, A.7 is inheritable from cloud-provider's ISO 27001:2022 Certificate via shared-responsibility model.

Theme A.6 People (8 controls — entirely OOS)

A.6.1 Screening (HR background checks) · A.6.2 Terms of employment (HR contracts) · A.6.3 Awareness training (LMS — KnowBe4, Proofpoint, SANS) · A.6.4 Disciplinary process (HR) · A.6.5 Post-termination responsibilities (HR offboarding) · A.6.6 NDAs (legal — DocuSign, Adobe Sign) · A.6.7 Remote working (endpoint-management — Intune, JAMF, Kandji) · A.6.8 Event reporting (incident-reporting channel — Slack, PagerDuty)

Theme A.7 Physical (14 controls — entirely OOS)

A.7.1 Physical perimeters · A.7.2 Physical entry · A.7.3 Securing offices · A.7.4 Physical security monitoring ⭐ NEW 2022 · A.7.5 Environmental threats · A.7.6 Secure areas · A.7.7 Clear desk/screen · A.7.8 Equipment siting · A.7.9 Off-premises assets · A.7.10 Storage media · A.7.11 Supporting utilities · A.7.12 Cabling security · A.7.13 Equipment maintenance · A.7.14 Disposal/re-use. Cloud-hosted: ENTIRELY inheritable from AWS / Azure / GCP ISO 27001:2022 Certificate (current as of 2026-Q1). On-premises: pair with facility-access systems (Brivo, S2 Security, Genetec) + CCTV (Verkada, Avigilon — relevant for NEW 2022 A.7.4).

11 NEW 2022 controls — coverage summary

CodeTitleEE statusOperator-side pairing
A.5.7Threat intelligenceOOSRecorded Future / Mandiant / ThreatConnect / Anomali TIP
A.5.23Cloud servicesCoveredCloud-provider AOC inheritance substrate
A.5.30ICT readiness for BCOOSVeeam / Cohesity / Datto + BCP testing cadence
A.7.4Physical security monitoringOOSCloud-provider physical AOC (cloud-hosted); facility CCTV (on-prem)
A.8.9Configuration managementCoveredConfig recorder + drift detection substrate
A.8.10Information deletionPartialS3 lifecycle + KMS key-deletion; operator data-disposal records
A.8.11Data maskingOOSHashicorp Vault / Skyflow / Very Good Security
A.8.12Data leakage preventionPartialMacie + DLP-config; endpoint DLP (Proofpoint, Forcepoint)
A.8.16Monitoring activitiesCoveredCloudTrail + GuardDuty + EventBridge; SIEM correlation
A.8.23Web filteringOOSCloudflare Gateway / Zscaler / Netskope SWG
A.8.28Secure codingOOSSemgrep / Snyk / GitHub Advanced Security / Sonatype

Pattern: 3 covered (cloud-service-inherited or substrate-native) + 2 partial (substrate + operator completion) + 6 OOS (process-driven or operator-side platform-required). Each NEW control must be explicitly addressed in operator's SoA — silent omission is a freshness-signal failure.

2013-to-2022 transition discipline

Transition deadline passed October 31, 2025. All active ISO 27001 certificates must now be 2022 edition. 2013-edition SoAs are stale. Schema validation in data/compliance/iso-27001.json rejects 2013-edition Annex A codes (A.9.*, A.10.*, A.11.*, A.12.*, A.13.*, A.14.*, A.15.*, A.16.*, A.17.*, A.18.* prefixes).

Migration pattern: 35 unchanged + 23 renamed + 57 merged-into-24 + 11 NEW = 93 controls in 2022 (down from 114 in 2013). Zero controls deleted entirely from 2013 — but some 2013 controls' content distributed across multiple 2022 controls (operator must re-thread justifications).

Example merges (per the iso2013Source field on each control):

Migration pitfalls: Re-categorization not just renaming (2013's 14 categories A.5-A.18 collapsed to 4 themes A.5-A.8); 57-into-24 merges may obscure operator's prior implementation; 11 NEW controls have no 2013 source. For comprehensive 2013-to-2022 mapping, refer to ISO/IEC 27002:2022 Annex B (the official mapping) or the transition guide published by accredited certification bodies (BSI / DNV / BVQI / Schellman / Coalfire / A-LIGN).

5-attribute taxonomy (NEW in 2022 edition)

Each Annex A control in 2022 carries five attributes for assessor-style navigation:

AttributeValuesPurpose
controlTypepreventive / detective / correctiveWhat the control DOES with respect to security events
informationSecurityPropertiesconfidentiality / integrity / availabilityThe CIA dimension(s) the control supports
cybersecurityConceptsidentify / protect / detect / respond / recover (5 categories)High-level security function alignment. NOT 6 categories like NIST CSF 2.0 — NIST added Govern in 2024; ISO 27001:2022 retains the original 5.
operationalCapabilities15 named (Governance, Asset_management, Information_protection, Human_resource_security, Physical_security, System_and_network_security, Application_security, Secure_configuration, Identity_and_access_management, Threat_and_vulnerability_management, Continuity, Supplier_relationships_security, Legal_and_compliance, Information_security_event_management, Information_security_assurance)Operational dimension grouping
securityDomainsGovernance_and_ecosystem / Protection / Defence / Resilience (4 domains per ISO/IEC TS 27110)Strategic domain grouping

The renderer surfaces attribute-grouped views ("All preventive controls" / "All confidentiality-property controls") at per-Annex-A surface for assessor walkthroughs.

Certification-cycle cadence — Stage 1 → Stage 2 → surveillance → recertification

ISO 27001 certification follows a 3-year cycle. Evidence needs differ per stage:

StageCadenceWhat's evidencedNSAuditor role
Stage 1Initial certificationDocumentation review (SoA, policies, risk treatment plan, internal-audit program, management review cadence)Pair with GRC platform — Stage 1 is operator-side documentation
Stage 21-3 months after Stage 1Implementation + operating-effectiveness samplingEngine substrate is PRIMARY evidence
Annual surveillanceYears 1 + 2Sample of controls each year (typically 30-50%)Engine substrate at appropriate cadence for control's operating frequency
RecertificationYear 3Full re-auditEngine evidence corpus across full 3-year window

Accredited certification bodies (ISO/IEC 17021-1): BSI, DNV, BVQI, Schellman, Coalfire, A-LIGN, TÜV, SGS, Lloyd's Register, NQA, Intertek, KPMG, EY. Pricing typically $15K-$50K for initial Stage 1 + Stage 2 (mid-market scope); $5K-$15K for annual surveillance. Cert body selection: prefer those with ISO 27001 specialization + your target customer-base familiarity (financial services → BSI / DNV; healthcare → Schellman / Coalfire; federal-contractor scope → A-LIGN / Schellman).

Cloud-provider ISO 27001:2022 Certificate inheritance

For cloud-hosted operators, Theme A.7 Physical (all 14 controls) is entirely inheritable from cloud-provider's ISO 27001:2022 Certificate via shared-responsibility model:

Per-control cloudProviderAttestation field in data/compliance/iso-27001.json documents the per-cloud-provider Certificate reference. Cloud-provider Certificates are reissued on the provider's own 3-year cycle with annual surveillance — re-pull the current Certificate at every EE release cycle + every annual surveillance.

Zero Data Exfiltration — operator-controlled boundary per Clause 4.3 ISMS scope

NSAuditor AI EE inherits the same Zero Data Exfiltration architecture across all 5 supported frameworks:

This architecture is institutionally critical for ISO 27001:2022 because Clause 4.3 (ISMS scope) + Clause 5.2 (information security policy) require operator-controlled boundaries — a SaaS compliance tool that ingests scan data into a third-party cloud environment introduces a new TPSP per A.5.19-A.5.21 that operator's SoA must address. Zero Data Exfiltration sidesteps that TPSP expansion entirely.

Comparison vs the ISO 27001 market

SurfaceNSAuditor AI EEDrata / Vanta / Secureframe ISO 27001AuditBoard / OneTrust ISMS
Annex A control coverage17 covered + 14 partial = 31 substrate-evidencedSoA workflow + checklist trackingSoA workflow + GRC integration
Per-Annex-A-code-mapped findingsLimitedManual
Cloud infrastructure scanning depth✅ (24 plugins across AWS / Azure / GCP / network)Surface-levelNone
Internal audit (Clause 9.2) workflowOOS (operator-side)
Management review (Clause 9.3) workflowOOS (operator-side)
Risk register (Clause 6.1.2)OOS (operator-side)
Zero Data ExfiltrationSaaS (data leaves operator env)SaaS (data leaves operator env)

Positioning: NSAuditor + ISO-aware GRC platform = full ISO 27001:2022 coverage. NSAuditor handles the substrate-evidence dimension where it's strongest (per-Annex-A-code technical configuration + signed evidence); GRC platform handles SoA + ISMS Clauses 4-10 + risk register + internal audit + management review workflow. The bundle is institutionally complete; each tool standalone leaves gaps the other fills.

ISO Lead Auditor FAQ

Does this report substitute for our Statement of Applicability?

No. The SoA per Clause 6.1.3.d is operator-side, maintained in your ISO-aware GRC platform. This report is INPUT to your SoA — for each covered/partial control, your SoA shows the control as Included with implementation status = Implemented/In progress + this report as documentation reference.

Does this report substitute for our internal audit per Clause 9.2?

No. Internal audits per Clause 9.2 are MANDATORY operator-side processes — must verify ISMS conforms to ISO 27001:2022 + the operator's own requirements + is effectively implemented and maintained. Cannot be performed by the same people who designed/implemented the ISMS (independence requirement). Absence = auto-fail Major Nonconformity.

Does this report substitute for our management review per Clause 9.3?

No. Management reviews per Clause 9.3 are MANDATORY — top management reviews the ISMS at planned intervals. Specific inputs + outputs required per the standard. Absence = auto-fail Major Nonconformity.

We're migrating from a 2013 certification. Can we use our existing SoA?

No. The 2013 edition transition deadline passed October 31, 2025. All active certificates must be 2022 edition. Use the iso2013Source field in data/compliance/iso-27001.json to map your 2013 controls to 2022 Annex A codes. Re-author your SoA against the 2022 Annex A before your next surveillance audit.

How do we address the 11 NEW 2022 controls in our SoA?

Each NEW control must be explicitly addressed (Included or Excluded with justification). 3 are substrate-evidenceable (A.5.23 cloud services, A.8.9 configuration management, A.8.16 monitoring activities — NSAuditor maps these); 2 are partial-substrate (A.8.10 information deletion, A.8.12 DLP); 6 are operator-side platform-required (A.5.7 threat intelligence, A.5.30 ICT readiness, A.7.4 physical security monitoring, A.8.11 data masking, A.8.23 web filtering, A.8.28 secure coding). See the per-control rows above for named operator-side platform pairings.

Why does the engine show 5 cybersecurity concepts and not 6 like NIST CSF 2.0?

ISO 27001:2022 retains the original 5 cybersecurity concepts (identify / protect / detect / respond / recover). NIST CSF 2.0 added Govern as the 6th category in 2024 — but ISO 27001:2022 was published in October 2022 and retains the original 5. The engine's per-control attributes.cybersecurityConcepts field reflects ISO 27001:2022 semantics; do not conflate with NIST CSF 2.0's 6 categories. A schema-level test asserts no 'govern' value leaks into the ISO 27001 cybersecurityConcepts attribute.

What's the difference between the engine's controlType and operating effectiveness?

controlType describes WHAT the control does (preventive = blocks events; detective = detects events; corrective = remediates after events). Operating effectiveness is WHETHER the control is operating correctly across the assessment window. NSAuditor evidences the CONFIGURATION substrate (i.e., the control is configured in a way that supports its type); operating effectiveness across the assessment window requires audit-log sampling + SIEM correlation that pair with engine substrate.

Our cloud provider has an ISO 27001:2022 Certificate. Can we exclude all A.7 Physical controls from our SoA?

Likely yes for cloud-hosted operators. The cloudProviderAttestation field references the cloud-provider Certificates (AWS / Azure / GCP). Your SoA shows A.7.* controls as Excluded with justification "operator uses [AWS / Azure / GCP] shared-responsibility model; [Provider]'s ISO 27001:2022 Certificate covers the physical layer." Provide the current [Provider] Certificate to your assessor at Stage 1.

What's the cadence for re-verifying cloud-provider Certificates?

Annually. Cloud-provider Certificates are reissued on the provider's own 3-year cycle with annual surveillance — re-pull the current Certificate at every EE release cycle + every annual surveillance.

What's the recommended approach for documenting evidence cadence for surveillance?

Schedule scans at cadence matching the control's operating frequency. For continuous-monitoring controls (A.8.16 Monitoring activities), monthly or weekly scans align to "continuous" semantics. For periodic-review controls (A.5.36 Compliance reviews), quarterly scans align. Operator's SoA documents the planned cadence; engine substrate evidences the executed cadence.

Does NSAuditor cover ISO/IEC 27001:2013?

No — explicitly only ISO/IEC 27001:2022. The 2013 edition transition deadline passed October 31, 2025. The version pin is enforced in data/compliance/iso-27001.json version: "2022" and reflected in the rendered frameworkLabel. Schema validation rejects 2013-edition Annex A codes.