ComplyGuideComplyGuide
HomeSoftwareLearn
Submit a Tool
ComplyGuideComplyGuide

Find and compare the best compliance automation tools. Trusted by thousands of compliance professionals.

Directory

  • All Vendors

Frameworks

  • SOC 2
  • HIPAA
  • GDPR
  • ISO 27001
  • PCI DSS
  • FedRAMP
  • NIST CSF

Resources

  • Learn

For Vendors

  • Submit a Tool
  • Premium Subscription
  • Claim Your Listing

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 ComplyGuide. All rights reserved.

Made for compliance professionals

Get a RecommendationBrowse Tools
Home/Learn/ISO 27001/ISO 27001 Statement of Applicability (SoA) Guide
Implementation
8 min read|January 15, 2025|Reviewed: March 20, 2026

ISO 27001 Statement of Applicability (SoA) Guide

Quick Answer

The Statement of Applicability (SoA) is a mandatory ISO 27001 document that lists all 93 Annex A controls and states whether each is applicable or not, with justification. It's the bridge between your risk assessment and your implemented controls.

Reviewed by ComplyGuide Editorial Team·Updated January 15, 2025

What Is the Statement of Applicability?

The Statement of Applicability (SoA) is one of the most important documents in your ISMS. Required by Clause 6.1.3(d), it's a comprehensive document that lists every Annex A control and records your decision about each one: is it applicable? Is it implemented? Why or why not?

Key Takeaways

  • Mandatory document required by ISO 27001 Clause 6.1.3(d)
  • Must list all 93 Annex A controls with applicability status and justification
  • Links your risk assessment to your actual control implementation
  • Auditors review the SoA extensively — it's a primary audit artifact
  • Should be a living document, updated when risks or controls change

SoA Required Content

Statement of Applicability Fields
FieldDescriptionExample
Control ReferenceAnnex A control number and nameA.8.5 Secure Authentication
Applicable (Yes/No)Whether the control applies to your ISMSYes
Justification for Inclusion/ExclusionWhy the control is or isn't applicableRequired to address risk R-012: Unauthorized access to production systems
Implementation StatusCurrent state of the controlImplemented — MFA enforced on all production access
Implementation MethodHow the control is achievedOkta SSO with hardware key MFA for all production systems
Risk ReferenceLink to the risk(s) this control addressesR-012, R-015

Creating Your SoA

Step-by-Step SoA Creation

1
Complete the risk assessment first

The SoA must be informed by your risk assessment. You need to know your risks before you can determine which controls are applicable. Don't create the SoA before the risk assessment.

2
List all 93 Annex A controls

Create a document or spreadsheet listing every Annex A control. Most compliance platforms provide this as a template. Include the control number, name, and description.

3
Determine applicability for each control

For each control, decide if it applies to your ISMS scope. Consider: Does this control address an identified risk? Is it relevant to your operations? Is it required by legal/regulatory obligations?

4
Document justifications

For every control — whether included or excluded — document why. Included controls should reference specific risks. Excluded controls need clear justification (e.g., 'Physical security monitoring not applicable — fully remote organization with no physical premises').

5
Record implementation status

For applicable controls, document: fully implemented, partially implemented, or planned. Include how the control is implemented and what evidence exists.

6
Get management approval

The SoA should be formally approved by management, as it represents the organization's decisions about risk treatment.

Common SoA Mistakes

  • Marking everything as applicable: If all 93 controls are applicable, auditors will question whether you did a genuine risk assessment or just selected everything
  • Weak exclusion justifications: 'Not applicable' is not a justification. Explain why: 'No mobile devices used in ISMS scope' for mobile device management controls
  • Disconnected from risk assessment: The SoA must trace to your risk assessment. If a control is included, it should address an identified risk. Random control selection undermines the risk-based approach
  • Treating it as static: The SoA should be updated whenever your risk profile changes, new controls are implemented, or the ISMS scope changes
  • Missing implementation details: Simply stating 'implemented' without describing how is insufficient. Auditors need to understand the implementation method

✅ SoA as a Security Dashboard

Think of your SoA as a high-level dashboard of your entire security control environment. When done well, anyone (auditors, management, customers) can look at the SoA and understand what controls you have, why, and how they're implemented. It's your single source of truth for control decisions.

93

Controls to Assess

Every Annex A control must be addressed

Clause 6.1.3(d)

ISO 27001 Requirement

Mandates the SoA document

60-80

Typical Applicable Controls

Most organizations implement

Living Document

Update Frequency

Review with each risk assessment cycle

Can I exclude controls from the SoA?

Yes, and you should exclude controls that aren't relevant to your risk profile or ISMS scope. However, you must document a clear justification for each exclusion. Auditors will specifically check that exclusions are reasonable and well-justified.

What format should the SoA be in?

ISO 27001 doesn't mandate a format. Most organizations use a spreadsheet or their compliance platform's built-in SoA module. The key is that it's comprehensive, clear, and easy to update. Templates are widely available.

How often should the SoA be updated?

At minimum, review the SoA during each risk assessment cycle (at least annually). Also update it when: new risks are identified, controls are added or removed, the ISMS scope changes, or significant organizational changes occur.

Do auditors focus heavily on the SoA?

Yes. The SoA is one of the first documents auditors review. It gives them a roadmap of your entire control environment. They'll check that control selections are justified by risks, exclusions are reasonable, and stated implementations match reality.

Build Your Statement of Applicability

Compare platforms with SoA templates, control mapping, and automated evidence tracking.

Browse ISO 27001 Tools
ISO 27001
Statement of Applicability
SoA
controls

On this page

What Is the Statement of Applicability?SoA Required ContentCreating Your SoACommon SoA Mistakes

ISO 27001 Tools & Comparisons

Explore ISO 27001 compliance tools, pricing, and side-by-side comparisons.

Best ISO 27001 ToolsAll ISO 27001 VendorsMore ISO 27001 Guides

Related Articles

Overview
10 min read

What Is ISO 27001? The Complete Guide

ISO 27001 is the international standard for information security management systems (ISMS). It provides a systematic framework for managing sensitive company and customer information through risk assessment, security controls, and continuous improvement processes.

Requirements
11 min read

ISO 27001 Annex A Controls Explained

ISO 27001:2022 Annex A contains 93 controls organized into 4 themes: Organizational (37), People (8), Physical (14), and Technological (34). These controls cover everything from access management and encryption to supplier relationships and incident response.

Implementation
10 min read

ISO 27001 Risk Assessment: Complete Guide

The ISO 27001 risk assessment is the cornerstone of the ISMS. It requires you to identify information security risks, analyze their likelihood and impact, evaluate them against your risk criteria, and select appropriate controls from Annex A to treat unacceptable risks.