March 25, 2024

ISO 27001:2022 Annex A Control 5.8: Information Security in Project Management

Annex 5.4 of the 2022 version of the ISO27001 standard can be mapped to ISO 27001:2013 Annex A 6.1.5and ISO 27001:2013 Annex A 14.1.1

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

Annex A control 5.8 ensures that any project management includes information security measures, helping to effectively manage any information security risks related to projects and deliverables.

Project security is a key consideration in any project management, as many projects involve the updating of systems that impact information security. Annex 5.8 documents information security requirements and concerns for project management to ensure their resolution throughout the life cycle of the project.

Project management information security

Any project must take information security into consideration, regardless of type or scale. Cybersecurity should be intrinsic to the foundation of an organisation, and project management is critical to this. Control 5.8 recommends a simple, repeatable checklist that can be used for all projects.

Organisations should incorporate annex 5.8 for personal data, considering Data Protection Impact Assessments (DPIAs) and other processes in order to demonstrate compliance with both the General Data Protection Regulation (GDPR) and the Data Protection Act 2018.

Annex 5.6 can be used in conjunction with annex 5.8 to bolster information security measures. A risk assessment should be carried out whenever systems are introduced or updated to determine the requirements for security controls.

By outlining and agreeing upon security requirements, organisations have reference points to utilise when undertaking projects.

Meeting the requirements of control 5.8

Every project must have IS requirements assessed by a project manager. Prioritising information security in project management allows organisations to highlight, evaluate, and address security risks. It should not be something that is done to a project, but something that is part of the project.

IS managers have a responsibility to work with project managers to assess and address information security risks, as part of the project management process. According to annex 5.8, project management systems require the following:

  • Security risks are assessed and addressed early and frequently during the project’s life cycle.
  • Information security requirements identified early in the project’s development.
  • Information security risks associated with the project’s execution should be considered and addressed, including the security of internal and external communication channels.
  • Evaluations of the effectiveness of information security measures should be conducted.

How has control 5.8 changed from ISO27001:2013?

Implementation guidelines for information security in project management now reflect more clarifications than in ISO27001:2013. The earlier version contained three points that every project manager should know related to information security. In the updated version, this has been expanded to four points.

While not a new control, Annex A control 5.8 brings significant changes to the standard, while also combining ISO27001:2013 Annex A controls 6.1.5 and 14.1.1 to make it more user-friendly.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Preparing for Your Audit
IT and Services
Enterprise