ISO 27001 is increasingly appearing as a mandatory requirement in defense software procurement frameworks across Europe and beyond. What was once a preferred differentiator has become a baseline expectation: vendors without a current ISO 27001:2022 certification are being excluded from tender shortlists before technical evaluation begins. Understanding what the standard actually requires — not just what the certificate looks like — is essential for both vendors seeking certification and procurement officers evaluating bids.
This article examines what ISO 27001:2022 requires in the context of software development organizations, where the 2022 revision introduced meaningful changes, and what the certification practically means for development processes, team composition, and project delivery.
What ISO 27001:2022 Is — and What Changed
ISO 27001 is an international standard specifying requirements for an Information Security Management System (ISMS). Unlike technical security standards that prescribe specific controls, ISO 27001 requires organizations to identify their information security risks, implement appropriate controls to manage those risks, and operate a continuous improvement cycle to maintain security posture over time.
The 2022 revision replaced ISO 27001:2013 and introduced substantial changes to Annex A, which contains the reference control set. The 2013 version had 114 controls across 14 domains. The 2022 version restructured these into 93 controls across 4 themes: organizational controls, people controls, physical controls, and technological controls. More significantly, 11 new controls were introduced — covering areas directly relevant to software development organizations:
- Threat intelligence (5.7) — organizations must collect and analyze information about threats relevant to their context
- Information security for use of cloud services (5.23) — explicit requirements for cloud usage governance
- ICT readiness for business continuity (5.30) — continuity planning must consider ICT dependencies
- Web filtering (8.23) — controls on what internet resources systems can access
- Secure coding (8.28) — formal requirements for secure development practices
- Data masking (8.11) — requirements for masking sensitive data in non-production environments
For defense software vendors, control 8.28 (Secure coding) is particularly significant. The 2022 standard now explicitly requires that organizations apply secure coding principles in software development — meaning that secure development practices must be documented, followed, and audited, not just mentioned in a policy document.
Key Controls Relevant to Software Development
ISO 27001 does not mandate specific technologies or development methodologies. What it mandates is a structured approach to identifying and managing information security risks throughout the software development lifecycle. In practice, this translates to several categories of requirements that affect how a software development organization operates.
Access control (8.2–8.5). The standard requires that access to systems, code repositories, and deployment infrastructure be managed on a least-privilege basis. For defense software development, this means developers should not have production access, code review must gate merges to protected branches, and privileged access to deployment systems must be time-limited and logged. Access rights must be reviewed periodically and revoked promptly when personnel leave or change roles.
Cryptography (8.24). Organizations must have a policy governing cryptographic controls: which algorithms are approved, how keys are managed, and who is responsible for cryptographic decisions. For defense software, this typically means alignment with national cryptographic standards (e.g., CNSS-approved algorithms in the US, BSI-approved in Germany) rather than arbitrary algorithm choice.
Secure development lifecycle (8.25–8.31). The standard requires that security be integrated across the development process: security requirements must be specified at the design stage, security testing must be performed before release, and dependencies (libraries, frameworks) must be assessed for vulnerabilities. This directly requires practices like threat modeling, static analysis, dependency vulnerability scanning, and penetration testing.
Incident management (5.24–5.28). Organizations must have documented procedures for detecting, reporting, and responding to security incidents. For software development environments, this means monitoring for anomalous access to code repositories, unusual build behavior (a common indicator of supply chain attacks), and unauthorized changes to deployment configurations.
Procurement note: When evaluating ISO 27001 certificates, always verify the certification scope statement. A certificate covering only "corporate headquarters" or "administrative functions" provides no assurance over the development environment where code is actually written. The scope must explicitly include software development activities and the infrastructure supporting them.
What Really Changes in Development Processes
Organizations pursuing ISO 27001 certification for the first time typically discover that the standard's impact on their development processes is more substantial than anticipated. The following changes are consistently required and consistently underestimated.
Risk assessment becomes a documented artifact. ISO 27001 requires that information security risks be identified, assessed, and tracked. For software development, this means producing a risk register that covers development environment risks (compromised developer workstations, repository access), supply chain risks (malicious dependencies, compromised build tools), and operational risks (misconfigured deployments, inadequate access revocation). The risk register is not a one-time document — it must be reviewed and updated at defined intervals and whenever significant changes occur.
SDLC gates become mandatory checkpoints. Security requirements must be captured at the start of each development cycle. Security testing must be performed before software is released. These are not optional activities that can be deferred to the next sprint — ISO 27001 requires that they be embedded in the development process with evidence that they occurred. Auditors will ask for security test results, not just assurances that testing was performed.
Supplier and dependency management requires formal treatment. The standard requires that information security requirements be communicated to suppliers and that supplier relationships be monitored. For software development, this encompasses the open-source libraries and third-party components used in the software. A process for evaluating new dependencies, tracking known vulnerabilities in existing dependencies, and responding to newly disclosed vulnerabilities must exist and be documented.
Personnel security requirements affect hiring and onboarding. ISO 27001 requires background verification for personnel whose roles involve access to sensitive information assets. For defense software vendors, this may need to align with national security requirements (vetting standards), and the ISMS must document how personnel security is implemented and maintained. This affects onboarding timelines and imposes costs that smaller organizations sometimes underestimate.
Physical security of development environments must be formally addressed. Remote and hybrid development environments introduce physical security challenges that the standard requires organizations to address. This includes policies for working with sensitive code in public spaces, requirements for device encryption and screen locking, and controls over removable media.
Why Procurement Officers Require ISO 27001
From the perspective of a defense procurement officer, ISO 27001 certification serves several functions that go beyond the security controls themselves.
First, it provides independent verification. The certification is issued by an accredited third-party body following an audit of the organization's ISMS. Unlike self-assessed compliance frameworks, ISO 27001 certification requires that a qualified auditor examine evidence of control implementation, not just policy documentation. Surveillance audits occur annually; recertification audits every three years. This means the certificate has a defined expiry and represents a relatively current state of the organization's security practices.
Second, it creates accountability. ISO 27001 certification requires that top management be visibly committed to the ISMS. This means the organization cannot credibly claim that security failures were isolated incidents unrelated to management — the standard requires that management review the ISMS, address non-conformities, and allocate resources for security. For procurement officers, this represents a level of organizational commitment that informal security practices cannot demonstrate.
Third, it simplifies due diligence. Rather than conducting a detailed security assessment of every potential vendor — which is resource-intensive and difficult to standardize — procurement frameworks that require ISO 27001 can use the certificate as a baseline filter. This is efficient, even if imperfect: a certified vendor may still have security gaps, but the probability is lower and the accountability mechanisms are more robust.
For defense contracts specifically, ISO 27001 is often complemented by additional requirements: national-level security frameworks (e.g., Cyber Essentials Plus in the UK, BSI IT-Grundschutz in Germany), contract-specific data handling requirements, and in some cases security accreditation of specific systems. ISO 27001 is a necessary foundation for these additional layers, not a substitute for them.
Vendors should also be aware that some defense procurement frameworks now specify ISO 27001:2022 explicitly, with a transition deadline that makes certificates based on the 2013 version no longer acceptable. Organizations certified under the 2013 standard were required to transition to the 2022 version by October 2025. Any certificate still referencing the 2013 standard after that date should be treated as lapsed for procurement purposes.