Skip to content
arrow_back
search
Annex A 8.26 verified ISO/IEC 27001:2022

Defining Security Requirements for Applications

Ensure security needs are clear and approved when creating or buying applications.

record_voice_over

Plain language

When developing or acquiring new applications, it's crucial to clearly define and approve security requirements. This ensures that sensitive information remains confidential and protected from threats like viruses or data breaches. If this isn't done, the application's integrity could be compromised, leading to potential financial loss or reputational damage for the organisation.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Technological controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

19 Mar 2026

Maturity levels

N/A

Official control statement

Information security requirements shall be identified, specified and approved when developing or acquiring applications.
verified ISO/IEC 27001:2022 Annex A 8.26
priority_high

Why it matters

Undefined application security requirements can cause insecure design, data breaches, compliance failures, costly rework, and loss of customer trust.

settings

Operational notes

Define, document and approve application security requirements (privacy, authn/authz, logging, encryption) during SDLC and procurement, and trace them to tests and sign-off.

Mapping detail

Mapping

Direction

Controls