Compliance Framework

ISO 27001:2022 — enforced at the code layer.

ISO 27001 requires a functioning Information Security Management System — but most security violations originate in code. MergeGuide maps ISO 27001:2022 Annex A controls to code-level detection patterns, enforcing them at every point in the development workflow.

What ISO 27001 requires from software teams

ISO 27001:2022 is an international standard for information security management. Its Annex A contains 93 controls organized across four themes: Organizational, People, Physical, and Technological. Software teams are primarily responsible for the Technological controls — and these are where most certification gaps are found.

Annex A controls like A.8.24 (cryptography), A.8.25 (secure development lifecycle), A.8.26 (application security requirements), and A.8.28 (secure coding) require demonstrable, repeatable processes — not one-time audits.

MergeGuide includes policies that guide implementation of ISO 27001:2022 requirements — mapping Annex A Technological controls to automated code-level detection patterns that run on every commit, across all supported languages.

Annex A Technological control coverage

MergeGuide templates cover key ISO 27001:2022 Annex A controls relevant to software development:

  • A.8.24 — Use of cryptography: detecting weak or missing encryption in code
  • A.8.25 — Secure development lifecycle: enforcing security gates at each dev stage
  • A.8.26 — Application security requirements: input validation, auth patterns
  • A.8.28 — Secure coding: detecting OWASP-class vulnerabilities before merge
  • A.8.20 — Network security: detecting insecure protocol usage in application code
  • A.8.3 — Information access restriction: detecting overprivileged access patterns

ISO 27001 detection patterns

Annex A Control What MergeGuide Detects Severity
A.8.24 — CryptographyHardcoded cryptographic keys or use of deprecated algorithms (MD5, SHA-1)Critical
A.8.24 — CryptographyData at rest stored without encryption in database schemas and file writesHigh
A.8.26 — App securitySQL injection patterns — unparameterized queries accepting user inputCritical
A.8.26 — App securityMissing input validation on externally-facing API endpointsHigh
A.8.28 — Secure codingCommand injection via unsanitized shell executionCritical
A.8.20 — Network securityTLS 1.0/1.1 usage or disabled certificate verificationHigh
A.8.3 — Access restrictionHardcoded credentials and secrets in source codeCritical
🔐

Annex A control mapping

Every MergeGuide detection rule is mapped to its ISO 27001:2022 Annex A control reference. When a violation is flagged, developers see the exact control number and requirement — not just a generic security warning.

📋

Evidence for your ISMS

Every PR Gate evaluation generates an immutable, timestamped artifact showing which Annex A controls were evaluated and whether code passed or failed. These artifacts feed directly into your ISMS evidence collection process.

🔄

Continuous enforcement

ISO 27001 certification requires that controls operate continuously, not just at audit time. MergeGuide enforces Annex A requirements at IDE write time, AI generation time, git commit, and PR merge — throughout the development lifecycle.

Building toward ISO 27001 certification?

See how MergeGuide enforces Annex A Technological controls and accumulates evidence for your ISMS in a live demo.

Book a demo Talk to sales