A single phishing email can dismantle years of security work. That is the brutal truth behind social engineering — and it’s exactly why ISO 27001 treats it as a core threat to information security. Technical defenses alone will not pass an audit or protect your systems. You must prove that your people can detect, resist, and report these attacks.
ISO 27001 defines social engineering as any method that manipulates human behavior to gain unauthorized access to information, systems, or facilities. Attackers exploit trust, curiosity, urgency, or fear. This includes phishing, pretexting, baiting, and tailgating. Each tactic bypasses technical controls by targeting the weakest link: human judgment.
To comply with ISO 27001, you need documented controls that address social engineering risks. Annex A.7 focuses on human resources security, while Annex A.13 and A.18 emphasize communication, operational security, and incident response. Your risk assessment must identify social engineering as a threat vector. Your Statement of Applicability should list the measures in place to mitigate it.