ISO 27001 Certification in SDLC: Improve Delivery, Trust, and Safety

TINQIN’s Data Protection Officer, Vasil Vasilev, explains how ISO 27001:2022 strengthens software delivery, from secure design to CI/CD, and what CTOs should verify in vendor due diligence.

Interview with TINQIN DPO

Q: What changed with ISO 27001:2022 that matters to software companies?

DPO: The 2022 revision is the first major update since 2013. The new standard takes into account new aspects of information security in modern processes while at the same time simplifies and merges controls. I’ll point out Annex A, which moved from 114 to 93 controls, now grouped under four themes: organizational, people, physical, and technological. The structure is simpler, and alignment with modern delivery is better. This helps teams map controls to day-to-day SDLC activities.


TINQIN DPO - ISO Certification
Vasil Vasilev – ISMS Coordinator & Data Protection Officer, TINQIN

Q: Which controls connect directly to the Software Development Lifecycle?

DPO: Start with A.8.25 Secure development life cycle, A.8.28 Secure coding, and A.8.29 Security testing in development and acceptance. Add A.5.7 Threat intelligence, A.5.23 Cloud services, and A.8.9 Configuration management. Together, these steer secure-by-design work, code quality, automated testing, and cloud hygiene.

Q: How do you operationalize A.8.25, A.8.28, and A.8.29 across projects?

DPO: At TINQIN, we define functional and non-functional security requirements at the start, codified in tickets and acceptance criteria. We maintain separate environments for development, test, and production. We restrict developer access to production and use masked or synthetic data in testing. Repos follow signed commits, branch protection, and secret scanning. CI/CD runs SAST, SCA, DAST, or IAST where applicable, plus IaC scanners and automated policy checks before merge and release. Training covers language-specific secure coding patterns that match the tech stack and A.8.28 expectations. On top of that, we’ve developed Secure Coding Guidelines to ensure consistent practices across projects.

Q: Where do secure requirements and architecture fit in?

DPO: As early as specification and design! We reference OWASP Top 10 to anchor common risks and the NIST SSDF, SP 800-218, to align practices like threat modeling, dependency risk management, and build integrity. These sources integrate cleanly with ISO 27001’s control intent. Moreover, the GDPR requirement of privacy by design and by default under Article 25 aligns perfectly with this approach.

Q: What about vulnerability management across the lifecycle?

DPO: We run continuous scanning that maps to A.8.26, A.8.29 and vulnerability management objectives. Our approach combines continuous automated scanning with targeted penetration testing to identify and address vulnerabilities proactively. All findings are tracked from discovery to closure, with evidence documented in our project management system and release notes.

Q: How does ISO 27001 guide outsourced development and vendor chains?

DPO: Contracts include information security clauses, right-to-audit, data protection obligations, and breach notification terms. Vendors must attest to secure coding practices and CI/CD controls. Access to client data is minimized and monitored. For subcontractors, masked data and environment separation are mandatory. This comprehensive approach assures clients and partners that we not only promise security but consistently deliver it.

Q: How is cloud addressed in the new standard?

DPO: Cloud responsibilities are clearer with A.5.23. We implement a control framework that maps provider shared-responsibility models to our policies, configuration baselines, encryption, key management, and logging. Change control covers both application and infrastructure code, aligning with A.8.9 Configuration management. (DataGuard)

Q: What is the transition path for organizations on ISO 27001:2013?

DPO: The deadline to transition is 31 October 2025. Teams should run a gap assessment, update the Statement of Applicability, and prioritize SDLC changes, environment separation, CI/CD controls, cloud controls, and training. Build a short improvement program with measurable checkpoints.

Q: How does certification translate into delivery quality for clients?

DPO: Our certification translates directly into superior delivery quality and a more reliable partnership for our clients. It reduces uncontrolled variance across projects. CI/CD pipelines and security tests identify and fix vulnerabilities earlier, leading to faster remediation and fewer delays. For regulated industries, certification simplifies vendor oversight and provides peace of mind. Ultimately, it’s more than a badge; it is a commitment to consistent, high-quality, secure processes.

Q: What is TINQIN’s current status, and how is it maintained?

DPO: TINQIN is certified to ISO/IEC 27001:2022. We run internal assessments throughout the year and complete annual surveillance audits. A group of ISO Champions runs the program, supporting projects with training and checks. This lets product teams focus on delivery while we keep the ISMS effective.


Buyer checklist, ISO 27001 alignment in vendor SDLCs

  1. Confirm ISO/IEC 27001:2022 scope, locations, services, and certificate validity dates.
  2. Request the current Statement of Applicability and mapping to SDLC controls A.8.25 to A.8.29.
  3. Inspect CI/CD evidence, SAST, SCA, DAST or IAST, IaC checks, policy gates, and failure handling.
  4. Verify environment separation, restricted production access, masked or synthetic test data, and no testing in production.
  5. Review secure coding standards, training records, and secret scanning configuration.
  6. Check cloud baselines for A.5.23, encryption, logging, key management, and change control.
  7. Examine vulnerability management workflow, ticketing, SLAs, and pen test scope and cadence.
  8. For subcontractors, review security clauses, right-to-audit, and onboarding assessments.

Annex A controls mapped to SDLC practices

ControlWhat clients should see in practice
A.8.25 Secure development life cycleSecurity requirements in backlog, threat modeling, peer reviews with security checklists, and environment separation documented.
A.8.26 Application security requirementsNon-functional security requirements linked to acceptance criteria and tests.
A.8.27 Secure architecture and engineeringAuthn, session control, input validation, crypto design patterns documented and reviewed.
A.8.28 Secure codingLanguage-specific secure coding standards, training records, secret scanning, dependency policies.
A.8.29 Security testing in development and acceptanceCI/CD gates for SAST, SCA, DAST or IAST, IaC scanning, evidence of test results tied to releases.
A.5.23 Cloud servicesCloud configuration baselines, logging, key management, and change control mapped to shared responsibility.

Sources for ISO 27001:2022 key facts:

  • New controls include Threat intelligence, Cloud services, ICT readiness, Secure coding. (Advisera, Thales Group CPL)
  • Annex A now has 93 controls under four themes. (IT Governance)
  • OWASP Top 10 2021 and NIST SSDF SP 800-218 for secure development practices. (OWASP Foundation)