Welcome to a practical, step-by-step guide on how to audit information security policies under ISO 27001 Annex A 5.1. Drawing from direct experience as a lead auditor, this guide aims to demystify the process for internal teams preparing for an audit and new auditors seeking to understand key focus areas. The goal is to clarify what auditors look for, why they look for it, and how to demonstrate compliance effectively.
Table of contents
Foundations of the Audit: Understanding Core Concepts
Before examining evidence, an auditor must grasp the foundational concepts underpinning the Information Security Management System (ISMS). Policies are the bedrock of the ISMS, articulating the organisation’s intent and providing the framework for all subsequent procedures and controls.
What are Information Security Policies?
In the context of ISO 27001, policies are “statements of what you do for information security.” Their primary role is to communicate the organisation’s requirements and commitments to staff, customers, and interested parties. They set high-level rules for safeguarding sensitive information.
The Auditor’s Distinction: Intent vs. Implementation
Auditors look for a clear separation between policies and processes:
- Policies: Statements of what you do.
- Processes: Statements of how you do it.
This separation allows organisations to share policies with clients without compromising confidential operational details, such as system names or specific internal workflows.
What is ISO 27001 Annex A 5.1?
Annex A 5.1 is a specific control mandating a comprehensive policy framework. Policies must be formally defined, approved by management, published, and communicated to relevant personnel. They must also be reviewed at planned intervals or following significant changes.
The 2022 version of the standard explicitly requires a suite of policies. This includes a top-level “Information Security Policy” supported by granular “Topic-Specific Policies” (e.g., Access Control, Clear Desk). This encourages a modular structure rather than a single, unwieldy document.
The Purpose of the Control
To ensure the suitability, adequacy, and effectiveness of management’s direction and support for information security.
The Auditor’s Mindset: Key Areas of Scrutiny
Experienced auditors look beyond well-written documents. They seek evidence that policies are “living instruments” integrated into the organisation’s fabric. An auditor assesses the following attributes:
Policy Linkage to Business Reality
Policies must not be generic templates. Auditors verify links to three specific areas:
- Business Strategy: Policies must support strategic goals. Auditors check that security objectives align with the organisation’s mission.
- Legal and Contractual Obligations: Policies must reflect relevant laws and regulations (e.g., GDPR, DPA 2018). Auditors cross-reference policies with the legal register.
- Security Risks: Policies must address specific risks identified in the risk register.
Mandatory Policy Content
The main information security policy must contain specific statements to demonstrate a structured approach. Auditors check for:
- A definition of information security (Confidentiality, Integrity, Availability).
- Information security objectives or a framework for setting them.
- Guiding principles for security activities.
- Commitment to satisfying applicable requirements.
- Commitment to continual improvement of the ISMS.
- Assignment of responsibilities for security management.
- A defined process for handling exemptions and exceptions.
Management Approval
Policies require authority. Auditors verify that top management has formally approved the main policy and that topic-specific policies are approved by the appropriate level of leadership. This confirms ownership of security commitments.
The Practical Audit Checklist: A 10-Step Guide
The following process outlines how a certification auditor methodically assesses compliance with Annex A 5.1.
1. Review the Information Security Policy
The auditor assesses the main document for scope, objectives, and commitment to confidentiality, integrity, and availability, ensuring alignment with organisational goals.
2. Assess Supporting Policies
The auditor examines topic-specific policies (e.g., access control, data classification) for consistency, completeness, and relevance to specific risks.
3. Evaluate Policy Communication
A policy is only effective if known. Auditors verify dissemination methods (intranet, email) and look for documented evidence that employees have acknowledged them.
4. Examine Policy Implementation
Auditors observe daily processes and interview employees to gauge awareness and adherence to the policies.
5. Review Policy Exception Handling
Auditors assess the formal process for requesting and approving exceptions, ensuring they are justified and documented.
6. Analyse Policy Review and Updates
Auditors check for evidence of regular reviews (at least annually) and updates triggered by changes in technology or threats.
7. Assess Policy Compliance Monitoring
The auditor reviews how the organisation monitors compliance (e.g., internal audits) and checks that corrective actions are taken for non-compliance.
8. Interview Key Personnel
Targeted interviews with management and security officers help corroborate evidence found in documentation.
9. Check for Legal and Regulatory Compliance
The auditor verifies that the policy framework meets all statutory and regulatory requirements applicable to the organisation.
10. Evaluate Overall Effectiveness
Finally, the auditor forms a judgement on the framework’s effectiveness, identifying weaknesses and making recommendations.
Avoiding Common Pitfalls: Top 3 Audit Failures
Based on field experience, these are the most common reasons for non-conformity regarding Annex A 5.1.
1. Lack of Evidence
Auditors operate on the principle: “If it is not written down, it did not happen.”
How to Avoid It: Maintain a clear paper trail. Keep minutes of approval meetings, records of dissemination, and logs of employee acknowledgements.
2. Incomplete Team Compliance
An auditor may interview any employee. A single person unaware of the policies can lead to a finding.
How to Avoid It: Verify that every team member—especially new joiners—knows where to find policies and has formally acknowledged them.
3. Incorrect Document and Version Control
Sloppy document management undermines credibility. Discrepancies between the footer version and the version control table are red flags.
How to Avoid It: Enforce strict document hygiene. Ensure version tables are current, evidence a review within the last 12 months, and remove internal draft comments.
Frequently Asked Questions (FAQ) about Policy Audits
What is the primary purpose of an Information Security Policy?
To establish a formal framework for managing information security and outline the organisation’s commitment to protecting assets from threats.
What is the difference between a policy and a process?
Policies are high-level rules (the “what”), while processes are detailed steps (the “how”). Auditors expect a clear distinction between the two.
How many policies are required for ISO 27001?
There is no precise number. The standard requires one overarching Information Security Policy and a suite of topic-specific policies relevant to the organisation’s risks.
How often should policies be reviewed?
At least annually, or more frequently if significant changes occur (e.g., new technology, regulatory updates, or security incidents).
Who is responsible for the policies?
Senior leadership holds ultimate responsibility. They must set, agree to, and formally approve the policies.
Conclusion
A successful audit of ISO 27001 Annex A 5.1 relies on demonstrating that policies are clear, communicated, and enforced. They must be linked to strategy, risks, and legal obligations. Preparing for this audit is not merely a compliance exercise; it is an opportunity to strengthen the organisation’s resilience and security posture from the top down.
About the author
Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management.
Holding an MSc in Software and Systems Security, Stuart combines academic rigor with extensive operational experience. His background includes over a decade leading Data Governance for General Electric (GE) across Europe, as well as founding and exiting a successful cyber security consultancy.
As a qualified ISO 27001 Lead Auditor and Lead Implementer, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. He has successfully guided hundreds of organizations – from high-growth technology startups to enterprise financial institutions – through the audit lifecycle.
His toolkits represents the distillation of that field experience into a standardised framework. They move beyond theoretical compliance, providing a pragmatic, auditor-verified methodology designed to satisfy ISO/IEC 27001:2022 while minimising operational friction.

