ISO 27001 Return of Assets | Annex A 5.11 | The Lead Auditor’s Implementation and Audit Guide

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.11 Return of Assets is a security control that ensures all organizational property is recovered upon termination of employment or contracts. The primary implementation requirement is establishing a formal asset retrieval process, delivering the business benefit of preventing data breaches and protecting intellectual property.

In this guide, I will show you exactly how to implement ISO 27001 Annex A 5.11 and ensure you pass your audit. You will get a complete walkthrough of the control, practical implementation examples, and access to the ISO 27001 templates and toolkit that make compliance easy.

I am Stuart Barker, an ISO 27001 Lead Auditor with over 30 years of experience conducting hundreds of audits. I will cut through the jargon to show you exactly what changed in the 2022 update and provide you with plain-English advice to get you certified.

Key Takeaways: ISO 27001 Annex A 5.11 Return of Assets

ISO 27001 Annex A 5.11 requires that personnel and other interested parties return all organization-owned assets in their possession upon termination of their employment, contract, or agreement. This “preventive” control is a critical part of the Joiners, Movers, and Leavers (JML) process. The goal is to ensure that confidential data, intellectual property, and physical hardware (like laptops and access badges) are secured before an individual leaves the organization’s sphere of control.

Core requirements for compliance include:

  • Formal Asset Retrieval Process: You must have a documented procedure for collecting assets. This should be triggered automatically by HR whenever a resignation or termination notice is received.
  • Legal Enforcement: Employee and contractor agreements must include explicit clauses requiring the return of all assets. Without this, you have no legal leverage to retrieve company property.
  • Digital “Return” of Access: The return of assets isn’t just physical. You must revoke access to email, VPNs, and SaaS applications (e.g., Salesforce, Slack) immediately upon the individual’s departure.
  • BYOD Data Deletion: If employees use personal devices for work (BYOD), you must ensure company data is wiped from those devices. This is typically done via Remote Wipe or a formal declaration of deletion signed by the leaver.
  • Intellectual Property Retrieval: Beyond hardware, you must ensure that physical notebooks, paper files, and “knowledge assets” (like client lists or source code) are returned or transferred to a successor.

Audit Focus: Auditors will look for “The Retrieval Chain”:

  1. Sample Verification: An auditor will pick a random person who left the company in the last 6 months and ask: “Show me the evidence that their laptop was returned and their email was disabled on their last day.”
  2. The Asset Register Link: They will check if the Physical Asset Register (A.5.9) was updated to show the device is now “In Stock” or reallocated.
  3. Third-Party Coverage: They will check if your contracts with freelancers or vendors include the same “Return of Assets” requirements as your staff contracts.

Return of Assets Checklist (Audit Prep):

Asset TypeCritical Action RequiredRequired Audit Evidence
Physical HardwareCollect Laptop, Phone, and Keys.Signed “Equipment Return Form.”
Digital IdentityDisable AD / Email / SaaS Accounts.Closed IT Ticket (timestamped).
Physical AccessRetrieve Badge / Keycard.Log entry in Access Control system.
BYOD (Personal)Wipe Company Email & Teams.Signed “Data Deletion Declaration.”
IP & DocumentsReturn Paper Files / Notebooks.Exit Interview Note or Checklist.
Fay Barker - High Table - ISO27001 Director

What is ISO 27001 Annex A 5.11?

ISO 27001 Annex A 5.11 is about the return of assets which means you should get back all assets from people that leave or change job.

ISO 27001 Annex A 5.11 Return of Assets is an ISO 27001 control that requires that people with organisation assets should return them when they leave.

ISO 27001 Annex A 5.11 Purpose

The purpose of ISO 27001 Annex A 5.11 is to ensure you protect the organisations assets as part of the process of changing or terminating employment, contract or agreement.

ISO 27001 Annex A 5.11 Definition

The ISO 27001 standard defines ISO 27001 Annex A 5.11 as:

Personnel and other interested parties as appropriate should return all the organisation’s assets in their possession upon change or termination of their employment, contract or agreement.

ISO 27001:2022 Annex A 5.11 Return of Assets

Watch the ISO 27001 Annex A 5.11 Tutorial

In the video ISO 27001 Annex A 5.11 Return Of Assets Explained show you how to implement it and how to pass the audit.

ISO 27001 Annex A 5.11 Podcast

In this episode: Lead Auditor Stuart Barker and team do a deep dive into the ISO 27001 Annex A 5.11 Return Of Assets. The podcast explores what it is, why it is important and the path to compliance.

ISO 27001 Annex A 5.11 Implementation Guidance

You are going to have to

You will need a process for people to return assets to you when they leave or your contract ends with them.

It is simple and straight forward but there a couple of steps to put in place first.

Consider that the employee that leaves.

Do we know what they have? Do they know they need to return it? How do they return it and in what time frame?

How to implement ISO 27001 Annex A 5.11

Implementing ISO 27001 Annex A 5.11 is a critical security safeguard to ensure that organisational property, both physical and digital, is recovered when an individual’s relationship with the business ends. As a Lead Auditor, I have seen many organisations fail here because they rely on memory rather than a structured process. By following these 10 steps, you will establish a watertight offboarding procedure that protects your intellectual property and reduces your attack surface. This process ensures that assets are returned, access is revoked, and the risk of post-employment data breaches is effectively mitigated.

1. Formalise the Return of Assets Policy

  • Document clear requirements within your Information Security Policy that mandate the return of all hardware and software upon termination of employment or contract.
  • Ensure the policy explicitly covers employees, contractors, and third-party consultants.
  • Result: A legally enforceable mandate that sets clear expectations for all personnel from the outset of their engagement.

2. Integration with the Human Resources Exit Process

  • Embed the asset return requirements into the standard HR exit interview and offboarding checklist.
  • Coordinate timelines between HR, IT, and Department Heads to ensure assets are recovered before the final day of service.
  • Result: A synchronised workflow that prevents personnel from leaving the premises while still in possession of critical assets.

3. Provision a Comprehensive Asset Register

  • Maintain an accurate Asset Register that links specific serial numbers and logical assets to individual owners.
  • Ensure the register includes “intangible” assets such as proprietary software licenses and encryption keys.
  • Result: Full visibility of exactly what needs to be recovered from a specific individual during the offboarding phase.

4. Utilise Record of Equipment (ROE) Documentation

  • Implement a Record of Equipment (ROE) log that requires a signature from the user upon receipt and return of physical items.
  • Use these documents as the primary evidence for internal and external ISO 27001 audits.
  • Result: An auditable paper trail that confirms the physical chain of custody for company hardware.

5. Revoke Logical Access via IAM Roles

  • Immediately disable or delete accounts within your Identity and Access Management (IAM) system upon the exit date.
  • Ensure that access to cloud repositories, SaaS applications, and internal databases is included in the revocation.
  • Result: Immediate cessation of the user’s ability to access organisational data remotely or from personal devices.

6. Deprovision Multi-Factor Authentication (MFA)

  • Revoke MFA seeds and hardware tokens associated with the individual to prevent secondary bypass attempts.
  • Ensure that company-owned mobile phones used for MFA are physically returned and factory reset.
  • Result: Elimination of residual authentication pathways that could be exploited post-termination.

7. Secure the Handover of Critical Information

  • Enforce a formal knowledge transfer process for administrative passwords, encryption keys, and master files.
  • Verify that no “single point of failure” exists where only the departing individual has access to specific encrypted assets.
  • Result: Continuous operational resilience and the prevention of data being locked out following a departure.

8. Implement Secure Data Sanitisation for Returned Assets

  • Follow a formal decommissioning process that includes data wiping or physical destruction of storage media for returned hardware.
  • Maintain certificates of destruction or sanitisation logs for all storage-bearing devices.
  • Result: Prevention of data leakage when assets are repurposed for new employees or sent for recycling.

9. Manage the Return of Assets for Role Changes

  • Apply the return of assets protocol when an employee moves to a new department with different security requirements.
  • Recover assets and access rights that are no longer required for the new role to maintain the principle of least privilege.
  • Result: Reduced internal risk by preventing “privilege creep” as staff move through the organisation.

10. Audit the Offboarding Process Regularly

  • Conduct quarterly spot checks comparing HR leaver logs against the Asset Register and IAM revocation timestamps.
  • Report any discrepancies to the management review meeting to ensure continuous process improvement.
  • Result: Verification that the control is operating effectively and remains compliant with Annex A 5.11 requirements.
Stuart Barker - High Table - ISO27001 Director

ISO 27001 Annex A 5.11 Implementation Checklist

The ISO 27001 Annex A 5.11 implementation checklist provides a rigorous framework for recovering physical and digital assets during personnel transitions. By synchronising HR exit processes with IT revocation and physical hardware collection, organisations can effectively eliminate the risk of post-employment data breaches and unauthorised access.

ISO 27001 Annex A 5.11 Implementation Checklist
Step Implementation Task Requirement Example
1 Update Asset Return Policy Formalise a policy requiring all information assets to be returned upon termination.
2 Define Responsibility Scope Explicitly include employees, contractors, and third-party consultants in the return mandate.
3 Align with HR Offboarding Embed asset return triggers into the standard HR exit interview and leaver checklist.
4 Maintain Record of Equipment Utilise a Record of Equipment (ROE) log to track hardware issuance and return signatures.
5 Revoke Logical Access Disable IAM roles, SSO accounts, and SaaS access immediately on the final day of service.
6 Deprovision MFA Seeds Revoke Multi-Factor Authentication seeds and recover any physical hardware tokens or keys.
7 Knowledge Handover Ensure administrative passwords and encryption keys are transferred to authorised personnel.
8 Secure Data Sanitisation Sanitise returned hardware according to industry standards before decommissioning or reissuing.
9 Manage Role Transitions Apply return protocols when staff move between departments with different security profiles.
10 Perform Regular Audits Conduct quarterly spot checks comparing HR leaver logs against Asset Register updates.

How to audit ISO 27001 Annex A 5.11

Auditing ISO 27001 Annex A 5.11 requires a meticulous examination of the offboarding lifecycle to ensure no physical or digital assets remain in the possession of former employees or contractors. As a Lead Auditor, I look for a watertight “Return of Assets” process where the Asset Register, HR records, and IT revocation logs align perfectly. Follow these 10 steps to verify that your organisation effectively prevents data leakage and asset loss during personnel transitions.

1. Review the Return of Assets Policy

  • Examine the formal policy to ensure it clearly defines the responsibilities of employees, contractors, and management regarding asset return.
  • Verify that the policy specifies timeframes for the return of equipment following termination or change of role.
  • Result: Confirmation of a documented mandate that governs the recovery of organisational property.

2. Cross-Reference HR Leavers Logs with Asset Records

  • Sample a list of recent leavers from HR records and trace them back to the Asset Register.
  • Verify that every item originally assigned to the individual has been marked as returned or decommissioned.
  • Result: Assurance that the inventory remains accurate and that “ghost assets” are not left with former staff.

3. Inspect the Record of Equipment (ROE) Logs

  • Audit the ROE documents to check for physical signatures or digital timestamps confirming the receipt of returned hardware.
  • Ensure serial numbers on returned items match the original issuance records.
  • Result: Validated physical evidence of the transfer of custody for laptops, mobiles, and hardware tokens.

4. Audit IAM Role Revocation and Access Logs

  • Review Identity and Access Management (IAM) logs to confirm that logical access was revoked immediately upon the user’s departure.
  • Verify that “Single Sign-On” (SSO) and individual application accounts are disabled in alignment with the exit date.
  • Result: Proof that the organisation has eliminated the risk of unauthorised remote access by former personnel.

5. Verify Multi-Factor Authentication (MFA) De-provisioning

  • Check that MFA seeds, hardware keys, or mobile authenticator links associated with the leaver have been revoked.
  • Confirm that company-owned MFA hardware has been physically recovered.
  • Result: Technical certainty that the secondary layer of authentication cannot be bypassed or misused.

6. Inspect Secure Disposal and Data Sanitisation Records

  • Examine certificates of data destruction for assets that were decommissioned rather than reassigned.
  • Verify that the sanitisation process follows industry standards to prevent data recovery from returned hard drives.
  • Result: Evidence that sensitive information has been permanently removed from the asset lifecycle.

7. Audit the Recovery of Intangible Information Assets

  • Confirm that intellectual property, such as source code, internal documentation, and encryption keys, has been accounted for.
  • Verify that access to proprietary cloud repositories (e.g., GitHub, AWS) was removed.
  • Result: Protection of the organisation’s competitive advantage and sensitive digital IP.

8. Evaluate Management Oversight of the Exit Checklist

  • Review completed exit checklists to ensure they have been signed off by the relevant department head or IT manager.
  • Check for instances where assets were not returned and verify if the organisation followed its recovery or “loss” procedure.
  • Result: Confirmation of management accountability for the final stages of the asset management process.

9. Test the Return of Assets for Third-Party Contractors

  • Perform a deep-dive audit on the offboarding process for temporary contractors and external consultants.
  • Verify that contractual clauses regarding the return of data and hardware were enforced upon contract completion.
  • Result: Mitigation of the specific risks associated with external partners and supply chain access.

10. Verify Knowledge Transfer and Handover Integrity

  • Examine evidence that critical administrative passwords or master keys held by the individual were changed or handed over.
  • Confirm that the individual no longer possesses unique knowledge that creates a “single point of failure” for asset access.
  • Result: Maintenance of operational resilience and security continuity post-departure.
Stuart and Fay High Table

ISO 27001 Annex A 5.11 Audit Checklist

ISO 27001 Annex A 5.11 Audit Checklist and Evidence Requirements
Item What to Check Audit Evidence Example GRC Platform Check
1 Asset Return Policy Review the formal policy for clarity on employee and contractor return obligations. Policy module: Approved “Return of Assets” document.
2 Offboarding Integration Verify that the HR exit process triggers a notification to IT for asset recovery. Workflow module: HR to IT handover task status.
3 Physical Asset Recovery Sample recent leavers to verify physical return of laptops, mobiles, and tokens. Asset module: Item status updated to “Returned” or “In Stock”.
4 ROE Accuracy Check the Asset Register or Record of Equipment (ROE) for leaver return signatures. Document module: Uploaded signed ROE return forms.
5 Logical Access Revocation Audit IAM logs to ensure accounts were disabled on or before the final day of service. IAM module: User status set to “Inactive” or “Deleted”.
6 MFA De-provisioning Confirm that Multi-Factor Authentication seeds and hardware keys have been revoked. Security module: MFA token revocation logs.
7 Knowledge Transfer Check evidence that administrative passwords or master keys were handed over and changed. Task module: Handover completion and password rotation logs.
8 Intangible Asset Recovery Verify that access to proprietary code, cloud instances, and sensitive IP was removed. User Access Review: Removal of leaver from GitHub/AWS groups.
9 Secure Sanitisation Inspect records for data wiping or destruction of storage media from returned devices. Evidence module: Sanitisation logs or destruction certificates.
10 Role Change Review Verify that assets no longer required for a new internal role were returned. Audit log: Asset transfer or return triggered by internal role change.

Return of Assets Checklist

Asset Type Action Required Evidence ISO 27001:2022 Control
Physical Hardware Return Laptop, Phone, Keys, Access Badge. Signed “Equipment Return Form”. Annex A 5.11 / 7.2
Digital Accounts Disable Active Directory / Email / SaaS Accounts. Ticket closed by IT. Annex A 5.11 / 5.18
BYOD (Personal) Wipe Company Email/Teams from personal phone. Signed “Data Deletion Declaration”. Annex A 5.11 / 6.7
Intellectual Property Return paper files / notebooks. Exit Interview Note. Annex A 5.11 / 5.13

ISO 27001 Templates

The ISO 27001 Toolkit is the ultimate resource for your ISO 27001 certification and having ISO 27001 templates can help fast track your ISO 27001 implementation. The following templates are designed for ISO 27001 Return Of Assets:

ISO 27001 Asset Management Policy Template

Download the Asset Management Policy Template

ISO27001 Asset Management Policy - ISO 27001 Annex A 5.11 Template

ISO 27001 Physical Asset Register Template

Download the Physical Asset Register Template

ISO27001 Physical Asset Register - ISO 27001 Annex A 5.11 Template

ISO 27001 Data Asset Register Template

Download the Data Asset Register Template

ISO27001 Data Asset Register -ISO 27001 Annex A 5.11 Template

How to comply

To comply with ISO 27001 Annex A 5.11 you are going to implement the ‘how’ to the ‘what’ the control is expecting. In short measure you are going to

  • Put in place contracts with employees and third parties that covers the use and return of assets
  • Implement your HR Starter, Leaver, Mover process that includes assets
  • Allocate assets to individuals and maintain a record
  • On termination of contract ensure the secure transport and return of the asset
  • Implement a process to securely store returned assets before reuse or reallocation
  • Consider the remote wiping, as appropriate, of assets and devices before transport when returning
  • Where employees and third parties use their own devices ensures processes are in place and followed for the deletion of company data assets
  • Consider the documentation and knowledge transfer from employees and third parties
  • Put in place appropriate controls during the notice period to prevent copying of information and intellectual property

How to pass the ISO 27001 Annex A 5.11 audit

To pass an audit of ISO 27001 Annex A 5.11 you are going to make sure that you have followed the steps above in how to comply.

What the auditor will check

The audit is going to check a number of areas. Lets go through them

1. There is a starter, leaver, mover process

The audit will check you have a starter, leaver, mover process documented and that you are following it. It will check that the return of assets is included in that process. It will then seek evidence that it has been followed at least once. They will randomly choose a sample of leavers and ask you to walk through what you did when you left. They are checking that you followed your written process and have evidence that the assets were returned.

2. There is an up to date asset register

The asset register will be checked to see that it meets the requirements of the standard and as a minimum that assets are allocated to owners. Where assets are returned, even if not reallocated, they will want to see that recorded in the asset register. They may then ask questions arounds the physical security of stored assets – such as are they locked away, who has access, what is the process for secure disposal / destruction.

3. Contracts are in place

They are going to look at your employee contracts and your third party contracts and see if the return of assets is mentioned and covered. There are other security clauses that are required, but where appropriate, they want to see that contracts cover the return of assets. This can include the deletion of data and information where personal or Bring Your Own Devices have been allowed and used. It would be sensible for them to sample any BYOD devices that belong to people that have left to ask you how you ensured data was deleted. Clearly they will not audit the actually device but the process you went through and the assurances that you got.

Top 3 ISO 27001 Annex A 5.11 Mistakes People Make and How to Avoid Them

The top 3 Mistakes People Make For ISO 27001 Annex A 5.11 are

1. Your asset register is not up to date

Either not having an asset register, an asset register that does not record all devices or an asset register that is out of date is the number 1 mistake people make. Usually as it is admin step that can get lost in the course of running a business.

2. Assets were not destroyed securely

Not a direct response to the the return of assets but they do check secure destruction and that it followed process. It is a common for organisations to have a room full of old assets that they do not know what to do with so keep them for ever. It can be a nightmare in time as no one knows why we keep them, what is on them and if we need them which brings up legal, regulatory and contractual issues.

3. Your document and version control is wrong

Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.

Applicability of ISO 27001 Annex A 5.11 across different business models.

Business Type Applicability & Interpretation Examples of Control
Small Businesses

Physical Keys & Basic Hardware. For small teams, assets are often physical. Compliance focuses on retrieving office keys, laptops, and ensuring no company data remains on personal phones (BYOD).

Exit Checklist: A manual sign-off sheet confirming the return of office keys and the company credit card before the final paycheck is released. • BYOD Wipe: A “Data Deletion Declaration” signed by the leaver confirming they have removed company email and WhatsApp chats from their personal device.

Tech Startups

Developer Laptops & Local Code. The biggest risk is code sitting on a developer’s local machine. “Return of Assets” implies ensuring that the intellectual property (code) is wiped or returned to the central repo.

MDM Lock: Using Mobile Device Management (e.g., Jamf or Kandji) to remotely lock and wipe the corporate MacBook immediately upon termination. • Asset Re-imaging: A procedure to re-image returned laptops to a clean state before reassigning them to new hires, ensuring no residual data exists.

AI Companies

Research Data & Weights. Assets include “Knowledge Assets.” Ensuring that researchers return local copies of datasets, model weights, or unpublished papers stored on local drives or personal clouds.

Data Transfer Audit: Checking the leaver’s local storage and cloud transfer logs to ensure no proprietary training data was “backed up” to a personal drive before exit. • Access Token Revocation: Immediate invalidation of any personal API tokens (e.g., Hugging Face, OpenAI) associated with the leaver’s identity.

Applicability of ISO 27001 Annex A 5.11 across different business models.

Fast Track ISO 27001 Annex A 5.11 Compliance with the ISO 27001 Toolkit

For ISO 27001 Annex A 5.11 (Return of assets), the requirement is to ensure that employees and contractors return all organizational assets in their possession upon change or termination of their contract. This is a critical physical and procedural control designed to protect sensitive data and intellectual property.

Compliance Factor SaaS Compliance Platforms High Table ISO 27001 Toolkit Audit Evidence Example
Policy Ownership Rents access to offboarding rules; if you cancel the subscription, your documented return standards and leaver history vanish. Permanent Assets: Fully editable Word/Excel Asset Management Policies and Checklists you own forever. A localized “Return of Assets Procedure” defining mandatory data deletion for BYOD devices and physical key returns.
Operational Utility Attempts to “automate” offboarding via dashboards that cannot physically collect laptops or verify the return of physical keys. Governance-First: Provides the framework to formalize your existing HR and IT “Leaver” workflows into an auditor-ready system. A completed “Return of Assets Checklist” signed by both the leaver and IT/HR to prove all hardware was recovered.
Cost Efficiency Charges a “Headcount Tax” or “Leaver Fee” that scales costs as your company grows and staff turnover occurs. One-Off Fee: A single payment covers your return governance for 2 employees a year or 2,000. Allocating budget to remote-wipe software or courier recovery services rather than monthly “compliance dashboard” fees.
Strategic Freedom Mandates rigid reporting formats that often fail to align with unique office setups or flexible remote-work models. 100% Agnostic: Procedures adapt to your environment—IT collection desks, mail-back services, or remote-wipe protocols. The ability to evolve your HR strategy and offboarding checklists without reconfiguring a rigid SaaS compliance module.

Summary: For Annex A 5.11, the auditor wants to see that you have a formal process for the return of assets and proof that you follow it (e.g., signed return forms and updated asset registers). The High Table ISO 27001 Toolkit provides the governance framework to satisfy this requirement immediately. It is the most direct, cost-effective way to achieve compliance using permanent documentation that you own and control.

Annex A 5.11 Regulatory and Industry Standard Mapping Table
Framework / Law Reference Clause Mapping Context and Requirement
GDPR / UK Data (Use and Access) Act 2025 Article 32 (Security of Processing) Mandates the recovery of all personal data assets and access revocation upon termination to prevent unauthorised processing by former staff.
NIS2 / UK Cyber Security and Resilience Bill Article 21 (HR Security) Requires strict offboarding procedures for entities in essential sectors to ensure that critical infrastructure access is terminated and hardware is recovered.
DORA (Digital Operational Resilience Act) Article 9 (Protection and Prevention) Financial entities must ensure that ICT asset return is part of a formal termination process to maintain operational resilience and prevent insider threats.
NIST CSF 2.0 PR.AA-06 (Asset Recovery) Focuses on the lifecycle management of assets, specifically requiring that assets be returned and access revoked when an individual no longer requires them.
SOC2 (Trust Services Criteria) CC6.1 (Access Revocation) Requires evidence that access to systems and the physical return of assets occur promptly upon an employee’s or contractor’s termination.
EU AI Act / AI Standards Article 15 (Cybersecurity) Mandates that access to high-risk AI training environments and proprietary models is revoked to prevent IP theft or model tampering during offboarding.
HIPAA Security Rule 45 CFR § 164.308(a)(3) Requires “Termination Procedures” to ensure that access to Electronic Protected Health Information (ePHI) is ended and hardware recovered.
CCPA / CPRA (California) Section 1798.100 Necessitates the recovery of devices containing consumer data to ensure the organisation can fulfill data deletion and security obligations.
CIRCIA (USA) Asset Integrity Implicitly requires that assets recovered during offboarding are sanitised to prevent “incident triggers” caused by lost or stolen hardware.
EU Product Liability Directive (PLD) Software Liability Requires providers to maintain control over software development assets, ensuring departing developers return all source code and access keys.
ECCF (European Cybersecurity Cert. Framework) Certification Integrity Standardised security labels require proof that the developer lifecycle includes the secure recovery of all assets used to build and certify the product.

ISO 27001 Annex A 5.11 FAQ

What is ISO 27001 Annex A 5.11?

ISO 27001 Annex A 5.11 is an organisational control that requires all employees and external parties to return all organisational assets in their possession upon termination of their employment, contract, or agreement.

  • Ensures that hardware, software, and physical data do not remain with unauthorised individuals.
  • Protects intellectual property and proprietary information.
  • Forms a critical part of the formalised offboarding lifecycle.
  • Applies to both permanent staff and third-party contractors.

Is a formal asset return policy mandatory?

Yes, a documented policy or procedure for the return of assets is essential to satisfy the requirements of Annex A 5.11 and provide legal standing for equipment recovery.

  • It defines clear timelines for the return of equipment.
  • It outlines the specific roles and responsibilities of HR, IT, and management.
  • It establishes the legal right to recover costs for unreturned items where applicable.
  • It provides a repeatable framework for auditors to verify compliance.

What items are included in the return of assets?

The scope of Annex A 5.11 extends beyond physical hardware to include all types of information and organisational property.

  • Physical hardware: Laptops, mobile phones, tablets, and monitors.
  • Access credentials: ID badges, physical keys, and MFA tokens.
  • Information assets: Intellectual property, customer data, and printed documentation.
  • Digital assets: Backups, software licenses, and cloud-stored corporate files.

Who is responsible for the return of assets?

The responsibility for managing the return of assets is typically shared across HR, IT, and the departing individual’s line manager.

  • HR: Initiates the offboarding workflow and communicates final requirements to the leaver.
  • IT: Verifies the return and functional state of technical hardware and digital data.
  • Line Manager: Ensures physical hand-overs occur and access cards are recovered on the final day.
  • Individual: Contractually obligated to return all property in their possession.

Does Annex A 5.11 cover digital data and files?

Yes, digital information assets are a core focus of Annex A 5.11, requiring users to return or delete corporate data stored on personal or external devices.

  • Includes the removal of corporate email accounts from personal smartphones.
  • Requires the handover of any administrative passwords or encryption keys.
  • Mandates the return of physical storage media like USB drives or external hard disks.
  • Covers intellectual property created during the term of employment.

What evidence do auditors look for during an ISO 27001 audit?

Auditors seek verifiable proof that the asset return process is being consistently followed for every individual leaving the organisation.

  • Signed offboarding checklists for recent leavers.
  • Updated asset registers showing the change in equipment status.
  • Records of access card deactivation and key recovery.
  • Evidence that digital accounts were disabled in tandem with asset return.

What happens if an employee fails to return organisational assets?

Failure to return assets should be treated as a security incident and managed through defined legal and contractual escalations.

  • Immediate remote wiping of mobile devices and laptops where technically possible.
  • Reporting unreturned items to insurance providers for replacement recovery.
  • Legal communication regarding the retention of intellectual property.
  • Withholding final settlement amounts where permitted by local employment laws.

The following mapping table establishes a high-authority topic cluster for ISO 27001 Annex A 5.11, structured to meet the “Diamond Standard” for AI search and semantic SEO. By interlinking these related controls and resources, we provide a clear roadmap for both human readers and AI crawlers to understand the structural dependencies of the offboarding lifecycle. Descriptions are written from the perspective of Stuart Barker, Lead Auditor, to provide technical context on how these pages support the central mandate of asset recovery.

ISO 27001 Controls and Attribute Values

Control typeInformation security propertiesCybersecurity conceptsOperational capabilitiesSecurity domains
PreventiveConfidentialityProtectAsset managementProtection
Integrity
Availability

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top