Home / ISO 27001 Annex A Controls / ISO 27001 Annex A 6.4 Disciplinary Process Ultimate Guide

ISO 27001 Annex A 6.4 Disciplinary Process Ultimate Guide

Last updated Dec 21, 2025

Author: Stuart Barker | ISO 27001 Lead Auditor

ISO 27001 Disciplinary Process

The ISO 27001 disciplinary process is a structured procedure that employers use to address employee misconduct or performance issues. It typically involves a series of steps to investigate, document, and resolve the issue.

What is ISO 27001 Annex A 6.4?

ISO 27001 Annex A 6.4 Disciplinary Process is an ISO 27001 control that wants you to have a process to take action against people who violate your information security policy, topic specific policies and processes.

ISO 27001 Annex A 6.4 Purpose

The purpose of the ISO 27001 disciplinary process is to ensure that people understand what will happen, and the consequences, of a violation of information security policy. The intent is to deter people from not following and adhering to policies and appropriately deal with those that do.

ISO 27001 Annex A 6.4 Definition

ISO 27001 defines the ISO 27001 Annex A 6.4 disciplinary process as:

A disciplinary process should be formalised and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation.

ISO 27001:2022 Annex A 6.4 Disciplinary Process
ISO 27001 Toolkit Business Edition

How to implement ISO 27001 Annex A 6.4

General Guidance

You are going to

  • engage with a HR professional
  • implement a HR disciplinary process
  • include information security violations in the disciplinary process
  • communicate the disciplinary process to relevant and interested parties
  • act on the process as required and maintain evidence

When to take disciplinary action

You are going to confirm and verify that an information security policy violation has actually occurred before you take any action.

What should the disciplinary action consider?

Under the guidance of a HR professional you are going to consider a reasoned and proportionate response that take into account all legal and regulatory requirements and obligations. Consider:

  • The nature of the event
  • The intent – was it intentional or unintentional
  • The frequency – was it a first time or a repeat offence
  • Was the person aware of what was required and can you prove that
  • Was the person trained and can you prove that

Reward positive behaviour

It isn’t just a negative approach. It can be a great way to enhance the culture and adherence to policy by rewarding, in what ever form is appropriate to you, positive behviours in relation to information security. From monetary rewards to formal recognition in meetings to ‘information security star of the month’ are all examples of what we have seen work well.

What are the different types of disciplinary actions that can be taken?

The types of disciplinary actions that can be taken vary depending on the severity of the offense. Some common disciplinary actions include

  • verbal warnings,
  • written warnings
  • suspension,
  • and termination.

Who is responsible for administering the disciplinary process?

The disciplinary process is usually administered by the organisation’s human resources department. However, in some cases, the disciplinary process may be administered by the employee’s manager or supervisor.

What are the steps involved in the disciplinary process?

The steps involved in the disciplinary process vary depending on the organisation. However, some common steps include:

  1. Investigation of the incident
  2. Review of the employee’s file
  3. Meeting with the employee to discuss the incident
  4. Issuance of a written warning or other disciplinary action
  5. Follow-up to ensure that the employee has corrected the behaviour

What are the rights of the employee during the disciplinary process?

The employee has the right to:

  • Be informed of the allegations against them
  • Be present at any disciplinary meeting
  • Respond to the allegations
  • Be represented by a union representative or other advocate
  • Appeal the disciplinary decision

What are the responsibilities of the employer during the disciplinary process?

The employer has the responsibility to:

  • Investigate the incident thoroughly
  • Review the employee’s file
  • Meet with the employee to discuss the incident
  • Issue a written warning or other disciplinary action that is fair and consistent with the organisation’s policies and procedures
  • Follow up to ensure that the employee has corrected the behaviour

What are the consequences of not following the disciplinary process?

The consequences of not following the disciplinary process can vary depending on the organisation. However, some common consequences include:

  • Increased employee turnover
  • Decreased employee morale
  • Decreased productivity
  • Increased legal liability

What are the challenges of implementing a disciplinary process?

Some of the challenges of implementing a disciplinary process include:

  • Dealing with employee emotions
  • Avoiding bias
  • Ensuring that the process is fair and consistent
  • Documenting the process

Watch the ISO 27001 Annex A 6.4 Tutorial

Watch the ISO 27001 disciplinary process tutorial.

ISO 27001 Templates

Having a topic specific policy for information security awareness training template and an ISO 27001 communication plan template can really help if you don’t want the entire ISO 27001 toolkit.

How to comply

To comply with ISO 27001 Annex A 6.4 Disciplinary Process you are going to implement the ‘how’ to the ‘what’ the control is expecting. In short measure you are going to:

  • Write, sign off, implement and communicate your topic specific policies for HR
  • Write, sign off, implement and communicate your disciplinary procedures
  • Implement your training and awareness that includes the consequences of violating policies and procedures
  • Implement your communication plan to communicate to relevant and interested parties
  • Ensure that the disciplinary process meets all laws as well as local laws and regulations
  • Implement a process of internal audit that checks that the appropriate controls are in place and effective and where they are not follow the continual improvement process to address the risks

How to pass the audit of ISO 27001 Annex A 6.4

To pass an audit of ISO 27001 Annex A 6.4 you are going to make sure that you have followed the steps above in how to comply.

What the auditor will check

The audit is going to check a number of areas for compliance with Annex A 6.4 Disciplinary Process. Lets go through them

1. That you have a documented disciplinary process

The auditor will meet with the HR team and look for a documented disciplinary process that includes violations of information security policies and procedures.

2. That you have communicated the disciplinary process

The process needs to be communicate to relevant and interested parties. The audit will check that the training and awareness plan and the communication plan and look for past evidence that this has happened.

3. That people are aware of their responsibilities

The audit is going to check for documented processes, documented topic specific policy and these have been communicated and people have been trained on what is required of them.

Common Mistakes

In my experience, the top 3 mistakes people make for ISO 27001 Annex A 6.4 Disciplinary Process are

1. You have no evidence that anything actually happened

You need to keep records and minutes of everything. You need a paper trail to show it was done. Make sure you have updated communication plans and training plans on the disciplinary process. If it isn’t written down it didn’t happen.

2. One or more members of your team haven’t done what they should have done

Prior to the audit check that all members of the team have done what they should have. Do they know where the process documents are in relation to the disciplinary process? Do a pre audit as close to the audit as you can that checks the disciplinary process and the HR team that will be involved. Assuming they are doing the right thing is a recipe for disaster. Check!

3. Your document and version control is wrong

Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.

ISO 27001 Annex A 6.4 FAQ

What are the Benefits of the ISO 27001 Disciplinary Process?

Other than your ISO 27001 certification requiring it, the following are the top 5 benefits of ISO 27001 Annex A 6.4 Disciplinary Process: 
You cannot get ISO 27001 certification without it.
Improved security: You will have an effective information security implementation that is based on people who are trained and aware of the requirements for information security and have a mechanism to take action when people do not do as expected
Reduced risk: By having a process to take action you will have a deterrent in place that will reduce the risk of a breach of information security policy
Improved compliance:  Many regulations and laws require a disciplinary process to be implemented
Reputation Protection: In the event of a breach having a disciplinary procedure in place will reduce the potential for fines and reduce the PR impact of an event

Who is responsible for the ISO 27001 disciplinary process?

HR is responsible for the disciplinary process. Under the guidance of legal counsel they are best placed to follow best practice and meet the requirements of the law.

Why is a Disciplinary Process important in ISO 27001?

A disciplinary process is important because it helps to ensure that employees comply with the organisations policies and procedures. It also helps to create a fair and consistent workplace, and it can help to protect the organisation from legal liability.
Here are some of the benefits of having a disciplinary process in place:
Increased employee compliance with policies and procedures. A well-defined disciplinary process can help to ensure that employees are aware of the organisations expectations and that they are held accountable for their actions. This can help to prevent misconduct and to create a more productive and safe workplace.
Decreased employee turnover. Employees who feel that they are being treated fairly and consistently are less likely to leave their jobs. This can save the organisation money in recruiting and training costs.
Increased employee morale. A fair and consistent disciplinary process can help to create a positive work environment where employees feel valued and respected. This can lead to increased morale and productivity.
Decreased legal liability. By having a clear and well-defined disciplinary process in place, organisations can help to protect themselves from legal liability in the event of employee misconduct. This is because the organisation can demonstrate that it has taken steps to prevent and address misconduct.

Will I need the help of a HR professional for the ISO 27001 Disciplinary Process?

Yes. You will need the help of a HR professional and a legal professional.

ISO 27001 Clause 7.5.1 Documented Information

ISO 27001 Clause 7.4 Communication

ISO 27001 Annex A 5.1 Policies for Information Security

ISO 27001 Annex A 6.2 Terms and Conditions of Employment

Further Reading

The complete guide to ISO/IEC 27002:2022

Matrix of ISO 27001 Controls and Attribute values

Control typeInformation
security properties
Cybersecurity
concepts
Operational
capabilities
Security domains
Preventive
Corrective
Availability
Confidentiality
Integrity
Protect
Respond
Human resource securityGovernance and ecosystem

About the author

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management.

Holding an MSc in Software and Systems Security, Stuart combines academic rigor with extensive operational experience. His background includes over a decade leading Data Governance for General Electric (GE) across Europe, as well as founding and exiting a successful cyber security consultancy.

As a qualified ISO 27001 Lead Auditor and Lead Implementer, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. He has successfully guided hundreds of organizations – from high-growth technology startups to enterprise financial institutions – through the audit lifecycle.

His toolkits represents the distillation of that field experience into a standardised framework. They move beyond theoretical compliance, providing a pragmatic, auditor-verified methodology designed to satisfy ISO/IEC 27001:2022 while minimising operational friction.

ISO 27001:2022 requirements

ISO 27001 Clauses

ISO 27001 Clause 4.1 – Understanding The Organisation And Its Context

ISO 27001 Clause 4.2 – Understanding The Needs And Expectations of Interested Parties

ISO 27001 Clause 4.3 – Determining The Scope Of The Information Security Management System

ISO 27001 Clause 4.4 – Information Security Management System

ISO 27001 Clause 5.1 – Leadership and Commitment

ISO 27001 Clause 5.3 – Organisational Roles, Responsibilities and Authorities

ISO 27001 Clause 6.1.1 – Planning General

ISO 27001 Clause 6.1.2 – Information Security Risk Assessment

ISO 27001 Clause 6.1.3 – Information Security Risk Treatment

ISO 27001 Clause 6.2 – Information Security Objectives and Planning to Achieve Them

ISO 27001 Clause 6.3 – Planning Of Changes

ISO 27001 Clause 7.1 – Resources

ISO 27001 Clause 7.2 – Competence

ISO 27001 Clause 7.3 – Awareness

ISO 27001 Clause 7.4 – Communication

ISO 27001 Clause 7.5.1 – Documented Information

ISO 27001 Clause 7.5.2 – Creating and Updating Documented Information

ISO 27001 Clause 8.3 – Information Security Risk Treatment

ISO 27001 Clause 9.1 – Monitoring, Measurement, Analysis, Evaluation

ISO 27001 Clause 9.2 – Internal Audit

ISO 27001 Clause 9.3 – Management Review

ISO 27001 Clause 10.1 – Continual Improvement

ISO 27001 Clause 10.2 – Nonconformity and Corrective Action

ISO 27001 Organisation Controls

ISO 27001 Annex A 5.1: Policies for information security

ISO 27001 Annex A 5.2: Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3: Segregation of duties

ISO 27001 Annex A 5.4: Management responsibilities

ISO 27001 Annex A 5.5: Contact with authorities

ISO 27001 Annex A 5.6: Contact with special interest groups

ISO 27001 Annex A 5.7: Threat intelligence

ISO 27001 Annex A 5.8: Information security in project management

ISO 27001 Annex A 5.9: Inventory of information and other associated assets

ISO 27001 Annex A 5.10: Acceptable use of information and other associated assets

ISO 27001 Annex A 5.11: Return of assets

ISO 27001 Annex A 5.12: Classification of information

ISO 27001 Annex A 5.13: Labelling of information

ISO 27001 Annex A 5.14: Information transfer

ISO 27001 Annex A 5.15: Access control

ISO 27001 Annex A 5.16: Identity management

ISO 27001 Annex A 5.17: Authentication information

ISO 27001 Annex A 5.18: Access rights

ISO 27001 Annex A 5.19: Information security in supplier relationships

ISO 27001 Annex A 5.20: Addressing information security within supplier agreements

ISO 27001 Annex A 5.21: Managing information security in the ICT supply chain

ISO 27001 Annex A 5.22: Monitoring, review and change management of supplier services

ISO 27001 Annex A 5.23: Information security for use of cloud services

ISO 27001 Annex A 5.24: Information security incident management planning and preparation

ISO 27001 Annex A 5.25: Assessment and decision on information security events

ISO 27001 Annex A 5.26: Response to information security incidents

ISO 27001 Annex A 5.27: Learning from information security incidents

ISO 27001 Annex A 5.28: Collection of evidence

ISO 27001 Annex A 5.29: Information security during disruption

ISO 27001 Annex A 5.30: ICT readiness for business continuity

ISO 27001 Annex A 5.31: Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32: Intellectual property rights

ISO 27001 Annex A 5.33: Protection of records

ISO 27001 Annex A 5.34: Privacy and protection of PII

ISO 27001 Annex A 5.35: Independent review of information security

ISO 27001 Annex A 5.36: Compliance with policies and standards for information security

ISO 27001 Annex A 5.37: Documented operating procedures

ISO 27001 Technical Controls

ISO 27001 Annex A 8.1: User Endpoint Devices

ISO 27001 Annex A 8.2: Privileged Access Rights

ISO 27001 Annex A 8.3: Information Access Restriction

ISO 27001 Annex A 8.4: Access To Source Code

ISO 27001 Annex A 8.5: Secure Authentication

ISO 27001 Annex A 8.6: Capacity Management

ISO 27001 Annex A 8.7: Protection Against Malware

ISO 27001 Annex A 8.8: Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9: Configuration Management 

ISO 27001 Annex A 8.10: Information Deletion

ISO 27001 Annex A 8.11: Data Masking

ISO 27001 Annex A 8.12: Data Leakage Prevention

ISO 27001 Annex A 8.13: Information Backup

ISO 27001 Annex A 8.14: Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15: Logging

ISO 27001 Annex A 8.16: Monitoring Activities

ISO 27001 Annex A 8.17: Clock Synchronisation

ISO 27001 Annex A 8.18: Use of Privileged Utility Programs

ISO 27001 Annex A 8.19: Installation of Software on Operational Systems

ISO 27001 Annex A 8.20: Network Security

ISO 27001 Annex A 8.21: Security of Network Services

ISO 27001 Annex A 8.22: Segregation of Networks

ISO 27001 Annex A 8.23: Web Filtering

ISO 27001 Annex A 8.24: Use of Cryptography

ISO 27001 Annex A 8.25: Secure Development Life Cycle

ISO 27001 Annex A 8.26: Application Security Requirements

ISO 27001 Annex A 8.27: Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28: Secure Coding

ISO 27001 Annex A 8.29: Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30: Outsourced Development

ISO 27001 Annex A 8.31: Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32: Change Management

ISO 27001 Annex A 8.33: Test Information

ISO 27001 Annex A 8.34: Protection of information systems during audit testing