ISO27001 Clause 6.2 Information Security Objectives and Planning to Achieve Them Beginner’s Guide

Share with your network

In this article we lay bare ISO27001 Clause 6.2 Information Security Objectives and Planning to Achieve Them. Exposing the insider trade secrets, giving you the templates that will save you hours of your life and showing you exactly what you need to do to satisfy it for ISO27001 certification. We show you exactly what changed in the ISO27001:2022 update. I am Stuart Barker the ISO27001 Ninja and this is ISO27001 Clause 6.2

What is ISO27001 Clause 6.2 Information Security Objectives and Planning to Achieve Them?

The ISO27001 standard requires an organisation to establish information security objectives at relevant functions and levels.

This clause is all about information security objectives and planning to meet those objectives.

The ISO27001 standard for ISO27001 certification wants you define and achieve information security objectives.

What are the ISO27001:2022 Changes to Clause 6.2?

ISO27001 clause 6.2 had minor changes in the 2022 update with the changes being focussed on clarity.

It introduced that information security objectives should be monitored and be available as documented information. This was always implied but is made explicit.

As a result the numbering of the sub parts shifted but this is not material.

ISO27001 Clause 6.2 Definition

The ISO27001 standard defines clause 6.2.1 as:

The organisation shall establish information security objectives at relevant functions and levels. The information security objectives shall:
a) be consistent with the information security policy;

b) be measurable (if practicable);

c) take into account applicable information security requirements, and risk assessment and risk treatment results;

d) be monitored

e) be communicated

f) be updated as appropriate.

g) be available as documented information

The organization shall retain documented information on the information security objectives. When planning how to achieve its information security objectives, the organisation shall determine;

h ) what will be done;

i) what resources will be required;

j) who will be responsible;

k) when it will be completed; and

l) how the results will be evaluated.

ISO27001 Clause 6.2

ISO27001 Clause 6.2 Implementation Guide

Consistent with the Information Security Policy

Objectives that you write for the information security management system have to be consistent with the information security policy. Making sure that they are documented in the information security policy so that everyone knows what they are. We do not want a conflict between what the information security policy sets out and what the objectives actually are. They must align.

Measurable Objectives

Information Security Objectives have to be measurable. A great way to think about how to measure an objective is to write it in a way that follows the SMART structure. Objectives should be

  • Specific
  • Measurable
  • Achievable
  • Realistic
  • Timely

There is no point in having an objective if you cannot measure it.

Risk Based Information Security Objectives

ISO27001 is a risk based information security management system. We take into account he the applicable information security requirements, and risk assessment and risk treatment results.

We covered ISO27001 Clause 6.1.2 Information Security Risk Assessment and ISO27001 Clause 6.1.3 Information Security Risk Treatment.

The risks that form part of this will inform our information security objectives.

Communicated Information Security Objectives

We communicate our information security objectives in a number of ways. We include them in our information security policy. We include them and track them in our Management Review Team Meeting. We may send out additional communications as part of our ISO27001 Communication Plan.

Information Security Objectives are Updated

The information security objectives are not static. Objectives change over time. We continually assess ourselves and our information security management system for relevance. If things change then we update our objectives. At least annually we will take a look at our objectives and review if they are still relevant and make the appropriate changes.

ISO27001 Clause 6.2 Templates

ISO27001 templates are a great way to implement your information security management system. Whilst an ISO27001 toolkit can save you up to 30x in consulting fees and allow you to deliver up to 10x faster these individual templates help meet the specific requirements of ISO27001 clause 6.2.1

ISO27001 Information Security Policy-Black
ISO27001 Management Review Team Meeting Agenda-Green
ISO27001 Risk Register-Black

ISO27001 Clause 6.2 FAQ

What is ISO27001 Clause 6.2.1 Information Security Objectives and Planning to Achieve Them?

The ISO27001 standard requires an organisation to establish and maintain information objectives that are based on risk and the needs of the business. It expects a plan on how to achieve the objectives as well as appropriate measures.

Where can I download ISO27001 Clause 6.2.1 Information Security Objectives and Planning to Achieve Them templates?

You can download ISO27001 Clause 6.2.1 Information Security Objectives and Planning to Achieve Them templates here: https://hightable.io/product/iso-27001-templates-toolkit/

ISO27001 Clause 6.2.1 Information Security Objectives and Planning to Achieve Them templates example

An example of ISO27001 Clause 6.2.1 Information Security Objectives and Planning to Achieve Them template can be found here: https://hightable.io/product/iso-27001-templates-toolkit/

How do you measure information security objectives?

Information security objectives should be Specific, Measurable, Achievable, Realistic and Timely (SMART). You define the objective and then define the measures that are the characteristics of the objective.

Are ISO27001 information security objectives based on risk?

Yes, ISO27001 information security objectives are based on risk. ISO27001 is a risk based management system.

ISO27001 Certification Requirements

ISO27001 Certification Requirements set out clause by clause with these complete beginner’s guides that include everything you need to know, what to do and ISO27001 templates.

See Also

Reference

ISO/IEC 27001 Information Security Management

Share with your network
ISO 27001 Templates Toolkit Business Edition Black
ISO27001 Policy Templates Pack Green
Free ISO27001 Strategy Call
Shopping Cart