ISO 27001:2022 Clause 6.2 Information Security Objectives and Planning to Achieve Them for SMEs

ISO 27001 Clause 6.2 for Small Business

In this guide, I will show you exactly how small businesses and SMEs can implement ISO 27001 Clause 6.2 Information Security Objectives and Planning to Achieve Them without the enterprise-level complexity. You will get a complete walkthrough of the control tailored for organizations with limited resources, along with practical examples and access to ISO 27001 templates that make compliance easy.

I am Stuart Barker, an ISO 27001 Lead Auditor with over 30 years of experience auditing businesses of all sizes. I will cut through the jargon to show you exactly what changed in the 2022 update and provide the plain-English advice you need to get your small business certified.

Key Takeaways: ISO 27001 Clause 6.2 Information Security Objectives (SME Edition)

For Small and Medium-sized Enterprises (SMEs), ISO 27001 Clause 6.2 is your security “North Star”. It requires you to translate your high-level commitment to security (the Policy) into specific, actionable targets. While the standard uses complex language, the goal for small businesses is simple: define what “good” security looks like for you this year and create a plan to achieve it. This prevents security from being a vague concept and turns it into a measurable business goal.

Core requirements for compliance include:

  • Meaningful Over SMART: While SMART goals (Specific, Measurable, Achievable, Relevant, Time-bound) are good, do not get trapped by them. Focus on what is genuinely important to your business first. If you cannot measure it perfectly, that is acceptable (the standard says “measurable if practicable“).
  • Alignment is Key: Your objectives must not exist in a vacuum. They must align with your Information Security Policy (Clause 5.2) and your risk assessment results.
  • The Planning Element: You cannot just have a goal (e.g. “Train all staff”). You must have a plan that details what will be done, who is responsible, when it will be finished, and how you will check it worked.
  • Communication: Security objectives should not be a secret kept by the IT manager. They must be communicated to the team so everyone knows what the company is striving for.
  • Monitoring & Updates: You must track your progress. If you set a goal to patch all servers within 7 days, you need a monthly report to check if you are hitting that target.

Audit Focus: Auditors will look for “The Evidence of Intent”:

  1. The Document: “Show me your Information Security Objectives for this year.” (A simple one-page list is sufficient).
  2. The Plan: “You want to reduce phishing risk. Show me the plan: who is buying the training tool and when will it be rolled out?”
  3. The Review: “Show me the minutes from your last management meeting where you reviewed progress against these objectives.”

SME Objectives Matrix (Audit Prep):

Objective CategoryExample ObjectiveEvaluation Method
Security CultureEnsure 100% of staff complete security awareness training.Training platform report showing 100% completion.
Risk ReductionReduce high-risk vulnerabilities on servers to zero.Monthly vulnerability scan reports.
AvailabilityMaintain 99.9% uptime for the customer portal.Uptime monitoring dashboard logs.
Supply ChainReview security of all “Critical” suppliers by Q4.Signed supplier review forms.

What is ISO 27001 Clause 6.2 for SMEs?

Understanding the specific requirements of Clause 6.2 is the first step toward compliance. These requirements are not arbitrary; they are designed to ensure that the security objectives an organisation sets are meaningful, actionable, and fully integrated into its operations.

The Core Requirements in Plain English

The standard breaks down Clause 6.2 into two main parts. First, it defines the essential characteristics your objectives must have. Second, it outlines the planning required to bring them to life.

Characteristics of Your Objectives:

  • Be consistent with the information security policy: Ensures your security efforts align with strategic direction.
  • Be measurable (if practicable): Allows you to track progress.
  • Take into account applicable requirements and risks: Guarantees relevance to your specific context.
  • Be monitored: Keeps objectives actively managed.
  • Be communicated: Ensures everyone understands their role.
  • Be updated as appropriate: Allows adaptation to change.
  • Be available as documented information: Provides clear evidence for auditors.

Planning to Achieve Your Objectives:

  • What will be done: Clarifies specific actions.
  • What resources will be required: Ensures realistic allocation of time and money.
  • Who will be responsible: Establishes clear accountability.
  • When it will be completed: Sets a timeline.
  • How the results will be evaluated: Defines success metrics.

The Purpose and Value for Your Business

The primary goal of Clause 6.2 is to ensure your ISMS is effective and aligned with your organisation’s commercial objectives. An ISMS that exists in a vacuum is unlikely to be successful. By setting clear objectives based on real business risks, you create a system that actively reduces the likelihood of costly security incidents and protects your company’s reputation.

Setting Meaningful Objectives: A Pragmatic Approach for SMEs

For an SME, the strategic importance of setting the right objectives cannot be overstated. The goal is not to create a long list of targets just to tick a box, but to define objectives that add genuine value.

The Power of a Single, High-Level Objective

A simple and highly effective approach, particularly for SMEs, is to start with a single, high-level objective that encapsulates the overall purpose of your ISMS. Expert Chris Hall recommends a powerful, overarching objective like this:

“To help prevent or minimise the impact of information security incidents or breaches to protect our business, reputation and to safeguard our people.“

This single statement is effective because it is directly tied to core business protection. It is broad enough to cover all aspects of your ISMS but specific enough to provide clear direction.

The “SMART” Objectives Debate: Pragmatism vs. Dogma

While the SMART framework (Specific, Measurable, Achievable, Relevant, Time-bound) is useful, a rigid adherence to it can be counterproductive. As consultant Chris Hall notes, “I am not at all keen on SMART as an approach because people ending up choosing objectives that they can make SMART rather than objectives that are important.”

The pragmatic approach is to focus on what is genuinely important to your business. Don’t let a rigid framework force you into chasing meaningless but easily measured targets.

Understanding “Measurable (if practicable)”

The ISO 27001 standard includes the crucial phrase “measurable (if practicable).” This is a deliberate flexibility. ISO 27001 does not mandate specific metrics or Key Performance Indicators (KPIs). The focus is on your ability to evaluate whether an objective is being met, and this evaluation can absolutely be qualitative.

From Objective to Action: Your Implementation Plan

An objective without a plan is just a wish. ISO 27001 Clause 6.2 requires a documented strategy to ensure your security objectives are met.

The Essential Elements of Your Plan

For each objective you set, your plan must answer a series of key questions:

  • What will be done? Describe specific actions.
  • What resources will be required? Outline needed people, budget, or technology.
  • Who will be responsible? Assign a specific person’s name.
  • When will it be completed? Set a target date (or “ongoing”).
  • How will the results be evaluated? Describe how you will check success.

Practical Example: A Sample Plan

Objective: Reduce the risk of malware infections by ensuring all staff complete annual security awareness training.

Planning ElementPlan Details
What will be done?Procure and roll out an online security awareness training module. Mandate completion for all staff annually.
What resources will be required?Budget for training platform subscription; staff time for completion (approx. 1 hour per person).
Who will be responsible?Jane Doe (IT Manager)
When will it be completed?Initial rollout by Q3. Annual refresh to be completed by March 31st each year.
How will the results be evaluated?The training platform’s dashboard will be used to confirm a 100% completion rate by the deadline.

Bringing It All Together: Documentation, Monitoring, and Review

Information security objectives are not “set and forget” items. Their strategic importance lies in their lifecycle of continuous monitoring, evaluation, and improvement.

Documenting Your Objectives

You can document your objectives using:

  • A dedicated document titled “Information Security Objectives”.
  • A simple spreadsheet with columns for each planning attribute.

Either method provides an auditor with the clear, organised evidence they need to see.

The Lifecycle of an Objective

Every objective should follow a continuous lifecycle:

  1. Establish: Define based on needs and risks.
  2. Plan: Detail the actions required.
  3. Monitor: Track progress.
  4. Evaluate: Measure results against success criteria.
  5. Update: Revise as needed.

Passing the ISO 27001 Clause 6.2 Audit: What to Expect

When it comes to Clause 6.2, an auditor is looking for evidence that your objectives are thoughtful, planned, and actively managed.

  • Have your documented evidence ready. Be ready to present your objectives document or spreadsheet.
  • Demonstrate clear business alignment. Show the link between business goals and security objectives.
  • Show proof of active monitoring. Use minutes from Management Review meetings as evidence.
  • Be prepared to show how you react to results. Demonstrate corrective actions if objectives were not met.

Fast Track ISO 27001 Clause 6.2 Compliance for SMEs with the ISO 27001 Toolkit

For Small Businesses and SMEs, ISO 27001 Clause 6.2 (Information security objectives and planning to achieve them) is about defining the fundamental ‘why’ behind your security system. It is not a bureaucratic hurdle but a framework to translate high level principles into tangible business focused goals. By setting clear objectives based on real risks, you create a system that actively protects your company’s reputation and financial stability.

While SaaS compliance platforms often try to sell you “automated objective tracking” or complex “KPI dashboards”, they cannot actually decide what is important for your specific business or ensure your objectives align with your commercial strategy. Those are human leadership and strategic tasks. The High Table ISO 27001 Toolkit is the logical choice for SMEs because it provides the objective framework you need without a recurring subscription fee.

1. Ownership: You Own Your Security Objectives Forever

SaaS platforms act as a middleman for your compliance evidence. If you define your security goals and store your planning records inside their proprietary system, you are essentially renting your own strategic roadmap.

  • The Toolkit Advantage: You receive the Information Security Objectives and Planning Templates in fully editable Word and Excel formats. These files are yours forever. You maintain permanent ownership of your records, such as your specific history of evaluating success metrics, ensuring you are always ready for an audit without an ongoing “rental” fee.

2. Simplicity: Governance for Pragmatic Goal Setting

Clause 6.2 is about having a meaningful plan. You do not need a complex new software interface to manage what a simple, well structured document or spreadsheet already does perfectly.

  • The Toolkit Advantage: SMEs need to avoid “meaningless but easily measured” targets often pushed by rigid software frameworks. What they need is the governance layer to prove to an auditor that their objectives are monitored and updated. The Toolkit provides pre-written “Implementation Plans” and “Auditor Readiness Checklists” that formalise your business goals into an auditor-ready framework, without forcing your team to learn a new software platform just to log a quarterly review.

3. Cost: A One-Off Fee vs. The “Objective” Tax

Many compliance SaaS platforms charge more based on the number of “active goals”, “measurable metrics”, or “assigned owners”. For an SME, these monthly costs can scale aggressively for very little added value.

  • The Toolkit Advantage: You pay a single, one-off fee for the entire toolkit. Whether you set 3 high level objectives or 30 detailed ones, the cost of your Objective Documentation remains the same. You save your budget for actual security improvements rather than an expensive compliance dashboard.

4. Freedom: No Vendor Lock-In for Your Strategic Strategy

SaaS tools often mandate specific ways to report on and monitor “security objectives”. If their system does not match your unique business model or specialised industry requirements, such as qualitative evaluation methods, the tool becomes a bottleneck to efficiency.

  • The Toolkit Advantage: The High Table Toolkit is 100% technology-agnostic. You can tailor the Objective Procedures to match exactly how you operate, whether you use formal board reviews or lean, collaborative team check-ins. You maintain total freedom to evolve your strategic strategy without being constrained by the technical limitations of a rented SaaS platform.

Summary: For SMEs, the auditor wants to see documented evidence that your objectives are thoughtful, planned, and actively managed (e.g. through meeting minutes). The High Table ISO 27001 Toolkit provides the governance framework to satisfy this requirement immediately. It is the most direct, cost-effective way to achieve compliance using permanent documentation that you own and control.

Conclusion: Making Clause 6.2 Work for You

Ultimately, the core purpose of Clause 6.2 is to provide clear direction and purpose to your information security efforts. For an SME, the key is to approach this clause pragmatically, focusing on value-driven objectives that address genuine risks rather than getting lost in paperwork. By starting with a clear, high-level goal and building a simple plan, you build the cornerstone of an effective and resilient ISMS.

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor ⚡ 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top