Policies

18/09/2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

ISO 27001 policies are the formal rules and guidelines an organisation creates to protect its information. They are a key part of an Information Security Management System (ISMS), which is a set of rules a company follows to manage its sensitive data. These policies make sure that everyone in the company understands what’s expected of them regarding information security.

Examples

  • Access Control Policy: This policy says who can use certain information or systems. For example, it might state that only a few people can see customer credit card details.
  • Acceptable Use Policy: This policy explains how employees should use company computers and networks. It might say you shouldn’t visit risky websites or download unapproved software.
  • Remote Work Policy: This policy provides rules for working from home. It might require using a secure company laptop and a special type of internet connection (VPN).

Context

An organisation’s top leaders set the tone and direction for these policies. They approve the policies, making them official. Policies are different from procedures. Policies are the “what”—the high-level rules—while procedures are the “how”—the step-by-step instructions. For example, a policy might say, “All laptops must be encrypted,” and a procedure would explain exactly how to do that. These policies are a core part of an organisation’s efforts to get and keep ISO 27001 certification.

Relevant ISO 27001 Controls

The following controls from the ISO/IEC 27001:2022 standard are related to policies:

ISO 27001:2022 Annex A 5.1: Policies for Information Security: the main ISO 27001 control for the requirement for ISO 27001 policies.

ISO 27001:2022 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security: the requirement to be compliant with policies.

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.