Policies

What are Policies?

ISO 27001 Policies are the foundational governance rules established to safeguard organisational information integrity. The Primary Implementation Requirement necessitates formal executive approval and annual reviews, providing the Business Benefit of a transparent security culture that mitigates risk while ensuring compliance with technical standards and international legal regulations.

What are Policies?

ISO 27001 policies are the formal rules and guidelines an organisation creates to protect its information. They are a key part of an Information Security Management System (ISMS), which is a set of rules a company follows to manage its sensitive data. These policies make sure that everyone in the company understands what’s expected of them regarding information security.

Examples

  • Access Control Policy: This policy says who can use certain information or systems. For example, it might state that only a few people can see customer credit card details.
  • Acceptable Use Policy: This policy explains how employees should use company computers and networks. It might say you shouldn’t visit risky websites or download unapproved software.
  • Remote Work Policy: This policy provides rules for working from home. It might require using a secure company laptop and a special type of internet connection (VPN).

Context

An organisation’s top leaders set the tone and direction for these policies. They approve the policies, making them official. Policies are different from procedures. Policies are the “what”—the high-level rules—while procedures are the “how”—the step-by-step instructions. For example, a policy might say, “All laptops must be encrypted,” and a procedure would explain exactly how to do that. These policies are a core part of an organisation’s efforts to get and keep ISO 27001 certification.

How to implement Policies

Implementing a robust framework for information security policies is the foundational requirement of any ISO 27001 Information Security Management System (ISMS). As a Lead Auditor, I have found that technical compliance hinges on the transition from static documentation to operational habits. This 10-step roadmap ensures you formalise your governance framework to meet legal, regulatory, and technical audit requirements while maintaining high information integrity.

1. Audit Regulatory and Contractual Obligations

Audit the organisational landscape to identify all legal, statutory, and contractual requirements: This ensures your policies address specific jurisdictional constraints such as GDPR or sector-specific regulations. Technical actions include:

  • Reviewing existing client contracts for specific security uptime or data handling clauses.
  • Identifying relevant legislation based on geographical data residency.
  • Mapping these requirements to a primary Regulatory Register to guide policy drafting.

2. Formalise the High-Level Information Security Policy

Formalise a top-level document that states management intent and security objectives: This serves as the “umbrella” for all subordinate documentation and satisfies the core requirements of ISO 27001 Clause 5.2. Necessary steps involve:

  • Defining the scope and boundaries of the ISMS.
  • Setting clear security goals that align with business strategy.
  • Ensuring the document explicitly references a commitment to continuous improvement.

3. Provision Topic-Specific Technical Policies

Provision granular policies for specific technical domains to provide detailed operational instructions: This ensures that technical staff have clear guardrails for high-risk activities. Key policies include:

  • An Access Control Policy defining IAM roles and the principle of least privilege.
  • A Cryptographic Policy specifying AES-256 encryption standards for data at rest.
  • An Acceptable Use Policy for company assets and portable media.

4. Define IAM Roles and Access Permissions

Define Identity and Access Management (IAM) roles within your policy framework to prevent unauthorised data modification: This ensures that policy enforcement is automated through system settings. Implementation involves:

  • Mapping job descriptions to specific system access levels.
  • Implementing Just-In-Time (JIT) access for administrative tasks.
  • Documenting the approval process for elevated privilege requests.

5. Execute Senior Management Review and Approval

Execute a formal review of all draft policies with senior leadership to secure management commitment: This is a mandatory audit requirement that proves security is led from the top. Actions include:

  • Presenting policy impact assessments to the board or steering committee.
  • Obtaining dated, formal approval signatures (digital or physical).
  • Recording the approval in the Management Review minutes for auditor inspection.

6. Provision a Centralised Secure Document Repository

Provision a read-only, centralised repository for all approved policies to ensure version control: This prevents staff from following obsolete versions of security rules. Technical requirements include:

  • Implementing strict folder permissions to allow only authorised editors.
  • Enabling Multi-Factor Authentication (MFA) for repository access.
  • Maintaining an automated version history for all policy updates.

7. Communicate Policies and Secure Acknowledgements

Communicate the approved policies to 100% of staff and relevant contractors: This ensures that every individual understands their specific security responsibilities. Implementation steps involve:

  • Conducting mandatory onboarding sessions for new employees.
  • Using digital acknowledgment tools to track policy “read and understood” status.
  • Providing accessible summaries of key rules for external suppliers.

8. Implement Technical Guardrails to Match Policy

Implement technical controls that automatically enforce policy statements to reduce human error: This bridges the gap between written rules and system reality. Key actions include:

  • Configuring firewalls and endpoint protection to match the Network Security Policy.
  • Enforcing complex password rotations or MFA via Active Directory.
  • Automating backup schedules as defined in the Business Continuity Policy.

9. Audit Policy Adherence through Internal Monitoring

Audit adherence to policies by reviewing system logs and conducting spot checks: This provides the objective evidence needed to prove the ISMS is operating effectively. Necessary steps involve:

  • Reviewing Access Control logs to verify only authorised IAM roles are active.
  • Checking the Asset Register against physical hardware locations.
  • Documenting any non-conformities found during the internal audit process.

10. Establish an Annual Review and Update Cycle

Establish a mandatory schedule to review and update policies at least annually: This ensures your governance framework remains effective against evolving cyber threats. Implementation involves:

  • Setting automated calendar triggers 12 months from the last approval date.
  • Updating policies following significant organisational changes or security incidents.
  • Re-obtaining management approval for any modified policy documents.

Policies FAQ

What are ISO 27001 policies?

ISO 27001 policies are high-level governance documents that define an organisation’s security requirements and management commitment. These documents are mandatory under Clause 5.2 and Annex A 5.1, ensuring that 100% of staff and stakeholders understand the rules for protecting information assets and maintaining compliance.

How many policies are required for ISO 27001?

While the standard mandates one primary Information Security Policy, most organisations require a suite of 15 to 25 topic-specific policies. These typically include technical and administrative controls such as:

  • Access Control Policy.
  • Cryptographic (Encryption) Policy.
  • Physical Security Policy.
  • Supplier Security Policy.
  • Clear Desk and Clear Screen Policy.

How often should ISO 27001 policies be reviewed?

Policies must be reviewed at least once every 12 months or whenever significant organisational or technical changes occur. Statistics show that outdated documentation accounts for approximately 35% of minor non-conformities during UKAS surveillance audits, making regular review cycles critical for maintaining certification validity.

Who is responsible for approving information security policies?

Senior management or the board of directors must formally approve all information security policies to demonstrate leadership commitment. This is a strict requirement of ISO 27001 Clause 5.1, ensuring that security objectives are integrated into business processes and allocated the necessary technical and financial resources.

How do you communicate policies to employees?

Organisations must ensure that 100% of staff acknowledge and understand the policies relevant to their role. Common implementation methods include mandatory security awareness training, hosting documents on a centralised intranet, and requiring digital signatures during onboarding to provide citable audit evidence for lead auditors.

Relevant ISO 27001 Controls

The following controls from the ISO/IEC 27001:2022 standard are related to policies:

Related ISO 27001 Control / Clause Relationship Description
ISO 27001 Annex A 5.1: Policies for Information Security Core Requirement: The primary control that mandates information security policies be defined, approved by management, published, and communicated to employees and relevant external parties.
ISO 27001 Annex A 5.36: Compliance with Policies Operational Oversight: Requires that the organization regularly reviews and ensures compliance with its own established security policies and standards.
ISO 27001 Clause 5.2: Information Security Policy Governance Framework: The high-level management requirement for top leadership to establish a policy that provides the framework for setting security objectives and a commitment to satisfy requirements.
ISO 27001 Annex A 5.10: Acceptable Use Policy Specific Rule-Set: One of the most common policies required by the standard, defining how employees should properly use company computers, networks, and data.
ISO 27001 Annex A 5.15: Access Control Policy Strategic Restriction: A vital policy area that defines who is authorized to use specific information or systems based on business and security requirements.
ISO 27001 Annex A 6.7: Remote Work Policy Operational Guideline: Focuses on the rules and security measures required for employees working from home or outside the primary office location.
Glossary: ISMS System Framework: Policies are the formal foundation of the ISMS, translating high-level management intent into actionable rules for the organization.
Glossary: Documented Information Format Requirement: Policies are a mandatory form of “documented information” that must be controlled and maintained to meet certification standards.
ISO 27001 Glossary of Terms (Main Index) Parent Directory: The central index where Policies is established as a critical governance and organizational concept.

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top