ISO 27001 Information Security Policy

What an information security policy contains, how to write it and a downloadable template.

Estimated reading time: 6 minutes

What is the ISO 27001 Information Security Policy?

The ISO 27001 information security policy is your main high level policy. This policy sets the principles, management commitment, the framework of supporting policies, the information security objectives and roles and responsibilities and legal responsibilities.

This is the policy that you can share with everyone and is your window to the world.

Information Security Policy Hargobind

How does it work?

You are going to have a suite or pack of policies that are required by ISO 27001. This makes good, practical sense for a governance framework. It could all be in one document but there are practical benefits to having separate policies. By having separate policy documents:

  • They are easy to communicate and to share with the people they are relevant to
  • They are easy to assign an owner who will keep it up to date and implement it
  • They are easy to review and sign off

Download the Information Security Policy.

Looking for specific policies? Search for policies in the template library.

Information Security Policy Overview Video

Information Security Policy Framework

The information security management system is built upon an information security policy framework. In conjunction with this policy, the following policies make up the policy framework:

  • DP 01 Data protection Policy
  • DP 02 Data Retention Policy
  • IS 01 Information Security Policy ( this policy )
  • IS 02 Access Control Policy
  • IS 03 Asset Management Policy
  • IS 04 Risk Management Policy
  • IS 05 Information Classification and Handling Policy
  • IS 06 Information Security Awareness and Training Policy
  • IS 07 Acceptable Use Policy
  • IS 08 Clear Desk and Clear Screen Policy
  • IS 09 Mobile and Teleworking Policy
  • IS 10 Business Continuity Policy
  • IS 11 Backup Policy
  • IS 12 Malware and Antivirus Policy
  • IS 13 Change Management Policy
  • IS 14 Third Party Supplier Security Policy
  • IS 15 Continual Improvement Policy
  • IS 16 Logging and Monitoring Policy
  • IS 17 Network Security Management Policy
  • IS 18 Information Transfer Policy
  • IS 19 Secure Development Policy
  • IS 20 Physical and Environmental Security Policy
  • IS 21 Cryptographic Key Management Policy
  • IS 22 Cryptographic Control and Encryption Policy
  • IS 23 Document and Record Policy

Do it yourself: a how to tutorial

In this simple how to tutorial we show you how you can do it your self. If you want to download the Information Security Policy template you can fast track here.

Information Security Policy FAQ

What is the purpose of the Information Security Policy?

The purpose of the policy is to set out the information security policies that apply to the company to protect the confidentiality, integrity and availability of data.

What is the scope of the Information Security Policy?

The scope of the policy is all employees and third-party users. This includes permanent staff, contractors, consultants and third party supplier employees working for your business.

What is the principle of the Information Security Policy?

Information security is managed based on risk, legal and regulatory requirements and business need.

Does an Information Security Policy Include Leadership Commitment?

Yes. Having a statement in the policy from the Chief Executive is a good way to record leadership commitment.

What does an Information Security Policy cover?
An information security management policy covers the following as a minimum:

Document Version Control
Document Contents Page
Purpose
Scope
Information Security Policy
Principle
Chief Executives Statement of Commitment
Introduction
Information Security Defined
Information Security Objectives
Information Security Policy Framework
Information Security Roles and Responsibilities
Monitoring
Legal and Regulatory Obligations
Policy Compliance
Compliance Measurement
Exceptions
Non-Compliance
Continual Improvement

What is an Information Security Policy?

An information security policy sets out what you do for information security. It covers the what you do not how you do it. How you do it is covered in process, procedure and operating documents. It sets a clear direction for the organisation.

Does ISO 27001 require an Information Security Policy?

Yes. An Information Security Policy is a key requirement of ISO 27001 forming part of ISO 27001 and ISO 27002 / Annex A.

Where can I get an Information Security Policy template and best practice?

A copy of the information security policy template and best practice can be found here: https://hightable.io/product/information-security-policy-template/

What is the definition of confidentiality?

Access to information is to those with appropriate authority.
The right people with the right access.

What is the definition of integrity?

Information is complete and accurate
The right people with the right access to the right data.

What is the definition of availability?

Information is available when it is needed
The right people with the right access to the right data at the right time.

What is CIA?

CIA is the Confidentiality, Integrity and Availability of data.

Is the Information Security Policy required for ISO 27001 certification?

Yes, it is a required element of the ISO 27001 certification.

Eager to learn more? Check out these related articles.

Shopping Cart