Iso 27003 2017
Iso 27003 2017
Iso 27003 2017
S TANDARD 2 7003
Second editio n
2 0 1 7- 0 3
Reference numb er
I SO /I EC 2 7 0 0 3 : 2 0 1 7 (E )
© I SO /I E C 2 0 1 7
ISO/IEC 2 7003 : 2 01 7(E)
All rights reserved. Unless otherwise specified, no part o f this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country o f
the reques ter.
Tel. + 41 2 2 749 0 1 1 1
Fax + 41 2 2 7 49 0 9 47
copyright@iso.org
www. iso .o rg
Contents Page
Foreword .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. iv
Introduction . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . v
1 Scope . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . 1
2 Normative references . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . 1
5 Leadership . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . . 6
5 .1 Leadership and commitment . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . 6
5 .2 Po licy . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . 8
6 Planning . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . 1 0
6.1 Actions to address risks and op portunities . . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. 1 0
6.1 .1 General . . . . . . .. . . . . . . . . .. .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . 1 0
7 Support . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . 2 1
7 .1 Resources . . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . 2 1
7 .2 C ompetence . . . .. . . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . 2 2
7 .3 Awareness . . . . . . .. . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . 2 3
7 .4 C ommunication . . . . . . .. . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. 2 4
7 .5 D ocumented information . . . . . . . .. . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . 2 5
7 .5 .1 General . . . . . . .. . . . . . . . . .. .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . 2 5
8 Operation . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . 2 9
8 .1 O perational planning and control . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . 2 9
9 Performance evaluation . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . 3 2
9.1 M o nito ring, meas urement, analys is and evaluatio n . .. . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . 3 2
9 .2 I nternal audit . .. . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . 3 3
9 .3 M anagement review . . . . . .. . . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . . 3 6
10 Improvement . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . 3 7
1 0.1 N o nco n fo rmity and co rrective actio n .. . . . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . 3 7
Bibliography . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . . .. . . . . . . . 45
Foreword
I SO (the I nternational O rgani zation for Standardiz ation) and I E C (the I nternational E lec trotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
memb ers of I S O or I E C p ar ticip ate in the development of I nternational Standards through technical
committees established by the respective organization to deal with particular fields o f technical
activity. ISO and IEC technical committees collaborate in fields o f mutual interest. Other international
organi zation s , governmental and non- governmental, in l iaison with I SO and I E C , al so take p ar t in the
work. In the field o f in formation technology, ISO and IEC have established a joint technical committee,
I SO/I EC J TC 1 .
T he procedures used to develop this do cument and those intended for its fur ther maintenance are
describ ed in the I S O/I EC D irec tives , Par t 1 . I n p ar ticu lar the di fferent approval criteria needed for
the di fferent types o f document should be noted. This document was dra fted in accordance with the
editorial ru les of the I SO/I E C D irec tives , Par t 2 (see www. iso . org/direc tives) .
Attention is drawn to the possibility that some o f the elements o f this document may be the subject
o f patent rights. ISO and IEC shall not be held responsible for identi fying any or all such patent
rights. Details o f any patent rights identified during the development o f the document will be in the
I ntro duc tion and/or on the I S O lis t of p atent declarations received (see www. iso . org/p atents) .
Any trade name used in this document is in formation given for the convenience o f users and does not
cons titute an endorsement.
For an explanation on the voluntary nature o f standards, the meaning o f ISO specific terms and
expressions related to con formity assessment, as well as in formation about ISO’s adherence to the
World Trade O rgani zation ( WTO) principles in the Technical B arriers to Trade ( TB T ) see the fol lowing
This document was prepared by ISO/IEC JTC 1, Information technology, Sub comm ittee S C 2 7, IT Security
techniques.
This second edition o f ISO/IEC 27003 cancels and replaces the first edition (ISO/IEC 27003:2010), o f
which it cons titutes a m inor revis ion .
T he main changes comp ared to the previous edition are as fol lows:
— the scop e and title have b een changed to cover explanation of, and guidance on the requirements of,
— the s truc ture is now aligned to the s truc ture of I SO/I E C 2 70 01 : 2 01 3 to make it eas ier for the user to
— the previous edition had a project approach with a sequence o f activities. This edition instead
provides guidance on the requirements regardless o f the order in which they are implemented.
Introduction
This document provides guidance on the requirements for an in formation security management system
(ISMS) as specified in ISO/IEC 27001 and provides recommendations (‘should’), possibilities (‘can’)
and permissions (‘may’) in relation to them. It is not the intention o f this document to provide general
guidance on all aspects o f in formation security.
C lauses 4 to 10 of this do cument mirror the s truc ture of I SO/I E C 2 70 01 : 2 01 3 .
This document does not add any new requirements for an ISMS and its related terms and definitions.
Organizations should re fer to ISO/IEC 27001 and ISO/IEC 27000 for requirements and definitions.
O rganiz ations implementing an I S M S are under no obl igation to obser ve the guidance in this do cument.
— understanding the organization’s needs and the necessity for establishing in formation security
policy and in formation security objectives;
— assessing the organization’s risks related to in formation security;
— implementing and operating in formation security processes, controls and other measures to
tre at r i s ks;
— monitoring and reviewing the p erformance and effec tivenes s of the I SM S; and
An ISMS, similar to any other type o f management system, includes the following key components:
a) policy;
b) persons with defined responsibilities;
c) management pro ces ses related to:
1) policy establishment;
2) awarenes s and comp etence provis ion;
3) planning;
4) implementation;
5) op eration;
8) improvement; and
d) documented information .
For exa mp le, s ome gu ida nce c a n b e more s u ite d to large organ i z ation s , but for ver y s ma l l organ i z ation s
— Required activity : pre s ents key ac tivitie s re qu i re d i n the corre s p ond i ng s ub clau s e o f I S O/I E C 2 70 01 ;
— Guidance : provide s more de tai le d or s upp or tive i n formation to i mplement “re qu i re d ac tivity”
— O ther information : provides fur ther information that can b e cons idered.
I SO/I EC 2 70 03 , I SO/I EC 2 70 0 4 and I SO/I E C 2 70 0 5 form a set of documents s upp or ting and providing
document that provides guidance for al l the requirements of I SO/I E C 2 70 01 , but it do es not have
de tai le d de s c rip tion s re gard i ng “mon itori ng , me as u rement, ana lys i s and eva luation” a nd i n formation
de tai le d gu ida nce on “mon itori ng , me a s u rement, a na lys i s and eva luation” a nd i n formation s e c u rity
risk management.
T here are several expl icit references to do cumented information in I SO/I EC 2 70 01 . Never theles s , an
organ i z ation c an re ta i n add itiona l do c u mente d i n formation that it de term i ne s as ne ce s s ar y for the
ma ndator y on ly i n the form and to the ex tent that the orga n i z ation de term i ne s a s ne ce s s a r y for the
1 Scope
2 Normative references
The following documents are re ferred to in the text in such a way that some or all o f their content
constitutes requirements o f this document. For dated re ferences, only the edition cited applies. For
undated re ferences, the latest edition o f the re ferenced document (including any amendments) applies.
I S O/I E C 2 70 0 0 : 2 016 , Information technology — Security techniques — Information security management
systems — Requirements
— I EC E lec trop edia: avai lable at http:// www. elec trop edia . org/
— I SO O nl ine brows ing platform: avai lable at http:// www. iso . org/obp
Required activity
T he organi zation determines external and internal is s ues relevant to its purp ose and affec ting its
ability to achieve the intended outcome(s) o f the in formation security management system (ISMS).
E xplanation
As an integral function o f the ISMS, the organization continually analyses itsel f and the world
surrounding it. This analysis is concerned with external and internal issues that in some way a ffect
in formation security and how in formation security can be managed, and that are relevant to the
organization’s objectives.
Analysis o f these issues has three purposes:
— unders tanding the context in order to decide the scop e of the I SM S;
E xternal is s ues are those outs ide of the organiz ation’s control . T his is often referred to as the
organization’s environment. Analysing this environment can include the following aspects:
a) so cial and cultural;
e) natural; and
f) comp etitive.
These aspects o f the organization’s environment continually present issues that a ffect in formation
security and how in formation security can be managed. The relevant external issues depend on the
organization’s specific priorities and situation.
For example, external issues for a specific organization can include:
g) the legal impl ications of us ing an outsourced I T ser vice (legal as p ec t) ;
h) characteristics o f the nature in terms o f possibility o f disasters such as fire, flood and earthquakes
(natural as p ec t) ;
i) technical advances o f hacking tools and use o f cryptography (technological aspect); and
j) the general demand for the organization’s services (social, cultural or financial aspects).
Internal issues are subject to the organization’s control. Analysing the internal issues can include the
fol lowing as p ec ts:
q) the capabilities, in terms o f resources and knowledge (e.g. capital, time, persons, processes, systems
and technologies) ;
B ased on an unders tanding of the organiz ation’s purp ose (e. g. referring to its mis s ion s tatement or
bus ines s plan) as wel l as the intended outcome(s) of the organiz ation’s I SM S , the organi z ation shou ld:
already existing governance and organizational structures should be taken into account. As an
example, the organi zation can model the s truc ture of its I SM S b as ed on the s truc ture of other exis ting
management systems, and can combine common functions, such as management review and auditing.
Example 2 on policy, objectives and strategies (see item l)): An analysis o f existing policies, objectives
and strategies, can indicate what the organization intends to achieve and how the in formation security
objectives can be aligned with business objectives to ensure success ful outcomes.
Example 3 on in formation systems and in formation flows (see item s)): When determining internal
issues, the organization should identi fy, at a su fficient level o f detail, the in formation flows between its
various in formation systems.
As both the external and the internal issues will change over time, the issues and their influence on the
scope, constraints and requirements o f the ISMS should be reviewed regularly.
Documented in formation on this activity and its outcome is mandatory only in the form and to the
extent that the organization determines as necessary for the e ffectiveness o f its management system
(s ee I SO/I E C 2 70 01 : 2 01 3 , 7. 5 .1 b)) .
O ther information
In ISO/IEC 27000, the definition o f “organization” has a note which states that: “The concept o f
organization includes but is not limited to sole-trader, company, corporation, firm, enterprise, authority,
partnership, charity or institution, or part or combination thereo f, whether incorporated or not, public
or private.” Some o f these examples are whole legal entities, whilst others are not.
T here are four cases:
1) the organization is a legal or administrative entity (e.g. sole-trader, company, corporation, firm,
enterprise, authority, partnership, charity or institution whether incorporated or not, public or
private) ;
2) the organization is a subset o f a legal or administrative entity (e.g. part o f a company, corporation,
enterprise) ;
3) the organiz ation is a set of a legal or adminis trative entities (e. g. a consor tium of sole-traders , larger
Required activity
T he organiz ation determines interes ted p ar ties relevant to the I SM S and their requirements relevant to
in formation security.
E xplanation
Interested party is a defined term (see ISO/IEC 27000:2016, 2.41) that re fers to persons or organizations
that can a ffect, be a ffected by, or perceive themselves to be a ffected by a decision or activity o f the
organi z ation. I nteres ted p ar ties can b e found b oth outs ide and ins ide the organiz ation and can have
specific needs, expectations and requirements for the organization’s in formation security.
d) i ndu s tr y a s s o ci ation s;
e) comp etitors;
g) ac tivis t groups .
Guidance
As the needs , exp ec tations and requirement of interes ted p ar ties change over time, these changes and
thei r i n fluence on the s cop e, con s trai nts a nd re qu i rements o f the I S M S s hou ld b e reviewe d regu la rly.
D o c u mente d i n formation on th i s ac tivity and its outcome i s ma ndator y on ly i n the form and to the
extent the organ i z ation de term i ne s as ne ce s s ar y for the e ffe c tivene s s o f its management s ys tem (s e e
I SO/I EC 2 70 01 : 2 01 3 , 7. 5 .1 b)) .
O ther information
No other information .
Required activity
T he organ i z ation de term i ne s the b oundarie s and appl ic abi l ity o f the I S M S to e s tabl i sh its s cop e .
E xplanation
T he s cop e defi ne s where a nd for wh at exac tly the I S M S i s appl ic able and where a nd for what it i s no t.
E s tabl i s h i ng the s cop e i s there fore a key ac tivity that de term i ne s the ne ce s s ar y fou ndation for a l l o ther
ac tivities in the implementation of the I SM S . For ins tance, risk as ses s ment and risk treatment, including
the determination of control s , wi l l not pro duce valid res u lts without having a precise unders tanding of
where exactly the ISMS is applicable. Precise knowledge o f the boundaries and applicability o f the ISMS
and the interfaces and dep endencies b etween the organi zation and other organi zations is critical as
well. Any later modifications o f the scope can result in considerable additional e ffort and costs.
T he fol lowing fac tors can affec t the determination of the scop e:
b) the interes ted p ar ties and their requirements that are determined according to
I SO/I EC 2 70 01 : 2 01 3¸4. 2 ;
d) all support functions, i.e. functions that are necessary to support these business activities (e.g.
human resources management; IT services and so ftware applications; facility management o f
s uppl iers .
The scope o f an ISMS can be very di fferent from one implementation to another. For instance, the scope
can include:
To es tabl ish the scop e of an I SM S , a mu lti-s tep approach can b e fol lowed:
f ) determine the preliminary scope: this activity should be conducted by a small, but representative
group of management representatives;
g) determine the refined scope: the functional units within and outside the preliminary scope should
be reviewed, possibly followed by inclusion or exclusion o f some o f these functional units to reduce
the number o f inter faces along the boundaries. When refining the preliminary scope, all support
functions should be considered that are necessary to support the business activities included in
the scop e;
h) determine the final scope: the refined scope should be evaluated by all management within the
refined scope. I f necessary, it should be adjusted and then precisely described; and
i) approval o f the scope: the documented in formation describing the scope should be formally
approved by top management.
T he organiz ation should al so cons ider ac tivities with imp ac t on the I SM S or ac tivities that are
outsourced, either to other p ar ts within the organiz ation or to indep endent s uppl iers . For s uch
activities, inter faces (physical, technical and organizational) and their influence on the scope should be
identified.
D o cumented information describing the scop e shou ld include:
k) the i n formation a nd com mun ic ation te ch nolo g y s cop e, b ou nda rie s and i nter face s; and
O ther information
No other information .
Required activity
T he organ i z ation e s tab l i s he s , i mplements , mai ntai n s a nd conti nua l ly i mprove s the I S M S .
E xplanation
I SO/I EC 2 70 01 : 2 01 3 , 4.4 s tates the central requirement for es tablishing, implementing, maintaining
elements of an I SM S , 4.4 mandates the organi z ation to ens ure that al l required elements are met in
order to e s tabl i sh, i mplement, mai nta i n and conti nua l ly i mprove the I S M S .
Guidance
No s p e ci fic gu idance .
O ther information
No other information .
5 Leadership
Required activity
Top management demons trates leadership and comm itment with res p ec t to the I S M S .
E xplanation
Top ma nagement i s defi ne d (s e e I S O/I E C 2 70 0 0) a s a p ers on or group o f p e ople who d i re c ts and control s
the orga n i z ation o f the I S M S at the h ighe s t level, i . e . top ma nagement h as the overa l l re s p on s ibi l ity
organ i z ation, for e xample the way budge ts are a l lo c ate d a nd mon itore d . Top ma nagement c an delegate
authority in the organ i z ation and provide re s ou rce s for ac tua l ly p er form i ng ac tivitie s rel ate d to
As an example, the organiz ation implementing and op erating the I SM S can b e a bus ines s unit within
a larger organi zation . I n this case, top management is the p erson or group of p eople that direc ts and
Top management also p ar ticip ates in management review (see 9. 3 ) and promotes continual
improvement (see 10 . 2 ) .
Guidance
Top management shou ld provide leadership and show commitment through the fol lowing:
a) top management shou ld en s ure that the i n formation s e c u rity p ol ic y a nd the i n formation s e c u rity
obj e c tive s a re e s tabl i she d and are comp atible with the s trate gic d i re c tion o f the orga n i z ation;
b) top management shou ld ens ure that I SM S requirements and controls are integrated into the
organ i z ation’s pro ce s s e s . How th i s i s ach ieve d shou ld b e ta i lore d to the s p e ci fic contex t o f the
organi zation . For example, an organi z ation that has des ignated proces s owners can delegate the
re s p on s ibi l ity to i mplement appl ic able re qui rements to the s e p ers on s or group o f p e ople . Top
management s upp or t can al so b e needed to overcome organi zational res is tance to changes in
c) top management shou ld en s u re the avai labi l ity o f re s ource s for a n e ffe c tive I S M S . T he re s ou rce s
are needed for the es tabl ishment of the I SM S , its implementation, maintenance and improvement,
a s wel l a s for i mplementi ng i n formation s e c u rity control s . Re s ou rce s ne e de d for the I S M S i nclude:
1) fi na nci a l re s ou rce s;
2) p ersonnel;
T he ne e de d re s ource s dep end on the organ i z ation’s contex t, s uch a s the s i z e, the comple xity, a nd
internal and external requirements . T he management review shou ld provide in formation that
indicates whether the resources are adequate for the organi zation;
d) top management s hou ld com mu n ic ate the ne e d for i n formation s e c u rity ma nagement in the
organ i z ation a nd the ne e d to con form to I S M S re qui rements . T h i s c an b e done by givi ng prac tic a l
e xample s th at i l lu s trate wh at the ac tua l ne e d is in the conte xt o f the orga n i z ation and by
e) top management should ens ure that the I SM S achieves its intended outcome(s) by s upp orting the
implementation of all in formation security management proces ses , and in particular through
reques ting and reviewing reports on the s tatus and effectiveness of the I SM S (see 5 . 3 b)) . Such reports
can be derived from measurements (see 6 . 2 b) and 9.1 a)) , management reviews and audit reports .
Top management can also set per formance obj ec tives for key personnel involved with the I SM S;
f) top ma nagement s hou ld d i re c t and s upp or t p ers on s i n the orga ni z ation d i re c tly i nvolve d with
i n formation s e c u rity and the I S M S . Fai l i ng to do th i s c an have a negative i mp ac t on the e ffe c tivene s s
of the I SM S . Feedb ack from top management can include how planned ac tivities are aligned to the
s trategic needs for the organi zation and al so for prioritiz ing different ac tivities in the I SM S;
h) top management shou ld s upp or t p ersons to whom roles and res p ons ibil ities relating to information
s e c u rity ma nagement have b e en as s igne d, s o that they a re mo tivate d and able to d i re c t and s upp or t
I n cases where the organi zation implementing and op erating an I SM S is p ar t of a larger organiz ation,
le aders h ip and com m itment c an b e i mprove d by engagement with the p ers on or group o f p e ople that
control s a nd d i re c ts the la rger orga n i z ation . I f they u nders tand wh at i s i nvolve d i n i mplementi ng an
I S M S , they ca n provide s upp or t for top management with i n the I S M S s cop e and help them provide
leadership and demon s trate commitment to the I S M S . For example, if interes ted p ar ties outs ide the
s cop e o f the I S M S are engage d i n de c i s ion ma ki ng concern i ng i n formation s e c u rity obj e c tive s a nd ri s k
criteri a and a re kep t awa re o f i n formation s e c u rity outcome s pro duce d b y the I S M S , thei r de ci s ion s
O ther information
No other in formation.
5 .2 Policy
Required activity
The in formation security policy describes the strategic importance o f the ISMS for the organization
and is available as documented in formation. The policy directs in formation security activities in the
organi zation .
The policy states what the needs for in formation security are in the actual context o f the organization.
Guidance
The in formation security policy should contain brie f, high level statements o f intent and direction
concerning in formation security. It can be specific to the scope o f an ISMS, or can have wider coverage.
All other policies, procedures, activities and objectives related to in formation security should be
aligned to the in formation security policy.
The in formation security policy should reflect the organization’s business situation, culture, issues and
concerns relating to in formation security. The extent o f the in formation security policy should be in
accordance with the purp ose and culture of the organi zation and shou ld seek a b alance b etween ease
o f reading and completeness. It is important that users o f the policy can identi fy themselves with the
strategic direction o f the policy.
The in formation security policy can either include in formation security objectives for the organization
or describe the framework for how in formation security objectives are set (i.e. who sets them for
the ISMS and how they should be deployed within the scope o f the ISMS). For example, in very large
organizations, high level objectives should be set by the top management o f the entire organization,
then, according to a framework established in the in formation security policy, the objectives should be
detailed in a way to give a sense o f direction to all interested parties.
The in formation security policy should contain a clear statement from the top management on its
commitment to satis fy in formation security related requirements.
The in formation security policy should contain a clear statement that top management supports
continual improvement in all activities. It is important to state this principle in the policy, so that
p ersons within the scop e of the I S M S are aware of it.
The in formation security policy should be communicated to all persons within the scope o f the ISMS.
There fore, its format and language should be appropriate so that it is easily understandable by all
recipients .
Top management should decide to which interested parties the policy should be communicated. The
in formation security policy can be written in such a way that it is possible to communicate it to relevant
external interes ted p ar ties outs ide of the organiz ation . E xamples of s uch external interes ted p ar ties
are customers, suppliers, contractors, subcontractors and regulators. I f the in formation security policy
is made available to external interested parties, it should not include confidential in formation.
The in formation security policy may either be a separate standalone policy or included in a
comprehensive policy, which covers multiple management system topics within the organization (e.g.
quality, environment and in formation security).
The in formation security policy should be available as documented in formation. The requirements in
ISO/IEC 27001 do not imply any specific form for this documented in formation, and there fore is up to
the organi zation to decide what form is mos t appropriate. I f the organi zation has a s tandard template
or policies, the form o f the in formation security policy should use this template.
f
O ther information
Further in formation on policies related to in formation security can be found in ISO/IEC 27002.
Further in formation about the relationship between the in formation security policy and other policies
in a policy framework can be found in Annex A.
Required activity
Top management ensures that responsibilities and authorities for roles relevant to in formation security
are as s igned and communicated throughout the organi z ation.
E xplanation
Top management ensures that roles and responsibilities as well as the necessary authorities relevant to
in formation security are assigned and communicated.
T he purp os e of this requirement is to as s ign res p ons ibi l ities and authorities to ens ure conformance of
the I SM S with the requirements of I SO/I EC 2 70 01 , and to en s ure rep or ting on the p erformance of the
Guidance
Top management should regularly ensure that the responsibilities and authorities for the ISMS are
assigned so that the management system fulfils the requirements stated in ISO/IEC 27001. Top
management does not need to assign all roles, responsibilities and authorities, but it should adequately
delegate authority to do this. Top management should approve major roles, responsibilities and
authorities of the I SM S .
Responsibilities and authorities related to in formation security activities should be assigned. Activities
include:
improvement of the I SM S;
Beyond the roles specifically related to in formation security, relevant in formation security
res p ons ibi lities and authorities should be included within other roles . For example, information
h) proces s owners;
j) risk owners;
k) in formation security coordinating functions or persons (this particular role is normally a
s upp or ting role in the I SM S ) ;
l) proj e c t managers;
n) information users .
D o c u mente d i n formation on th i s ac tivity and its outcome i s ma ndator y on ly i n the form and to the
extent the organ i z ation de term i ne s as ne ce s s ar y for the e ffe c tivene s s o f its management s ys tem (s e e
I SO/I EC 2 70 01 : 2 01 3 , 7. 5 .1 b)) .
O ther information
No other information .
6 Planning
6.1 .1 General
O verview
opp or tunities that are relevant to the I SM S . T his includes risk as ses s ment and planning for risk
treatment.
T he s truc ture of I S O/I E C 2 70 01 s ub divides risks into two categories during planning:
a) risks and opp or tunities relevant to the intended outcome(s) of the I SM S as a whole; and
b) i n formation s e c u rity ri s ks that relate to the lo s s o f con fidenti a l ity, i ntegrity and avai labi l ity o f
6 .1 .1 ( genera l) . Ri sks th at fa l l i nto th i s c ate gor y c an b e ri s ks relati ng to the I S M S its el f, the I S M S s cop e
defi n ition, top management’s com m itment to i n formation s e c u rity, re s ou rce s for op erati ng the I S M S ,
e tc . O pp or tu n itie s th at fa l l i nto th i s c ate gor y c a n b e opp or tu n itie s rel ati ng to the outcome(s) o f the
I S M S , the com merci a l va lue o f a n I S M S , the e ffic ienc y o f op erati ng I S M S pro ce s s e s and i n formation
s e c u rity control s , e tc .
T he s e cond c ategor y con s i s ts o f a l l ri s ks that d i re c tly relate to the lo s s o f con fidenti a l ity, i ntegrity and
ava i labi l ity o f i n formation with i n the s cop e o f the I S M S . T he s e ri s ks s hou ld b e hand le d i n accordance
T he s ub divis ion of requirements for addres s ing risks can b e explained as fol lows:
— it encou rage s comp atibi l ity with o ther management s ys tem s s tanda rd s for tho s e organ i z ation s
th at h ave i nte grate d management s ys tem s for d i fferent a s p e c ts l i ke qua l ity, envi ronment and
i n formation s e c u rity;
— it re qu i re s th at the organ i z ation defi ne s a nd appl ie s comple te and de ta i le d pro ce s s e s for i n formation
s e c urity ri s k as s e s s ment a nd tre atment; and
I S O/I E C 2 70 01 : 2 01 3 , 6 .1 .1 u s e s the expre s s ion s ‘de term i ne the ri s ks and opp or tu n itie s ’ and ‘add re s s
the s e ri s ks and opp or tu n itie s ’. T he word “de term i ne” c a n b e con s idere d to b e e qu iva lent to the word
“as s e s s ” u s e d i n I S O/I E C 2 70 01 : 2 01 3 , 6 .1 . 2 (i . e . identi fy, a na lys e and eva luate) . Si m i larly, the word
“add re s s ” c a n b e con s idere d e qu iva lent to the word “tre at” u s e d i n I S O/I E C 2 70 01 : 2 01 3 , 6 .1 . 3 .
Required activity
When planning for the I SM S , the organi zation determ ines the risks and opp or tunities cons idering
E xplanation
For risks and opp or tunities relevant to the intended outcome(s) of the I SM S , the organi z ation
determines them b ased on internal and external i s s ues (see 4.1) and requirements from interes ted
a) en s u re th at i ntende d outcome s are del ivere d by the I S M S , e . g. that the i n formation s e c u rity ri s ks
are known to the risk owners and treated to an accep table level;
b) prevent or reduce undes ired effec ts of risks relevant to the intended outcome(s) of the I SM S; and
and correc t weaknes ses in the management proces ses or taking opp or tunities for improving
i n formation s e c u rity.
Risks connec ted to a) ab ove cou ld b e unclear pro ces ses and res p ons ibi lities , p o or awarenes s among
management or p oor awarenes s of risks . Risks connec ted to c) ab ove could b e p o or management of the
When an organiz ation purs ues opp or tunities in its ac tivities , these ac tivities then affec t the context
of the organi zation (I S O/I E C 2 70 01 : 2 01 3 , 4.1) or the needs and exp ec tations of interes ted p ar ties
(I S O/I EC 2 70 01 : 2 01 3 , 4. 2 ) , and can change the risks to the organi zation . E xamples of s uch opp or tunities
c an b e: fo c u s i ng its bu s i ne s s on s ome are as o f pro duc ts or s er vice s , e s tabl i s h i ng ma rke ti ng s trateg y for
some geographical regions , or exp anding bus ines s p ar tnership s with other organiz ations .
O pp or tunities al so exis t in continual improvements of the I SM S pro ces ses and do cumentation, along
with eva luation o f the i ntende d outcome s del ivere d b y the ISMS . For exa mple, con s ideration of a
relatively new I S M S o ften re s u lts i n identi fic ation o f opp or tun itie s to refi ni ng pro ce s s e s b y cl ari fyi ng
interfaces , reducing adminis trative overhead, el iminating p ar ts of proces ses that are not cos t effec tive,
1) integrate and implement these ac tions into the I SM S pro ces ses; and
Guidance
f) determine risks and opp or tunities that can affec t the achievement of the go al s describ ed in a) , b)
and c) , cons idering the is s ues referred to in 4.1 and the requirements referred to in 4. 2 ; and
g) develop a plan to implement the determ ined ac tions and to evaluate the effec tivenes s of those
ac tion s; ac tion s shou ld be plan ne d con s ideri ng i ntegration o f i n formation s e c u rity pro ce s s e s
and 6 .1 . 3 ) .
s upp or te d b y the re qu i rement to ach ieve conti nua l i mprovement given i n 6 .1 .1 with o ther relevant
T he ac tions required in 6 .1 .1 can b e di fferent for s trategical, tac tical and op erational level s , for different
— cons idering risks and opp or tunities as so ciated with planning, implementing and op erating the
O ther information
NOTE The term “risk” is defined as the “e ffect o f uncertainty on objectives” (see ISO/IEC 27000:2016, 2.68).
Required activity
The organization defines and applies an in formation security risk assessment process.
E xplanation
2) criteria for performing in formation security risk assessments, which can include criteria for
assessing the consequence and likelihood, and rules for the determination of the level of risk; and
b) ensures that repeated in formation security risk assessments produce consistent, valid and
comp arable res u lts .
The in formation security risk assessment process is then defined along the following sub-processes:
c) identification o f in formation security risks:
1) identi fy risks associated with the loss o f confidentiality, integrity and availability for
information within the scop e of the I SM S; and
2) identi fy the risk owners associated with these risks, i.e. identi fy and appoint persons with the
appropriate authority and responsibility for managing identified risks.
d) analysis o f the in formation security risks:
1) assess the potential consequences in case the identified risks materialize, e.g. direct business
impacts such as monetary loss or indirect business impacts such as damage in reputation.
As ses s ed consequences can b e rep or ted with quantitative or qualitative values;
2) assess the realistic likelihood o f occurrence o f the identified risks, with quantitative (i.e.
probability or frequency) or qualitative values; and
The in formation security risk criteria should be established considering the context o f the organization
and requirements o f interested parties and should be defined in accordance with top management’s
risk preferences and risk p ercep tions on one hand and shou ld al low for a feas ible and appropriate risk
The in formation security risk criteria should be established in connection with the intended outcome(s)
of the I SM S .
According to ISO/IEC 27001:2013, 6.1.2 a), criteria concerning in formation security risk assessment
that cons ider the as ses s ment of l i keli ho o d and consequences shou ld b e es tablished. Fur ther, risk
A fter establishing criteria for assessing consequences and likelihoods o f in formation security
ri sks , the organ i z ation shou ld a l s o e s tab l i sh a metho d for combi n i ng them i n order to deter m i ne a
level o f risk. Consequences and likelihoods may be expressed in a qualitative, quantitative or semi-
qu antitative man ner.
Risk accep tance criteria relates to risk as ses s ment (in its evaluation phase, when the organi zation
should unders tand i f a risk is accep table or not) , and risk treatment ac tivities (when the organi z ation
should understand i f the proposed risk treatment is su fficient to reach an acceptable level o f risk).
Risk acceptance criteria can be based on a maximum level o f acceptable risks, on cost-benefits
considerations , or on consequences for the organiz ation .
The risk assessment process should be based on methods and tools designed in su fficient detail so that
it leads to cons is tent, val id and comp arable res u lts .
Whatever the chosen method, the in formation security risk assessment process should ensure that:
— al l risks , at the needed level of detai l, are cons idered;
— its results are consistent and reproducible (i.e. the identification o f risks, their analysis and their
evaluation can be understood by a third party and results are the same when di fferent persons
as ses s the risks in the s ame context) ; and
— the res u lts of rep eated risk as s es s ments are comp arable (i. e. it is p os s ible to unders tand i f the level s
Inconsistencies or discrepancies in the results when the whole or part o f the in formation security risk
as ses s ment proces s is rep eated can indicate that the chosen risk as ses s ment metho d is not adequate.
Ri s k identi fic ation is the pro ce s s o f fi nd i ng , re co gni z i ng and de s cribi ng ri s ks . This i nvolve s the
identi fication o f ri sk s ou rce s , events , thei r cau s e s a nd thei r p o tenti a l con s e quence s .
m ight c re ate, en ha nce, prevent, degrade, accelerate or delay the ach ievement o f i n formation s e c u rity
obj e c tive s .
Two appro ache s a re com mon ly u s e d for the identi fic ation o f i n formation s e c urity ri s ks:
— event-b as e d appro ach: con s iders ri sk s ou rce s i n a generic way. E vents con s idere d c an have happ ene d
i n the p a s t or c an b e antic ip ate d for the futu re . I n the fi rs t c a s e they c an i nvolve h i s toric a l data, i n
the s e cond ca s e they c an b e b a s e d on the ore tic a l ana lys i s and e xp er t opi n ion s; a nd
— appro ach b a s e d on identi fic ation o f a s s e ts , th re ats , and vu l nerabi l itie s: con s iders two d i fferent typ e s
of risk sources: as sets with their intrins ic vu lnerabi lities , and threats . Potential events cons idered
here a re ways a s to how th re ats cou ld e xploit a cer tai n vu l nerabi l ity o f an as s e t to i mp ac t the
B oth appro aches are cons is tent with the principles and generic guidel ines on risk as s es s ment in
I SO 3 10 0 0 .
O ther appro ache s o f ri s k identi fic ation may b e us e d i f they have proven a s i m i lar prac tic a l u s e fu l ne s s
NO TE T he ap pro ach b a s e d on a s s e ts , th re ats , a nd vu l nerab i l itie s cor re s p o nd s to the i n for m ation s e c u r ity
ri s k identi fic atio n app ro ach b y, a nd comp atib le with , the re qu i rements i n I S O/I E C 2 70 01 to en s u re th at pre viou s
I t i s no t re com mende d that the ri s k identi fic ation b e to o de ta i le d i n the fi rs t c ycle o f ri s k as s e s s ment.
H avi ng a h igh level but cle a r pic tu re o f the i n formation s e c u rity ri sks i s far b e tter than havi ng no
pic ture at al l .
identi fie d ri sk the ri sk ana lys i s i s b a s e d on a s s e s s i ng the con s e quence s re s u lti ng from the ri sk and
as ses s ing the l i keli ho o d of those con sequences occurring to determine a level of risk.
2) quantitative, u s i ng a s c a le with numeric a l va lue s (e . g. mone tar y co s t, fre quenc y or prob abi l ity o f
o ccurrence) ; or
Whatever te ch n ique for ri s k ana lys i s i s u s e d, its level o f obj e c tivity shou ld b e con s idere d .
T here are s evera l me tho d s for a na lys i ng the ri s ks . T he two appro ache s mentione d (event b as e d
appro ach a nd appro ach b a s e d on identi fic ation o f a s s e ts , th re ats , and vu l nerabi l itie s) c an b e s u itable
for i n formation s e c u rity ri s k a na lys i s . Ri sk identi fic ation a nd a na lys i s pro ce s s e s c a n b e mo s t e ffe c tive
when carried out with the help of exp er ts in the relevant risks under discus s ion .
This final step o f the risk assessment verifies whether the risks that have been analysed in the previous
steps can be accepted according to the acceptance criteria defined under 6.1.2 a), or need further
treatment. T he s tep in 6 .1 . 2 d) delivers in formation ab out the magnitude of the risk but no im mediate
in formation about the urgency o f implementing risk treatment options. Depending on the circumstances
in which risks occur, they can have di fferent priorities for treatment. There fore, the output o f this step
should be a list o f risks in priority order. It is use ful to retain further in formation about these risks from
the risk identification and risk analysis steps to support decisions for risk treatment.
O ther information
ISO/IEC 27005 provides guidance for per forming in formation security risk assessments.
Required activity
The organization defines and applies an in formation security risk treatment process.
E xplanation
In formation security risk treatment is the overall process o f selecting risk treatment options,
determining appropriate controls to implement s uch op tions , formu lating a risk treatment plan and
a) avoiding the risk by deciding not to start or continue with the activity that gives rise to the risk or
by removing the risk source (e.g. closing an e-commerce portal);
b) taking additional risk or increasing risk in order to pursue a business opportunity (e.g. opening an
e- commerce p or tal) ;
c) modi fying the risk by changing the likelihood (e.g. reducing vulnerabilities) or the consequences
(e.g. diversi fying assets) or both;
d) sharing the risk with other parties by insurance, sub-contracting or risk financing; and
e) retaining the risk based on the risk acceptance criteria or by in formed decision (e.g. maintaining
the exis ting e- commerce p or tal as it is) .
Each individual risk should be treated in line with in formation security objectives by one or more o f
these op tion s , in order to meet risk accep tance criteria.
f ) all necessary controls are included, and no unnecessary controls are chosen; and
g) the design o f necessary controls satisfies an appropriate breadth and depth.
As a consequence o f a poor choice o f controls, the proposed in formation security risk treatment can be:
h) ineffec tive; or
It can be necessary to use multiple controls to achieve the required treatment o f the in formation
security risk. For example, i f the option to change the consequences o f a particular event is chosen,
it may require controls to e ffect prompt detection o f the event as well as controls to respond to and
recover from the event.
When determining control s , the organiz ation shou ld al so take into account control s needed for
services from outside suppliers o f e.g. applications, processes and functions. Typically, these controls
are mandated by entering in formation security requirements in the agreements with these suppliers,
including ways to get in formation about to which extent these requirements are met (e.g. right o f audit).
There may be situations where the organization wishes to determine and describe detailed controls as
being part o f its own ISMS even though the controls are carried out by outside suppliers. Independently
o f the approach taken, the organization always should consider controls needed at their suppliers when
determining controls for its I SM S .
ISO/IEC 27001:2013, Annex A contains a comprehensive list o f control objectives and controls. Users o f
this do cument are direc ted to the generic representation of controls in I SO/I EC 2 70 01 : 2 01 3 , Annex A
to ensure that no necessary controls are overlooked. Comparison with ISO/IEC 27001:2013, Annex A
can also identi fy alternative controls to those determined in 6.1.3 b) which can be more e ffective at
modi fying in formation security risk.
Control objectives are implicitly included in the controls chosen. The control objectives and controls
listed in ISO/IEC 27001:2013, Annex A are not exhaustive and additional control objectives and controls
shou ld b e added as needed.
Not every control within ISO/IEC 27001:2013, Annex A needs to be included. Any control within
ISO/IEC 27001:2013, Annex A that does not contribute to modi fying risk should be excluded and
justification for the exclusion should be given.
Guidance on producing a Statement o f Applicability (SoA) (6.1.3 d))
T he S oA contains:
— all necessary controls (as determined in 6.1.3 b) and 6.1.3 c)) and, for each control:
— the justification for the control’s inclusion; and
— whether the control is implemented or not (e.g. fully implemented, in progress, not yet
s tar te d) ; and
— the justification for excluding any o f the controls in ISO/IEC 27001: 2013, Annex A.
Justification for including a control in part relies on the e ffect o f the control in modi fying an in formation
security risk. A re ference to in formation security risk assessment results and the in formation security
risk treatment plan should be su fficient, along with the in formation security risk modification expected
by the implementation o f necessary controls.
16 © I SO /I E C 2 0 1 7 – All rights res erved
ISO/IEC 2 7003 : 2 01 7(E)
Justification for excluding a control contained within ISO/IEC 27001:2013, Annex A can include the
fol lowing:
— it has been determined that the control is not necessary to implement the chosen in formation
security risk treatment option(s);
— the control is not applicable b ecause it is outs ide the scop e of the I SM S (e. g. I SO/I E C 2 70 01 : 2 01 3 ,
A.14.2.7 Outsourced development is not applicable i f all the organization’s system development is
p erformed in-house) ; and
A useful S oA can b e pro duced as a table containing al l 114 controls of I SO/I E C 2 70 01 : 2 01 3 , Annex A
along the rows plus rows with the additional control s that are not mentioned in I SO/I E C 2 70 01 : 2 01 3 ,
Annex A, i f needed. One column o f the table can indicate whether a control is necessary to implement
the risk treatment option(s) or can be excluded. A next column can contain the justification for inclusion
or exclus ion of a control . A las t column of the table can indicate the current implementation s tatus of
the control. Further columns can be used, such as for details not required by ISO/IEC 27001 but usually
usefu l for s ub sequent reviews; thes e detai l s can b e a more detailed descrip tion of how the control is
implemented or a cros s-reference to a more detailed descrip tion and do cumented information or
Although it is not a specific requirement o f ISO/IEC 27001, organizations can find it use ful to include
res p ons ibi lities for the op eration of each control included in the S oA.
I f any action is required by the risk treatment plan, then it should be planned indicating responsibilities
and deadl ines (see al so 6 . 2 ); such an action plan can be represented by a list o f these actions.
A use ful in formation security risk treatment plan can be designed as a table sorted by risks identified
during the risk as ses s ment, showing al l the determined controls . As an example, there can b e columns
in this table which indicate the names of the p ersons res p ons ible for providing the control s . Fur ther
columns can indicate the date of implementation of the control, information ab out how the control (or a
pro ces s) is intended to op erate and a column ab out the target implementation s tatus .
As an example for p ar t of the risk treatment proces s , cons ider the theft of a mobile phone. T he
consequences are loss o f availability and potential undesirable disclosure o f in formation. I f the
as ses s ment of the risk showed that the level of risk is out of accep tance, the organiz ation can decide to
change the li kel iho od, or change the consequences of the risk.
To change the li kel iho od of los s or theft of a mobi le phone, the organiz ation can determ ine that a
suitable control is to oblige employees through a mobile device policy to take care o f mobile phones and
periodically check for loss.
To change the consequence of los s or theft of a mobi le phone, the organiz ation can determine control s
s uch as:
— a Mobile D evice M anagement (M DM ) solution to delete the content of the phone if los t; and
When preparing its SoA (6.1.3 d)), the organization can include its chosen controls (mobile device policy
and MDM), justi fying their inclusion based on their e ffect o f changing the likelihood and consequences
of mobi le phone los s or theft, res ulting in reduced res idual risk.
C omp aring thes e controls with those l is ted in I SO/I EC 2 70 01 : 2 01 3 , Annex A (6 .1 . 3 c)) , it can b e seen
that the mobile device policy is aligned with ISO/IEC 27001:2013, A.6.2.1, but the MDM control does not
directly align and should be considered as an additional custom control. I f MDM and other controls are
determined as necessary control(s) in an organization’s in formation security risk treatment plan, they
shou ld b e included in the S oA (see “Guidance on pro ducing an S oA (6 .1 . 3 d)) .
I f the organi zation wants to fur ther reduce the risk, it can cons ider from I SO/I E C 2 70 01 : 2 01 3 , A.9.1 .1
(access control policy) that it lacked control o f access to mobile phones and modi fy its mobile device
policy to mandate the use o f PINs on all mobile phones. This should then be a further control to change
the con sequences of los s or theft of mobi le phones .
When formulating its in formation security risk treatment plan (6.1.3 e)), the organization should then
include actions to implement mobile device policy and MDM and assign responsibilities and time frames.
Guidance on ob taining risk owners ’ approval (6 .1 . 3 f))
When the in formation security risk treatment plan is formulated, the organization should obtain the
authorization from the risk owners. Such authorization should be based on defined risk acceptance
criteria or justified concession i f there is any deviance from them.
T hrough its management proces ses the organi z ation shou ld record the risk owner’s accep tance of the
As an example, this risk owner’s approval can be documented by amending the risk treatment plan
described under guidance on 6.1.3 e) by columns indicating the e ffectiveness o f the control, the residual
risk, and the risk owner ’s approval .
O ther information
Required activity
The organization establishes in formation security objectives and plans to achieve them at relevant
func tions and level s .
E xplanation
I n formation s e c u rity obj e c tive s help to i mplement s trategic go a l s o f a n organ i z ation a s wel l as to
i mplement the i n formation s e c u rity p ol ic y. T hereb y, obj e c tive s i n an I S M S are the i n formation s e c u rity
obj e c tive s for con fidenti a l ity, i nte grity and avai labi l ity o f i n formation . I n formation s e c u rity obj e c tive s
a l s o help to s p e ci fy and me a s ure the p er formance o f i n formation s e c u rity control s and pro ce s s e s , i n
T he organ i z ation pl an s , e s tabl i she s and i s s ue s i n formation s e c u rity obj e c tive s to relevant fu nc tion s
and levels .
s e c u rity obj e c tive s . I f the i n formation s e c u rity p ol ic y contai n s obj e c tive s , then tho s e obj e c tive s are
re qu i re d to me e t the c riteria i n 6 . 2 . I f the p ol ic y contai n s a fra mework for s e tti ng obj e c tive s , then the
Re qu i rements to be ta ken i nto accou nt when e s tabl i s h i ng obj e c tive s are tho s e de term i ne d when
unders tanding the organis ation and its context (see 4.1) as wel l as the needs and exp ec tations of
T he res u lts from risk as ses s ments and risk treatments are used as input to the on- going review of
obj e c tive s to en s u re th at they remai n appropri ate to the ci rc u m s tance s o f a n orga n i z ation .
I n formation s e c urity obj e c tive s are i nputs for ri s k a s s e s s ment: ri sk accep ta nce criteria and c riteri a
for p er form i ng i n formation s e c u rity ri sk as s e s s ments (s e e 6 .1 . 2 ) take into account these in formation
b) meas urable if prac ticable; this means that it is imp or tant to b e able to determine whether or not an
obj e c ti ve h as b e en me t;
c) con ne c te d to appl ic able i n formation s e c u rity re qui rements , and re s u lts from ri s k a s s e s s ment a nd
risk treatment;
d) communicated; and
e) up dated as appropriate.
When plan n i ng how to ach ieve its i n formation s e c u rity obj e c tive s , the organ i z ation de term i ne s:
— any other plans that are found necessary for e ffective operation (e.g. plans for developing
comp etence and increas ing awarenes s , communication, p erformance evaluation, internal audits
Guidance
The in formation security policy should state the in formation security objectives or provide a framework
for setting the objectives.
In formation security objectives can be expressed in various ways. The expression should be suitable to
meet the requirement of b eing meas urable (i f prac ticable) (I S O/I EC 2 70 01 : 2 01 3 , 6 . 2 b)) .
T he fol lowing guidance applies to the bu l lets addres sed in the explanation:
— see a) above. The in formation security policy specifies the requirements for in formation security
in an organization. All other specific requirements set for relevant functions and levels should be
consistent with them. I f the in formation security policy has in formation security objectives, then
any other specific in formation security objective should be linked to the ones in the in formation
security policy. I f the in formation security policy only provides the framework for setting objectives,
then that framework should be followed and should ensure that more specific objectives are linked
to the more generic ones;
— see b) above. Not every objective can be measurable, but making objectives measurable supports
achievement and improvement. It is highly desirable to be able to describe, qualitatively or
quantitatively, the degree to which an objective has been met. For example, to guide priorities for
additional e ffort i f objectives are not met, or to provide insights into opportunities for improved
e ffectiveness i f objectives are exceeded. It should be possible to understand whether they have
been achieved or not, how achievement o f objectives is determined, and whether it is possible to
determine the degree o f achievement o f objectives using quantitative measurements. Quantitative
descriptions o f objective attainment should speci fy how associated measurement is done. It may not
be possible to quantitatively determine the degree o f attainment o f all objectives. ISO/IEC 27001
requires objectives to be measurable i f practicable;
— see c) above. In formation security objectives should be aligned with in formation security needs;
for this reason, risk as ses s ment and treatment res u lts shou ld b e used as inputs when setting
T he organ i z ation shou ld plan how to ach ieve its i n formation s e c u rity obj e c tive s . T he orga n i s ation may
u s e a ny me tho dolo g y or me chan i s m it cho o s e s to plan for the ach ievement o f its i n formation s e c u rity
obj e c tive s . T here may b e a s i ngle i n formation s e c u rity pla n, one or more proj e c t pla n s , or ac tion s
i nclude d i n o ther organ i s ationa l p lan s . Whatever form plan n i ng ta ke s , the re s u lti ng pla n s shou ld defi ne
as a m i n i mu m (s e e f) to j ) ab ove) :
— the me tho d s and me a s u rements to eva luate whe ther the re s u lts ach ieve obj e c tive s , wh ich i nclude s
— plans , ac tions , resources , res p ons ibi lities , dead lines and evaluation metho ds; and
— re qu i rements , ta sks , re s ou rce s , re s p on s ibi l itie s , eva luation fre quenc y and me tho d s .
O ther information
No other in formation.
7 Support
7.1 Resources
Required activity
T he organi z ation determines and provides the resources for es tablishing, implementing, maintaining
E xplanation
Re s ou rce s are fu nda menta l to p er form any ki nd o f ac tivity. C ate gorie s o f re s ou rce s c an i nclude:
b) time to p erform ac tivities and time to al low res u lts to settle down b efore making a new s tep;
d) information to s upp or t decis ions , meas ure p erformance of ac tions , and improve knowledge; and
T hese resources are to b e kep t aligned with the needs of the I SM S and hence are to b e adap ted when
required.
Guidance
f) e s ti mate the re s ou rce s ne e de d for a l l the ac tivitie s relate d to the I S M S i n term s o f quantity a nd
i) maintain the resources across the whole ISMS processes and specific activities; and
j) review the provided resources against the needs o f the ISMS, and adjust them as required.
Documented in formation on this activity and its outcome is mandatory only in the form and to the
extent that the organization determines as necessary for the e ffectiveness o f its management system
(see I SO/I EC 2 70 01 : 2 01 3 , 7. 5 .1 b)) .
O ther information
No other information .
7.2 Competence
Required activity
The organization determines the competence o f persons needed for in formation security per formance,
and ens ures that the p ersons are comp etent.
E xplanation
Competence is the ability to apply knowledge and skills to achieve intended results. It is influenced by
knowledge, exp erience and wisdom .
Competence can be specific (e.g. about technology or specific management areas such as risk
management) or general (e. g. soft ski l ls , trus twor thines s , and b as ic technological and managerial
subjects).
C omp etence relates to p ersons that work under control of the organi z ation. T his means that comp etence
should be managed for persons that are employees o f the organization and for other people as needed.
Acquisition o f higher or new competence and skills can be achieved both internally and externally
through exp erience, training (e. g. courses , seminars and workshop s) , mentoring, hiring or contrac ting
external p ersons .
For competence that is only temporarily needed – for a specific activity or for a short period o f time,
e.g. to cover unexpected temporary shortage o f internal personnel – organizations can hire or contract
external resources, whose competence is to be described and verified.
Guidance
a) determine the exp ec ted comp etence for each role within the I SM S and decide if it needs to b e
comp etence (e. g. through provis ion of trai ning, mentoring, reas s ign ment of current
employees); or
3) engaging new p ersons who have the comp etence (e. g. through hiring or contrac ting) ;
E X AM PLE 1 C on s ider i f p ers ons have acqui re d comp etence a fter the trai ni ng.
EXAMPLE 2 Analyse the competence o f newly hired or contracted persons some time a fter their
arriva l i n the organi z ation .
EXAMPLE 3 Veri fy i f the plan for acquiring new persons has been completed as expected.
d) veri fy that the persons are competent for their roles; and
e) ensure that the competence evolves over time as necessary and that it meets expectations.
Appropriate do cumented information is required as evidence of comp etence. T he organiz ation should
there fore retain documentation about the necessary competence a ffecting in formation security
per formance and how this competence is met by relevant persons.
O ther information
No other in formation.
7.3 Awareness
Required activity
The persons doing work under the organization’s control are made aware o f the in formation security
policy, their contribution to the e ffectiveness o f the ISMS, benefits o f improved in formation security
p erformance and implications of not conforming to the requirements of the I SM S .
E xplanation
Awareness o f persons working under the organization’s control re fers to having the necessary
understanding and motivation about what is expected o f them with regard to in formation security.
Awarenes s concerns p ersons who have to know, unders tand, accep t and:
Additionally, the persons doing work under the organization’s control also need to know, understand
and accep t the implications of not con forming with the I SM S requirements . I mpl ications can b e negative
c) prepare a programme with the specific messages focused on each audience (e.g. internal and
external p ersons) ;
d) include in formation security needs and expectations within awareness and training materials on
other topics to place in formation security needs into relevant operational contexts;
e) prep are a plan to communicate mes s ages at planned inter val s;
f ) veri fy the knowledge and understanding o f messages both at the end o f an awareness session and
at random b etween s es s ions; and
g) veri fy whether persons act according to the communicated messages and use examples o f ’good’
and ’ b ad’ b ehaviour to rein force the mes s age.
Documented in formation on this activity and its outcome is mandatory only in the form and to the
extent the organization determines as necessary for the e ffectiveness o f its management system (see
I SO/I EC 2 70 01 : 2 01 3 , 7. 5 .1 b)) .
O ther information
7.4 Communication
Required activity
T he organiz ation determines the needs for internal and external communications related to the I SM S .
E xplanation
Communication is a key process within an ISMS. Adequate communication is necessary with internal
and external interes ted p ar ties (see 4. 2 ) .
C ommunication can be b etween internal interes ted p ar ties at al l level s of the organi z ation or
b etween the organi zation and external interes ted p ar ties . C om munication can b e initiated within the
— which content needs to be communicated, e.g. in formation security policies, objectives, procedures,
their changes, knowledge on in formation security risks, requirements to suppliers and feedback on
the in formation security per formance;
— the preferred or op timal p oint in time for communication ac tivities;
— who is to b e involved in communication ac tivities , and which is the target audience of each
— who is to initiate communication activities, e.g. specific content can require communication to be
initiated by a specific person or organization; and
— which proces ses are driving or initiating communication ac tivities , and which pro ces ses are
C ommunication relies on pro ces ses , channel s and protocols . T hes e shou ld b e chosen to ens ure the
communicated message is integrally received, correctly understood and, when relevant, acted upon
appropriately.
O rgani z ations shou ld determine which content needs to b e communicated, s uch as:
a) plans and res u lts of risk management to interes ted p ar ties as needed and appropriate, in the
d) incidents or crises, where transparency is o ften key to preserve and increase trust and confidence
in the organization’s capability to manage its in formation security and deal with unexpected
s ituations;
f) i n formation excha nge d b e twe en func tion s and role s as re qu i re d b y the I S M S ’s pro ce s s e s;
g) changes to the I SM S;
h) o ther matters identi fie d b y reviewi ng the control s and pro ce s s e s with i n the s cop e o f the I S M S;
i) matters (e . g. i ncident or c ri s i s no ti fic ation) that re qui re com mu n ic ation to regu lator y b o d ie s or
j) re que s ts or o ther com mu n ic ation s from e xterna l p a r tie s s uch a s c u s tomers , p o tenti a l c u s tomers ,
T he organ i z ation shou ld identi fy the re qu i rements for com mu n ic ation on relevant i s s ue s:
k) who i s a l lowe d to com mun icate ex terna l ly and i nterna l ly (e . g. i n s p e c ia l c as e s s uch a s a data bre ach) ,
a l lo c ati ng to s p e c i fic role s with the appropri ate authority. For exa mple, o ffici a l com mun ication
o fficers c an b e defi ne d with the appropri ate authority. T hey cou ld b e a pub l ic relation s o fficer for
e xterna l com mu n ic ation and a s e c u rity o fficer for i nterna l com mu n ic ation;
l) the triggers or fre quenc y o f com mu n ic ation (e . g. for com mun ic ation o f a n event, the trigger i s the
m) the contents o f me s s age s for key i ntere s te d p ar tie s (e . g. c u s tomers , regu lators , genera l pub l ic,
imp or tant internal users) b ased on high level imp ac t scenarios . C ommunication can b e more
e ffe c tive i f b a s e d on me s s age s prep are d and pre - approve d b y an appropriate level o f ma nagement
a s p ar t o f a com mu n ic ation pl an, the i nc ident re s p on s e pla n or the bu s i ne s s conti nu ity plan;
n) the intended recipients of the communication; in some cases , a l is t should b e maintained (e. g. for
o) the communication means and channel s . C ommunication should use dedicated means and channels ,
chan nel s s hou ld add re s s any ne e d s for the pro te c tion o f the con fidentia l ity and i nte grity o f the
p) the de s igne d pro ce s s and the me tho d to en s u re me s s age s are s ent and h ave b e en corre c tly re ceive d
C om mu n ic ation s hou ld b e cla s s i fie d and hand le d accord i ng to the organ i z ation’s re qu i rements .
D o c umente d i n formation on th i s ac tivity a nd its outcome i s mand ator y on ly i n the form and to the
ex tent the orga ni z ation de term i ne s a s ne ce s s a r y for the e ffe c tivene s s o f its management s ys tem (s e e
I S O/I E C 2 70 01 : 2 01 3 , 7. 5 .1 b)) .
O ther information
No other in formation.
7.5 .1 General
Required activity
as wel l as de term i ne d by the organ i z ation a s b ei ng ne ce s s a r y for the e ffe c tivene s s o f the I S M S .
E xplanation
D o c u mente d i n formation is ne e de d to defi ne and com mu n ic ate i n formation s e c u rity obj e c tive s ,
p ol ic y, gu idel i ne s , i n s truc tion s , control s , pro ce s s e s , pro ce du re s , a nd what p ers on s or group s o f p e ople
for aud its o f the ISMS and to mai ntai n a s table ISMS when p ers on s i n key role s ch ange . Fu r ther,
do cumented information is needed for recording ac tions , decis ions and outcome(s) of I SM S pro ces ses
— i n formation ab out i n formation s e c urity obj e c tive s , ri sks , re qu i rements and s tandard s;
— information ab out proces ses and pro cedures to b e fol lowed; and
— records of the input (e. g. for management reviews) and the outcomes of proces ses (including plans
T here are ma ny ac tivitie s with i n the I S M S that pro duce do c u mente d i n formation th at i s u s e d, mo s t o f
that add itiona l do c u mente d i n formation i s re qu i re d i f it i s ne ce s s a r y for the e ffe c tivene s s o f the I S M S .
T he amount of do cumented information needed is often related to the s ize of the organi zation .
I n to ta l, the mandator y and add itiona l do c u mente d i n formation conta i n s s u fficient i n formation to
a l low the p er formance eva luation re qui rements s p e ci fie d i n C lause 9 to b e carried out.
Guidance
T he do c u mente d i n formation shou ld b e there to fit the pu rp o s e . Fac tua l and ‘to the p oi nt’ i n formation
is what is needed.
— the roles , res p ons ibi lities and authorities (see C laus e 5 ) ;
— pro ces ses and procedures us ed to implement, maintain and improve the I SM S and the overal l
— evidence of the res u lts of I SM S pro ces s es (e. g. incident management, acces s control, information
O ther information
I f the organ i z ation wa nts to manage its do c umente d i n formation i n a do c ument management s ys tem,
Required activity
When creating and up dating do cumented information, the organi z ation ens ures its appropriate
identi fic ation and de s crip tion, format and me d i a, a nd review a nd approva l .
E xplanation
T he organ i z ation identi fie s i n de ta i l how the do c u mente d i n formation i s b e s t s truc tu re d and defi ne s a
s uitable for the purp ose, and in an adequate form and detai l for the intended audience. Regu lar reviews
en s ure conti nue d s u itabi l ity and ade quac y o f do c u mente d i n formation .
Guidance
elec tronic form) , web p ages , datab ases , computer logs , computer generated rep or ts , audio and video.
M ore over, do c u mente d i n formation may con s i s t o f s p e ci fic ation s o f i ntent (e . g. the i n formation s e c urity
p ol ic y) or re cord s o f p er forma nce (e . g. the re s u lts o f an aud it) or a m i xtu re o f b o th . T he fol lowi ng
gu idance appl ie s d i re c tly to trad itiona l do c uments and shou ld be i nterpre te d appropri ately when
do c u mente d i n formation b y:
d) determining the res p ons ibil ities for prep aring, approving, publishing and managing the
e) de term i n i ng a nd do c u menti ng the revi s ion a nd approva l pro ce s s to en s u re conti nua l s u itabi l ity
a nd ade quac y.
O rgan i z ation s shou ld defi ne a do c umentation appro ach th at i nclude s com mon attribute s o f ever y
do c u ment, wh ich a l low cle ar and u n ique identi fic ation . T he s e attribute s u s ua l ly i nclude do c u ment
typ e (e . g. p ol ic y, d i re c tive, r u le, gu idel i ne, pla n, form, pro ce s s or pro ce dure) , the pu rp o s e and s cop e,
title, date o f publ ic ation, clas s i fic ation, re ference nu mb er, vers ion numb er, a nd a revi s ion h i s tor y. T he
identi fic ation o f the author and the p ers on(s) c u rrently re s p on s ible for the do c u ment, its appl ic ation
Format re qu i rements c an i nclude defi n ition o f s uitable do c u mentation la nguage s , fi le formats , s o ftware
vers ion for worki ng with them and graph ic a l content. M e d ia re qu i rements defi ne on wh ich phys ic a l
Statements and writi ng s tyle shou ld b e tai lore d to the aud ience a nd s cop e o f the do c u mentation .
D uplication of information in do cumented information shou ld b e avoided and cros s-references used
The documentation approach should ensure timely review o f the documented in formation and that
all documentation changes are subject to approval. Suitable review criteria can be timing related (e.g.
ma ximum time p erio ds b etween document reviews) or content related. Approval criteria should b e
defined, which ensures that the documented in formation is correct, suitable for the purpose, and in an
adequate form and detai l for the intended audience.
O ther information
No other information .
Required activity
The organization manages documented in formation throughout its li fecycle and makes it available
where and when needed.
E xplanation
O nce approved, the do cumented information is communicated to its intended audience. D o cumented
in formation is available where and when it is needed, while preserving its integrity, confidentiality, and
relevance throughout the whole li fecycle.
Note that activities described “as applicable” in ISO/IEC 27001:2013, 7.5.3 need to be per formed i f they
can b e p erformed and are usefu l, cons idering the organiz ation’s needs and exp ec tation s .
Guidance
All o f the documented in formation should be classified (see ISO/IEC 27001:2013, A.8.2.1) in accordance
with the organization’s classification scheme. Documented in formation should be protected and
handled in accordance with its classification level (see ISO/IEC 27001:2013, A.8.2.3).
A change management process for documented in formation should ensure that only authorised persons
have the right to change and distribute it as needed through appropriate and predefined means.
Documented in formation should be protected to ensure it keeps its validity and authenticity.
D ocumented in formation shou ld b e dis tributed and made avai lable to authorized interes ted p ar ties .
For this , the organi zation shou ld es tabl ish who are the relevant interes ted p ar ties for each do cumented
in formation (or groups of documented in formation) , and the means to use for dis tribution, acces s ,
retrieval and use (e. g. a web s ite with appropriate acces s control mechanis ms) . T he dis tribution should
comply with any requirements related to protecting and handling o f classified in formation.
T he organi zation shou ld es tablish the appropriate retention p eriod for do cumented information
according to its intended validity and other relevant requirements. The organization should ensure that
in formation is legible throughout its retention period (e.g. using formats that can be read by available
so ftware, or veri fying that paper is not corrupted).
T he organiz ation should es tablish what to do with documented information after its retention p eriod
has expired.
T he organi zation shou ld al so manage do cumented information of external origin (i . e. from cus tomers ,
O ther information
No other in formation.
8 Operation
Required activity
T he organ i z ation pla n s , i mplements a nd control s the pro ce s s e s to me e t its i n formation s e c u rity
T he organ i z ation ke ep s do c umente d i n formation a s ne ce s s a r y to h ave con fidence that pro ce s s e s are
T he organi zation controls planned changes and reviews the consequences of unintended changes , and
en s ure s that outs ource d pro ce s s e s a re identi fie d, defi ne d and control le d .
E xplanation
T he pro ce s s e s that an orga ni z ation u s e s to me e t its i n formation s e c u rity re qu i rements are pla nne d,
and once i mplemente d, they a re control le d , p ar tic u la rly when change s are re qu i re d .
B ui lding on the planning of the I SM S (see 6 .1 and 6 . 2 ) , the organ i z ation p er form s the ne ce s s ar y
requirements .
I mplementation of plans res u lts in op erated and control led proces ses .
T he orga n i z ation u lti mately rema i n s re s p on s ible for pla n n i ng and control l i ng any outs ou rce d pro ce s s e s
i n order to ach ieve its i n formation s e c u rity obj e c tive s . T hu s the organ i z ation ne e d s to:
c) de term i ne outs ou rce d pro ce s s e s con s ideri ng the i n formation s e c urity ri sks relate d to the
outsourcing; and
d) en s ure that outsourced pro ces ses are control led (i . e. planned, monitored and reviewed) in a
ma n ner that provide s a s s u rance that they op erate as i ntende d (a l s o con s ideri ng i n formation
s e c u rity obj e c tive s and the i n formation s e c u rity ri sk tre atment pla n) .
After the implementation is completed, the proces ses are managed, monitored and reviewed to
en s ure that they conti nue to fu l fi l the re qui rements de term i ne d a fter u nders tand i ng the ne e d s a nd
T he orga n i z ation can ge t con fidence ab out the e ffe c tivene s s of the i mplementation of pl an s by
do cumenting ac tivities and us ing doc umented in formation as input to the p erformance evaluation
pro ce s s e s s p e ci fie d in C laus e 9. T he organiz ation therefore es tablishes the required do cumented
information to keep .
Guidance
i mplemente d, op erate d and veri fie d th roughout the organ i z ation . T he fol lowi ng shou ld b e con s idere d
and implemented:
e) pro ce s s e s th at are s p e ci fic for the management o f i n formation s e c u rity (s uch a s ri sk management,
i ncident m anagement, conti nuity management, i nterna l aud its , management reviews) ;
f) p ro ce s s e s em a n ati ng from i n for m atio n s e c u r ity co ntrol s in the i n fo rm atio n s e c u rity risk
g) rep or ti ng s truc tu re s (contents , fre quenc y, format, re s p on s ibi l itie s , e tc .) with i n the i n formation
s e c urity are a, for example i nc ident rep or ts , rep or ts on me as u ri ng the fu l fi l ment o f i n formation
h) me e ti ng s tr uc tu re s (fre quenc y, p ar tic ip ants , pur p o s e and authori z ation) with i n the i n formation
s e c urity are a . I n formation s e c u rity ac tivitie s s hou ld be co - ord i nate d b y repre s entative s from
d i fferent p ar ts o f the organ i z ation with releva nt role s and j ob fu nc tion s for e ffe c tive ma nagement
i) plan their implementation and as s ign tasks , res p ons ibi lities , dead lines and resources;
k) mon itor thei r i mplementation to con fi rm th at they are i mplemente d accord i ng to the pla n; and
l) col le c t and re ta i n do c u mente d i n formation on the e xe c ution o f the change s as evidence that they
have b een carried out as planned (e. g. with res p ons ibil ities , deadl ines , effec tivenes s evaluations) .
For obs er ved unintended changes , the organiz ation shou ld:
n) de term i ne whe ther a ny advers e e ffe c ts have a l re ady o cc u rre d or c an o cc u r i n the futu re;
p) col lec t and retain do cumented in formation on unintended changes and ac tions taken to mitigate
adverse effec ts .
I f p ar t of the organi zation’s func tions or proces ses are outsourced to s uppliers , the organiz ation shou ld:
t) mon itor a nd review the s uppl ier s er vice s to en s u re that they a re op erate d as i ntende d and
a s s o ci ate d i n formation s e c u rity ri sks me e t the ri s k accep tance c riteria o f the orga n i z ation; a nd
O ther information
No other information .
Required activity
The organization per forms in formation security risk assessments and retains documented in formation
on their res ults .
E xplanation
When per forming in formation security risk assessments, the organization executes the process
defined in 6 .1 . 2 . These assessments are either executed according to a schedule defined in advance,
or in response to significant changes or in formation security incidents. The results o f the in formation
security risk assessments are retained in documented in formation as evidence that the process in 6 .1 . 2
has been per formed as defined.
Documented in formation from in formation security risk assessments is essential for in formation
security risk treatment and is valuable for per formance evaluation (see C laus e 9) .
Guidance
Organizations should have a plan for conducting scheduled in formation security risk assessments.
When any significant changes o f the ISMS (or its context) or in formation security incidents have
o ccurred, the organiz ation shou ld determine:
a) which o f these changes or incidents require an additional in formation security risk assessment; and
b) how these as ses s ments are triggered.
The level o f detail o f the risk identification should be refined step by step in further iterations o f the
in formation security risk assessment in the context o f the continual improvement o f the ISMS. A broad
in formation security risk assessment should be per formed at least once a year.
O ther information
ISO/IEC 27005 provides guidance for per forming in formation security risk assessments.
Required activity
The organization implements the in formation security risk treatment plan and retains documented
in formation on the results o f the in formation security treatment.
E xplanation
In order to treat in formation security risks, the organization needs to carry out the in formation security
risk treatment process defined in 6 .1 . 3 . D uring op eration of the I SM S , whenever the risk as ses s ment
is up dated according to 8 . 2 , the organiz ation then appl ies the risk treatment according to 6 .1 . 3 and
up dates the risk treatment plan. T he up dated risk treatment plan is again implemented.
The results o f the in formation security risk treatment are retained in documented in formation as
evidence that the pro ces s in 6 .1 . 3 has been per formed as defined.
Guidance
The in formation security risk treatment process should be per formed a fter each iteration o f the
in formation security assessment process in 8 . 2 or when the implementation of the risk treatment plan
or p ar ts of it fai l s .
The progress o f implementation o f the in formation security risk treatment plan should be driven and
monitored by this activity.
O ther information
No other information .
9 Performance evaluation
Required activity
The organization evaluates the in formation security per formance and the e ffectiveness o f the ISMS.
E xplanation
The objective o f monitoring and measurement is to help the organization to judge whether the intended
outcome o f in formation security activities including risk assessment and treatment is achieved as
planned.
Monitoring determines the status o f a system, a process or an activity, whilst measurement is a process
to determine a value. T hus monitoring can b e achieved through a s ucces s ion of s imi lar meas urements
For monitoring and meas urement, the organi z ation es tabl ishes:
c) metho ds to b e used so as to pro duce val id res u lts (i . e. comp arable and repro ducible) .
f ) evaluating the in formation security per formance, for determining whether the organization is
doing as exp ec ted, which includes determ ining how wel l the proces ses within the I SM S meet their
specifications; and
g) evaluating the effec tivenes s of the I SM S , for determining whether or not the organi zation is doing
the right things, which includes determining the extent to which in formation security objectives
are achieved.
Note that as “as applicable” (ISO/IEC 27001:2013, 9.1, b)) means that i f methods for monitoring,
measurement, analysis and evaluation can be determined, they need to be determined.
Guidance
A good practice is to define the ‘in formation need’ when planning the monitoring, measurement,
analysis and evaluation. An in formation need is usually expressed as a high level in formation security
question or statement that helps the organization evaluate in formation security per formance and ISMS
e ffectiveness. In other words, monitoring and measurement should be undertaken to achieve a defined
in formation need.
Care should be taken when determining the attributes to be measured. It is impracticable, costly and
counterproductive to measure too many, or the wrong attributes. Besides the costs o f measuring,
analysing and evaluating numerous attributes, there is a possibility that key issues could be obscured
or mis sed altogether.
The responsibilities for monitoring and measurement and those for analysis and evaluation are o ften
as s igned to sep arate p ersons whom different comp etence is required.
O ther information
Monitoring, measurement, analysis and evaluation is critical to the success o f an e ffective ISMS. There
are a number o f clauses in ISO/IEC 27001 that explicitly require determination o f the e ffectiveness o f
some ac tivities . For example, I SO/I EC 2 70 01 : 2 01 3 , 6 .1 .1 e) , 7. 2 c) or 10 .1 d) .
Fur ther information can be found in I S O/I EC 2 70 0 4, which provides guidance on meeting the
requirements of I S O/I EC 2 70 01 : 2 01 3 , 9.1 . I n p ar ticu lar, it exp ands on al l of the concep ts mentioned
ab ove, s uch as roles and res p ons ibi l ities , and form s , and gives numerous examples .
Required activity
The organization conducts internal audits to provide in formation on con formity o f the ISMS to the
requirements .
E xplanation
Evaluating an ISMS at planned intervals by means o f internal audits provides assurance o f the status
o f the ISMS to top management. Auditing is characterized by a number o f principles: integrity; fair
presentation; due pro fessional care; confidentiality; independence; and evidence-based approach (see
I S O 19 011) .
I nternal audits provide in formation on whether the I SM S conform s to the organi zation’s own
requirements for its I SM S as wel l as to the requirements in I SO/I E C 2 70 01 . T he organi zation’s own
requirements include:
Auditors also evaluate whether the ISMS is e ffectively implemented and maintained.
An audit programme describes the overall framework for a set o f audits, planned for specific time
frames and directed towards specific purposes. This is di fferent from an audit plan, which describes
the activities and arrangements for a specific audit. Audit criteria are a set o f policies, procedures
or requirements used as a reference agains t which audit evidence is comp ared, i . e. the audit criteria
An internal audit can identi fy noncon formities, risks and opportunities. Noncon formities are managed
according to requirements in 10 .1 . Risks and opp or tunities are managed according to requirements in
4.1 and 6 .1 .
T he organi zation is required to retain documented in formation ab out audit programme(s) and audit
res u lts .
Guidance
An audit programme defines the structure and responsibilities for planning, conducting, reporting
and fol lowing up on individual audit ac tivities . As s uch it should en s ure that audits conduc ted are
appropriate, have the right scop e, m inimi ze the imp ac t on the op erations of the organiz ation and
maintain the necessary quality o f audits. An audit programme should also ensure the competence o f
audit teams , appropriate maintenance of audit records , and the monitoring and review of the op erations ,
risks and effec tivenes s of audits . Fur ther, an audit programme shou ld ens ure that the I SM S (i . e. al l
relevant processes, functions and controls) is audited within a specified time frame. Finally, an audit
programme should include documented in formation about types, duration, locations, and schedule o f
the audits .
The extent and frequency o f internal audits should be based on the size and nature o f the organization
as well as on the nature, functionality, complexity and the level o f maturity o f the ISMS (risk-based
auditing) .
T he effec tivenes s of the implemented controls shou ld b e examined within the scop e of internal audits .
An audit programme should be designed to ensure coverage o f all necessary controls and should
include evaluation o f the e ffectiveness o f selected controls over time. Key controls (according to the
audit programme) should be included in every audit whereas controls implemented to manage lower
risks may be audited less frequently.
T he audit programme shou ld al so con s ider that pro ces ses and controls shou ld have b een in op eration
Internal audits concerning an ISMS can be per formed e ffectively as a part o f, or in collaboration with,
other internal audits of the organi z ation. T he audit programme can include audits related to one or
selection o f audit teams, processes for handling confidentiality, in formation security, health and sa fety
provis ions for auditors , and other s imi lar matters .
Regarding comp etence and evaluation of auditors , the organi zation shou ld:
g) have a pro ces s in place for monitoring the p erformance of auditors and audit teams; and
h) include personnel on internal audit teams that have appropriate sector specific and in formation
security knowledge.
Auditors should be selected considering that they should be competent, independent, and adequately
trained.
Selecting internal auditors can be di fficult for smaller companies. I f the necessary resources and
competence are not available internally, external auditors should be appointed. When organizations
use external auditors, they should ensure that they have acquired enough knowledge about the context
o f the organization. This in formation should be supplied by internal sta ff.
Organizations should consider that internal employees acting as internal auditors can be able to
per form detailed audits considering the organization’s context, but may not have enough knowledge
ab out p erforming audits .
O rganiz ations should then recogni ze charac teris tics and p otential shor tcomings of internal vers us
external auditors and establish suitable audit teams with the necessary knowledge and competence.
Performing the audit
When p erform ing the audit, the audit team leader shou ld prep are an audit plan cons idering res u lts of
previous audits and the need to follow up on previously reported noncon formities and unacceptable
risks . T he audit plan should b e retained as do cumented information and shou ld include criteria, scop e
— consistency o f the actual in formation security risk treatment plan with the identified assessed risks
and the risk accep tance criteria;
— relevance (considering organization’s size and complexity) o f management review inputs and
outputs; and
— imp ac ts of management review outputs (including improvement needs) on the organi zation .
The extent and reliability o f available monitoring over the e ffectiveness o f controls as produced by
the I SM S (see 9.1 ) may allow the auditors to reduce their own evaluation e fforts, provided they have
noncon formity to be agreed with the audit team leader. A follow-up action plan typically includes:
i) description o f the detected noncon formity;
j) description o f the cause(s) o f noncon formity;
k) descrip tion of shor t term correc tion and longer term correc tive ac tion to eliminate a detec ted
Audit rep or ts , with audit res u lts , shou ld b e dis tributed to top management.
Results o f the previous audits should be reviewed and the audit programme adjusted to better manage
areas experiencing higher risks due to noncon formity.
O ther information
Fur ther information can be found in ISO 19 011 , which provides general guidance on auditing
management systems, including the principles o f auditing, managing an audit programme and
conducting management system audits. It also provides guidance on the evaluation o f competence o f
p ersons or group of p eople involved in the audit, including the p erson managing the audit programme,
Al so, in addition to the guidance contained in I SO 19 011 , fur ther information can b e found in:
a) I SO/I E C 2 70 07
1)
, which provides specific guidance on managing an ISMS audit programme, on
conduc ting the audits , and on the comp etence of I SM S auditors; and
Required activity
E xplanation
The purpose o f management review is to ensure the continuing suitability, adequacy and e ffectiveness
o f the ISMS. Suitability re fers to continuing alignment with the organization’s objectives. Adequacy
and effec tivenes s refer to a s uitable des ign and organi z ational emb edding of the I SM S , as wel l as the
e ffective implementation o f processes and controls that are driven by the ISMS.
O veral l, management review is a pro ces s carried out at various level s in the organi zation . T hese
activities could vary from daily, weekly, or monthly organizational unit meetings to simple discussions
o f reports. Top management is ultimately responsible for management review, with inputs from all
level s in the organi zation .
Guidance
Top management should require and regularly review reporting o f the per formance o f the ISMS.
There are many ways in which management can review the ISMS, such as receiving and reviewing
measurements and reports, electronic communication, verbal updates. Key inputs are the results
o f the in formation security measurements as described in 9.1 and the res u lts of the internal audits
describ ed in 9. 2 and risk as ses s ment res ults and risk treatment plan s tatus . When reviewing the
results o f in formation security risk assessment and status o f the in formation security risk treatment
plan, management should confirm that residual risks meet risk acceptance criteria, and that the risk
treatment plan addres ses al l relevant risks and their risk treatment op tions .
All aspects o f the ISMS should be reviewed by management at planned intervals, at least yearly, by
setting up s uitable schedu les and agenda item s in management meetings . New or les s mature I SM S s
b) changes in external and internal is s ues (see 4.1) that are relevant to the I SM S;
complaints;
e) results o f in formation security risk assessment(s) and status o f in formation security risk treatment
plan; and
f ) opportunities for continual improvement, including e fficiency improvements o f both the ISMS and
in formation security controls.
Inputs to the management review should be at the appropriate level o f detail, according to the objectives
es tablished for the management involved in the review. For example, top management should evaluate
only a summary o f all items, according to the in formation security objectives or high level objectives.
T he outputs from the management review pro ces s shou ld include decis ions related to continual
improvement opportunities and any needs for changes to the ISMS. They can also include evidence o f
decis ions regarding:
g) changes o f the in formation security policy and objectives, e.g. driven by changes in external and
internal is s ues and requirements of interes ted p ar ties;
h) changes o f the risk acceptance criteria and the criteria for per forming in formation security risk
as ses s ments (see 6 .1 . 2 ) ;
that cons ideration has b een given to (at leas t) al l the areas l is ted in I SO/I E C 2 70 01 , even where it is
O ther information
No other in formation.
1 0 Improvement
Required activity
T he organi zation reac ts to nonconformities , evaluates them and takes correc tions as wel l as correc tive
ac tions if needed.
E xplanation
A noncon formity is a non- fulfilment o f a requirement o f the ISMS. Requirements are needs or
expectations that are stated, implied or obligatory. There are several types o f noncon formities such as:
a) failure to fulfil a requirement (completely or partially) o f ISO/IEC 27001 in the ISMS;
b) failure to correctly implement or con form to a requirement, rule or control stated by the ISMS; and
c) partial or total failure to comply with legal, contractual or agreed customer requirements.
Noncon formities can b e for example:
m) monitoring and meas urement res u lts not meeting accep tance criteria; and
Corrective actions aim to eliminate the cause o f a noncon formity and to prevent recurrence
(I SO/I EC 2 70 01 : 2 01 3 , 10 .1 b) to g)) .
Note that as “as applicable” (ISO/IEC 27001:2013, 10.1 a)) means that i f an action to control and correct
a noncon formity can be taken, then it needs to be taken.
Guidance
In formation security incidents do not necessarily imply that a noncon formity exists, but they can be an
indicator o f a noncon formity. Internal and external audit and customer complaints are other important
sources that help in identi fying noncon formities.
The reaction to the noncon formity should be based on a defined handling process. The process should
include:
— communicating with relevant p ersonnel to ens ure that correc tions are carried out;
— acting further to correct the noncon formity i f it is still not remediated; and
— communicating with other relevant interes ted p ar ties , as appropriate.
As an overall result, the handling process should lead to a managed status regarding the noncon formity
and the associated consequences. However, corrections alone will not necessarily prevent recurrence
o f the noncon formity.
C orrec tive ac tions can o ccur after, or in p aral lel with, correc tions . T he fol lowing proces s s tep s shou ld
b e taken:
1. decide i f there is a need to carry out a corrective action, in accordance with established criteria
(e.g. impact o f the noncon formity, repetitiveness);
2. review o f the noncon formity, considering:
— i f s imi lar nonconformities have b een recorded;
— all the consequences and side-e ffects caused by the noncon formity; and
— the correc tions taken .
— patterns and criteria that may help to identi fy similar situations in the future.
4. per form an analysis o f potential consequences on the ISMS, considering:
— whether similar noncon formities exist in other areas, e.g. by using the patterns and criteria
found during the cause analysis; and
— whether other areas match the identified patterns or criteria, so that it is only a matter o f time
be fore a similar noncon formity occurs.
5. determine actions needed to correct the cause, evaluating i f they are proportionate to the
consequences and impact o f the noncon formity, and checking they do not have side-e ffects which
may lead to other noncon formities or significant new in formation security risks;
6. plan the corrective actions, giving priority, i f possible, to areas where there are higher likelihood
o f recurrence and more significant consequences o f the noncon formity. Planning should include a
res p ons ible p erson for a correc tive ac tion and a deadl ine for implementation;
8. assess the corrective actions to determine whether they have actually handled the cause o f the
noncon formity, and whether it has prevented related noncon formities from occurring. This
as ses s ment shou ld b e imp ar tial, evidence-b ased and do cumented. I t shou ld al so b e communicated
As a res u lt of correc tions and correc tive ac tions , it is p os s ible that new opp or tunities for improvement
information is also required to include evidence as to whether or not ac tions taken have achieved the
intended effec ts .
S ome organiz ations maintain regis ters for tracking noncon formities and correc tive ac tion s . T here
can b e more than one regis ter (for example, one for each func tional area or pro ces s) and on different
media (paper, file, application, etc.). I f this is the case, then they should be established and controlled
as documented in formation and they should allow a comprehensive review o f all noncon formities and
correc tive ac tion s for ens uring the correc t evaluation of the need for ac tions .
O ther information
ISO/IEC 27001 does not explicitly state any requirements for “preventive action”. This is because one
o f the key purposes o f a formal management system is to act as a preventive tool. Consequently, the
common text used in ISO management system standards requires an assessment o f the organization’s
“external and internal issues that are relevant to its purpose and that a ffect its ability to achieve the
intended outcome(s)” in 4.1 , and to “determine the risks and opp or tunities that need to b e addres sed to:
as s ure the I SM S can achieve its intended outcome(s) ; prevent, or reduce, undes ired effec ts; and achieve
continual improvement.” in 6 .1 . T hese two s ets of requirements are cons idered to cover the concep t of
“preventive action”, and also to take a wider view that looks at risks and opportunities.
Required activity
The organization continually improves the suitability, adequacy and e ffectiveness o f the ISMS.
E xplanation
Organizations and their contexts are never static. In addition, the risks to in formation systems, and
the ways in which they can be compromised, are evolving rapidly. Finally, no ISMS is per fect; there is
always a way in which it can be improved, even i f the organization and its context are not changing.
As an example of improvements not l inked with nonconformities or risks , the as ses s ment of an
element o f the ISMS (in terms o f suitability, adequacy and e ffectiveness) can show that it exceeds ISMS
requirements or lacks e fficiency. I f it does, then there can be an opportunity to improve the ISMS by
changing the as ses sed element.
A systematic approach using continual improvement will lead to a more e ffective ISMS, which
will improve the organization’s in formation security. In formation security management leads the
organi zation’s op erational ac tivities in order to avoid b eing to o reac tive, i . e. that mos t of the resources
are used for finding problems and addressing these problems. The ISMS is working systematically
through continual improvement so that the organi zation can have a more proac tive approach. Top
management can set objectives for continual improvement, e.g. through measurements o f e ffectiveness,
cost, or process maturity.
As a cons equence, the organi zation treats its I SM S as an evolving, learning, l iving p ar t of bus ines s
operations. In order for the ISMS to keep up with changes, it is regularly evaluated with regard to its
fitness for purpose, e ffectiveness, and alignment to the organization’s objectives. Nothing is to be taken
for granted, and nothing is to be considered as ‘o ff limits’ simply because it was good enough at the time
it was implemented.
Guidance
C ontinual improvement of the I SM S shou ld entai l that the I SM S itsel f and al l of its elements are as ses sed
cons idering internal and external is s ues (4.1) , requirements of the interes ted p ar ties (4. 2 ) and res ults
c) effec tivenes s of the I SM S , cons idering i f the intended outcome(s) of the I SM S are achieved, the
requirements o f the interested parties are met, in formation security risks are managed to meet
in formation security objectives, noncon formities are managed, while resources needed for
the es tablishment, implementation, maintenance and continual improvement of the I SM S are
T he a s s e s s ment c an a l s o i nclude an ana lys i s o f the e ffic ienc y o f the I S M S and its elements , con s ideri ng
I mprovement opp or tu n itie s c an a l s o b e identi fie d when managi ng noncon form itie s a nd corre c tive
ac tions .
O nce opp or tu n itie s for i mprovement a re identi fie d, the organ i z ation shou ld , accord i ng to 6 .1 .1 :
e) determine the changes to the I SM S and its elements in order to achieve the improvement;
f) pl an a nd i mplement the ac tion s to add re s s the opp or tu n itie s en s u ri ng that b enefits are re a l i s e d,
T hese ac tions shou ld b e cons idered as a s ub set of ac tions to addres s risks and opp or tunities describ ed
in 6 .1 .1 .
O ther information
No other in formation.
Annex A
(informative)
Policy framework
security policy.
In general, a policy is a statement o f intentions and direction o f an organization as formally expressed
by its top management (see ISO/IEC 27000:2016, 2.84).
The content o f a policy guides actions and decisions concerning the topic o f the policy.
An organization can have a number o f policies; one for each o f the activity areas that is important to
the organi z ation. S ome p ol icies are indep endent of each other, whi le other p olicies have a hierarchical
relationship .
Typically, an organization has a general policy, e.g. code o f conduct, at the highest level o f the policy
hierarchy. The general policy is supported by other policies addressing di fferent topics and can be
applicable to specific areas or functions o f the organization. The in formation security policy is one o f
these specific policies.
The in formation security policy is supported by a range o f topic-specific policies related to aspects o f
in formation security. A number o f these are discussed in ISO/IEC 27002, for example the in formation
security policy can be supported by policies concerning access control, in formation classification (and
handling), physical and environmental security, end user oriented topics, amongst others. Additional
layers o f policies may be added. This arrangement is shown in Figure A.1 . Note that some organi zations
use other terms for topic-specific policy documents, such as “standards”, “directives” or “rules”.
ISO/IEC 27001 requires organizations to have an in formation security policy. It does not, however
speci fy any particular relationship between this policy and other policies o f the organization.
T he content o f p ol icie s i s b as e d on the contex t i n wh ich an organ i z ation op erate s . Sp e ci fic a l ly, the
fol lowi ng s hou ld b e con s idere d when developi ng a ny p ol ic y with i n the p ol ic y framework:
a) Adminis trative – p ol ic y title, vers ion, publ ic ation/va l id ity d ate s , cha nge h i s tor y, owner(s) a nd
b) Pol ic y s u m mar y – a one or two sentence over view. ( T his can sometimes b e merged with the
f) P rinciples – de s c rib e s the ru le s concerni ng ac tion s and de ci s ion s for ach ievi ng the obj e c tive s . I n
s ome c a s e s , it c a n b e u s e fu l to identi fy the key pro ce s s e s as s o c iate d with the topic o f the p ol ic y a nd
g) Res p ons ibi lities – describ es who is res p ons ible for ac tions to meet the requirements of the
h) Key outcome s – de s c rib e s the bu s i ne s s outcome s i f the obj e c tive s are me t. I n s ome c a s e s , th i s c an
i) Related p olicies – de s crib e s o ther p ol icie s relevant to the ach ievement o f the obj e c ti ve s , u s ua l ly by
Pol ic y content c an b e organ i ze d i n a va rie ty o f ways . For example , organ i z ation s that place empha s i s
on role s and re s p on s ibi l itie s may s i mpl i fy the de s crip tion o f obj e c tive s , and apply the pri nc iple s
Bibliography
2) Under preparation.