top of page

ISO 27001

Information Security Policies Required by ISO 27001
information-security-management_0.jpg

When your organization undertakes the effort to become ISO 27001 certified, you must establish certain policies governing various aspects of information security. These policies become the foundation for the ISMS, and ensure that information security is managed consistently throughout your organization.


These are the key information security policies that should be created as required by ISO 27001:
Information Security Policy – The information security policy must be the overarching document that outlines your organization's commitment to information security. It should define the scope of the ISMS, the objectives, and the general principles guiding your organization's approach to information security.

Access Control Policy – The access control policy governs how individuals and entities access your organization's information assets. It should cover user registration and de-registration, the management of privileged access rights, and the requirements for secure authentication.

Cryptography Policy – The cryptography policy defines your organization's approach to the use of cryptographic controls, such as encryption and digital signatures, to protect the confidentiality, integrity, and authenticity of information.

Physical and Environmental Security Policy – This policy addresses the physical protection of your organization's information assets, including facilities, equipment, and media. It should cover aspects, such as entry controls, secure areas, and the protection of equipment.

Operations Security Policy – The operations security policy outlines the procedures and controls to ensure the correct and secure operation of information processing facilities. This may include change management, backup and recovery, and the logging and monitoring of system activities.

Communications Security Policy – The communications security policy focuses on the protection of information in transit, both within the organization and across external networks. It should address topics such as network security, information transfer, and electronic messaging.

Supplier Relationships Policy – This policy manages the information security risks associated with third-party suppliers and service providers. It should cover the selection, monitoring, and review of suppliers, as well as the handling of information assets shared with them.

Information Security Incident Management Policy – The information security incident management policy defines your organization's approach to identifying, reporting, and responding to information security incidents. It should include procedures for incident response, escalation, and lessons learned.


It is extremely important that your key external stakeholders and, internally, your employees are well-aware of the policies, and have a keen understanding of the rationale and “why” behind these policies. This is critical for ensuring that these policies are consistently implemented, and the responsible parties are held accountable for upholding these policies.


By establishing and maintaining these information security policies, your organization can ensure that your ISMS is fully aligned with the requirements of the ISO 27001 standard, and that information security is consistently implemented throughout the organization.

bottom of page