Awareness
Plain English Translation
Clause 7.3 ensures that every person working for the organization understands the basics of the Information Security Management System (ISMS). Unlike 'Competence,' which is about having the specific skills to do a job, 'Awareness' is about ensuring employees know what the security policy is, why their role matters in keeping data safe, and the consequences of ignoring security rules. It is about creating a culture where everyone knows their part in protecting the organization.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Include a security slide deck in the new hire onboarding process
- Have employees sign an acknowledgement of the Information Security Policy
- Share security tips via Slack or email once a quarter
Required Actions (scaleup)
- Implement a formal Learning Management System (LMS) for tracking completion
- Conduct annual refresher training for all employees
- Run basic phishing simulation tests to gauge awareness levels
Required Actions (enterprise)
- Tailor awareness campaigns to specific roles (e.g., developers vs. HR)
- Gamify security training to improve engagement
- Automate retraining triggers based on failed phishing simulations or policy violations
Clause 7.3 requires that all persons working under the organization's control are aware of the security policy, their contribution to ISMS effectiveness, and the consequences of non-compliance.
Staff must know: 1) The Information Security Policy, 2) How they contribute to security (benefits of doing it right), and 3) What happens if they don't follow the rules (implications of non-conformance).
Implement it by integrating security training into new hire onboarding, conducting regular (e.g., annual) refresher courses, and using ongoing communication channels like newsletters or slack tips.
Competence (7.2) refers to the specific skills and knowledge required to perform a job function (e.g., configuring a firewall). Awareness (7.3) is general knowledge required by everyone (e.g., knowing not to click suspicious links).
Topics should include the security policy, password hygiene, phishing recognition, incident reporting procedures, clean desk policy, and data handling rules.
While ISO 27001 doesn't strictly define frequency, best practice is upon hire (onboarding) and then annually, with periodic updates or 'micro-trainings' throughout the year.
Effectiveness can be measured through quiz results, phishing simulation click rates, the number of security incidents reported by staff, and random spot checks (e.g., clean desk audits).
You need records of training attendance/completion, policy acknowledgement logs, and materials used for the awareness program (slides, emails, etc.). Tools like WatchDog Security's Compliance Center can centralize these artifacts, link them to Clause 7.3 evidence tasks, and highlight missing acknowledgements before an audit.
Awareness evidence often becomes fragmented across slide decks, email threads, and ad-hoc sign-off lists, which makes it hard to show consistent coverage for employees and contractors. A structured system helps by assigning training on a schedule, tracking completion, and retaining the artifacts an auditor expects (content, timestamps, and participant records). For example, WatchDog Security's Security Awareness Training can deliver micro-courses, track completions and quiz results, and provide exportable logs that support awareness evidence.
Awareness is not just 'training happened'—it is whether people apply it when they face realistic threats like suspicious emails and credential prompts. Phishing simulations provide measurable signals (clicks, reporting rates, and repeat behavior) that show where awareness is weak and where targeted coaching is needed. For example, WatchDog Security's Phishing Simulation can run vendor-aware campaigns, track behavior outcomes over time, and help trigger focused retraining for groups with elevated risk.
"Persons doing work under the organization's control shall be aware of: a) the information security policy; b) their contribution to the effectiveness of the information security management system, including the benefits of improved information security performance; and c) the implications of not conforming with the information security management system requirements."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2025-05-27 | WatchDog Security GRC Team | Initial publication |