WikiFrameworksISO/IEC 27001:2022Documented Operating Procedures

Documented Operating Procedures

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.5.37 requires that organizations formally document the operating procedures for their information processing facilities. This means step-by-step instructions, such as standard operating procedures (SOP) for IT, runbooks, or internal wiki pages for tasks like creating infrastructure, deploying code, and performing system backups, must be clearly written, maintained, and readily accessible to the personnel who need them to perform their jobs securely.

Executive Takeaway

Documenting standard operating procedures prevents knowledge silos and ensures consistent, secure execution of critical IT tasks.

ImpactMedium
ComplexityMedium

Why This Matters

  • Reduces human error and operational downtime by standardizing routine IT and security tasks.
  • Accelerates employee onboarding and ensures business continuity if key technical personnel depart the organization.

What “Good” Looks Like

  • An internal engineering wiki or knowledge base contains up-to-date runbooks for system deployments, monitoring, and changes; tools like WatchDog Security's Policy Management can help apply document control practices (ownership, versioning, and attestations) so procedures stay current and reviewable.
  • Procedures are subject to strict version control and are accessible only to authorized personnel on a need-to-know basis; tools like WatchDog Security's Secure File Sharing can help enforce controlled access with audit logs when operating procedures must be distributed outside a wiki or stored as controlled files.

It is an organizational control requiring that procedures for the secure and correct operation of information processing facilities be documented, maintained, and made available to the personnel who need them.

An operating procedure includes step-by-step instructions for tasks such as system restarts, automated backups, equipment maintenance, code deployment, handling user access requests, and configuring firewalls.

You should document standard operating procedures (SOP) for IT tasks that affect security, such as capacity management, patching, cryptography key rotation, system monitoring, and incident triage.

A policy dictates the high-level rules (the 'what' and 'why'), an SOP defines the standardized process for a specific operation (the 'how'), and a work instruction provides the granular, step-by-step technical commands to execute it.

Only authorized personnel who require the procedures to perform their duties should have access. This is enforced using role-based access controls (RBAC) on internal wikis or document management systems to prevent unauthorized viewing or tampering.

Auditors look for an Operations Security Policy and ISO 27001 A.5.37 audit evidence such as screenshots of an internal engineering wiki detailing processes like pull requests, or documented technical runbooks.

They should be detailed enough that a trained professional could follow them consistently without relying on undocumented tribal knowledge, thereby reducing the risk of errors during critical operations.

Procedures should be managed in a centralized document control system that tracks version history, enforces peer review (e.g., via pull requests), and requires periodic management review to ensure technical accuracy. WatchDog Security's Policy Management can support this by maintaining a controlled document lifecycle with version history and acceptance tracking for SOP updates.

By hosting ISO 27001 documented procedures in an easily searchable, centralized knowledge base (like Confluence or an internal wiki) and incorporating them into new employee onboarding and continuous training.

Yes, modern IT operations procedures such as automated runbooks, incident playbooks, and structured ticketing templates are excellent examples of documented operating procedures that satisfy this control.

Operating procedures often become outdated when ownership is unclear and changes happen informally, which creates audit and operational risk. WatchDog Security's Policy Management helps teams maintain controlled SOP documentation with version history and acceptance tracking so changes are reviewed, approved, and attributable to defined owners instead of relying on tribal knowledge.

Runbooks can contain privileged details (admin steps, recovery actions, tooling secrets) and should only be available to people who need them. WatchDog Security's Secure File Sharing supports encrypted distribution with access controls, TOTP verification, and audit logs so teams can share sensitive operating procedures while retaining proof of who accessed what and when.

ISO-27001 A.5.37

"Operating procedures for information processing facilities shall be documented and made available to personnel who need them."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication