WikiFrameworksISO/IEC 27001:2022General (Documented information)

General (Documented information)

Updated: 2025-05-27

Plain English Translation

Clause 7.5.1 establishes the foundation for ISMS documentation. It states that your security program must include two types of written information: documents explicitly required by the ISO 27001 standard (such as the Scope, Policy, and Risk Assessment) and any other documents your organization determines are necessary to ensure security is effective. It allows for flexibility—you do not need to document every single keystroke, but you must have enough documentation to prove the system works, is consistent, and meets your objectives.

Executive Takeaway

The organization must maintain a central set of mandatory compliance documents and operational procedures to prove the ISMS is functioning.

ImpactMedium
ComplexityMedium

Why This Matters

  • Auditors cannot verify compliance for activities that are not documented
  • Ensures consistency in security operations regardless of staff turnover
  • Provides the legal and operational evidence required for certification

What “Good” Looks Like

  • A 'Master Document List' exists identifying all ISMS policies and procedures, and tools like WatchDog Security's Compliance Center can help keep owners, versions, mappings, and review dates current in one place.
  • Documents are clearly distinguished from records (evidence), and tools like WatchDog Security's Compliance Center can help link each document to the controls it supports while separately tracking immutable evidence items.
  • The volume of documentation is proportional to the complexity of the organization

It is the clause requiring the ISMS to include both the specific documents mandated by the ISO 27001 standard and any additional documentation the organization decides is necessary for the system to be effective.

Key mandatory documents include the Scope, Information Security Policy, Risk Assessment Process, Risk Treatment Plan, Statement of Applicability (SoA), and Information Security Objectives.

Documents are live instructions (like policies or procedures) that can be updated. Records are evidence of past events (like audit logs, training certificates, or meeting minutes) which generally should not be changed.

The extent of documentation depends on the organization's size, complexity, and competence of personnel. ISO 27001 does not require bureaucracy; it requires enough documentation to ensure consistent and effective security.

You must include all documents referenced by 'shall' in the standard (e.g., policy, scope, risk assessment) and operational documents needed to run your security (e.g., network diagrams, onboarding guides).

Control involves ensuring documents are available where needed, protected from loss or unauthorized change, identifying changes (version control), and managing retention and disposition (covered in Clause 7.5.3).

Clause 7.5 covers Documented Information, with 7.5.1 covering 'General' requirements, 7.5.2 covering 'Creating and updating', and 7.5.3 covering 'Control'.

Retention periods are not defined by the standard itself but must be determined by the organization based on legal, regulatory, and business needs (e.g., keeping logs for 1 year for forensics).

A Master Document List is easiest to sustain when ownership, versioning, review dates, and mappings to controls are centralized rather than spread across wikis and shared drives. WatchDog Security's Compliance Center helps by tracking required ISMS documents, linking each document to relevant controls, and highlighting gaps when a required document is missing or overdue for review.

Beyond writing policies, organizations need a repeatable way to publish updates, record who approved changes, and collect acknowledgements from the right audiences. WatchDog Security's Policy Management supports this by providing version control, review workflows, and acceptance tracking so you can demonstrate that current policies were communicated and acknowledged when auditors ask.

ISO-27001 7.5.1

"The organization's information security management system shall include: a) documented information required by this document; and b) documented information determined by the organization as being necessary for the effectiveness of the information security management system."

VersionDateAuthorDescription
1.0.02025-05-27WatchDog Security GRC TeamInitial publication