WikiFrameworksISO/IEC 27001:2022Policies for information security

Policies for information security

Updated: 2026-02-18

Plain English Translation

Control 5.1 (A.5.1) serves as the foundation of the Information Security Management System (ISMS). It requires the organization to define, approve, and publish a set of rules that govern how information is protected. This includes a high-level 'Information Security Policy' authorized by top management, alongside specific topic-based policies (such as Access Control or Data Management). These documents must be communicated to all employees and relevant external parties, acknowledged by them, and reviewed regularly to ensure they remain effective and aligned with business changes.

Executive Takeaway

Management must establish the 'law of the land' for security by approving and distributing clear policy documents that employees must acknowledge.

ImpactHigh
ComplexityLow

Why This Matters

  • Establishes the legal and operational authority for the security program
  • Ensures all employees understand their specific security responsibilities
  • Mandatory for ISO 27001 certification; auditors require proof of management approval

What “Good” Looks Like

  • A comprehensive set of policies (approx. 12-20) approved by leadership within the last 12 months
  • 100% of employees have signed/acknowledged the policies upon hire and annually
  • Policies are easily accessible to staff via an intranet or policy portal

Control 5.1 (Annex A.5.1) requires organizations to define, approve, publish, and communicate both a high-level information security policy and specific topic-based policies (like Access Control or Physical Security) to relevant personnel.

While the standard allows flexibility, common required policies include Access Control, Asset Management, Cryptography, Physical Security, Operations Security, Supplier Relationships, Incident Management, and Business Continuity.

Start by defining the purpose, scope, and objectives. Align it with business goals and ISO requirements. Ensure it is clear, concise, and actionable. It must include a commitment to satisfy requirements and to continual improvement.

It should include the organization's security objectives, roles and responsibilities, commitment to compliance, consequences of violations, and references to supporting procedures or standards.

Policies must be reviewed at 'planned intervals' (typically annually) or whenever significant changes occur (e.g., new regulations, major infrastructure changes, or after a security incident).

Top management (e.g., the Board, CEO, or CISO) must formally approve the policies. This approval is usually documented in meeting minutes or via a digital signature in a policy management system.

They are often used interchangeably. 'Control 5.1' refers to the first control in the Organizational Controls category (Clause 5) of Annex A in the ISO 27001:2022 standard.

Effective implementation involves publishing them in a central location, conducting awareness training, requiring signed acknowledgement from staff, and enforcing the rules through technical controls and disciplinary processes.

ISO-27001 A.5.1

"Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occur."

VersionDateAuthorDescription
1.0.02026-02-18WatchDog Security GRC TeamInitial publication