July 25, 2023

ISO 27001 Annex A 5.1: Information Security Policies

Annex 5.1 of the 2022 version of the ISO27001 standard can be mapped to ISO27001:2013 Annex 5.1.1 and ISO27001:2013 Annex 5.1.2

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

Within the ISO27001:22 standard, Annex 5.1 requires that an information security policy document is held by an organisation to mitigate risk and protect against information security threats.

The document itself will outline the organisation’s approach to security and communicate them clearly and transparently to employees, stakeholders, associates and clients.

In the creation of an information security policy, an organisation may consider relevant regulations and legislation, as well as the broader needs of the business. Once drafted, the policies must be reviewed and then made available both internally and externally to interested parties.

A feature of the 2022 version of the standard is the requirement to include a programme of education, training and awareness to interested parties – as described in People Controls A.6.3.

Information security policies should be kept under constant review and updated as is necessary. Changes may include management adjustments, corporate standards, governing laws or technology updates. Policies may also require revisions in light of an information security breach.

An information security policy should always follow best practice and sound procedures in order to protect the confidentiality, integrity and availability of files.

Information security policies: what you need to know

The purpose of an information security policy is to provide a clear framework for information and data – including computer networks – to internal staff and external parties such as suppliers and customers.

An information security policy can help to ensure that all employees are aware of their responsibilities in relation to protecting the organisation’s information and more able to reduce the risk of data loss in the event of an internal or external threat.

Information security policies not only demonstrate compliance with standards such as ISO27001 but also reflect adherence to laws and regulations.

What’s changed from ISO27001:2013?

ISO27001:2022 Annex A control 5.1 Information Security Policies merges Annex A controls 5.1.1 and 5.1.2 from the ISO27001:2013 standard. In the updated version of the standard, more detail is given to the purpose of the control and guidance on its implementation is provided.

Within Annex A 5.1, information security and topic-specific policies must be clearly defined and approved by senior managers before being published, communicated to and acknowledged by relevant employees and stakeholders.

According to both ISO27001:2013 and ISO27001:2022 a security policy should be developed that outlines how organisational data will be protected and that this framework has been approved by senior management.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Preparing for Your Audit
Computer Software
IT and Services
Legal Services
Enterprise