Everything you need to know
Security and customers first

Request a demo

Find out today the difference that Hicomply’s unique solution can make to your business.


Thank you for your request


In the meantime, connect with Hicomply for insights on authentication and fraud prevention


ROI Calculator

See how much you could save with Hicomply

Hicomply feature Yearly saving
Automated scoping Easily scope your ISMS with the Hicomply platform
Asset register autogeneration A shorter learning curve for organisations and a simplified process
Risk assessment Autogenerate your risk register and risk treatment plan
Extended policy templates 90% of the essential are already written out of the box
Controls framework All controls are pre-loaded and already linked to the risks they mitigate
Task management Automate all actions, administration and setup time of your ISMS
Real time monitoring Understand status and progress across your ISMS with the Hicomply dashboard
Compliance & Training Your whole team, on the same page
Audit readiness Hicomply makes sure you have everything in place for your audit
Auditor access Give auditors a dedicated login to access and audit your ISM
Back to Resource Hub

ISO 27001 Clause 5.2: Policy

An information security policy is the foundation of any ISMS.

The policy must outline the organisation’s objectives for security and provides for supporting documents (I.e. procedures and guidelines) to achieve it. From providing the best route for achieving the ISMS goals to resolve any dispute that may occur during the implementation of the ISMS, a policy can be drafted to cover everything from A to Z related to information security. The requirements for policy making can differ depending upon the size and operation of the organisation.

According to the standard, top management must establish the policy in a way that aligns with organisational goals, provides the objectives and framework for the information security, provisions to satisfy the requirements for information security and constant improvement of the ISMS. The standard also requires the organisation to keep the policy in a document form, which is communicated within the organisation and available for interested parties.

More Resource Hub

NIST Controls For Supply Chain Risk Management
ISO 9001 Hub
NIST 800-53 Hub