Guide to ISO 27001 policies and procedures 

Reviewed by: Zbignev Zalevskij (Chief Information Security Officer)

When I first sat down to implement ISO 27001 in a mid-sized fintech company, I underestimated one thing: how overwhelming the policies and procedures could get. What started as a structured information security project soon morphed into a maze of spreadsheets, internal memos, and conflicting interpretations of what “required” really meant. Over the months, I learned—sometimes the hard way—that ISO 27001 isn’t just about security controls. It’s about aligning your people, processes, and documentation in a way that reflects how your organization actually operates.

So, if you’re looking for a practical, experience-based guide to navigating ISO 27001 policies and procedures, you’re in the right place. This article will walk you through what policies are mandatory, which ones are often recommended, and how to approach writing them with clarity and purpose. We’ll use tables to organize the information for easy digestion—and more importantly, explain how it all connects in the real world.

What are ISO 27001 policies and why do they matter?

At its core, ISO 27001 policies are the backbone of your Information Security Management System (ISMS). They set the tone for how security is managed and embedded across your organization. But here’s the catch: the standard doesn’t give you a checklist. Instead, it gives you a framework—and expects you to figure out what fits your context.

Each policy serves a distinct purpose: from guiding employee behavior to ensuring legal compliance and technical control enforcement. But to avoid redundant paperwork, they need to reflect actual risks and operations. A poorly written policy that no one reads is just as risky as not having one at all.

Required ISO 27001 policies and procedures

Let’s start with the mandatory policies and procedures you’ll need to pass a certification audit. These are explicitly required by ISO 27001:2013 (and remain relevant under the 2022 revision). While ISO 27001 doesn’t demand a specific format, auditors expect a consistent, logical structure.

Here’s a breakdown of the essential documentation.

Required ISO 27001 policies and procedures

Document namePurposeClause / annex reference
Information security policyDefines the organization’s overall security directionClause 5.2
Risk assessment and treatment processDocuments how risks are identified, evaluated, and treatedClause 6.1.2–6.1.3
Statement of applicability (SoA)Lists which controls are applicable and whyClause 6.1.3 d)
Risk treatment planOutlines actions to address identified risksClause 6.1.3 e)
Information security objectivesDefines measurable goals aligned with the ISMSClause 6.2
Evidence of competenceDemonstrates that employees have relevant training or skillsClause 7.2
Operational planning and controlDetails how processes are implemented and controlledClause 8.1
Monitoring and measurement resultsShows how performance is evaluatedClause 9.1
Internal audit program and resultsProves regular reviews of ISMS effectivenessClause 9.2
Management review recordsDemonstrates top-level oversight and decisionsClause 9.3
Nonconformities and corrective actionsTracks incidents and how they’re resolvedClause 10.1

If you’re aiming for ISO 27001 compliance, these documents are non-negotiable. But in practice, most companies expand beyond this list to include procedures and policies that enhance implementation clarity and employee accountability.

Commonly adopted supporting policies

In my own journey, I quickly realized that just having the core documents wasn’t enough. Auditors often expect supporting policies that align with Annex A controls—the actual technical and organizational security controls you’re implementing.

Here’s where organizations often get tripped up. You don’t need to create 93 separate documents for each control. Instead, you can group them logically under broader policies. Below is a practical list of supporting policies commonly found in a mature ISMS.

Supporting ISO 27001 policies and how they map to Annex A

Policy nameRelevance to Annex A controlsPractical use case
Access control policyAnnex A.9 – Access controlDefines roles, permissions, user account management
Asset management policyAnnex A.8 – Asset managementTracks ownership, use, and classification of information assets
Acceptable use policyAnnex A.8.1.3 – Acceptable use of assetsSets rules for using company devices, networks, and software
Cryptographic policyAnnex A.10 – CryptographyOutlines encryption practices and key management
Mobile device and teleworking policyAnnex A.6.2 – Mobile and remote workingCovers use of personal and mobile devices for work
Backup policyAnnex A.12.3 – BackupDetails backup frequency, retention, and restoration procedures
Information transfer policyAnnex A.13.2 – Information transferGoverns how data is securely exchanged internally and externally
Incident management policyAnnex A.16 – Information security incident managementSets out how to detect, report, and respond to incidents
Business continuity policyAnnex A.17 – Business continuityLinks to disaster recovery and continuity planning
Supplier security policyAnnex A.15 – Supplier relationshipsSets expectations for vendors and third-party service providers

While not mandatory, these documents offer a clearer view of how your organization interprets and enforces ISO controls. You can find further guidance in ISO’s official site or explore tools like IT Governance’s policy templates for implementation shortcuts.

Writing policies that actually get read

Too often, ISO 27001 policies and procedures get written in dense, legalistic language that alienates the very people meant to follow them. The real challenge isn’t just passing the audit—it’s embedding these policies into daily operations. And that means clarity, brevity, and context matter.

Here are a few tips that worked for me:

Start with the “why.” Explain the policy’s intent in plain language at the top. Define roles clearly. Who’s responsible for enforcement, review, and updates? When possible, include brief examples to show what the policy looks like in practice. And finally, keep formatting consistent—use headings, short paragraphs, and clear document titles.

It also helps to centralize your policies in an accessible repository—ideally within an internal wiki or document portal—and tie them into onboarding and refresher training.

Are your policies helping or just existing?

Many companies complete their ISO 27001 documentation in a rush to meet certification deadlines, only to realize a year later that no one is using them. That’s a red flag—not just for compliance, but for your security posture as a whole. A policy that lives in a drawer (or buried in SharePoint) might as well not exist.

To get real value from your ISO 27001 policies, treat them as living documents. Build in regular reviews. Encourage feedback. Align them with how your teams actually work—not just how the standard says they should.

And most importantly, remember that documentation is just the start. The true test of your ISMS is how well your people embody the principles it outlines—day in, day out.

Automate Your Cybersecurity and Compliance

It's like an in-house cybersec & compliance team for a monthly subscription! No prior cybersecurity or compliance experience needed.

Related articles