Skip to main content
← All controls
A.5.1 / PL-1 ISO/IEC 27001:2022 Annex A ISO 27001

A.5.1 — Are information security policies defined, approved by management, published and reviewed at planned intervals?

Demonstrate that information security policies are formally documented, approved by appropriate management authority, communicated to relevant stakeholders, and subject to regular review cycles that maintain their relevance and effectiveness.

Description

What this control does

This control requires organizations to establish a formal information security policy framework that includes documented policies approved by executive management or the board, published to relevant personnel, and periodically reviewed at defined intervals (typically annually or when significant changes occur). The policy set defines the organization's strategic direction and commitment to information security, aligned with business objectives and regulatory requirements. Proper implementation ensures governance oversight, organizational alignment, and adaptation to evolving threats and business changes.

Control objective

What auditing this proves

Demonstrate that information security policies are formally documented, approved by appropriate management authority, communicated to relevant stakeholders, and subject to regular review cycles that maintain their relevance and effectiveness.

Associated risks

Risks this control addresses

  • Unauthorized or unapproved security policies lead to misaligned security posture that does not reflect management intent or risk appetite
  • Employees operate without clear security guidance, resulting in inconsistent security practices and increased likelihood of breaches due to ad-hoc decision-making
  • Outdated policies fail to address emerging threats, new technologies, or regulatory changes, creating compliance gaps and unmitigated vulnerabilities
  • Lack of management approval diminishes policy authority, reducing employee compliance and weakening enforcement mechanisms
  • Policies not communicated to affected personnel result in security controls not being implemented or maintained consistently across the organization
  • Absence of scheduled reviews allows policy drift where documented requirements diverge from actual practices, rendering audits ineffective
  • Inconsistent policy structure and content creates confusion about security requirements and impedes incident response coordination

Testing procedure

How an auditor verifies this control

  1. Obtain the complete set of current information security policies including the overarching information security policy and any supporting domain-specific policies
  2. Review policy documentation headers and metadata to verify version control, document owners, approval dates, and scheduled review intervals
  3. Examine formal approval records such as board minutes, executive committee meeting records, or signed approval memoranda demonstrating management authorization
  4. Verify publication and distribution mechanisms by reviewing policy repositories, intranet locations, training materials, or communication records showing how policies are made available to relevant personnel
  5. Select a sample of employees from different departments and roles to interview regarding their awareness of and access to current security policies
  6. Review the policy review schedule or calendar to confirm planned review intervals are defined and documented (typically annually or aligned with ISO certification cycles)
  7. Examine evidence of the most recent policy review including change logs, review meeting minutes, or revision tracking documentation showing when the last review occurred and what changes resulted
  8. Cross-reference policy content against recent significant organizational changes, regulatory updates, or security incidents to verify policies reflect current context and requirements
Evidence required Policy documents with version history and approval signatures or digital approval workflows from authorized management. Meeting minutes, board resolutions, or approval memoranda dated within the current review cycle. Screenshots or exports from policy management systems, intranets, or document repositories showing publication dates and access permissions. Review schedules, calendars, or procedural documentation defining review intervals. Change management records or version control logs showing revision history and dates of last review.
Pass criteria Current information security policies are documented, bear formal approval signatures or records from appropriate management authority dated within the defined review cycle, are published in accessible locations to relevant personnel, and have documented evidence of reviews conducted at planned intervals not exceeding the organization's defined schedule.