Live Webinar | 26 June 2025 9AM PT
From Black Box to Boardroom: Operationalizing Trust in AI Governance
July 14, 2025
July 14, 2025

ISO 27001 policy requirements: Complete list and how to write them

Megha Thakkar
Technical Content Writer at
Scrut Automation

When it comes to implementing ISO 27001, most teams get tripped up not by the controls, but by the paperwork. And at the heart of that paperwork? Policies. Lots of them.

Think of these policies as your Information Security Management System’s (ISMS) instruction manual. They tell your team what’s expected, show auditors you mean business, and help leadership steer the ship in the right direction. Without them, compliance becomes a game of broken telephone—confusing, inconsistent, and risky.

But here’s the good news: you don’t have to start from scratch. Whether you’re building a single policy or setting up an entire policy stack, there is a method to the madness. In this blog, we’ll walk you through:

  • What ISO 27001 actually expects when it comes to policies
  • A complete list of essential ones so you don’t miss anything critical
  • How to write policies that are actually useful, not just shelfware
  • Where to find vetted templates and downloads

Let’s break it down and take the mystery out of ISO 27001 documentation, one policy at a time.

What are ISO 27001 policies?

ISO 27001 policies are formal, documented rules that shape how your organization protects its information assets. These policies define what needs to be done to meet security requirements, while procedures and controls describe how it’s done.

They’re not just for show. ISO 27001 treats policies as the foundation of a good ISMS. They create structure, ensure consistency, and show that leadership is actively steering the ship, not just watching from the sidelines.

Pro tip: Start short & grow.
Begin with essential policies that reflect your current risks and tech environment. As your ISMS matures, layer on additional policies that support new controls and teams.

What policies does ISO 27001 require?

ISO 27001 doesn’t hand you a ready-made list of policy titles. Instead, it sets expectations through two main parts of the standard: Clause 5.2 and Annex A.

Each policy should be:

  • Approved by leadership
  • Communicated to everyone who needs to follow it
  • Reviewed and updated regularly

Let’s unpack what that actually means for your documentation.

1. The high-level Information Security Policy (Clause 5.2)

This high-level policy sets the strategic direction for your entire information security program. It communicates management’s intent, outlines the organization’s approach to managing information risks, and sets objectives for continual improvement. It must:

  • Reflect your organization’s purpose and direction

  • Define security objectives

  • Commit to meeting applicable requirements

  • Support continual improvement

  • Be approved by top management and communicated clearly

Think of it as your information security mission statement. Everyone from the CEO to the newest hire should be able to understand what it says and why it matters.

2. Topic-specific policies (Annex A)

Clause 5.1 in Annex A requires organizations to define, approve, communicate, and review policies that govern specific control areas. These are sometimes called “supporting policies,”  and they’re where most of your policy work lives.

They cover everything from access control to incident management and provide clear guidance to employees, vendors, and auditors on how the organization handles different areas of risk.

Here’s a list of common ISO 27001-aligned policies, based on control domains from Annex A:

Core governance policies

1. Risk management policy

Defines how the organization identifies, evaluates, and treats information security risks. It establishes risk appetite and criteria, sets out processes for risk assessment, and ensures consistent tracking, mitigation, and reporting of security threats.

2. Document and record control policy

Specifies how policies, procedures, and records related to information security are created, reviewed, approved, stored, and retired. This policy helps maintain version control and ensures accessibility and traceability during audits.

People-centric policies

3. Human resource security policy

Covers employee-related security measures across hiring, onboarding, employment, and exit processes. It includes background checks, confidentiality agreements, and role-based training to reduce insider risks.

4. Security awareness and training policy

Outlines how employees are educated on security practices, including onboarding training, annual refreshers, and targeted awareness campaigns. It ensures staff understand their role in maintaining security.

5. Acceptable use policy

Defines acceptable behaviors for using company-provided devices, email, internet, and other systems. It outlines what is allowed and what is considered misuse, reducing the risk of human error or abuse.

6. Clear desk and clear screen policy

Encourages employees to lock computers when unattended, secure printed documents, and maintain clean workspaces. This minimizes the risk of accidental exposure of sensitive data in physical environments.

Technical control policies

7. Access control policy

Details how access rights are granted, reviewed, modified, and revoked. It enforces principles like least privilege and separation of duties to prevent unauthorized access to systems and data.

8. Cryptography and key management policy

Defines when and how encryption is used to protect data in transit and at rest. It includes secure handling of cryptographic keys, including generation, distribution, storage, and disposal.

9. Logging & monitoring policy

Explains how system and user activities are logged, monitored, and reviewed to detect and respond to anomalies, unauthorized access, or policy violations.

10. Vulnerability management policy

Covers the process for identifying, assessing, and remediating security vulnerabilities in systems, software, and infrastructure. It ensures timely patching and reduces exposure to known threats.

11. Malware protection policy

Outlines controls for detecting, preventing, and responding to malicious software, including antivirus deployment, real-time scanning, and user behavior monitoring.

12. Cloud security policy

Defines controls for configuring, securing, and monitoring cloud services and infrastructure. It addresses shared responsibility models, access controls, encryption, and compliance requirements for cloud environments.

13. API security policy

Outlines guidelines for securing Application Programming Interfaces (APIs) across their lifecycle, including authentication, authorization, input validation, rate limiting, and secure coding standards.

System & development policies

14. Secure development policy

Establishes requirements for secure software development practices, including secure coding standards, peer reviews, and testing for vulnerabilities during the Software Development Lifecycle (SDLC).

15. Change management policy

Defines how technical changes are proposed, reviewed, tested, approved, and documented before implementation to ensure they do not introduce security risks or disrupt operations.

16. AI and automation policy

Establishes controls around the use of artificial intelligence and automation tools. It addresses ethical use, data handling, model testing, accountability, and human oversight in decision-making systems.

Data and asset protection policies

17. Asset management policy

Ensures all information assets, including hardware, software, and data, are inventoried, classified, assigned owners, and handled appropriately throughout their lifecycle.

18. Information classification and handling policy

Outlines how information is classified by sensitivity and handled accordingly. It includes rules for storage, access, sharing, and secure disposal.

19. Data retention and disposal policy

Specifies how long various data types should be retained for legal, regulatory, or business purposes and the secure methods for deleting or destroying data when no longer needed.

20. Data privacy policy

Defines how personal and sensitive data is collected, processed, shared, and protected in compliance with privacy regulations like GDPR or CCPA. It includes data subject rights, consent handling, and cross-border transfers.

Network, physical, and operational policies

21. Physical and environmental security policy

Covers protections for buildings, server rooms, and physical assets, including access control, surveillance, fire protection, and climate controls to prevent damage or unauthorized access.

22. Mobile device and remote work policy

Defines security requirements for employees using laptops, smartphones, or accessing systems remotely. It addresses secure configurations, encryption, VPN usage, and acceptable behaviors.

23. Information transfer policy

Describes how sensitive or business-critical information should be transferred within and outside the organization, including encryption, secure channels, and approval workflows.

24. SaaS usage and shadow IT policy

Establishes guidelines for using third-party SaaS applications, preventing unauthorized software use, and maintaining visibility into all cloud-based tools in the environment.

Third-party & continuity policies

25. Supplier and third-party security policy

Specifies how third-party vendors are evaluated, onboarded, and monitored to ensure they meet your security requirements. It also defines how data shared with suppliers is protected.

26. Incident management policy

Explains how to detect, report, assess, and respond to information security incidents. It defines roles, escalation procedures, post-incident analysis, and communication protocols.

27. Business continuity and backup policy

Outlines measures for ensuring operations can continue during and after a disruption. It includes backup frequency, recovery objectives, testing, and roles in disaster recovery planning.

28. Threat intelligence policy

Defines how external threat intelligence is collected, validated, and integrated into the organization's risk management process. It includes sharing indicators of compromise (IOCs) and proactive defense strategies.

You may not need every one of these out of the gate. But if a control is marked as applicable in your Statement of Applicability (SoA), your policies should reflect how it is being addressed.

Each policy should have:

  • A clear scope

  • A responsible owner

  • Definitions of who must follow it and how

  • A review schedule

Together, these policies make your ISMS operational; they bring your security principles to life in daily decisions.

Pro tip: Owners & roles matter.

Each policy should name a clear owner — someone who ensures it’s maintained, updated, and actually followed. Accountability isn’t optional when it comes to audits.

How to write your ISO 27001 policies

Step by Step Process to write ISO 27001 Policies

Writing ISO 27001 policies isn’t about filling in templates with jargon. It’s about translating your security intent into language your teams can follow and your auditors can trust.

Here’s how to do it right:

1. Start with the standard

Begin by reviewing Clause 5.2 (for your master policy) and Annex A controls (for topic-specific ones). This helps you understand what each policy needs to support.

2. Set a clear structure

Each policy should answer these questions:

  • What is the purpose of this policy?

  • Who does it apply to?

  • What are the key rules or expectations?

  • Who owns and maintains it?

  • How often will it be reviewed?

Use plain language, not legalese, so it’s accessible to everyone, from your developers to your HR team.

3. Customize for your context

Don’t copy policies from the internet or competitors. Your risk environment, tech stack, team structure, and legal exposure are unique. Your policies should reflect that.

For example:
If your developers use GitHub and AWS, your access control policy should reflect those tools, not generic references to “source code repositories.”

4. Link policies to controls

Each policy should map back to one or more ISO 27001 controls. This makes your Statement of Applicability stronger and helps during internal audits.

5. Get leadership approval

Policies carry weight only when management signs off. Formal approval shows auditors that the organization takes security seriously at the top level.

What is the difference between controls and policies?

Policies are high-level rules or guidelines that define what your organization intends to do (for example, “We will restrict access to systems based on role”).

Controls are specific actions or technical measures that define how those policies are implemented (for example, “Enable multi-factor authentication for admin accounts”).

In short, policies guide behavior, and controls enforce it.

“If you’ve got good controls in place, security is invisible … you’re not having to worry about whoever is clicking on a bad link because you’ve already got the measures in place to detect, respond, and recover.”
Goher Ritter, CISO at Worldpay, speaking in Information Security Is Like an F1 Pit Crew

Ways to implement ISO 27001 policies

Step by Step Process to implement ISO 27001 Policies

Once your policies are written and approved, the next step is to implement them. Implementation isn’t just about uploading documents to a shared drive—it’s about making sure they’re actually followed.

Here are a few proven ways to embed policies into daily operations:

1. Make them accessible

Store your policies in a central, easy-to-find location like an internal knowledge base or compliance platform. Everyone should know where to find the latest version.

2. Train your teams

Use onboarding sessions, workshops, or quick video briefings to explain the “why” behind each policy. Make it relevant to their roles so the guidance sticks.

3. Collect acknowledgments

Have employees formally acknowledge they’ve read and understood the policies. This not only boosts accountability but also creates a paper trail for ISO 27001 audits.

4. Embed policies into tools and workflows

Tie policies to actual behavior. For instance, link your access control policy to how requests are approved in Jira or how encryption settings are enforced in AWS.

5. Monitor and reinforce

Check for policy violations using logging and monitoring tools. Reinforce the rules through regular reminders, internal audits, or spot checks.

6. Review and refine

Policies aren’t static. Review them at least once a year or whenever there’s a change in risk, tools, structure, or regulations. Feedback from users can help make them more practical.

How Scrut helps you write and manage ISO 27001 policies

Drafting policies is hard enough. Keeping them aligned, updated, and audit-ready? That’s a whole different challenge. Scrut takes the pain out of both.

Here’s how Scrut supports you at every step:

  • Start with expert templates by tapping into Scrut’s 75+ policy blueprints approved by experts so you can hit the ground running.

  • Customize with confidence thanks to built-in guidance prompts and sample text that help you tailor policies to your team’s workflows.

  • Assign owners and track progress so every policy moves smoothly from draft through review to approval.

  • Automate reviews and version control by setting reminders and logging every change to keep your documentation audit-ready.

  • Centralize access and acknowledgment by hosting all policies in one platform, sharing them with teams, and seeing who’s signed off.

  • Link policies to controls and evidence so each document connects directly to ISO 27001 requirements and proof of implementation.

Make ISO 27001 compliance effortless

Scrut gives you everything you need to draft, manage, and track ISO 27001 policies - without the busywork.

SCRUT DEMO CTA BANNER

FAQs

What are the 3 key elements of information security in ISO 27001?

The three core elements of information security, as emphasized by ISO 27001, are:

  1. Confidentiality – Ensuring that sensitive information is only accessible to those who are authorized to view it.

  2. Integrity – Making sure that data is accurate, complete, and protected from unauthorized changes.

  3. Availability – Ensuring that information and systems are accessible when needed by authorized users.

Together, these form the foundation of a strong Information Security Management System (ISMS) under ISO 27001.

Which are the ISO 27001 mandatory policies?

ISO 27001 requires just one mandatory policy - the Information Security Policy. This policy, outlined in Clause 5.2 of the standard, describes your organization's overall approach to information security and must be approved by senior management, communicated, and reviewed regularly.

While this is the only explicitly mandatory policy, ISO 27001 also expects organizations to create supporting policies for applicable Annex A controls (such as access control, incident management, and asset handling). These aren’t named as mandatory in the clause, but if you implement the associated controls, having a supporting policy becomes essential for audit readiness.

How many new policies were added to the new version of ISO 27001:2022?

ISO 27001:2022 introduced 11 new controls in Annex A compared to the previous version, ISO 27001:2013. These updates reflect modern risks like cloud security, threat intelligence, and data masking.

How many controls does each Annex A category have?

A total of 93 controls, grouped into these four themes, reflecting the 2022 update are as follows:

  • Organisational controls - 37 controls
  • People controls - 8 controls
  • Physical controls - 14 controls
  • Technological controls - 34 controls

Liked the post? Share on:
Table of contents
Subscribe to our newsletter
Get monthly updates and curated industry insights
Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our community and be the first to know about updates!

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

Compliance Essentials
SOC 2
The Unified Compliance Framework Vs. The Secure Controls Framework: What's Right For Your Organization?
ISO 27001
What's new in ISO 27001:2022?
Cloud Security
Vulnerability Management
Risk Management
Compliance Essentials
Vendor Security
Staying on the Offence: Strengthening Cloud Security with Continuous VAPT

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

See what a real security- first GRC platform looks like

Ready to see what security-first GRC really looks like?

Focus on the traveler experience. We’ll handle the regulations.

Achieve and maintain compliance without the busywork.

Choose risk-first compliance that’s always on, built for you, and never in your way.

Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?

Join the thousands of companies automating their compliance with Scrut.

The right partner makes all the difference. Let’s grow together.

Make your business easy to trust, put security transparency front and center.

Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.

Your GRC team, multiplied and AI-backed.

Modern compliance for the evolving education landscape.

Ready to simplify healthcare compliance?

Don’t let compliance turn into a bottleneck in your SaaS growth.

Find the right compliance frameworks for your business in minutes

Ready to see what security-first GRC really looks like?

Real-time visibility into every asset

Ready to simplify fintech compliance?

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Tag, classify, and monitor assets in real time—without the manual overhead.

Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.

Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.

Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.

Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.

Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.

Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.

Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.

Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.

Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.

Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.

Scrut ensures access permissions are correct, up-to-date, and fully compliant.

Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?

Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.

Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.

Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.

Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!

Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.

Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!

Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.

Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.

Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.

Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.

Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.

Book a Demo
Book a Demo
Join the Scrut Partner Network
Join the Scrut Partner Network