Checklist of ISO 27001 Mandatory Documentation EN
Checklist of ISO 27001 Mandatory Documentation EN
Documentation Required by
ISO/IEC 27001
Risk assessment and risk treatment process Clause 6.1.2 Risk Assessment
and Treatment
Methodology
Risk assessment and treatment report Clauses 8.2 and Risk Assessment &
8.3 Treatment Report
*Note: ISO 27001 documents and records required by Annex A controls are
mandatory only if there are risks or requirements from interested parties that would
demand implementing those controls.
This is by no means a definitive list of documents and records that can be used during
the ISO 27001 implementation – the standard allows any other documents to be
added to improve the level of information security.
Mobile Device, Teleworking, and Work from Controls A.6.7, A.7.8, A.7.9, and A.8.1
Home Policy
Bring Your Own Device (BYOD) Policy Controls A.7.8 and A.8.1
Read more here: Problems with defining the scope in ISO 27001.
Read more here: Information security policy – how detailed should it be?
Statement of Applicability
The Statement of Applicability (or SoA) is written based on the results of the risk
treatment – this is a central document within the ISMS because it describes not only
which controls from Annex A are applicable, but also how they will be implemented,
and their current status. You could also consider the Statement of Applicability as a
document that describes the security profile of your company.
Read more here: Statement of Applicability in ISO 27001 – What is it and why does it
matter?
Read more here: ISO 27001 Risk Assessment, Treatment, & Management: The
Complete Guide.
Security roles and responsibilities for third parties are defined in contracts.
Read more here: What is the job of Chief Information Security Officer (CISO) in ISO
27001?
Inventory of assets
If you didn't have such an inventory prior to the ISO 27001 project, the best way to
create such a document is directly from the result of the risk assessment – during the
risk assessment all the assets and their owners must be identified anyway, so you just
copy the results from there.
Read more here: Asset management according to ISO 27001: How to handle an asset
register / asset inventory.
IT security policy
This document is sometimes called an Acceptable Use of Assets Policy. This kind of
document can cover a very wide range of topics because the standard doesn't define
this control very well. Probably the best way to approach it is the following: (1) leave it
for the end of your ISMS implementation, and (2) all the areas & controls that you
Read more here: 6-step process for handling supplier security according to ISO 27001.
Read more here: How to perform training & awareness for ISO 27001 and ISO 22301.
Read more here: How to perform monitoring and measurement in ISO 27001.
Read more here: ISO 27001 internal audit: The complete guide.
You can find more information about the internal audit in this free online training: ISO
27001 Internal Auditor Course.
Read more here: Why is management review important for ISO 27001 and ISO 22301?
Read more here: Complete guide to corrective action vs. preventive action.
For more information, please take a look at this useful handbook: Managing ISO
Documentation: A Plain English Guide.
The easiest way is to describe the control of records in each policy or procedure (or
other document) that requires a record to be created. These controls are normally
written toward the end of each document, and are usually in the form of a table that
describes where the record is archived, who has access, how it is protected, for how
long it is archived, etc.
Read more here: How to manage documents according to ISO 27001 and ISO 22301.
You can use this free ISO online tool for handling your documentation, i.e., using it as
a document management system (DMS).
Our offices:
Zavizanska 12, 10000 Zagreb, Croatia
Via Maggio 1 C, Lugano, CH-6900, Switzerland
275 Seventh Ave, 7th Floor, New York, 10001, U.S.
Email: [email protected]