When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.
When putting an information security management system (ISMS) in place and preparing for certification it’s often useful to know what documentation an auditor will want to see. The term used in ISO management system standards is “documented information” which covers what used to be referred to in previous versions as “documents and records”. In general, the trend is away from explicitly specifying policies and other types of documents, but there are still a few places in the 2022 version of the standard where such items are either named, or strongly implied, so let’s have a look at these first.
A detailed read of the management system part of the standard shows up the following required documented information:
A similar look through the Annex A controls reveals the following explicit or strongly implied requirements for documented information (remember that not all of these controls will necessarily apply to your organization):
So we already have quite a list of ISO 27001 mandatory documents, even before we start to consider those requirements and controls where documented information is not mentioned, but would come in handy when defining and communicating how your ISMS works.
Taking a simple example, although Clause 7.3 Awareness doesn’t mention documented information explicitly, an auditor would want to see some kind of evidence that an awareness programme is in place. This could be a list of attendees along with the slides from a presentation, or perhaps information on a portal that tracks who has received video training on information security.
The key point is to always think “evidence” and ensure that all the useful actions you are taking as part of your ISMS are recorded somewhere, in some form.
As an organization grows, there is also the realisation that documentation, such as procedures, is necessary in order to ensure that things get done the right way each time, especially when done by different people. So, for example, although Control 5.11 Return of assets doesn’t explicitly state that a procedure or form is required, you would probably want to put such items in place so that it happens correctly, and nothing is missed.
There are a number of options organizations use when creating their documents for ISO/IEC 27001:2022 and this can depend on budgets, timelines and knowledge within the business. Writing documents internally, using a document toolkit or hiring a consultant are the three common ways organizations create their mandatory documentation. Using a document toolkit (such as the ISO27001 toolkit from CertiKit) can save you time and money whilst still making use of your internal resources. The document toolkit includes over 180 pre-written templates and guides, effectively covering the mandatory information required, and also provides additional documents to assist your ISO27001 implementation, so you can get the best out of your information security management system.
CertiKit are a provider of ISO toolkits, consultancy and internal auditing services, and have helped more than 4000 organizations worldwide with their compliance.
For more guidance on implementing the ISO27001:2022 standard, we’ve put together a list of our best free resources including video guides, blogs and downloadable documents.