Mandatory documentation in ISO27001
1. ISMS
scope (Clause 4.3);
2. Information
security policy (Clause 5.2);
3. Information
security risk assessment procedure (Clause 6.1.2);
4. Statement
of applicability (Clause 6.1.3 d);
5. Information
security risk treatment procedure (Clause 6.1.3);
6. Information
security objectives (Clause 6.2);
7. Personnel
records (Clause 7.2);
8. ISMS
operational information (Clause 8.1);
9. Risk
assessment reports (Clause 8.2);
10. Risk
treatment plan (Clause 8.3);
11. Security
measurements (Clause 9.1);
12. ISMS
internal audit programme and audit reports (Clause
9.2.2);
13. ISMS
management review reports (Clause 9.3.3);
14. Records of nonconformities and corrective actions (Clause 10.1).
"This requirement is necessarily vague and generic due to the enormous variety of contexts to which it applies. Essentially management institutes whatever information security controls are necessary to reduce (or at least prevent increases in) risks to information, including management information. Proactive management ensures that the controls not only operate as planned (requiring assurance) but, in so doing, fulfil the organisation’s objectives.
ISMS processes can be supported and enabled by automation, including information systems, tools and services. Although the requirement does not explicitly refer to them, they should also be planned, implemented and controlled to achieve the information security objectives, given their close association with the ISMS processes.
Similarly, integration of the ISMS into the wider business implies the need to plan, monitor and control processes, activities and information spanning the ISMS scope boundary. For example, identifying, analysing and evaluating risks to business information requires extensive knowledge about the information, while treating the risks generally involves information security controls that are operated by or involve personnel and activities beyond the ISMS.
There may be information risk and security aspects to the supply of processes, products, services or information to the organization by external providers, including those relating to the ISMS itself such as:
- Threat and vulnerability information services;
- Assurance services such as auditing and certification;
- ISMS support systems, tools, techniques and templates;
- Recruitment, legal and other professional services.
The requirement for documented information in clause 8.1 is discretionary. Management determines the need for assurance that the security processes are operating effectively. A blend of documented and undocumented information can provide the necessary assurance e.g. direct observation and management oversight of ISMS processes in operation, supplemented by records, measurements, management review reports and audit reports."