ISO 27001:2022 Mandatory Documentation Requirements
| Mandatory Document | ISO 27001:2022 Reference | Interpretation | Usually Documented Through |
|---|---|---|---|
| Scope of the ISMS | Clause 4.3 | The ISMS scope clarifies the boundaries of the certified ISMS in relation to the context or business situation of the organization (e.g. certain business units, sites or departments), and its information risks and security requirements plus any imposed by third parties (e.g. laws and regulations plus contractual obligations). | ISMS Scope Document
|
| Information Security Policy | Clause 5.2 | The information security policy lays out and confirms senior management's commitment to the organization's information security objectives and continuous improvement of the ISMS. Senior management may prefer to mandate a single, succinct, broad/overarching governance-type policy. | Information Security Policy |
| Risk Assessment and Risk Treatment Process | Clause 6.1.2 | A structured and repeatable process for risk assessment must be established. This involves documenting a comprehensive risk assessment procedure outlining the identification, analysis, evaluation, and prioritization of information risks with periodic reviews and updates. | Risk Assessment and Treatment Methodology
|
| Statement of Applicability (SoA) | Clause 6.1.3(d) | The SoA lays out the information risk and security controls that are relevant and applicable to your organization's ISMS, as determined by your risk assessments or as required by laws, regulations or good practice. Cross-reference them against ISO/IEC 27001 Annex A controls. | Statement of Applicability
|
| Risk Treatment Plan | Clauses 6.1.3(e), 6.2, 8.3 | Risk treatment decisions, such as selecting treatments and implementing controls, require a written policy and/or procedure for consistently deciding on and implementing appropriate information risk treatments. Various structures may be utilized to articulate the process through which information risks are controlled. | Risk Treatment Plan
|
| Information Security Objectives | Clause 6.2 | The ISO requirement to "retain documented information on the information security objectives" allows for flexibility. It's beneficial to begin with the organization's high-level business objectives and derive information risk and security objectives from them. | Information Security Objectives
|
| Competence Records | Clause 7.2 | Evidence of competence must be retained. This could involve relying on HR records to document relevant experience, skills, qualifications, and training courses for core ISMS personnel within the information risk and security management function. | HR Documents and Records |
| Operational Planning and Control | Clause 8.1 | Documentation must be kept "to the extent necessary to have confidence that the processes have been carried out as planned." This includes management information related to the ISMS, such as budgets, progress reports, policies, procedures, and compliance activities. | ISMS Procedures and Management Information
|
| Risk Assessment Results | Clause 8.2 | The risk assessment process should generate information regularly including risk assessment reports, risk metrics, prioritized lists of risks, information risk inventories or catalogs, and entries in corporate risk inventories/catalogs. | Risk Assessment & Treatment Report
|
| Risk Treatment Results | Clause 8.3 | Evidence that identified information risks are being 'treated' as decided must be collected. This could include reports on control tests, implementation plans, financial records for risk management spending, and metrics showing incident reduction. | Risk Treatment Evidence and Control Test Reports
|
| Monitoring and Measurement Results | Clause 9.1 | The ISMS generates metrics to track and guide information risks, controls, and the ISMS overall. Evidence includes security metrics presented in reports, systems, dashboards, and presentations, plus documentation proving these metrics are being acknowledged and acted upon. | Logs and Dashboards |
| Internal Audit Programme and Results | Clause 9.2 | Evidence primarily consists of ISMS internal audit reports documenting key audit findings, conclusions, and recommendations. Supporting evidence includes audit programs, plans, calendars, budgets, scopes, and working paper files. | Internal Audit Program and Reports |
| Management Review Results | Clause 9.3 | Evidence includes management review reports, calendars, plans, budgets, scopes, working papers containing evidence, recommendations, action plans, and closure notes. Auditors may interview top management regarding the ISMS and issues raised in reports. | Management Review Minutes and Reports |
| Nonconformities and Corrective Actions | Clause 10.1 | Nonconformities refer to partially or wholly unsatisfied requirements. Evidence must demonstrate routine and systematic identification, reporting, addressing, and resolution of issues including root-cause analysis, corrective actions, and effectiveness reviews. | Nonconformity/Corrective Action Reports (NCAR) |
ISMS