Posts Tagged ‘ISO 27001 Policy’

Information security is one of the central concerns of the modern organization. The volume and value of the data used in everyday business increasingly informs how organizations work and how they are successful. To protect this information and be seen to be protecting more and more companies are becoming ISO 27001 certified.

ISO 27001 is an internationally recognized and independent specification for the management of information security. It provides a comprehensive checklist of security controls that will be considered for use in the context of information security control of the organization. ISO 27001 Certification enables Interoute to demonstrate a safety control environment of robust information to manage safety and reduce the risk of consistent information in its activities.

Control Areas of ISO 27001:

Information Security Policy: The organization offers a full range of ISO 27001 Policies that define the security management principles in all our activities , and enabled us to obtain ISO 27001 certification for our certification Operations Centre and the ISO 27001 or national equivalent for data center operations in Amsterdam , Berlin, Geneva and Stockholm.

Asset Management: It maintains official inventories of information assets requiring protection by a comprehensive suite of policies, processes and security controls. These details all services and components platform, with pre – defined functional owners for maintenance, and are reviewed on an annual basis.

Physical and Environmental Security: To prevent unauthorized physical access, damage and interference to the organization’s information and information processing facilities.

Communication and Management: ISO 27001 security policies cover the correct and secure operation of information processing facilities to protect and maintain the integrity and availability of information and information processing facilities, minimizing the risk of system failure. These include safeguards, segregation of duties, and additional security solutions in both Interoute systems, available to customers based on the requirements.

Access Control: ISO 27001 security policies cover the logical and physical access controls, as well as features of specific products to protect critical information. Access to data and systems is based on the principle of least privilege with the rights granted are based on functional responsibilities. This is regularly reviewed to ensure compliance with safety, and includes specific indexing process for any non-compliance.

Development and Maintenance of Systems: It has integrated security at every stage of the system development life cycle with questions or nonconformities degenerated into safety and risk management for the review and sanitation.


As part of your ISO 27001 Certification project, your organisation will need to prove its compliance with appropriate documentation. If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write certain policies or not.

ISO 27001 Certification states that it is necessary to document an information security policy.

What is an information security policy?

Information Security Policy

An information security policy could be a set of rules or needs that govern however your organization and its employees will try to manage its digital resources and assets in a very safe manner. It is one of the mandatory ISO 27001 documents and sets out the requirements of your information security management system (ISMS).

The policy should be a short and simple document, approved by the board which defines management direction for information security in accordance with business requirements and relevant laws and regulations.

Key elements of your information security policy

An information security policy needs to reflect your organisation’s view on information security and must:

  • Provide information security direction for your organisation;
  • Include information security objectives;
  • Include information on how you will meet business, contractual, legal or regulatory requirements; and
  • Contain a commitment to continually improve your ISMS.

The ISO 27001 Policy should help drive your approach to scoping the ISMS and implementation project. An information security policy needs to include all employees in an organisation, and may also consider customers, suppliers, shareholders and other third parties. It’s important to consider how the policy will impact on these parties and the effect on your organisation as a result.

Help with creating an information security policy template

The information security policy is one of the most important documents in your ISMS.

Knowing where to start when compiling your information security policy can be difficult, especially in large or complex organisations where there may be many objectives and requirements to meet.

The ISO 27001:2013 Documentation Toolkit contains a customisable information security policy template for you to easily apply to your organisation’s ISMS.