ISO 270018 min read

ISO 27001 Documentation Requirements

Documentation is a fundamental aspect of ISO 27001. Understanding what documentation is required—and why—helps you build an effective ISMS without over-engineering or under-preparing.

Key Takeaways

Point Summary
Mandatory documents ISO 27001 explicitly requires certain documented information
Total documentation Typically 30-35 documents for a complete ISMS
Purpose Ensures consistency, enables improvement, provides audit evidence
Balance needed Sufficient for compliance without bureaucratic overhead
Maintenance Documents must be controlled, reviewed, and kept current

Quick Answer: ISO 27001 requires documented information including your ISMS scope, information security policy, risk assessment methodology and results, Statement of Applicability, and evidence that controls are operating. Most organizations create 30-35 documents, but the exact number depends on your context and how you choose to organize your documentation.

Understanding Documentation Requirements

What "Documented Information" Means

ISO 27001:2022 uses the term "documented information" to cover:

  • Documents: Policies, procedures, guidelines (how things should be done)
  • Records: Evidence that activities have been performed (proof things were done)

Both are important for certification:

  • Documents define your ISMS
  • Records prove it's operating

Why Documentation Matters

Purpose Benefit
Consistency Ensures practices are repeatable
Communication Makes expectations clear to staff
Training Provides reference material
Audit evidence Demonstrates compliance
Continuity Knowledge preserved if people leave
Improvement Baseline for measuring progress

Mandatory Documentation

Explicitly Required by ISO 27001

The standard explicitly requires the following documented information:

Document Clause Reference Purpose
ISMS scope 4.3 Defines boundaries of your ISMS
Information security policy 5.2 Top-level security commitment
Risk assessment methodology 6.1.2 How you identify and assess risks
Risk assessment results 6.1.2 Output of your risk assessment
Risk treatment plan 6.1.3 How you're addressing identified risks
Statement of Applicability 6.1.3 d) Which Annex A controls apply and why
Information security objectives 6.2 Measurable security goals
Competence evidence 7.2 Proof of personnel competence
Operational planning and control 8.1 How operations are managed
Risk assessment records 8.2 Documentation of risk assessment activities
Risk treatment records 8.3 Evidence of risk treatment implementation
Monitoring and measurement results 9.1 Performance metrics
Internal audit program and results 9.2 Internal audit documentation
Management review results 9.3 Management review meeting records
Nonconformity and corrective action 10.1 Evidence of improvement activities

Control-Specific Documentation

Many Annex A controls also require documented information, such as:

Control Area Documentation Needed
Access control Access control policy, user access records
Asset management Asset inventory, acceptable use policy
Operations security Operating procedures, change records
Incident management Incident response procedure, incident records
Business continuity Business continuity plans, test results
Supplier relationships Supplier policy, supplier assessments

Typical ISMS Documentation Set

Common Structure

Most organizations organize their ISMS documentation in layers:

Tier 1: Policy Documents
High-level statements of intent and direction

Tier 2: Procedures
How policies are implemented in practice

Tier 3: Work Instructions/Guidelines
Detailed steps for specific tasks

Tier 4: Records/Evidence
Proof that activities occurred

Representative Document List

A typical ISMS includes documents such as:

Category Documents
Core ISMS ISMS scope, Security policy, Risk methodology, Statement of Applicability
Organizational Security roles, Asset management, Information classification
People Acceptable use, Remote working, Security awareness, Screening
Operations Change management, Incident response, Business continuity, Backup
Access Control Access control policy, User provisioning, Privileged access
Technical Encryption, Network security, Secure development, Vulnerability management
Third Party Supplier security, Cloud security
Records Risk register, Internal audit, Management review

Document Count Guidance

Organization Size Typical Document Count
Small startup 25-30 documents
Medium company 30-40 documents
Larger organization 40-50+ documents

The goal isn't to minimize or maximize—it's to have appropriate documentation for your context.

Creating Effective Documentation

Policy Writing Principles

Effective policies are:

Principle Application
Clear Unambiguous language, no jargon
Concise Long enough to be complete, short enough to be read
Actionable Specific enough to guide behavior
Appropriate Suited to your organization's size and culture
Maintained Reviewed and updated regularly

Common Documentation Mistakes

Mistake Better Approach
Copying generic templates Tailor to your actual environment
Over-documenting Document what's necessary, not everything
Under-documenting Ensure mandatory items are covered
Set and forget Regular review and update cycle
Too theoretical Reflect actual practices
No version control Track changes and approvals

Document Control Requirements

ISO 27001 requires that documented information is controlled:

Requirement Implementation
Identification Clear titles, version numbers
Format Consistent templates and structure
Review and approval Defined approval process
Distribution Ensure current versions available
Storage and protection Secure, accessible storage
Change control Track and approve modifications
Retention Defined retention periods
Disposition Secure disposal when no longer needed

Key Documents in Detail

1. ISMS Scope

Purpose: Defines the boundaries of your information security management system.

Should include:

  • Products/services covered
  • Business functions in scope
  • Physical locations included
  • Systems and data covered
  • Organizational units
  • Boundaries and exclusions (with justification)

Example:

"The ISMS covers the development, delivery, and support of [Product Name], including customer data processing, cloud infrastructure (AWS), corporate IT systems, and all personnel involved in these activities."

2. Information Security Policy

Purpose: Top-level statement of management's commitment and security direction.

Should include:

  • Management commitment to security
  • Security objectives or framework
  • Compliance with requirements
  • Continual improvement commitment
  • Policy applicability
  • Review frequency

Length: Typically 2-4 pages

3. Risk Assessment Methodology

Purpose: Defines how your organization identifies, analyzes, and evaluates risks.

Should include:

  • Risk identification approach
  • Risk analysis criteria (likelihood, impact scales)
  • Risk evaluation criteria (risk levels, acceptance thresholds)
  • Risk treatment options
  • Review frequency

4. Statement of Applicability (SoA)

Purpose: Documents which Annex A controls apply to your organization and why.

Should include for each of 93 controls:

  • Control reference and title
  • Applicable (Yes/No)
  • Justification for inclusion or exclusion
  • Implementation status
  • Brief description of implementation (optional)

See our detailed SoA guide

5. Risk Register

Purpose: Documents identified risks and their treatment.

Should include:

  • Risk identifier
  • Risk description
  • Asset/process affected
  • Threat and vulnerability
  • Likelihood and impact ratings
  • Risk level (calculated)
  • Treatment decision
  • Controls applied
  • Residual risk
  • Risk owner
  • Status

Evidence and Records

What Evidence to Collect

Control Area Example Evidence
Access control User lists, access review records, MFA configuration
Change management Change tickets, approval records, test results
Security awareness Training records, completion certificates, materials
Incident response Incident tickets, response timelines, lessons learned
Vulnerability management Scan reports, remediation records, patching status
Backup Backup logs, restoration test records
Supplier management Assessments, contracts, monitoring records

Evidence Freshness

Different types of evidence have different freshness requirements:

Evidence Type Freshness Expectation
Security awareness training Annual completion
Access reviews Quarterly
Vulnerability scans Monthly or continuous
Backup tests Regular intervals (quarterly typical)
Incident records Period since last audit
Policy reviews Annual

Organizing Evidence

Effective evidence organization:

Approach Benefits
Centralized platform Single source of truth
Automated collection Reduces manual effort
Consistent naming Easy to locate
Version control Clear audit trail
Access control Appropriate permissions

Maintaining Documentation

Review Cycle

Document Type Review Frequency
Policies Annual minimum
Procedures Annual or on change
Risk assessment Annual + on significant change
SoA Annual + on control changes
Records As generated

Triggers for Updates

Update documentation when:

  • Annual review cycle
  • Significant organizational changes
  • New systems or processes
  • Incident findings
  • Audit findings
  • Regulatory changes
  • Feedback or improvements identified

Version Control

Essential version control elements:

Element Purpose
Version number Track document evolution
Date When approved/published
Author Who wrote/updated
Approver Who authorized
Change summary What changed
Next review date When to review again

Working with Templates

Pros of Templates

Benefit Consideration
Faster development Don't start from scratch
Completeness Cover required elements
Consistency Uniform formatting
Experience-based Learn from what works

Template Pitfalls

Risk Mitigation
Generic content Customize to your context
Over-complexity Simplify for your size
Outdated standards Ensure ISO 27001:2022 alignment
Cut-and-paste errors Careful review before use

Best Practice

Templates are a starting point, not an end point. Every document should reflect your actual organization, processes, and controls.

Common Questions

How many pages should policies be?

There's no requirement. Policies should be long enough to be complete and short enough to be read. For smaller organizations, a 2-3 page policy is often sufficient. Avoid unnecessary complexity.

Can we combine documents?

Yes. You can organize documentation however works for your organization. What matters is that required content exists and is controlled, not how it's packaged.

What format should documents use?

No required format. Most organizations use Word documents, Google Docs, or purpose-built compliance platforms. Choose what's maintainable for your team.

How detailed should procedures be?

Detailed enough that someone could follow them, concise enough that they will be read. The right level depends on your team's expertise and the complexity of the process.

The Bastion Approach

We help organizations develop appropriate documentation:

Challenge Our Approach
Starting from scratch Pre-built templates tailored to your context
Document development Expert drafting with your review and approval
Consistency Uniform formatting and organization
Completeness Coverage of all mandatory requirements
Maintenance Ongoing support for reviews and updates

Ready to develop your ISMS documentation? Talk to our team


Sources