ISO 27001 Annex A.6 – Organisation of Information Security

Simplifying Information Security Certification

What is the objective of ISO 27001 Annex A.6.1?

Annex A.6.1 requires the company to follow best practices and establish an effective management framework to control the implementation and operation of information security within the company. Having the framework independently audited and certified as ISO 27001 compliant gives clients and potential clients confidence in your company’s security posture.


A.6.1 forms part of the information security management system (ISMS) and is an integral step to
achieve ISO 27001 certification. It contains the five controls listed below.

A.6.1.1 Information Security Roles and Responsibilities

Annex 6.1.1 or Control A.6.1.1 stipulates that all information security responsibilities should be well defined and allocated in accordance with the company’s information security policies. The Adoptech Roles and Responsibilities Policy outlines the process for allocating these responsibilities.The allocation of information security responsibilities can be easily managed within the Adoptech platform and clearly demonstrated to an auditor. 

Responsibilities for information security risk management activities and in particular for acceptance of residual risks is defined as part of the risk assessment process. Responsibility for the protection of individual assets is outlined within the asset register maintained within Adoptech. 

Oversight of the information security aspects of supplier relationships should be defined in the supplier / third-party register.

Many companies appoint an information security manager to take overall responsibility for the development and implementation of information security and to support the identification of controls. However, responsibility for resourcing and implementing the controls will often remain with individual managers. One common practice is to appoint an owner for each asset who then becomes responsible for its day-to-day protection.

A.6.1.2 Segregation of Duties

Annex 6.1.2 or Control A.6.1.2 requires appropriate care to be taken to ensure that conflicting duties and areas of responsibility are segregated to reduce risk of accidental or deliberate misuse of the company’s assets. 

For example, ensuring that no single person can access, modify or use assets without authorisation or detection. This is detailed in the Adoptech Access Controls policy. The policy and processes in place aim to ensure that the initiation of an event is separated from its authorisation. In smaller companies it may not be so easy to segregate duties and so other controls such as monitoring of activities, audit trails and management supervision should be implemented.

A.6.1.3 Contact with Authorities

Annex 6.1.3 or Control A.6.1.3 requires appropriate contacts to be maintained with relevant authorities. 

The company must maintain procedures that specify when and by ‘whom’ authorities (e.g. law enforcement, regulatory bodies, supervisory authorities) should be contacted and how identified information security incidents should be reported in a timely manner (e.g. if it is suspected that laws may have been broken). The relationship owner is outlined in Adoptech’s Roles and Responsibilities Policy, and Adoptech’s Cyber Incident Management Policy outlines how incidents are managed. In addition, Adoptech’s Information Security Legal Register can be used to outline relevant legislation and reviews of compliance.

A.6.1.4 Contact with Special Interest Groups

Annex 6.1.4 or Control A.6.1.4 covers the need to maintain appropriate contacts with special interest groups or other specialist security forums and professional associations and industry organisations. This ensures that your company has a network of expertise in information security to improve knowledge about best practices and stay up to date with relevant security information. Understanding the purpose of such groups is important as some may be commercially driven.

A.6.1.5 Information Security in Project Management

Annex 6.1.5 or Control A.6.1.5 stipulates that information security should be an integral part of all company projects and include an assessment of the potential impact to data and cyber security. The information security assessment steps should be in line with the SDLC policy and change management procedures and be regularly reviewed.

The ISO 27001 certification audit will require evidence that all project staff are aware of the need to consider information security at all phases of the project lifecycle. This should be part of the company’s education, training and awareness programme.

Start simplifying your Information Security Certification

What is the objective of Annex A.6.2?

Annex A.6.2 requires the company to follow best practices and establish an effective management framework to ensure the security of teleworking (including home working and working from satellite offices) and use of mobile devices.


A.6.2 forms part of the information security management system (ISMS)
and is an integral step to achieve ISO 27001 certification. It contains the two controls listed below.

A.6.2.1 Mobile Device Policy

Annex 6.2.1 or Control A.2.1 requires a policy and supporting security measures to be adopted to clarify the acceptable use of mobile devices, manage the risks introduced by using mobile devices and protect a company’s information. 

Mobile devices, including mobile phones, laptops and tablets are becoming more and more sophisticated enabling truly flexible working but this also presents a security and compliance risk to the company. BYOD or Bring Your Own Device is also increasingly common and adds a level of complexity to the level of risk and requires specific controls to manage it. 

The auditor will want to know that the company has processes in place to ensure that its data and that of its customers is protected on mobile devices. The Adoptech Mobile Device Policy goes into further detail than the Acceptable Use policy and provides broader guidance on the appropriate use of business and personal equipment.

This policy should also be part of the company’s education, training and awareness programme.

A.6.2.2 Teleworking

Annex 6.2.2 or Control A.6.2.2 is about teleworking. Teleworking is also known as remote working and covers not just working from home, but working from any location that is outside the office including ‘workspaces’. Access granted should be based on a risk assessment. Adoptech’s Home Working and Remote Access Policies outline the  process, procedures and controls that must be followed to reduce the information security risks associated with working outside the office and reassure the auditor that the company protects information accessed, processed or stored remotely.

This policy should also be part of the company’s education, training and awareness programme.

Do you need more info about ISO 27001? Take a look at our InfoSec Certification Guide

Annex A Domains & Controls

A.9 – Access control

A.9.1.1 – Access control policy

A.9.1.2 – Access to networks and network services

A.9.2.1 – User registration and de-registration

A.9.2.2 – User access provisioning

A.9.2.3 – Management of privileged access rights

A.9.2.4 – Management of secret authentication information of users

A.9.2.5 – Review of user access rights

A.9.2.6 – Removal or adjustment of access rights

A.9.3.1 – Use of secret authentication information

A.9.4.1 – Information access restriction

A.9.4.2 – Secure log-on procedures

A.9.4.3 – Password management system

A.9.4.4 – Use of privileged utility programs

A.9.4.5 – Access control to program source code

A.11 – Physical and environmental security

A.11.1.1 – Physical security perimeter

A.11.1.2 – Physical entry controls

A.11.1.3 – Securing offices, rooms and facilities

A.11.1.4 – Protecting against external and environmental threats

A.11.1.5 – Working in secure areas

A.11.1.6 – Delivery and loading areas

A.11.2.1 – Equipment siting and protection

A.11.2.2 – Supporting utilities

A.11.2.3 – Cabling security

A.11.2.4 – Equipment maintenance

A.11.2.5 – Removal of assets

A.11.2.6 – Security of equipment and assets off-premises

A.11.2.7 – Secure disposal or reuse of equipment

A.11.2.8 – Unattended user equipment

A.11.2.9 – Clear desk and clear screen policy

A.12 – Operations security

A.12.1.1 – Documented operating procedures

A.12.1.2 – Change management

A.12.1.3 – Capacity management

A.12.1.4 – Separation of development, testing and operational environments

A.12.2.1 – Controls against malware

A.12.3.1 – Information backup

A.12.4.1 – Event logging

A.12.4.2 – Protection of log information

A.12.4.3 – Administrator and operator logs

A.12.4.4 – Clock synchronization

A.12.5.1 – Installation of software on operational systems

A.12.6.1 – Management of technical vulnerabilities

A.12.6.2 – Restrictions on software installation

A.12.7.1 – Information systems audit controls

A.13 – Communications Security

A.13.1.1 – Network controls

A.13.1.2 – Security of network services

A.13.1.3 – Segregation in networks

A.13.2.1 – Information transfer policies and procedures

A.13.2.2 – Agreements on information transfer

A.13.2.3 – Electronic messaging

A.13.2.4 – Confidentiality or nondisclosure agreements

A.14 – Systems acquisition, development and maintenance

A.14.1.1 – Information security requirements analysis and specification

A.14.1.2 – Securing application services on public networks

A.14.1.3 – Protecting application services transactions

A.14.2.1 – Secure development policy

A.14.2.2 – System change control procedures

A.14.2.3 – Technical review of applications after operating platform changes

A.14.2.4 – Restrictions on changes to software packages

A.14.2.5 – Secure system engineering principles

A.14.2.6 – Secure development environment

A.14.2.7 – Outsourced development

A.14.2.8 – System security testing

A.14.2.9 – System acceptance testing

A.14.3.1 – Protection of test data

A.15 – Supplier relationships

A.15.1.1 – Information security policy for supplier relationships

A.15.1.2 – Addressing security within supplier agreements

A.15.1.3 – Information and communication technology supply chain

A.15.2.1 – Monitoring and review of supplier services

A.15.2.2 – Managing changes to supplier services

A.16 – Information security incident management

A.16.1.1 – Responsibilities and procedures

A.16.1.2 – Reporting information security events

A.16.1.3 – Reporting information security weaknesses

A.16.1.4 – Assessment of and decision on information security events

A.16.1.5 – Response to information security incidents

A.16.1.6 – Learning from information security incidents

A.16.1.7 – Collection of evidence

A.17 – Information security aspects of business continuity management

A.17.1.1 – Planning information security continuity

A.17.1.2 – Implementing information security continuity

A.17.1.3 – Verify, review and evaluate information security continuity

A.17.2.1 – Availability of information processing facilities

A.18 – Compliance

A.18.1.1 – Identification of applicable legislation and contractual requirements

A.18.1.2 – Intellectual property rights

A.18.1.3 – Protection of records

A.18.1.4 – Privacy and protection of personally identifiable information

A.18.1.5 – Regulation of cryptographic controls

A.18.2.1 – Independent review of information security

A.18.2.2 – Compliance with security policies and standards

A.18.2.3 – Technical compliance review

Some of the companies trusting Adoptech