ISO 27001 Annex A.7 – Human Resource Security

Simplifying Information Security Certification

What is the objective of ISO 27001 Annex A.7.1?

Annex A.7.1 ‘Prior to employment’ requires the company to ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered.

A.7.1 forms part of the information security management system (ISMS) and is an integral step to achieve ISO 27001 certification. It contains the two controls listed below.

A.7.1.1 Screening

Annex 7.1.1 or Control A.7.1.1 stipulates that background verification checks should be carried out on all candidates for employment, in accordance with relevant laws, regulations and ethics and should be proportional to the perceived risks and so screening for a role that requires access to a higher classification of information asset should be more stringent than for a role accessing lower levels of information.

Making the right hiring decisions should not be left to chance. It is vital to ensure that the individual has the integrity, skills and experience necessary for you to place your company’s trust, data and technology in their hands. Screening is essential, particularly for maintaining compliance in sensitive industries like healthcare or finance and the screening process you conduct is likely to be driven by the role, for example:  

Developer

✔ ID check

✔ Proof of address

✔ Right to work

✔ Employment history

✔ References

✔ Basic criminal record check

✔ Qualifications

Chief technology officer

✔ ID check

✔ Proof of address

✔ Right to work

✔ Employment history

✔ References

✔ Basic criminal record check

✔ Qualifications

✔ Sanctions check

✔ Credit check

✔ Directorship check

✔ Social media check

A.7.1.2 Terms & Conditions of Employment

Annex 7.1.2 or Control A.7.1.2 requires contractual agreements with employees and contractors to state the individual and company’s responsibility for information security.  It ensures that everyone understands their obligations and responsibilities with respect to your ISMS even before they start with your company.

Start simplifying your Information Security Certification

What is the objective of Annex A.7.2?

Annex A.7.2 ’During employment’ requires the company to make sure that employees and contractors are aware of and fulfill their information security responsibilities.

A.7.2 forms part of the information security management system (ISMS) and is an integral step to achieve ISO 27001 certification. It contains the two controls listed below.

A.7.2.1 Management Responsibilities

Annex 7.2.1 or Control A.7.2.1 requires management to ensure all employees and contractors apply information security in accordance with the established policies and procedures of the organisation.

Management responsibilities include ensuring that employees and contractors:

  1. Are aware of their information security roles and responsibilities – The Adoptech Roles and Responsibilities Policy outlines the process for allocating these responsibilities
  2. Achieve a level of information security awareness – a training plan must be maintained and executed that is aligned with the roles and responsibilities the individual undertakes.
  3. Are provided with an anonymous reporting channel to report violations of information security policies or procedures – this is outlined within the Adoptech Information Security Enforcement Policy.
  4. Management must sign-off information security policies and ensure the respective controls are maintained – the Adoptech platform provides a management approval and staff attestation workflow for all policies.

A.7.2.2 Information Security Awareness, Education and Training

Annex 7.2.2 or Control A.7.2.2 outlines that all employees and, where relevant, contractors should receive appropriate awareness education and training and regular updates in organisational policies and procedures, as relevant for their job function.

An information security awareness programme should be provided to all relevant staff In line with the company’s information security policies. The programme should be documented and reviewed on a regular basis to ensure its objectives are being met. 

The Adoptech platform enables all staff in scope of information security policies to read and attest that they have understood each policy on an appropriately regular basis. ISO clients are also provided with support on creating training plans that are effective and cost efficient

A.7.2.3 Disciplinary Process

Annex 7.2.3 or Control A.7.2.3 stipulates that there should be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breach. The consequences of such a breach should be made clear to all staff.  

The formal disciplinary process should ensure correct and fair treatment for employees who are suspected of committing breaches of information security. The Adoptech Information Security Enforcement Policy outlines the disciplinary action to be taken in the event that a member of staff has violated the Information Security Enforcement Policy.

What is the objective of Annex A.7.3?

Annex A.7.3 ’Termination and change of employment’ is about protecting the company and its information if someone changes role or leaves the company.

A.7.3.1 Termination or change of employment responsibilities

Annex 7.3.1 or Control A.7.3.1 aims to ensure that everyone understands their responsibilities with regards to ongoing information security after a member of staff has left the company or changed role including, where appropriate, responsibilities contained within any confidentiality agreement and the terms and conditions of employment continuing for a defined period after the end of the employment.

Do you need more info about ISO 27001? Take a look at our InfoSec Certification Guide

Annex A Domains & Controls

A.9 – Access control

A.9.1.1 – Access control policy

A.9.1.2 – Access to networks and network services

A.9.2.1 – User registration and de-registration

A.9.2.2 – User access provisioning

A.9.2.3 – Management of privileged access rights

A.9.2.4 – Management of secret authentication information of users

A.9.2.5 – Review of user access rights

A.9.2.6 – Removal or adjustment of access rights

A.9.3.1 – Use of secret authentication information

A.9.4.1 – Information access restriction

A.9.4.2 – Secure log-on procedures

A.9.4.3 – Password management system

A.9.4.4 – Use of privileged utility programs

A.9.4.5 – Access control to program source code

A.11 – Physical and environmental security

A.11.1.1 – Physical security perimeter

A.11.1.2 – Physical entry controls

A.11.1.3 – Securing offices, rooms and facilities

A.11.1.4 – Protecting against external and environmental threats

A.11.1.5 – Working in secure areas

A.11.1.6 – Delivery and loading areas

A.11.2.1 – Equipment siting and protection

A.11.2.2 – Supporting utilities

A.11.2.3 – Cabling security

A.11.2.4 – Equipment maintenance

A.11.2.5 – Removal of assets

A.11.2.6 – Security of equipment and assets off-premises

A.11.2.7 – Secure disposal or reuse of equipment

A.11.2.8 – Unattended user equipment

A.11.2.9 – Clear desk and clear screen policy

A.12 – Operations security

A.12.1.1 – Documented operating procedures

A.12.1.2 – Change management

A.12.1.3 – Capacity management

A.12.1.4 – Separation of development, testing and operational environments

A.12.2.1 – Controls against malware

A.12.3.1 – Information backup

A.12.4.1 – Event logging

A.12.4.2 – Protection of log information

A.12.4.3 – Administrator and operator logs

A.12.4.4 – Clock synchronization

A.12.5.1 – Installation of software on operational systems

A.12.6.1 – Management of technical vulnerabilities

A.12.6.2 – Restrictions on software installation

A.12.7.1 – Information systems audit controls

A.13 – Communications Security

A.13.1.1 – Network controls

A.13.1.2 – Security of network services

A.13.1.3 – Segregation in networks

A.13.2.1 – Information transfer policies and procedures

A.13.2.2 – Agreements on information transfer

A.13.2.3 – Electronic messaging

A.13.2.4 – Confidentiality or nondisclosure agreements

A.14 – Systems acquisition, development and maintenance

A.14.1.1 – Information security requirements analysis and specification

A.14.1.2 – Securing application services on public networks

A.14.1.3 – Protecting application services transactions

A.14.2.1 – Secure development policy

A.14.2.2 – System change control procedures

A.14.2.3 – Technical review of applications after operating platform changes

A.14.2.4 – Restrictions on changes to software packages

A.14.2.5 – Secure system engineering principles

A.14.2.6 – Secure development environment

A.14.2.7 – Outsourced development

A.14.2.8 – System security testing

A.14.2.9 – System acceptance testing

A.14.3.1 – Protection of test data

A.15 – Supplier relationships

A.15.1.1 – Information security policy for supplier relationships

A.15.1.2 – Addressing security within supplier agreements

A.15.1.3 – Information and communication technology supply chain

A.15.2.1 – Monitoring and review of supplier services

A.15.2.2 – Managing changes to supplier services

A.16 – Information security incident management

A.16.1.1 – Responsibilities and procedures

A.16.1.2 – Reporting information security events

A.16.1.3 – Reporting information security weaknesses

A.16.1.4 – Assessment of and decision on information security events

A.16.1.5 – Response to information security incidents

A.16.1.6 – Learning from information security incidents

A.16.1.7 – Collection of evidence

A.17 – Information security aspects of business continuity management

A.17.1.1 – Planning information security continuity

A.17.1.2 – Implementing information security continuity

A.17.1.3 – Verify, review and evaluate information security continuity

A.17.2.1 – Availability of information processing facilities

A.18 – Compliance

A.18.1.1 – Identification of applicable legislation and contractual requirements

A.18.1.2 – Intellectual property rights

A.18.1.3 – Protection of records

A.18.1.4 – Privacy and protection of personally identifiable information

A.18.1.5 – Regulation of cryptographic controls

A.18.2.1 – Independent review of information security

A.18.2.2 – Compliance with security policies and standards

A.18.2.3 – Technical compliance review

Some of the companies trusting Adoptech