ISO 27001

ISO 27001 reference guide


title: ISO 27001 reference guide description: Detailed reference for requirements, controls and processes sidebar_position: 4

ISO 27001 reference guide

This reference guide contains detailed information about ISO 27001 requirements and implementation. Use it as a lookup guide during your project.

Requirements overview: Clauses 4-10

Clause 4: Context of the organization

What you must do:

  • Identify internal and external factors that influence information security
  • Determine stakeholders and their requirements
  • Define ISMS scope clearly and measurably

Practical execution:

  • Determine which regulations from Tidal's inventories of laws and regulations apply to your organization (GDPR, HIPAA, etc.)
  • Inventory customer and partner requirements using Tidal's context analysis
  • Document which information and systems fall within scope in the Scope document

Clause 5: Leadership

What you must do:

  • Management shows active involvement
  • Establish information security policy
  • Assign roles and responsibilities
  • Provide resources and support

Practical execution:

  • Management signs policy and communicates it
  • Appoint ISMS manager with mandate
  • Plan budget for implementation and maintenance
  • Schedule information security in management meetings

In Tidal: Document in Tidal policies, management dashboard shows progress, escalations for unresolved issues.

Clause 6: Planning

What you must do:

  • Conduct risk analysis
  • Establish security objectives
  • Select appropriate measures
  • Create implementation plan

Practical execution:

  • Identify threats specific to your business
  • Determine impact and likelihood per risk
  • Choose controls from Annex A that cover risks
  • Plan implementation with deadlines and responsible parties

In Tidal: Risk assessment with AI, automatic control mapping, project planning tools.

Clause 7: Support

What you must do:

  • Ensure competent employees
  • Provide security awareness training
  • Document procedures and policies
  • Establish communication channels

Practical execution:

  • Train ISMS team in ISO 27001 basics
  • Organize security awareness for all employees
  • Create workable procedures (max 1-2 pages)
  • Establish incident reporting channel

In Tidal: Document training progress, document templates, awareness campaign tools.

Clause 8: Operation

What you must do:

  • Implement planned measures
  • Execute risk treatment
  • Monitor implementation progress
  • Document executed actions

Practical execution:

  • Install technical measures (antivirus, firewalls, etc.)
  • Implement organizational procedures
  • Test whether measures actually work
  • Track which risks are covered

In Tidal: Work on implementation tasks, assess executed automatic tests, monitor progress with KPIs.

Clause 9: Performance evaluation

What you must do:

  • Monitor effectiveness of measures
  • Conduct internal audit
  • Hold management review
  • Measure security indicators

Practical execution:

  • Check monthly whether procedures are followed
  • Have independent party audit ISMS
  • Discuss findings with management
  • Track KPIs like number of incidents, training participation

In Tidal: Automatic monitoring, audit execution or provision of work program and reporting templates, management review reports.

Clause 10: Improvement

What you must do:

  • Resolve non-conformities
  • Implement improvement actions
  • Update procedures where needed
  • Document lessons learned

Practical execution:

  • Analyze causes of incidents
  • Adjust procedures based on new insights
  • Communicate changes to team
  • Plan preventive measures

In Tidal: Enter Issues, document corrective action plans, and monitor progress of resolution.

Controls library: Annex A practical

Organizational controls (5.1-5.37)

Most important for small businesses:

5.1 Information security policy

  • What: Policy document that provides direction
  • Practice: 2-3 pages with main rules and responsibilities

5.9 Asset inventory

  • What: List of all systems, data and hardware
  • Practice: Excel/database with owners and classification

5.15 Access control

  • What: Who may access what
  • Practice: Least privilege principle, regular reviews

5.24 Incident response planning

  • What: Plan for when things go wrong
  • Practice: Clear escalation procedure with contact details

People controls (6.1-6.8)

Focus on awareness and responsibility:

6.3 Security awareness training

  • What: Train all employees
  • Practice: Annual training + monthly tips

6.7 Remote working

  • What: Arrange secure remote work
  • Practice: VPN, device management, clear desk policy

Physical controls (7.1-7.14)

Relevant for office environments:

7.1 Physical access control

  • What: Limited access to office/server room
  • Practice: Badge system, visitor registration

7.7 Clear desk policy

  • What: Don't leave sensitive information on desk
  • Practice: Lock screens, clean up documents

Technological controls (8.1-8.34)

Essential for IT security:

8.5 Multi-factor authentication

  • What: Extra verification besides password
  • Practice: SMS, app or hardware token for critical systems

8.7 Malware protection

  • What: Antivirus on all systems
  • Practice: Centrally managed antivirus, automatic updates

8.13 Information backup

  • What: Regular backups of critical data
  • Practice: Automatic cloud backup, monthly restore test

8.15 Event logging

  • What: Track who does what when
  • Practice: Central log management, security monitoring

Documentation checklist

Mandatory documents (13 pieces)

DocumentRequired forIn Tidal
Organizational contextClause 4.1Policies section
Scope of the ISMSClause 4.3Policies section
Information security policyClause 5.2Policies section
Risk management processClause 6.1Policies section
Risk treatment planClause 6.1.3Risk module
Statement of ApplicabilityClause 6.1.3Policies section
Information security objectivesClause 6.2Policies section
Internal audit planClause 9.2Policies section
Internal audit reportClause 9.2Documents section
Management reviewClause 9.3Documents section
Incident logsClause 5.24-5.28Issues module
Corrective actionsClause 10.1Issues module
Training recordsClause 7.2Upload to task

Recommended documents (20 pieces)

DocumentRequired forIn Tidal
Organisation chartClause 4.1Upload in Policies section
Register of laws and regulationsControl 5.31Policies section
Roles and responsibilitiesClause 5.3Policies section
Communication structureClause 7.4Policies section
Internal audit programmeClause 9.2.2Policies section
Acceptable use policyControl 5.10Policies section
Access control policyControl 5.15Policies section
Network diagramControl 8.20Upload in Policies section
Secure configuration baselineAnnex Chapter 8Policies section
Logging & Monitoring policyControl 8.15Policies section
Incident response planControl 5.26Policies section
Emergency contact listControl 5.24Policies section
Change management policyControl 8.32Policies section
Secure software development policyControl 8.25Policies section
Business continuity planControl 5.30Policies section
Information classification policyControl 5.12Policies section
Data retention policyControl 5.33Policies section
Privacy policy (GDPR compliance)Control 5.34Policies section
Supplier security policyControl 5.19Policies section
Physical and environmental security policyControl 7.1Policies section

Tidal advantage: Audit-proof templates are already in Tidal for all mandatory ánd optional documentation

Certification process: What auditors check

Phase 1 Audit (Document review)

Duration: 1 day for small organization Focus: Documents and procedures

Auditor checks:

  • Are all mandatory documents present?
  • Are procedures logical and complete?
  • Is the Statement of Applicability correct?
  • Is management involvement visible?

Common findings:

  • Missing or inadequate version control on policies
  • Procedures that don't match reality
  • Statement of Applicability incorrectly completed
  • Unclear scope definition

Tidal preparation: Internal audit shows exactly what's missing.

Phase 2 Audit (On-site assessment)

Duration: 1-2 days for small organization Focus: Implementation and effectiveness

Auditor checks:

  • Are procedures actually followed?
  • Are technical controls implemented?
  • Is the team aware of their responsibilities?
  • Does the management review cycle work?

Interviews with:

  • ISMS manager about daily practice
  • IT administrator about technical measures
  • Random employees about awareness
  • Management about commitment and review

Common findings:

  • Gap between written procedure and practice
  • Missing technical implementation
  • Employees not aware of procedures
  • Management review too superficial

Tidal evidence: All evidence directly available for auditor.

After the audit

Certificate issuance: 2-4 weeks after successful audit Validity period: 3 years Surveillance audits: Annually, 1 day Recertification: After 3 years, comparable to initial audit

Maintenance after certification

Monthly tasks (2-3 hours)

  • Compliance dashboard check in Tidal
  • New risks assess (changes, incidents)
  • Access reviews for critical systems
  • Security metrics update

Quarterly tasks (4-6 hours)

  • Policy review - are documents still current?
  • Training planning - who needs refresher course?
  • Vendor assessments - check new suppliers
  • Incident trend analysis - identify patterns

Annual tasks (2-3 days)

  • Complete risk assessment review
  • Internal audit conduct or have conducted
  • Management review prepare and hold
  • Surveillance audit prepare

Tidal support

  • Automatic reminders for all periodic tasks
  • Compliance tracking with real-time status
  • Evidence collection for surveillance audits
Tip

Save time: With Tidal automation you take 70% less time for maintenance activities compared to manual systems.

Troubleshooting & FAQ

Frequently asked questions

"How many controls from Annex A must I implement?" There is no minimum. Focus on controls that actually address your identified risks. Small organizations typically implement 60-90 controls.

"Must each procedure be a separate document?" No. You can combine related procedures. But although it seems convenient to put all "ISO 27001" policy in one document, this will eventually lead to organizational confusion, poor management, and a handbook that loses relevance and creates duplicate work when other compliance requirements arise (e.g., expansion to the US market, or product development for another target group, such as healthcare).

"How specific should procedures be?" Specific enough that a new employee can follow the procedure, but not so detailed that updates are constantly needed. Focus on 'what' and 'when', less on 'how'.

"Can we outsource controls?" Yes, but you remain responsible. Document which supplier provides which control and monitor their effectiveness.

Common problems

"Surveillance audit finds gap that wasn't there last year"

  • Cause: Procedures not updated after changes
  • Solution: Implement change management process
  • Prevention: Monthly compliance checks in Tidal

"Team doesn't follow procedures"

  • Cause: Procedures too complex or not practical
  • Solution: Simplify procedures, retrain team
  • Prevention: Test procedures with end users before finalization

"Technical controls don't work as intended"

  • Cause: Configuration errors, lack of monitoring
  • Solution: Technical review, implement monitoring
  • Prevention: Automatic compliance checks in Tidal

Still stuck?

Send an email to support@tidalcontrol.com, and we'll get back to you as soon as possible.

Info

Gather support info: Note specifically which requirement is unclear, which steps you've already tried, and what your deadline is for resolution.