Back to blog
Creating an information security policy compliant with ISO 27001 for SMEs
iso-27001

What Does an Information Security Policy Include in ISO 27001?

Ilkka Sillanpää
Ilkka SillanpääCEO
Published on March 29, 2026

In many SMEs, the information security policy is created hastily: a customer requests it during the tender phase, an audit is approaching, or management wants a document to prove security is managed. The problem is that too often the policy remains a high-level proclamation that does not guide daily work, responsibilities, or decisions. In that case, it’s not very useful—for staff, management, or ISO 27001 efforts.

This article reviews what an information security policy practically includes, what ISO 27001 requires from it, and how to distinguish a useful policy from just a template. You'll also get a concrete step-by-step approach to build a policy that’s clear enough for personnel and credible enough for customers and audits.

What is an Information Security Policy and Why is it Important?

An information security policy is a management-approved statement on how information is protected and the principles guiding security management. Practically, it communicates what the company values, what objectives it sets, and who is responsible for what. It’s not a detailed work instruction but rather a guiding fundamental document.

From the ISO 27001 perspective, the policy is part of the information security management system—a systematic way to plan, implement, monitor, and improve security. Without a policy, the management system lacks a common direction. If staff do not know what information is protected, at what level, and why, practices tend to be random.

A good policy helps particularly in situations such as:

  • onboarding new employees to security principles
  • when customers request a description of the company’s security management
  • when management assesses risks, investments, and responsibilities
  • when an incident such as a data leak or incorrect access must be handled swiftly
  • when proving management commitment during an ISO 27001 audit

Note

ISO 27001 does not require the information security policy to be a lengthy document. For an SME, often 1–3 pages suffice if the content is clear, current, and tied to practical activities.

What Does ISO 27001 Require from an Information Security Policy?

ISO 27001 does not provide a fixed outline to be copied. Instead, the standard requires the policy to suit the organization’s purpose, support security objectives, and include a commitment to meet requirements and continuous improvement. This may sound abstract, so let’s break it down into practical terms.

The policy should include at least the following areas:

Content AreaWhat it Means PracticallyExample for an SME
PurposeWhy the policy existsThe company systematically protects customer, personnel, and business information
ScopeWhich operations, units, or services the policy coversApplies to the entire company, all employees, and key SaaS services
PrinciplesThe general approaches to implementing securityAccess to data is limited based on role; changes require prior approval
ObjectivesWhat security aims to achieveReduce critical access errors by 50% annually
ResponsibilitiesWho owns, approves, and implementsCEO approves; IT handles technical controls; supervisors handle onboarding
Commitment to ComplianceWhether laws, contracts, and internal requirements are followedCustomer contracts, data protection, and internal guidelines are considered
Continuous ImprovementHow the policy and practices are developedPolicy reviewed at least annually

When you read this table, you may notice one key point: the policy is not a list of all controls. It is not the place to describe backup technicalities or firewall rules in detail. Those belong to lower-level instructions and procedures.

Instead, the policy’s role is to answer questions like:

  • What information are we protecting?
  • What is management’s intention?
  • What are the main ground rules?
  • How are responsibilities divided?
  • How do we know that operations are improving?

What Does a Good Information Security Policy Include in Practice?

In practice, a workable policy is clear, scoped, and tied to the company’s daily environment. If your company sells software services, the policy should address topics such as customer data protection, access management, supplier dependencies, and incident handling. If you operate as a consultancy, emphasis may be on staff behavior, endpoint devices, and confidential communication.

A good framework often includes these elements:

  • the policy’s purpose and connection to business
  • scope, i.e., which operations and data the policy covers
  • key security objectives for a 12-month timeframe
  • management’s commitment to resources and compliance
  • roles and responsibilities
  • references to more detailed instructions such as access, backup, and incident processes
  • a review and update practice, e.g., once a year or when significant changes occur

For example, regarding access rights, the policy might state: access is granted based on job role, approved through a specified process, and removed within 24 hours after employment ends. The detailed work instruction can then specify who performs the removal, in which system, and how it’s documented.

Tip

If the policy feels too general, test it with one question: can a supervisor make a better decision tomorrow based on it? If not, add a concrete principle, responsibility, or metric.

Common Mistakes in Information Security Policies

Many companies start from a template, which in itself makes sense. The problem arises when the text is not adapted to the company’s own operations. This becomes clear in audits and customer assessments quickly: the policy discusses environments, roles, or processes that don’t actually exist in the company.

Typical mistakes include:

  • the policy is too long, e.g., 8–15 pages, and staff don’t read it
  • the policy is too general, lacking measurable goals or responsibilities
  • the document is outdated and doesn’t reflect current services, systems, or organization
  • the policy is not approved by management and has no designated owner
  • the policy isn’t linked to risk assessments, incident handling, or training

A particularly common problem is writing the policy for the audit, not for management. Then it easily becomes a static document opened only once a year. A useful policy is visible in everyday activities like onboarding, supplier selection, access management, and management reviews.

Warning

A common pitfall is copying promises into the policy that you cannot verify. For example, if you write that all incidents are handled within 24 hours, you must also have a process, responsibilities, and monitoring to ensure this happens.

How Does the Information Security Policy Relate to Other ISO 27001 Documents?

The information security policy does not stand alone. It’s a high-level document under which more detailed procedures, instructions, and records fall. If the policy says risks are managed systematically, this must also be evident in risk assessments. If the policy covers incident handling, the organization must have a practice for documenting and managing incidents.

A typical document hierarchy looks like this:

DocumentRoleUpdate Frequency
Information Security PolicyHigh-level direction and management intentAt least annually
Security ObjectivesConcrete metrics and improvement areasQuarterly or semi-annually
Risk AssessmentIdentifies 3–5 key risks and their handling1–2 times per year
ProceduresDescribes practical operationsAs needed, when changes occur
RecordsEvidence of implementation, such as approvals and trainingContinuously

If the company already has an ISO 9001 quality system, managing the information security policy within the same management system is advisable. This simplifies approvals, reviews, and version control. Many SMEs benefit from integrating quality and security instead of running them as isolated silos.

How to Build an Information Security Policy in Practice

The following approach works well in an SME aiming to complete the policy without a heavy project. A realistic schedule is often 1–2 weeks if decision-makers are involved and baseline information exists.

Define the policy scope

First, specify which business areas, services, teams, and data the policy covers. Record this concretely—for example, whether it applies to the entire company or only one service, and whether subcontractors and cloud services are included.

Identify 3–5 key security themes

Choose the topics with the greatest impact on the business and customer trust. Typically, these include access rights, endpoints, customer data protection, supplier management, and incident handling.

Document principles, responsibilities, and measurable goals

Formulate a clear principle for each theme and name an owner. Add 2–4 measurable goals, such as onboarding within 7 days of employment or access removal within 24 hours after termination.

Get management approval and communicate to staff

The policy only works after official management approval and when staff understand what it means in their work. Review the policy in a 30-minute staff briefing and integrate it into onboarding and annual training.

Integrate policy with monitoring and annual cycle

Agree on when the policy will be reviewed and how its effectiveness will be evaluated. This may involve an annual management review, monitoring incident trends, and reviewing goals quarterly.

What Kind of Policy Works Best in SMEs?

In SMEs, the best information security policy is usually concise and practical. It doesn’t need to look like a corporate manual. More important is that staff understand it, management stands behind it, and its content is reflected in everyday decisions.

An effective policy usually meets these criteria:

  • length is about 1–3 pages
  • language is understandable to non-IT experts as well
  • each main principle has an assigned responsible person
  • includes at least 2–4 metrics or goals
  • the document is regularly reviewed and changes are approved formally

If you wonder whether your policy is good enough, ask yourself three questions:

  1. Is there a clear management commitment in the document?
  2. Does it reflect the risks specific to our business?
  3. Can staff deduce how they should act practically from it?

If the answer to any is no, sharpen your policy.

How Does Tietoturvapankki Make the Work Easier?

In many organizations, the hardest part isn’t writing but managing the whole picture. The policy should link with risks, objectives, responsibilities, training, and audit evidence. When these reside in separate files and owners, maintenance quickly slows down.

Tietoturvapankki helps build an ISO 27001-compliant whole so the information security policy isn’t an isolated document. When policy, risks, actions, and monitoring are in one service, updates and reviews are easier to carry out on time. Behind this is Softapankki Oy and QMClouds Oy’s expertise in implementing management systems, and a related solution is Laatupankki — the group’s brand for quality management.

Summary

  • The information security policy is a management-approved high-level statement, not a detailed work instruction.
  • ISO 27001 requires the policy to suit the organization’s operations, support objectives, and include commitment to compliance and continuous improvement.
  • An effective policy includes at least purpose, scope, principles, responsibilities, objectives, and a review practice.
  • For SMEs, a concise 1–3 page measurable policy works better than a long general document.
  • The best benefit comes from linking the policy with risk assessment, training, incident handling, and management review.

Need help with information security management?

Our experts are here to assist you.

Get in touch