In many SMEs, the information security policy is created hastily: a customer requests it during the tender phase, an audit is approaching, or management wants a document to prove security is managed. The problem is that too often the policy remains a high-level proclamation that does not guide daily work, responsibilities, or decisions. In that case, it’s not very useful—for staff, management, or ISO 27001 efforts.
This article reviews what an information security policy practically includes, what ISO 27001 requires from it, and how to distinguish a useful policy from just a template. You'll also get a concrete step-by-step approach to build a policy that’s clear enough for personnel and credible enough for customers and audits.
What is an Information Security Policy and Why is it Important?
An information security policy is a management-approved statement on how information is protected and the principles guiding security management. Practically, it communicates what the company values, what objectives it sets, and who is responsible for what. It’s not a detailed work instruction but rather a guiding fundamental document.
From the ISO 27001 perspective, the policy is part of the information security management system—a systematic way to plan, implement, monitor, and improve security. Without a policy, the management system lacks a common direction. If staff do not know what information is protected, at what level, and why, practices tend to be random.
A good policy helps particularly in situations such as:
- onboarding new employees to security principles
- when customers request a description of the company’s security management
- when management assesses risks, investments, and responsibilities
- when an incident such as a data leak or incorrect access must be handled swiftly
- when proving management commitment during an ISO 27001 audit
Note
ISO 27001 does not require the information security policy to be a lengthy document. For an SME, often 1–3 pages suffice if the content is clear, current, and tied to practical activities.
What Does ISO 27001 Require from an Information Security Policy?
ISO 27001 does not provide a fixed outline to be copied. Instead, the standard requires the policy to suit the organization’s purpose, support security objectives, and include a commitment to meet requirements and continuous improvement. This may sound abstract, so let’s break it down into practical terms.
The policy should include at least the following areas:
| Content Area | What it Means Practically | Example for an SME |
|---|---|---|
| Purpose | Why the policy exists | The company systematically protects customer, personnel, and business information |
| Scope | Which operations, units, or services the policy covers | Applies to the entire company, all employees, and key SaaS services |
| Principles | The general approaches to implementing security | Access to data is limited based on role; changes require prior approval |
| Objectives | What security aims to achieve | Reduce critical access errors by 50% annually |
| Responsibilities | Who owns, approves, and implements | CEO approves; IT handles technical controls; supervisors handle onboarding |
| Commitment to Compliance | Whether laws, contracts, and internal requirements are followed | Customer contracts, data protection, and internal guidelines are considered |
| Continuous Improvement | How the policy and practices are developed | Policy reviewed at least annually |
When you read this table, you may notice one key point: the policy is not a list of all controls. It is not the place to describe backup technicalities or firewall rules in detail. Those belong to lower-level instructions and procedures.
Instead, the policy’s role is to answer questions like:
- What information are we protecting?
- What is management’s intention?
- What are the main ground rules?
- How are responsibilities divided?
- How do we know that operations are improving?
What Does a Good Information Security Policy Include in Practice?
In practice, a workable policy is clear, scoped, and tied to the company’s daily environment. If your company sells software services, the policy should address topics such as customer data protection, access management, supplier dependencies, and incident handling. If you operate as a consultancy, emphasis may be on staff behavior, endpoint devices, and confidential communication.
A good framework often includes these elements:
- the policy’s purpose and connection to business
- scope, i.e., which operations and data the policy covers
- key security objectives for a 12-month timeframe
- management’s commitment to resources and compliance
- roles and responsibilities
- references to more detailed instructions such as access, backup, and incident processes
- a review and update practice, e.g., once a year or when significant changes occur
For example, regarding access rights, the policy might state: access is granted based on job role, approved through a specified process, and removed within 24 hours after employment ends. The detailed work instruction can then specify who performs the removal, in which system, and how it’s documented.
Tip
If the policy feels too general, test it with one question: can a supervisor make a better decision tomorrow based on it? If not, add a concrete principle, responsibility, or metric.
Common Mistakes in Information Security Policies
Many companies start from a template, which in itself makes sense. The problem arises when the text is not adapted to the company’s own operations. This becomes clear in audits and customer assessments quickly: the policy discusses environments, roles, or processes that don’t actually exist in the company.
Typical mistakes include:
- the policy is too long, e.g., 8–15 pages, and staff don’t read it
- the policy is too general, lacking measurable goals or responsibilities
- the document is outdated and doesn’t reflect current services, systems, or organization
- the policy is not approved by management and has no designated owner
- the policy isn’t linked to risk assessments, incident handling, or training
A particularly common problem is writing the policy for the audit, not for management. Then it easily becomes a static document opened only once a year. A useful policy is visible in everyday activities like onboarding, supplier selection, access management, and management reviews.
Warning
A common pitfall is copying promises into the policy that you cannot verify. For example, if you write that all incidents are handled within 24 hours, you must also have a process, responsibilities, and monitoring to ensure this happens.
How Does the Information Security Policy Relate to Other ISO 27001 Documents?
The information security policy does not stand alone. It’s a high-level document under which more detailed procedures, instructions, and records fall. If the policy says risks are managed systematically, this must also be evident in risk assessments. If the policy covers incident handling, the organization must have a practice for documenting and managing incidents.
A typical document hierarchy looks like this:
| Document | Role | Update Frequency |
|---|---|---|
| Information Security Policy | High-level direction and management intent | At least annually |
| Security Objectives | Concrete metrics and improvement areas | Quarterly or semi-annually |
| Risk Assessment | Identifies 3–5 key risks and their handling | 1–2 times per year |
| Procedures | Describes practical operations | As needed, when changes occur |
| Records | Evidence of implementation, such as approvals and training | Continuously |
If the company already has an ISO 9001 quality system, managing the information security policy within the same management system is advisable. This simplifies approvals, reviews, and version control. Many SMEs benefit from integrating quality and security instead of running them as isolated silos.
How to Build an Information Security Policy in Practice
The following approach works well in an SME aiming to complete the policy without a heavy project. A realistic schedule is often 1–2 weeks if decision-makers are involved and baseline information exists.
Define the policy scope
First, specify which business areas, services, teams, and data the policy covers. Record this concretely—for example, whether it applies to the entire company or only one service, and whether subcontractors and cloud services are included.
Identify 3–5 key security themes
Choose the topics with the greatest impact on the business and customer trust. Typically, these include access rights, endpoints, customer data protection, supplier management, and incident handling.
Document principles, responsibilities, and measurable goals
Formulate a clear principle for each theme and name an owner. Add 2–4 measurable goals, such as onboarding within 7 days of employment or access removal within 24 hours after termination.
Get management approval and communicate to staff
The policy only works after official management approval and when staff understand what it means in their work. Review the policy in a 30-minute staff briefing and integrate it into onboarding and annual training.
Integrate policy with monitoring and annual cycle
Agree on when the policy will be reviewed and how its effectiveness will be evaluated. This may involve an annual management review, monitoring incident trends, and reviewing goals quarterly.
What Kind of Policy Works Best in SMEs?
In SMEs, the best information security policy is usually concise and practical. It doesn’t need to look like a corporate manual. More important is that staff understand it, management stands behind it, and its content is reflected in everyday decisions.
An effective policy usually meets these criteria:
- length is about 1–3 pages
- language is understandable to non-IT experts as well
- each main principle has an assigned responsible person
- includes at least 2–4 metrics or goals
- the document is regularly reviewed and changes are approved formally
If you wonder whether your policy is good enough, ask yourself three questions:
- Is there a clear management commitment in the document?
- Does it reflect the risks specific to our business?
- Can staff deduce how they should act practically from it?
If the answer to any is no, sharpen your policy.
How Does Tietoturvapankki Make the Work Easier?
In many organizations, the hardest part isn’t writing but managing the whole picture. The policy should link with risks, objectives, responsibilities, training, and audit evidence. When these reside in separate files and owners, maintenance quickly slows down.
Tietoturvapankki helps build an ISO 27001-compliant whole so the information security policy isn’t an isolated document. When policy, risks, actions, and monitoring are in one service, updates and reviews are easier to carry out on time. Behind this is Softapankki Oy and QMClouds Oy’s expertise in implementing management systems, and a related solution is Laatupankki — the group’s brand for quality management.
Summary
- The information security policy is a management-approved high-level statement, not a detailed work instruction.
- ISO 27001 requires the policy to suit the organization’s operations, support objectives, and include commitment to compliance and continuous improvement.
- An effective policy includes at least purpose, scope, principles, responsibilities, objectives, and a review practice.
- For SMEs, a concise 1–3 page measurable policy works better than a long general document.
- The best benefit comes from linking the policy with risk assessment, training, incident handling, and management review.
Need help with information security management?
Our experts are here to assist you.
