Skip to content

What Is ISO 27001:2022 Annex A 6.4?

ISO 27001:2022 Annex A 6.4 requires organisations to establish a disciplinary process to act as a deterrent against information security violations.

Formal communication of this process should be implemented and a penalty suitable for employees and other stakeholders who violate the information security policy should be established.

Information Security Violation Explained

Information security policy violations constitute a breach of the regulations governing the proper handling of information. Organisations establish these policies to protect confidential, proprietary and personal data, such as customer records and credit card numbers. Additionally, computer security policies are also included in these to ensure data stored on computers remains secure and intact.

If you utilise company email to send personal communications without permission from your supervisor, this could constitute a breach of the company policy. Additionally, should you make an error while utilising the firm’s equipment or software, resulting in damage to either the equipment or the data stored on it, this is also an infraction of the information security policy.

If an employee contravenes an organisation’s info security policy, disciplinary action or dismissal may result. In certain situations, a business may opt not to dismiss a worker who breaches its computer usage policy, but to take other suitable steps to stop any further infringements of company policy.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




The Purpose of ISO 27001:2022 Annex A 6.4?

The purpose of the disciplinary process is to make sure personnel and any other interested parties recognise the outcomes of a breach of the information security policy.

Annex A 6.4 is designed to both deter and assist in handling any violations of information security policies, ensuring that employees and other related stakeholders are aware of the ramifications.

An effective information security programme must include the capacity to administer suitable disciplinary measures for workers who violate information security regulations. Doing so ensures that personnel understand the implications of disregarding pre-defined regulations, thus diminishing the likelihood of deliberate or inadvertent data leakage.

Examples of activities that could be included while enforcing this control are:

  • Carry out regular training sessions to keep staff up to date on policy changes.
  • Design disciplinary measures for failure to adhere to information security policies.
  • Supply each employee with a copy of the organisation’s disciplinary procedures.
  • In similar situations, ensure that disciplinary procedures are followed consistently.

The disciplinary measures outlined in the framework should be swiftly implemented following an incident, to discourage any further breaches of organisational policies.

What Is Involved and How to Meet the Requirements

To meet the requirements of Annex A 6.4, disciplinary action must be taken when there is evidence of not adhering to the organisation’s policies, procedures, or regulations. This also includes any applicable legislation and regulations.

Per Annex A 6.4, the formal disciplinary process should account for the following elements when taking a graduated approach:

  • The extent of the breach, its nature, seriousness, and consequences must all be taken into account.
  • Whether the offence was deliberate or accidental.
  • Regardless of whether this is the initial or repeat offence.
  • Whether the transgressor has been given sufficient training is to be considered.

Consider all relevant legal, legislative, regulatory, contractual and corporate obligations, as well as any other relevant factors, when taking action.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 6.4 replaces ISO 27001:2013 Annex A 7.2.3 in the revised 2022 version of ISO 27001.

ISO 27001:2022 employs user-friendly language to ensure the standard’s users can comprehend its content. There are minor variations in wording, however the overall context and content remain the same.

The only distinction you’ll observe is the Annex A Control Number having been changed from 7.2.3 to 6.4. Moreover, the 2022 standard has the added benefit of a attributes table and statement of purpose which are absent in the 2013 version.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing




Who Is in Charge of This Process?

In the majority of cases, the disciplinary process is overseen by the department manager or HR representative. It is not uncommon for the HR representative to give the responsibility of disciplinary action to someone else in the organisation, like an information security expert.

The primary goal of disciplinary action is to safeguard the organisation from any additional infringements from the staff member. It further aims to deter any further occurrences of similar incidents by making sure that all employees are aware of the significance of information security breaches.

It is essential for any organisation to ensure that disciplinary action is taken when a staff member has breached any of its policies or procedures. To ensure this, clear guidance must be established on how to handle such situations, including instructions on how to carry out investigations and the actions to take afterwards.

What Do These Changes Mean for You?

If you’re pondering how these alterations affect you, here’s a concise summary of the most critical points:

  • No need to re-certify; it’s only a minor alteration.
  • Retain your current certification until it expires, provided it remains valid.
  • No major alterations have been made to ISO 27001:2022 Annex A 6.4.
  • The aim is to bring the standard in line with the most up-to-date best practices and standards.

If you’re aiming to gain ISMS certification, you should assess your security measures to ensure they comply with the revised standard.

To gain insight into the impact the new ISO 27001:2022 could have on your data security procedures and ISO 27001 accreditation, please refer to our complimentary ISO 27001:2022 guide.




[case_study_slider ids=”88859,101932,92016″ autoplay=”true” autoplay_speed=”5000″]


How ISMS.Online Help

ISMS.online is the leading ISO 27001 management system software, aiding in compliance with the ISO 27001 standard. It assists companies to ensure their security policies and procedures are in line with the requirement.

This cloud-based platform offers a full range of tools to help organisations to establish an Information Security Management System (ISMS) based on ISO 27001.

These tools comprise of:

  • A library of templates for frequently encountered corporate documents is available.
  • A collection of pre-established guidelines and protocols is in place.
  • An audit tool to facilitate internal audits is available.
  • An interface to personalise Information Security Management System (ISMS) policies and procedures is provided.
  • All changes to policies and procedures must be approved through a workflow process.
  • Create a list to ensure that your policies and information protection measures are in line with international standards.

ISMS.Online provides users with the ability to:

  • Handle all areas of the ISMS life-cycle with ease.
  • Gain immediate understanding of their security status and compliance problems.
  • Integrate with other systems such as HR, finance and project management.
  • Ensure conformance of the ISMS to ISO 27001 criteria.

ISMS.Online offers advice on how to execute your ISMS optimally, with guidance on forming policies and protocols associated with risk management, staff security awareness training and incident response preparation.

Reach out to us now to schedule a demonstration.


Mike Jennings

Mike is the Integrated Management System (IMS) Manager here at ISMS.online. In addition to his day-to-day responsibilities of ensuring that the IMS security incident management, threat intelligence, corrective actions, risk assessments and audits are managed effectively and kept up to date, Mike is a certified lead auditor for ISO 27001 and continues to enhance his other skills in information security and privacy management standards and frameworks including Cyber Essentials, ISO 27001 and many more.

ISO 27001:2022 Annex A Controls

Organisational Controls