Skip to content

What Is ISO 27001:2022 Annex A 6.5?

ISO 27001:2022 Annex A 6.5 mandates that organisations specify information security roles and responsibilities that remain effective even if personnel leave or are reassigned. Communicate these duties and responsibilities to the employee and any applicable third party.

Information Duties and Responsibilities Explained

Employees are legally obliged to keep confidential any information that their employer entrusts to them. It is essential for personnel to comprehend the requirements for protecting their employer’s data.

Employers are generally entitled to anticipate their workers to safeguard confidential data and not exploit it for personal profit, e.g. through insider trading or other unlawful activities.

A few examples of Information Security duties and responsibilities include:

  • Ensuring the confidentiality of personal information is of utmost importance.
  • It is essential to maintain a log of how personal data is managed, applied and shared.
  • Ensuring accuracy and dependability of data is paramount. This necessitates collection from reliable sources, secure storage, and secure disposal when no longer needed.
  • Ensure only authorised individuals have access to information.
  • Make use of and divulge personal data lawfully and justly, in agreement with applicable laws.

It’s essential for organisations to be aware of their obligations when managing personal data in order to stay clear of infringing upon any privacy regulations, as the repercussions for both the business and its staff could be dire.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




What Is The Purpose of ISO 27001:2022 Annex A 6.5?

Annex A 6.5 should be implemented upon an employee or contractor’s departure from the organisation, or when a contract ends before its expiration.

This control safeguards the organisation’s information security interests in the event of employment changes or contract terminations.

This Annex A Control safeguards against the possibility of employees taking advantage of their access to confidential information and processes for personal gain or malicious intent, especially following their departure from the organisation or job.

Annex A Control 6.5 Explained

ISO 27001:2022 Annex A 6.5 seeks to safeguard the organisation’s data security interests in the event of changing or ending employment or contracts. This covers employees, contractors, and third parties who gain access to confidential data.

Assess if any persons (including contracted ones) with access to your sensitive personal data are departing your organisation and take measures to guarantee they do not keep and persist in accessing your sensitive personal data after they leave.

If you detect that an individual is departing and there is a chance that confidential personal information could be revealed, then you must take appropriate steps either before they go or as swiftly as possible afterwards to ensure this does not occur.

What Is Involved and How to Meet the Requirements

To meet the criteria of Annex A 6.5, an individual’s employment contract or agreement should specify any information security responsibilities and duties that still stand after the conclusion of the relationship.

Information security responsibilities may be included in other contracts or agreements that last longer than an employee’s period of employment.

Upon leaving a role or changing jobs, the incumbent must ensure their security responsibilities are transferred and all access credentials are deleted and replaced.

For further details of this process, consult the ISO 27001:2022 standard document.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 6.5 is an adaptation of ISO 27001:2013 Annex A 7.3.1 rather than a new Annex A Control.

The fundamentals of these two controls are alike, though there are small discrepancies. For instance, the implementation guidance differs slightly in both versions.

The first part of Annex A 7.3.1 in ISO 27001:2013 directs that organisations must:

Upon termination, it is essential to communicate the necessary information security and legal requirements, as well as any applicable confidentiality agreements and terms and conditions of employment that may run for a specified period following the end of the employee or contractor’s engagement.

The same section Annex A 6.5 of ISO 27001:2022 stipulates that:

The procedure for managing termination or change of employment should specify which information security responsibilities and obligations remain in force after termination or alteration. This may include maintaining confidentiality of information, intellectual property and other knowledge acquired, as well as any other responsibilities stipulated in a confidentiality agreement.

Responsibilities and duties that remain in effect after the termination of an individual’s employment, contract, or agreement should be detailed in their terms and conditions. Additionally, any contracts or agreements that span a defined period beyond the end of the individual’s employment may include information security responsibilities.

Despite the difference in wording, both Annex A Controls have a largely similar structure and purpose in their respective contexts. To make Annex A 6.5 more user-friendly, the language has been simplified, allowing users to better understand its content.

The 2022 version of ISO 27001 includes a statement of purpose and attributes table for each control, aiding users in understanding and implementing them. This is absent in the 2013 edition.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing




Who Is in Charge of This Process?

In keeping with the recommendation of ISO 27001:2022 Annex A 6.5, Human Resources usually takes charge of the entire termination process in most organisations, collaborating with the individual’s supervisor to ensure information security as part of the procedures.

Personnel supplied by an external party (for example, a supplier) should be terminated in accordance with the contract established between the organisation and the external party.

What Do These Changes Mean for You?

The ISO 27001:2022 standard has remained largely unchanged, merely updated for improved usability. No organisation currently compliant with ISO 27001:2013 needs to take any extra measures to stay compliant.

To meet the changes in ISO 27001:2022, the organisation will only have to make slight alterations to their existing methods and processes, particularly if aiming to renew certification.




[case_study_slider ids=”88859,101932,92016″ autoplay=”true” autoplay_speed=”5000″]


How ISMS.Online Help

Companies can harness ISMS.online to assist with their adherence to ISO 27001:2022. This platform simplifies the process of managing, updating, testing and evaluating their security protocols.

Our cloud-based platform simplifies ISMS management, allowing you to efficiently oversee risk management, policies, plans, procedures and more, all from one single source. The platform is straightforward and its user-friendly interface makes it simple to pick up.

ISMS.online enables your organisation to:

  • Document your procedures using a user-friendly web interface, no software installation necessary on your computer or network.
  • Automate your danger evaluation technique for greater efficiency.
  • Achieving compliance is simple with online reports and checklists.
  • Monitor your progress while seeking certification.

If you operate a business requiring adherence to ISO 27001, ISMS.Online provides a comprehensive selection of features to enable you to accomplish this essential task.

Contact us now to arrange a demonstration.


Mike Jennings

Mike is the Integrated Management System (IMS) Manager here at ISMS.online. In addition to his day-to-day responsibilities of ensuring that the IMS security incident management, threat intelligence, corrective actions, risk assessments and audits are managed effectively and kept up to date, Mike is a certified lead auditor for ISO 27001 and continues to enhance his other skills in information security and privacy management standards and frameworks including Cyber Essentials, ISO 27001 and many more.

ISO 27001:2022 Annex A Controls

Organisational Controls