Skip to content

What is ISO 27001:2022 Annex A 6.3?

ISO 27001:2022, Annex A 6.3, Information Security Awareness, Education, and Training, stresses the need for staff to receive suitable instruction in info security, including regular policy refreshers pertinent to their roles.

Information Security Awareness, Education and Training Explained

Information security awareness, education, and training (IT security awareness) involves informing users of the significance of information security and inspiring them to enhance their computer security practices.

Users must be advised of the potential security risks associated with their activities and educated on how to guard against them.

Information security awareness, education and training are essential to any organisation’s success. All personnel must comprehend the significance of information security and the consequences it has for everyone.

The greater the comprehension of staff as to how to shield themselves from cyber dangers, the more secure your organisation will be.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




What Is the Purpose of ISO 27001:2022 Annex A 6.3?

The goal of ISO 27001:2022 Annex A 6.3 is to guarantee that personnel and pertinent stakeholders are informed of and suitably educated to meet their info security obligations.

ISO 27001:2022 Annex A 6.3 details the range of activities necessary to ensure personnel possess the knowledge and abilities necessary to operate in the organisation’s information security framework. Primarily, this Annex A Control focuses on raising awareness of the significance of information security, advocating good practice, and encouraging conformity to relevant policies and regulations.

Annex A 6.3 Explained

Information security education, awareness, and training are essential components of an organisation’s risk management strategy and should be incorporated into the security policy. By providing employees with the knowledge and tools they need, organisations can ensure that their security measures are effective.

ISO 27001:2022 Annex A 6.3 outlines the necessity for businesses to have an information security awareness program to grant all personnel the appropriate knowledge and abilities to safeguard information resources. It gives advice regarding what should be included in a productive awareness program.

The organisation might need to provide security awareness training at least once a year, or as the risk assessment dictates, to all personnel with access to sensitive information assets or information systems that store, process, or transmit sensitive data.

What Is Involved and How to Meet the Requirements

Organisations must implement a process that ensures employees are adequately trained to perform their job duties safely and securely, without compromising information security. Training can be conducted in sessions, or through online resources such as videos or webinars. Annex A 6.3 dictates this.

Information security awareness, education, and training programmes should be developed in line with the organisation’s policy, topic-specific policies, and relevant security procedures. This should consider the information that needs protecting and the security controls in place to protect it, and should take place regularly.

Introducing awareness, education, and training to both new employees and those transitioning to roles needing different levels of security is beneficial.

An awareness campaign should comprise multiple activities to heighten understanding. This could involve campaigns, booklets, posters, newsletters, websites, information sessions, briefings, e-learning modules and e-mails.

Per Annex A 6.3, this program should encompass:

  • Management is devoted to ensuring information security across the organisation.
  • Familiarity with, and adherence to, the relevant information security procedures, including the security policy and any additional policies, regulations, laws, contracts and agreements concerning information security.
  • Personal accountability for one’s own actions and inaction’s, responsibility for protecting information belonging to the organisation and its stakeholders; this is essential.
  • Basic security procedures like information security event reporting (see Annex A 6.8) and baseline controls such as password security should be adhered to.
  • Information security contact points and resources, including additional information security awareness materials.



climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Changes and Differences from ISO 27001:2013

ISO 27001:2022 is not an entirely novel control. This version of ISO 27001, published in October 2022, updates the previous version ISO 27001:2013.

ISO 27001:2013 Annex A Control 7.2.2 lacks the attributes table and statement of purpose that are provided in ISO 27001:2022 Annex A Control 6.3.

Despite the variation in control numbers, there appears to be no other distinctions between the two Annex A Controls. While the wording of the two Annex A Controls varies, their meaning and purpose remain the same.

Annex A Control 6.3 was designed to be more user-friendly, enabling people to better understand its contents.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

Who Is in Charge of This Process?

This response hinges on your organisation. Many organisations’ security teams manage their information security consciousness, teaching, and training programmes. Some organisations, however, entrust the HR department or another branch to handle it.

Ensuring that somebody takes charge of formulating and executing your organisation’s security awareness program is vital. The information security manager should oversee this individual/department (if different from themselves).

This individual should possess sound knowledge of information security and be able to converse with staff regarding various security protocols. Furthermore, they should be able to create content for your training programmes and conduct recurrent training for personnel.

It is essential to comprehend that information security is not merely the duty of IT. All employees should be held accountable. Companies should create a team devoted to security, but they must also ensure everyone grasps the significance of confidentiality and reliability.




[case_study_slider ids=”88859,101932,92016″ autoplay=”true” autoplay_speed=”5000″]


What Do These Changes Mean for You?

ISO 27001:2022 Annex A 6.3 is a revision of ISO 27001:2013 Annex A 7.2.2 and not a new Annex A Control. Consequently, most organisations won’t require to modify anything.

If you’ve already implemented the 2013 version of ISO 27001, you must evaluate whether these changes are pertinent to your company. Likewise, if you’re planning ISMS certification, you need to review your security processes to guarantee they meet the revised standard.

How ISMS.Online Helps

ISMS.online provides a comprehensive solution for ISO 27001:2022 implementation. It is a web-based platform that enables organisations to demonstrate their compliance with ISO 27001 standards through streamlined processes, procedures and checklists.

This platform not only facilitates the implementation of ISO 27001 but also provides an excellent resource for training personnel on information security best practices and documenting all efforts.

The benefits of using ISMS.Online are plentiful:

  • This platform is easy to use and can be accessed from any device.
  • It is fully adjustable to suit your requirements.
  • Custom workflows and processes to suit your business requirements.
  • Training resources to aid new staff members in attaining proficiency faster.
  • The library contains templates for various documents, including policies, procedures, plans, and checklists.

ISMS.online streamlines the implementation of ISO 27001, offering all the resources, information and tools you need in one place. Just a few clicks of your mouse are all it takes to ensure your ISMS meets the standard.

Contact us now to arrange a demonstration.


Toby Cane

Partner Customer Success Manager

Toby Cane is the Senior Partner Success Manager for ISMS.online. He has worked for the company for close to 4 years and has performed a range of roles, including hosting their webinars. Prior to working in SaaS, Toby was a Secondary School teacher.

ISO 27001:2022 Annex A Controls

Organisational Controls