What is Control 5.4 Management Responsibilities

What is an information security policy?

An information security policy is a formal document that provides management direction, goals and principles for protecting an organisation’s information. An effective information security policy should be tailored to the specific needs of an organisation and supported by senior management to ensure appropriate allocation of resources.

The policy communicates the overarching principles on how management would like employees to handle sensitive data and how the company will protect its information assets.

The policy is often derived from laws, regulations and best practices that must be adhered to by the organisation. Information security policies are usually created by an organisation’s senior management, with input from its IT security staff.

Policies should also include a framework for defining roles and responsibilities and a timeline for periodic review.

Attributes Table

Attributes are a way to categorise different types of controls. These attributes allow you to align your controls with industry standards. In control 5.4 they are:

Control Type Information Security Properties Cybersecurity Concepts Operational Capabilities Security Domains
#Preventive #Confidentiality #Identify #Governance #Governance and Ecosystem
#Integrity
#Availability



Get an 81% headstart

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo



What Is The Purpose of Control 5.4?

Control 5.4 was designed to ensure that management understands their responsibility in information security and that they take steps to ensure that all employees are aware of and fulfil their information security obligations.

Control 5.4 Explained

Information is a valuable asset and must be protected from loss, damage or misuse. The organisation shall ensure that appropriate measures are taken to protect this asset. For this to happen, management must ensure that all personnel apply all the information security policy, topic-specific policies and procedures of the organisation.

Control 5.4 covers the purpose and implementation guidance for defining management responsibility with regards to information security in an organisation in line with the framework of ISO 27001.

This control is all about making sure that management is on board with the information security programme and that all employees and contractors are aware of and follow the organisation’s information security policy. No one should ever be exempt from mandatory compliance with the organisation’s security policies, topics-specific policies and procedures.

What Is Involved and How to Meet the Requirements

The key to meeting the requirements of this control is in ensuring that management is able to compel all relevant personnel to adhere to the organisation’s information security policies, standards, and procedures.

The first step is management buy-in and support. Management must demonstrate its commitment by following through on all policies and procedures it puts in place. For example, if you require workers to take annual security awareness training courses, managers should lead by example and complete those courses first.

Next comes communicating the importance of information security to everyone in the company, regardless of their role. This includes the board of directors, executives and management, as well as employees. Everyone must understand their role in maintaining the security of sensitive data as covered in the company’s ISMS programme.




Compliance doesn't have to be complicated.

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo



Differences between ISO 27002:2013 and ISO 27002:2022

ISO 27002:2022 control 5.4 Management Responsibilities was formerly known as control 7.2.1 Management Responsibilities in ISO 27002:2013. This is not a new control but a more robust interpretation of the 2013 version.

While control 5.4 and control 7.2.1 broadly covers the same thing, there are few differences that organisations and business managers should note. These differences are covered in the implementation guidance of the control.

Control 5.4 ISO 27002:2013-2022 Implementation Guidelines Compared

In ISO 27002: 2013, management responsibilities covers ensuring that employees and contractors:

a) are properly briefed on their information security roles and responsibilities prior to being granted access to confidential information or information systems;

b) are provided with guidelines to state information security expectations of their role within the
Organisation;

c) are motivated to fulfil the information security policies of the organisation;

d) achieve a level of awareness on information security relevant to their roles and responsibilities within the organisation;

e) conform to the terms and conditions of employment, which includes the organisation’s information security policy and appropriate methods of working;

f) continue to have the appropriate skills and qualifications and are educated on a regular basis;

g) are provided with an anonymous reporting channel to report violations of information security policies or procedures (“whistle blowing”).

Management should demonstrate support of information security policies, procedures and controls, and act as a role model.

Control 5.4 is a more user-friendly version and requires that management responsibilities ensures that employees and contractors:

a) Are properly briefed on their information security roles and responsibilities prior to being granted access to the organisation’s information and other associated assets;

b) Are provided with guidelines which state the information security expectations of their role within the organisation;

c) Are mandated to fulfil the information security policy and topic-specific policies of the organisation;

d) Achieve a level of awareness of information security relevant to their roles and responsibilities within the organisation;

e) Compliance with the terms and conditions of employment, contract or agreement, including the organisation’s information security policy and appropriate methods of working;

f) Continue to have the appropriate information security skills and qualifications through ongoing professional education;

g) Where practicable, are provided with a confidential channel for reporting violations of information security policy, topic-specific policies or procedures for information security (“whistleblowing”). This can allow for anonymous reporting, or have provisions to ensure that knowledge of the identity of the reporter is known only to those who need to deal with such reports;

h) Are provided with adequate resources and project planning time for implementing the organisation’s security-related processes and controls.

As you can see, ISO 27002:2022 specifically requires that in order to execute the organisation’s security-related procedures and controls, workers and contractors are supplied with necessary resources as well as project planning time.

The wordings in some of the implementation guidelines of ISO 27002:2013 vs ISO 27002:2020 were also affected. Where guideline C of the 2013 version states that employees and contractors be ‘motivated’ to adopt the company’s ISMS policies, 2022 uses the word ‘mandated’




Manage all your compliance in one place

ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.

Book a demo



Who Is In Charge Of This Process?

The answer to this question is pretty simple: the management! It is the responsibility of the management to ensure that a proper ISMS (Information Security Management System) is implemented.

This is normally supported by the appointment of a suitably qualified and experienced information security manager, who will be accountable to senior management for developing, implementing, managing and continually improving the ISMS.

New ISO 27002 Controls

New Controls


Organisational Controls

ISO/IEC 27002:2022 Control IdentifierISO/IEC 27002:2013 Control IdentifierControl Name
5.105.1.1, 05.1.2Policies for information security
5.206.1.1Information security roles and responsibilities
5.306.1.2Segregation of duties
5.407.2.1Management responsibilities
5.506.1.3Contact with authorities
5.606.1.4Contact with special interest groups
5.7NewThreat intelligence
5.806.1.5, 14.1.1Information security in project management
5.908.1.1, 08.1.2Inventory of information and other associated assets
5.1008.1.3, 08.2.3Acceptable use of information and other associated assets
5.1108.1.4Return of assets
5.12 08.2.1Classification of information
5.1308.2.2Labelling of information
5.1413.2.1, 13.2.2, 13.2.3Information transfer
5.1509.1.1, 09.1.2Access control
5.1609.2.1Identity management
5.17 09.2.4, 09.3.1, 09.4.3Authentication information
5.1809.2.2, 09.2.5, 09.2.6Access rights
5.1915.1.1Information security in supplier relationships
5.2015.1.2Addressing information security within supplier agreements
5.2115.1.3Managing information security in the ICT supply chain
5.2215.2.1, 15.2.2Monitoring, review and change management of supplier services
5.23NewInformation security for use of cloud services
5.2416.1.1Information security incident management planning and preparation
5.2516.1.4Assessment and decision on information security events
5.2616.1.5Response to information security incidents
5.2716.1.6Learning from information security incidents
5.2816.1.7Collection of evidence
5.2917.1.1, 17.1.2, 17.1.3Information security during disruption
5.30NewICT readiness for business continuity
5.3118.1.1, 18.1.5Legal, statutory, regulatory and contractual requirements
5.3218.1.2Intellectual property rights
5.3318.1.3Protection of records
5.3418.1.4Privacy and protection of PII
5.3518.2.1Independent review of information security
5.3618.2.2, 18.2.3Compliance with policies, rules and standards for information security
5.3712.1.1Documented operating procedures


People Controls


Physical Controls


How ISMS.online Helps

One of the biggest challenges in implementing an ISO 27001-aligned ISMS is keeping on top of your information security controls. Our system makes this easy.

We understand the importance of protecting your organisation’s data and reputation. That’s why our cloud-based platform is designed to simplify the implementation of ISO 27001, provide you with a robust framework of information security controls and help you achieve certification with minimal resources and time.

We’ve included a variety of user-friendly features and toolkits into our platform to save you time and guarantee you’re creating a really robust ISMS. With ISMS.online, you can easily obtain ISO 27001 certification and afterwards easily manage it.

Book a demo today.


Jump to topic

Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

ISMS Platform Tour

Interested in an ISMS.online platform tour?

Start your free 2-minute interactive demo now and experience the magic of ISMS.online in action!

Try it for free

We’re a Leader in our Field

Users Love Us
Leader Winter 2025
Leader Winter 2025 United Kingdom
Best ROI Winter 2025
Fastest Implementation Winter 2025
Most Implementable Winter 2025

"ISMS.Online, Outstanding tool for Regulatory Compliance"

-Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

-Karen C.

"Innovative solution to managing ISO and other accreditations"

-Ben H.

DORA is here! Supercharge your digital resilience today with our powerful new solution!