ISO 27001 Annex People Control

10/21/2025
ISO 27001 Annex A People Control
Reading Time: 4 minutes

ISO 27001 Annex A 6.1 – Screening

Requirements

Background verification checks on all candidates to become personnel should be carried out prior to joining the organization and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.

Explanation

This control checks if new hires are trustworthy and fit for the job. It includes background reviews before starting and ongoing checks, balanced with laws and risks, to avoid hiring someone who might harm data security.

Example

A company hiring a bookkeeper verifies their resume, references, and criminal record before offering the job, ensuring they can handle financial data safely.

FAQ 1: When should screening be performed?

Answer: Screening should be done before joining and periodically afterward, especially for critical roles.

FAQ 2: What should be included in verification checks?

Answer: References, resume accuracy, qualifications, identity, and possibly credit or criminal checks for sensitive positions.

FAQ 3: How to handle screening for supplier personnel?

Answer: Include screening requirements in contracts with suppliers.

ISO 27001 Annex A 6.2 – Terms and Conditions of Employment

Requirements

The employment contractual agreements should state the personnel’s and the organization’s responsibilities for information security.

Explanation

Job contracts should clearly list security duties for employees and the company. This ensures everyone knows what to do to keep information safe from day one.

Example

A new employee’s contract includes rules like not sharing passwords and reporting lost devices, which they sign before starting.

FAQ 1: What should be clarified in contractual obligations?

Answer: Confidentiality agreements, legal responsibilities, asset handling, and actions for disregarding security requirements.

FAQ 2: When should security roles be communicated?

Answer: During the pre-employment process.

FAQ 3: How long do responsibilities continue after employment?

Answer: For a defined period, as stated in terms and conditions.

ISO 27001 Annex A 6.3 – Information Security Awareness, Education and Training

Requirements

Personnel of the organization and relevant interested parties should receive appropriate information security awareness, education and training and regular updates of the organization’s information security policy, topic-specific policies and procedures, as relevant for their job function.

Explanation

Everyone needs training on security rules to avoid mistakes. This includes regular sessions and updates so staff know how to protect data in their roles.

Example

A shop runs monthly emails and quizzes on spotting phishing, helping staff avoid scams with customer emails.

FAQ 1: How often should training take place?

Answer: Periodically, with initial training for new hires or role changes.

FAQ 2: What should awareness programmes cover?

Answer: Management commitment, compliance needs, personal accountability, basic procedures, and contacts for advice.

FAQ 3: How to assess understanding?

Answer: Test knowledge at the end of activities.

ISO 27001 Annex A 6.4 – Disciplinary Process

Requirements

A disciplinary process should be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation.

Explanation

Have a clear process for dealing with security rule breaks. It deters problems and handles them fairly, starting after confirming a violation.

Example

If an employee shares a password, the company follows steps like a warning or training, based on how serious it is.

FAQ 1: When should the disciplinary process start?

Answer: After verifying a violation has occurred.

FAQ 2: What factors influence the response?

Answer: Nature and gravity of the breach, if intentional, repeats, and training received.

FAQ 3: What is the purpose of the process?

Answer: To deter violations and deal with them appropriately.

ISO 27001 Annex A 6.5 – Responsibilities After Termination or Change of Employment

Requirements

Information security responsibilities and duties that remain valid after termination or change of employment should be defined, enforced and communicated to relevant personnel and other interested parties.

Explanation

Even after leaving or changing roles, some security duties continue, like keeping secrets. Define these in contracts to protect company info.

Example

A former manager’s contract says they can’t share client lists for a year after leaving.

FAQ 1: How to manage role changes?

Answer: Treat as termination of old role and start of new.

FAQ 2: What to do with leaving personnel’s security roles?

Answer: Identify and transfer to others.

FAQ 3: How to apply to external personnel?

Answer: Use the process when their contract or job ends or changes.

ISO 27001 Annex A 6.6 – Confidentiality or Non-Disclosure Agreements

Requirements

Confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information should be identified, documented, regularly reviewed and signed by personnel and other relevant interested parties.

Explanation

Use agreements to keep sensitive info private. Review them regularly and have everyone sign who needs access.

Example

New hires sign an NDA promising not to share company recipes.

FAQ 1: What elements to include in agreements?

Answer: Definition of protected info, duration, actions on termination, responsibilities, ownership, permitted use, audit rights, reporting process, return terms, and non-compliance actions.

FAQ 2: When to review agreements?

Answer: Periodically and when changes influence requirements.

FAQ 3: Who do agreements apply to?

Answer: Personnel and interested parties like suppliers.

ISO 27001 Annex A 6.7 – Remote Working

Requirements

Security measures should be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization’s premises.

Explanation

For home or remote work, set rules to keep data safe, like secure connections and home setup checks.

Example

A firm provides secure laptops and VPNs for staff working from home.

FAQ 1: What to consider in remote working policy?

Answer: Physical security, rules for environment, communications, virtual desktops, unauthorized access threats, network use, security measures, equipment support, insurance, backup, audit, and revocation.

FAQ 2: What equipment to provide?

Answer: Suitable devices and furniture if privately-owned not allowed.

FAQ 3: How to handle support?

Answer: Provide hardware/software support and maintenance.

ISO 27001 Annex A 6.8 – Information Security Event Reporting

Requirements

The organization should provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.

Explanation

Make it easy for staff to report security issues quickly, like strange emails, to stop problems early.

Example

Employees use a hotline to report a suspected hack.

FAQ 1: Why report events quickly?

Answer: To prevent or minimize incidents’ effects.

FAQ 2: What to include in reporting mechanisms?

Answer: Clear procedures, multiple channels, anonymous options, and awareness of what to report.

FAQ 3: How to encourage reporting?

Answer: Through training and non-punitive culture.

ISO 27001 Annex A People Control

ISO 27001 Annex People Control

Reading Time: 4 minutesISO 27001 Annex A 6.1 – Screening Requirements Background verification checks on all candidates to become personnel should be carried out prior to joining the organization and…
Read more
ISO 27001 Annex A Organizational control

ISO 27001 Annex A Organizational Control

Reading Time: 15 minutesISO 27001 Annex A 5.1 – Policies for Information Security Requirements: Information security policy and topic-specific policies should be defined, approved by management, published, communicated to and…
Read more
ISO 9001 Logo_Gabriel Consultant
Gabriel Consultant in ISO Consulting
Service with 20 years of experience.
ISO 14001 Certification logo
Ecovadis_Silver Badge_Gabriel Consultant
EcoVadis_Badges_Approved-Partner-2025
Find Us
© 2024 Gabriel Consultant. All rights reserved
Find Us
ISO 14001 Certification logo
ISO 9001 Logo_Gabriel Consultant
Ecovadis_Silver Badge_Gabriel Consultant
EcoVadis_Badges_Approved-Partner-2025
© 2024 Gabriel Consultant. All rights reserved
Standard

Office Hour: 9:00- 18:00

Tel : +852 23664622

Email : info@gabriel.hk

Free 30 Min Consultation Call

Request an economy and speedy way to get an ISO Certification