Most organisations have too many policies that nobody reads. This guide covers which policies actually matter, how to structure them, and how to keep them alive.
Most organisations have one of two problems: either they have no policies at all, or they have dozens of policies that nobody reads, nobody follows, and nobody updates.
Neither is compliant. Neither is useful.
Good security policies are short, clear, and connected to real controls. They tell people what is expected of them — and the organisation has mechanisms to verify compliance.
For ISO 27001 or SOC 2, you don’t need a 200-page policy library. You need a coherent set of documents that covers your risk landscape. For most organisations, that’s around 15–20 policies:
Core / Always Required:
Commonly Required:
Situational:
Every policy should answer the same questions in the same order:
Purpose — Why does this policy exist? What risk does it address?
Scope — Who does it apply to? (All staff? IT only? Contractors?)
Policy Statements — The actual requirements. Clear, specific, measurable where possible. Avoid vague language like “appropriate” or “reasonable” without defining what that means.
Roles and Responsibilities — Who owns compliance? Who enforces it?
Exceptions — How do people request an exception, and who approves it?
Review — When was it last reviewed? When is it next due?
Aim for 1–3 pages per policy. If it’s longer, it probably covers too much.
A policy nobody reads is a liability, not a protection. Policies need to be:
Communicated — Staff need to be aware of policies relevant to their role. This means more than emailing a PDF once a year.
Acknowledged — Collect signed acknowledgements. This is an audit requirement and creates accountability.
Trained — For complex policies (incident response, data handling), training is more effective than documents alone.
Enforced — There need to be consequences for violations, proportionate to severity. A policy with no enforcement mechanism is a suggestion.
Reviewed — At minimum annually, and whenever there’s a significant change to the organisation, technology, or threat landscape.
Too long — Policies that try to cover every edge case become unreadable. Keep them high-level; use procedures for the detail.
Aspirational not actual — Policies should describe what you actually do, not what you wish you did. An auditor will test controls against your policy statements.
Set and forget — Policies that haven’t been reviewed in three years and still reference “the IT Manager” who left in 2021 will raise flags immediately.
No ownership — Every policy needs a named owner who is responsible for keeping it current and relevant.