Review compliance with information security policies
Regularly check if your organisation's security policies and rules are being followed.
Plain language
This control is about checking regularly to make sure your organisation is following its own information security rules and standards. If this isn't done, there might be security weaknesses that could lead to data breaches or compliance issues with laws like the Privacy Act 1988.
Framework
ISO/IEC 27001:2022
Control effect
Preventative
ISO 27001 domain
Organisational controls
Classifications
N/A
Official last update
24 Oct 2022
Control Stack last updated
19 Mar 2026
Maturity levels
N/A
Official control statement
Compliance with the organization’s information security policy, topic-specific policies, rules and standards shall be regularly reviewed.
Why it matters
Without regular compliance reviews, staff may not follow the organisation’s security policies and standards, increasing audit nonconformities and security incidents.
Operational notes
Schedule quarterly compliance reviews against the organisation’s information security and topic-specific policies; sample evidence (logs, approvals, training) and track corrective actions to closure.
Implementation tips
- The IT manager should organise regular reviews to ensure compliance with the organisation's security policies. They can do this by scheduling monthly checks where they compare current practices with the standards set in the policy documents. This can involve using software tools that automatically report on security compliance.
- Department heads should ensure that their teams understand and follow the organisation’s information security policies. This can be done by conducting training sessions and quizzes to reinforce the rules and standards applicable to their roles, referencing the Privacy Act 1988 to emphasise compliance requirements.
- The HR department should maintain up-to-date records of all compliance training completed by employees. This involves tracking employee participation in security awareness programs and making sure everyone attends refresher courses at least annually.
- The compliance officer should work to identify causes of any non-compliance and implement corrective actions as soon as they are found. This can be done by investigating reported discrepancies, understanding their root causes, and collaborating with relevant managers to fix these issues.
- The board should ensure that there is an independent review process in place, as recommended by ISO 27002:2022, to oversee the effectiveness of the compliance checks. This involves appointing an external party to periodically audit the organisation’s adherence to its own policies.
Audit / evidence tips
-
AskRequest the most recent compliance review report.
GoodThe report should show clear methods of review and documented corrective actions with timelines and responsibilities.
-
AskAsk for the schedule of compliance reviews.
GoodThe schedule should indicate regular review intervals, such as monthly or quarterly, with records showing these reviews were completed on time.
-
AskRequest records of training and awareness sessions.
GoodThere should be a full attendance record for all staff, showing repeated training could indicate effectiveness.
-
AskInquire about the process for dealing with non-compliance.
GoodA detailed log with timely follow-up and satisfactory resolution for each issue indicates effective compliance management.
-
AskRequest a report from an independent review, if one has been conducted recently.
GoodThe independent review should confirm adherence to policies and suggest areas of improvement, showing external objectivity.
Cross-framework mappings
How Annex A 5.36 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ASD ISM
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (2) expand_less | ||
| ISM-1037 | ISM-1037 requires gateways to be tested after changes and at least every six months to validate conformance to expected security configur... | |
| ISM-1523 | ISM-1523 requires a three‑monthly review of a sample of CDS security-relevant events against data transfer security policies to identify ... | |
| sync_alt Partially overlaps (5) expand_less | ||
| ISM-0072 | Annex A 5.36 requires organisations to regularly review compliance with information security policies, rules and standards | |
| ISM-0718 | ISM-0718 mandates regular cyber security reporting by the CISO to the board | |
| ISM-1478 | Annex A 5.36 requires organisations to regularly review compliance with information security policies, rules and standards | |
| ISM-1738 | Annex A 5.36 requires organisations to regularly review compliance with information security policies, rules and standards | |
| ISM-1971 | ISM-1971 mandates periodic ASD security assessments for TOP SECRET managed services, providing formal assurance against the ISM baseline | |
| handshake Supports (17) expand_less | ||
| ISM-0039 | ISM-0039 requires the organisation to maintain an effective cyber security strategy over time | |
| ISM-0041 | Annex A 5.36 requires regularly reviewing compliance with information security policies, rules and standards | |
| ISM-0264 | ISM-0264 requires an organisation to maintain an email usage policy, implying it should remain effective and relevant over time | |
| ISM-0588 | ISM-0588 requires an MFD usage policy to be developed, implemented and maintained to govern how MFDs are used | |
| ISM-0724 | ISM-0724 requires the CISO to implement metrics and KPIs to measure and track cyber security performance in the organisation | |
| ISM-1359 | ISM-1359 requires an organisation to develop, implement and maintain a removable media usage policy to manage removable media risks | |
| ISM-1533 | ISM-1533 requires the organisation to develop, implement and maintain an MDM policy | |
| ISM-1549 | ISM-1549 requires an organisation to develop, implement, and maintain a media management policy | |
| ISM-1551 | ISM-1551 requires the organisation to implement and maintain an IT equipment management policy | |
| ISM-1617 | ISM-1617 requires the CISO to regularly review and update the cyber security program for alignment with evolving threats and opportunities | |
| ISM-1755 | ISM-1755 requires a vulnerability disclosure policy to be developed, implemented and maintained over time | |
| ISM-1763 | ISM-1763 requires organisations to standardise ECDSA signature configurations to approved NIST curves, preferably P-384 | |
| ISM-1864 | ISM-1864 requires a system usage policy to be developed, implemented, and maintained | |
| ISM-1884 | ISM-1884 requires compliance with ASD EMSEC doctrine, including verifying that required emanation controls are actually followed in relev... | |
| ISM-1956 | ISM-1956 requires organisations to maintain a recurring AD FS certificate change practice (at least annually) and an accelerated double-r... | |
| ISM-1997 | Annex A 5.36 requires regular reviews to confirm compliance with the organisation’s information security policies, rules and standards | |
| ISM-1998 | ISM-1998 requires executive leadership to integrate cyber security across all business functions, which implies ongoing oversight of how ... | |
| extension Depends on (2) expand_less | ||
| ISM-1078 | Annex A 5.36 requires regular review of compliance with the organisation’s information security policies, topic-specific policies, rules ... | |
| ISM-2074 | ISM-2074 requires an organisation to develop, implement and maintain a general-purpose AI usage policy | |
| link Related (1) expand_less | ||
| ISM-0499 | Annex A 5.36 requires organisations to regularly review whether information security policies and standards are being complied with | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.