August 7, 2024

ISO 27001:2022 Annex A Control 5.36: Compliance With Policies, Rules and Standards for Information Security

Annex A control 5.36 of the 2022 version of the ISO 27001 standard can be mapped to ISO 27001:2013 Annex A 18.2.2 and ISO 27001:2013 Annex A 18.2.3

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

One of the most integral aspects of running an organisation with a robust set of information security practices is maintaining compliance with published procedures, rules and policies, and Information security is best tackled with a top-down approach, according to control 5.36 of ISO 27001:2022 Annex A.

The control calls for organisations to engage in a top-down perspective when it comes to policies, rules, and standards.

As a preventative and corrective control, 5.36 aims to reduce risk by promoting adherence to pre-existing procedures and policies under the umbrella of information security.

Understanding control 5.36

Information owners and managers, including service and product owners, should have access to an organisation’s information security policies, rules, and standards, in order to act within the status quo. Implementing business-specific reporting methods for information security compliance is a key role of managers.

It’s also important that periodic reviews are conducted to highlight any areas for improvement. These reviews should be documented, stored, and reported. If issues or instances of non-compliance are discovered, managers should take decisive action. Steps include:

  • Outlining the underlying causes of non-compliance
  • Determining how necessary it is to take decisive action
  • Implementing corrective action if necessary to ensure compliance
  • Assessing said actions for their effectiveness, noting any areas that still require attention

Corrective action to non-compliance must be taken in a timely manner, especially by the net review. Reviewers should be able to see that progress is being made to deal with any potential issues of non-compliance.

What’s changed since 2013?

There are two controls in ISO 27001:2013 that cover the same materials as 2022’s control 5.36. These are 18.2.2 and 18.2.3. The more recent version condenses the complex technical guidance of these earlier versions into a single control, making it more accessible and therefore easier for action to be taken.

2022’s control 5.36 contains the same guidance points as 2013’s 18.2.2 regarding what actions should be taken in the event of non-compliance being discovered during a review.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Staying Compliant
Computer Software
IT and Services
Growth