Although many organizations have some form of acceptable use policies in place, these documents often lack the comprehensive scope needed for ISO 27001 certification. In fact, studies show that inadequate information use policies contribute to approximately 60% of internal security incidents. Additionally, organizations with well-documented acceptable use policies experience 30% fewer security violations compared to those without such guidelines.
This guide examines Control 5.10 in detail, explaining its requirements and how it differs from its predecessors in the 2013 version. Furthermore, you will discover practical implementation strategies, audit preparation techniques, and common pitfalls to avoid when developing your information security policy framework. Whether you're preparing for initial certification or transitioning to the 2022 standard, this article provides the essential knowledge to ensure your acceptable use policies meet ISO requirements.
Understanding ISO 27001:2022 Control 5.10
Control 5.10 serves as a cornerstone of the ISO 27001:2022 framework, establishing essential guidelines for how organizations should manage their information assets. Understanding this control's requirements, scope, and relationship to previous standards provides a solid foundation for implementing effective information security policies.
Definition of Acceptable Use in ISO 27001
ISO 27001:2022 defines Control 5.10 as the requirement to identify, document, and implement "rules for the acceptable use and procedures for handling information and other associated assets" [1]. Essentially, this control establishes formal boundaries for how individuals within an organization can interact with sensitive data and systems.
The primary purpose of Control 5.10 is preventative—it ensures information and associated assets are appropriately protected, used, and handled [2]. Consequently, this control reduces the likelihood of data breaches, unauthorized access, and misuse of organizational resources.
An Acceptable Use Policy (AUP) under ISO 27001 is a formal document that sets rules for secure and responsible use of an organization's information and IT assets [3]. This policy must include guidance on permitted versus prohibited activities, monitoring procedures, and consequences of non-compliance. Moreover, all users must acknowledge and comply with the policy, which needs regular review and updates to address evolving risks and technologies.
Scope of Information and Associated Assets
Control 5.10 encompasses a broad range of information assets that require protection. Notably, these include:
- Hardware: Computers, mobile devices, phones, and fax machines
- Software: Operating systems, applications, utilities, firmware, and programming languages
- Data: Structured data in databases and unstructured data like documents and media files
- Networks: Wired and wireless systems, telecommunications, and VoIP services
- Services: Cloud services, email accounts, and other hosted offerings [1]
The scope extends to all members of an organization, including full-time and part-time employees, temporary personnel, consultants, contractors, and any third parties authorized to access company data or systems [4]. Accordingly, the control applies to all uses of information assets, regardless of purpose.
Mapping to ISO 27001:2013 Controls 8.1.3 and 8.2.3
Control 5.10 in the 2022 version is not entirely new but rather a strategic combination of two controls from the 2013 standard: Control 8.1.3 (Acceptable Use of Assets) and Control 8.2.3 (Handling of Assets) [5]. This consolidation aims to improve user-friendliness while maintaining the essential security principles of both original controls [6].
Despite this merger, the implementation guidelines remain largely similar to those in the 2013 version. However, Control 5.10 adds an important new requirement not previously included: approval procedures for the disposal of information assets and supported deletion methods [1]. This addition addresses growing concerns about data remnants and improper disposal of sensitive information.
Organizations transitioning from the 2013 standard should review their existing acceptable use policies to ensure they now cover both aspects—acceptable use and proper handling—under a single, cohesive framework. This integration aligns with the 2022 standard's overall approach of streamlining controls while enhancing their effectiveness in protecting organizational assets.
Purpose and Objectives of Control 5.10
The fundamental aim of Control 5.10 centers on establishing clear boundaries for information usage within organizations. This control primarily serves as a preventative measure that protects valuable information assets throughout their lifecycle, from creation to disposal.
Preventing Misuse of Information Assets
Control 5.10 establishes a framework that defines acceptable behaviors versus prohibited activities regarding organizational information. Without clear rules, employees may unintentionally expose sensitive data, allow shadow IT to develop unnoticed, or inadvertently cause legal violations [7]. Through a well-structured Acceptable Use Policy (AUP), organizations create accountability that significantly reduces the risk of insider threats and accidental breaches [7].
The control requires organizations to categorize specific activities and data usage scenarios as either permissible or prohibited. This categorization must encompass actions that could potentially expose the organization to legal, regulatory, or reputational risks [8]. Furthermore, the policy should outline what monitoring activities the organization conducts to validate compliance, including email monitoring, internet traffic tracking, and device logs [8].
Since people cannot be expected to act appropriately unless given clear expectations, this control functions as one of the first lines of information security defense [9]. By documenting expected behavior for information security alongside unacceptable actions, organizations create a safer working environment with shared understanding across all stakeholders.
Ensuring Confidentiality, Integrity, and Availability
The ISO 27001 framework builds upon three core principles known as the CIA triad—confidentiality, integrity, and availability [10]. Control 5.10 directly supports these principles by establishing rules that protect information according to these dimensions.
Confidentiality ensures that information is not made available or disclosed to unauthorized individuals, entities, or processes [10]. Through Control 5.10, organizations implement access restrictions based on classification, role-based access controls, and mechanisms that limit information disclosure to authorized parties only.
Integrity refers to maintaining the accuracy and completeness of information [10]. The acceptable use guidelines established under Control 5.10 help prevent unauthorized alterations to data, thus preserving its trustworthiness throughout its entire lifecycle.
Availability means that information remains accessible and usable upon demand by authorized entities [10]. Proper implementation of Control 5.10 ensures that access to systems and data remains unimpeded for legitimate users while establishing protocols that prevent service disruptions.
Together, these three principles form the foundation for an effective information security framework. Control 5.10 helps enforce them by establishing clear parameters for how information assets should be handled, stored, transmitted, and ultimately disposed of.
Supporting Legal and Regulatory Compliance
Beyond internal security objectives, Control 5.10 plays a crucial role in meeting external obligations. Organizations must identify and document relevant laws and regulations from all jurisdictions in which they operate—including national, regional, and local requirements [11].
An effective Acceptable Use Policy aids compliance with various frameworks such as GDPR, HIPAA, SOX, and PCI-DSS [12]. The policy should address relevant information security requirements stemming from three primary sources:
- Legislative requirements - government-imposed laws that dictate how certain types of data must be handled
- Regulatory obligations - rules from industry bodies that govern operational standards
- Contractual agreements - specific requirements from relationships with employees, suppliers, and customers [11]
These external mandates often explicitly demand protection of the confidentiality, integrity, and availability of information. For instance, GDPR specifically requires organizations to maintain the confidentiality of personal data they process to protect it from internal and external threats [10].
By implementing Control 5.10 effectively, organizations reduce their vulnerability to potential legal repercussions, including prosecutions, financial penalties, or loss of business licenses [11]. Additionally, the control helps prevent reputational damage by establishing appropriate reporting channels that enable security incidents to be addressed properly.
Developing an Acceptable Use Policy
Creating effective policies requires a structured approach that addresses both organizational needs and ISO 27001 requirements. A well-crafted Acceptable Use Policy (AUP) serves as the cornerstone document that guides how information assets are utilized throughout your organization.
Key Elements: Permitted vs Prohibited Use
The heart of any AUP lies in clearly defining boundaries for information usage. Effective policies must explicitly outline both permitted and prohibited activities rather than relying on generalized statements [13]. These specifications should address:
- Acceptable Activities: Legitimate work-related usage, permissible personal use limitations, and proper data handling procedures
- Prohibited Behaviors: Unauthorized access, bypassing security controls, downloading unapproved software, and inappropriate internet usage [14]
To maintain effectiveness, your AUP should encompass key components including user responsibilities, monitoring procedures, consequences for violations, and policy review processes [15]. Primarily, the policy must clarify that all employees must comply with organizational directives, detailing that no employee may undertake activities contrary to the company's interests [16].
Policy Communication and Acknowledgement
Even the most comprehensive policy fails without proper communication. Initially, all personnel who work with information assets must receive formal notification of acceptable usage guidelines [16]. Organizations typically implement several acknowledgment methods:
Digital acknowledgments track who signed off on each policy version, recording exactly when acceptance occurred [17]. Furthermore, this documentation serves as critical evidence during ISO 27001 audits, demonstrating that personnel understand their security responsibilities [2].
During onboarding, new employees should review and formally acknowledge the AUP before receiving system access [18]. Subsequently, annual refresher training reinforces policy importance while ensuring awareness of any updates [15].
Covering the Full Information Lifecycle
An effective AUP extends protection across the complete information lifecycle based on classification and identified risks [9]. The policy must address:
Access restrictions supporting each security classification level [19] Maintenance of authorized user registries for information assets [16] Protection standards for temporary and permanent copies consistent with original information [19] Secure storage requirements following manufacturer specifications [16] Clear marking procedures for electronic and physical media [19] Authorized disposal methods and deletion procedures [17]
Throughout policy development, consider collaborating with multiple stakeholders—including HR, Legal/Compliance, and IT personnel—to ensure comprehensive coverage of technical, behavioral, and security concerns [14]. Certainly, this collaborative approach ensures the policy remains both technically sound and organizationally aligned.
Implementing Control 5.10 in Practice
Practical implementation of Control 5.10 requires systematic processes that transform policy into action. Organizations must move beyond documentation to establish effective mechanisms that enforce acceptable use guidelines throughout their information ecosystem.
Access Restrictions Based on Classification
Effective implementation starts with aligning access controls to information classification levels. Organizations should apply the principle of least privilege, granting users only the minimum access needed to perform their roles. Therefore, information classified as confidential typically requires stricter access limitations than public data [20].
Technical controls must support classification-based restrictions through:
- Authentication technologies, credentials, or certificates for information access
- Time-based restrictions allowing access only during specific periods
- Encryption protecting information at both device and content levels [21]
Role-based access control (RBAC) proves particularly effective for implementing these restrictions, as it allows organizations to assign permissions based on job functions rather than individual identities [6].
Maintaining a Register of Authorized Users
A formal user registration and deregistration process forms the backbone of access management. This process must link individual IDs to real people while limiting shared access accounts [6].
Organizations should maintain comprehensive documentation of:
- Who is authorized to access specific information assets
- When access was granted and by whom
- Regular reviews confirming continued business need
Periodic audits should identify and suspend redundant user accounts, with suspended IDs deleted after confirming they're no longer needed [22]. Additionally, user IDs should never be reassigned to other individuals, as this creates security and traceability issues.
Secure Storage and Disposal Procedures
Secure disposal represents a critical phase of the information lifecycle. Organizations must verify that equipment containing storage media has had sensitive data removed before disposal or reuse [23]. This process should be proportional to information classification—higher classification levels require more thorough sanitization methods [24].
Disposal options include:
- Physical destruction (shredding, degaussing, incineration) for highly sensitive data
- Secure data overwriting using standards like DoD 5220.22-M or NIST 800-88
- Cryptographic erasure by destroying encryption keys [25]
All disposal activities should be documented in logs that record who performed the procedure, when, and which method was used [24].
Handling Cloud-Based and Third-Party Assets
Cloud services introduce unique implementation challenges due to the shared responsibility model [26]. Organizations must clearly define security responsibilities between themselves and cloud providers, addressing:
- Data confidentiality, integrity, and availability requirements
- Service level objectives and performance metrics
- Backup, recovery, and secure storage procedures
- Incident management protocols
- Secure exit strategies [26]
For third-party relationships, implement structured processes to identify, assess and manage security risks in supplier relationships [27]. Furthermore, agreements should explicitly define required security controls covering data encryption, access management, incident response, and compliance with relevant standards [27].
Audit Readiness and Common Pitfalls
Preparing for an ISO 27001 audit requires meticulous attention to documentation and evidence collection. Successful certification depends not only on implementing Control 5.10 correctly but likewise on demonstrating compliance effectively to auditors.
Evidence Required During ISO 27001 Audits
Auditors typically seek concrete proof that rules for proper use of information assets are defined, documented, and implemented [2]. Key evidence includes:
- A formally approved and signed-off Acceptable Use Policy
- Documentation showing policy communication to all staff
- Records of employee acknowledgment and acceptance
- Proof that the policy covers the entire information lifecycle [9]
First, ensure all documents have appropriate markups including version control numbers, document owners, and security classifications [28]. Second, maintain easily accessible records of policy reviews and approvals to demonstrate ongoing governance [29].
Top 3 Mistakes in Acceptable Use Implementation
Organizations often struggle with these common implementation pitfalls:
- Neglecting User Acceptance - Many organizations create policies but fail to obtain and document user acknowledgment, which auditors specifically look for [9]
- Incomplete Lifecycle Coverage - Overlooking non-obvious aspects such as remote work policies, third-party data sharing, and social media usage [30]
- Poor Document Management - Failing to maintain proper version control, allowing outdated document markups, or neglecting regular policy reviews [9]
Version Control and Policy Review Best Practices
Effective document control serves as the foundation of audit readiness. Ensure documentation includes:
- Clear version numbering consistent across all references
- Evidence of review within the last 12 months
- Clean documents without comments or markup artifacts
- Appropriate approvals from senior management [31]
Eventually, prepare by double-checking that old employees no longer have access to sensitive documents, as inappropriate access control remains among the top five audit findings [31].
Conclusion
Establishing robust information security policies under Control 5.10 stands as a critical component of ISO 27001:2022 certification. Throughout this guide, we examined how this consolidated control requires organizations to implement comprehensive rules governing the acceptable use of information assets.
Organizations must therefore create policies that clearly distinguish between permitted and prohibited activities while addressing the entire information lifecycle. These policies essentially serve as the first line of defense against both internal misuse and external threats. Additionally, well-crafted acceptable use guidelines directly support the CIA triad—confidentiality, integrity, and availability—that forms the foundation of effective information security.
Practical implementation requires several key elements working together. First, access restrictions must align with classification levels, applying the principle of least privilege. Second, maintaining an accurate register of authorized users ensures appropriate accountability. Third, secure storage and disposal procedures protect information assets throughout their lifecycle, including the newly emphasized disposal requirements unique to the 2022 standard.
Audit readiness demands meticulous documentation, proper version control, and evidence of user acknowledgment. Organizations frequently stumble by neglecting user acceptance, providing incomplete lifecycle coverage, or maintaining poor document management practices.
Ultimately, Control 5.10 represents more than a compliance checkbox—it establishes the foundation for a security-conscious organizational culture. As threats evolve and regulatory requirements intensify, comprehensive acceptable use policies will undoubtedly remain essential for protecting valuable information assets. Organizations that thoughtfully implement this control position themselves not only for successful certification but also for genuinely effective information security management.


