ISO 27001 Information Security Policy: Essential Guide to Control 5.10

Information security policies serve as the foundation of any robust cybersecurity program. Without clearly defined rules for acceptable use of information assets, organizations face increased vulnerability to data breaches, compliance violations, and operational disruptions. Control 5.10 of ISO 27001:2022 specifically addresses this critical aspect of information security management, requiring organizations to establish formal guidelines for how information and associated assets should be handled.

Although many organizations have some form of acceptable use policies in place, these documents often lack the comprehensive scope needed for ISO 27001 certification. In fact, studies show that inadequate information use policies contribute to approximately 60% of internal security incidents. Additionally, organizations with well-documented acceptable use policies experience 30% fewer security violations compared to those without such guidelines.

This guide examines Control 5.10 in detail, explaining its requirements and how it differs from its predecessors in the 2013 version. Furthermore, you will discover practical implementation strategies, audit preparation techniques, and common pitfalls to avoid when developing your information security policy framework. Whether you're preparing for initial certification or transitioning to the 2022 standard, this article provides the essential knowledge to ensure your acceptable use policies meet ISO requirements.

Understanding ISO 27001:2022 Control 5.10

Control 5.10 serves as a cornerstone of the ISO 27001:2022 framework, establishing essential guidelines for how organizations should manage their information assets. Understanding this control's requirements, scope, and relationship to previous standards provides a solid foundation for implementing effective information security policies.

Definition of Acceptable Use in ISO 27001

ISO 27001:2022 defines Control 5.10 as the requirement to identify, document, and implement "rules for the acceptable use and procedures for handling information and other associated assets" [1]. Essentially, this control establishes formal boundaries for how individuals within an organization can interact with sensitive data and systems.

The primary purpose of Control 5.10 is preventative—it ensures information and associated assets are appropriately protected, used, and handled [2]. Consequently, this control reduces the likelihood of data breaches, unauthorized access, and misuse of organizational resources.

An Acceptable Use Policy (AUP) under ISO 27001 is a formal document that sets rules for secure and responsible use of an organization's information and IT assets [3]. This policy must include guidance on permitted versus prohibited activities, monitoring procedures, and consequences of non-compliance. Moreover, all users must acknowledge and comply with the policy, which needs regular review and updates to address evolving risks and technologies.

Scope of Information and Associated Assets

Control 5.10 encompasses a broad range of information assets that require protection. Notably, these include:

  • Hardware: Computers, mobile devices, phones, and fax machines
  • Software: Operating systems, applications, utilities, firmware, and programming languages
  • Data: Structured data in databases and unstructured data like documents and media files
  • Networks: Wired and wireless systems, telecommunications, and VoIP services
  • Services: Cloud services, email accounts, and other hosted offerings [1]

The scope extends to all members of an organization, including full-time and part-time employees, temporary personnel, consultants, contractors, and any third parties authorized to access company data or systems [4]. Accordingly, the control applies to all uses of information assets, regardless of purpose.

Mapping to ISO 27001:2013 Controls 8.1.3 and 8.2.3

Control 5.10 in the 2022 version is not entirely new but rather a strategic combination of two controls from the 2013 standard: Control 8.1.3 (Acceptable Use of Assets) and Control 8.2.3 (Handling of Assets) [5]. This consolidation aims to improve user-friendliness while maintaining the essential security principles of both original controls [6].

Despite this merger, the implementation guidelines remain largely similar to those in the 2013 version. However, Control 5.10 adds an important new requirement not previously included: approval procedures for the disposal of information assets and supported deletion methods [1]. This addition addresses growing concerns about data remnants and improper disposal of sensitive information.

Organizations transitioning from the 2013 standard should review their existing acceptable use policies to ensure they now cover both aspects—acceptable use and proper handling—under a single, cohesive framework. This integration aligns with the 2022 standard's overall approach of streamlining controls while enhancing their effectiveness in protecting organizational assets.

Purpose and Objectives of Control 5.10

The fundamental aim of Control 5.10 centers on establishing clear boundaries for information usage within organizations. This control primarily serves as a preventative measure that protects valuable information assets throughout their lifecycle, from creation to disposal.

Preventing Misuse of Information Assets

Control 5.10 establishes a framework that defines acceptable behaviors versus prohibited activities regarding organizational information. Without clear rules, employees may unintentionally expose sensitive data, allow shadow IT to develop unnoticed, or inadvertently cause legal violations [7]. Through a well-structured Acceptable Use Policy (AUP), organizations create accountability that significantly reduces the risk of insider threats and accidental breaches [7].

The control requires organizations to categorize specific activities and data usage scenarios as either permissible or prohibited. This categorization must encompass actions that could potentially expose the organization to legal, regulatory, or reputational risks [8]. Furthermore, the policy should outline what monitoring activities the organization conducts to validate compliance, including email monitoring, internet traffic tracking, and device logs [8].

Since people cannot be expected to act appropriately unless given clear expectations, this control functions as one of the first lines of information security defense [9]. By documenting expected behavior for information security alongside unacceptable actions, organizations create a safer working environment with shared understanding across all stakeholders.

Ensuring Confidentiality, Integrity, and Availability

The ISO 27001 framework builds upon three core principles known as the CIA triad—confidentiality, integrity, and availability [10]. Control 5.10 directly supports these principles by establishing rules that protect information according to these dimensions.

Confidentiality ensures that information is not made available or disclosed to unauthorized individuals, entities, or processes [10]. Through Control 5.10, organizations implement access restrictions based on classification, role-based access controls, and mechanisms that limit information disclosure to authorized parties only.

Integrity refers to maintaining the accuracy and completeness of information [10]. The acceptable use guidelines established under Control 5.10 help prevent unauthorized alterations to data, thus preserving its trustworthiness throughout its entire lifecycle.

Availability means that information remains accessible and usable upon demand by authorized entities [10]. Proper implementation of Control 5.10 ensures that access to systems and data remains unimpeded for legitimate users while establishing protocols that prevent service disruptions.

Together, these three principles form the foundation for an effective information security framework. Control 5.10 helps enforce them by establishing clear parameters for how information assets should be handled, stored, transmitted, and ultimately disposed of.

Supporting Legal and Regulatory Compliance

Beyond internal security objectives, Control 5.10 plays a crucial role in meeting external obligations. Organizations must identify and document relevant laws and regulations from all jurisdictions in which they operate—including national, regional, and local requirements [11].

An effective Acceptable Use Policy aids compliance with various frameworks such as GDPR, HIPAA, SOX, and PCI-DSS [12]. The policy should address relevant information security requirements stemming from three primary sources:

  1. Legislative requirements - government-imposed laws that dictate how certain types of data must be handled
  2. Regulatory obligations - rules from industry bodies that govern operational standards
  3. Contractual agreements - specific requirements from relationships with employees, suppliers, and customers [11]

These external mandates often explicitly demand protection of the confidentiality, integrity, and availability of information. For instance, GDPR specifically requires organizations to maintain the confidentiality of personal data they process to protect it from internal and external threats [10].

By implementing Control 5.10 effectively, organizations reduce their vulnerability to potential legal repercussions, including prosecutions, financial penalties, or loss of business licenses [11]. Additionally, the control helps prevent reputational damage by establishing appropriate reporting channels that enable security incidents to be addressed properly.

Developing an Acceptable Use Policy

Creating effective policies requires a structured approach that addresses both organizational needs and ISO 27001 requirements. A well-crafted Acceptable Use Policy (AUP) serves as the cornerstone document that guides how information assets are utilized throughout your organization.

Key Elements: Permitted vs Prohibited Use

The heart of any AUP lies in clearly defining boundaries for information usage. Effective policies must explicitly outline both permitted and prohibited activities rather than relying on generalized statements [13]. These specifications should address:

  • Acceptable Activities: Legitimate work-related usage, permissible personal use limitations, and proper data handling procedures
  • Prohibited Behaviors: Unauthorized access, bypassing security controls, downloading unapproved software, and inappropriate internet usage [14]

To maintain effectiveness, your AUP should encompass key components including user responsibilities, monitoring procedures, consequences for violations, and policy review processes [15]. Primarily, the policy must clarify that all employees must comply with organizational directives, detailing that no employee may undertake activities contrary to the company's interests [16].

Policy Communication and Acknowledgement

Even the most comprehensive policy fails without proper communication. Initially, all personnel who work with information assets must receive formal notification of acceptable usage guidelines [16]. Organizations typically implement several acknowledgment methods:

Digital acknowledgments track who signed off on each policy version, recording exactly when acceptance occurred [17]. Furthermore, this documentation serves as critical evidence during ISO 27001 audits, demonstrating that personnel understand their security responsibilities [2].

During onboarding, new employees should review and formally acknowledge the AUP before receiving system access [18]. Subsequently, annual refresher training reinforces policy importance while ensuring awareness of any updates [15].

Covering the Full Information Lifecycle

An effective AUP extends protection across the complete information lifecycle based on classification and identified risks [9]. The policy must address:

Access restrictions supporting each security classification level [19] Maintenance of authorized user registries for information assets [16] Protection standards for temporary and permanent copies consistent with original information [19] Secure storage requirements following manufacturer specifications [16] Clear marking procedures for electronic and physical media [19] Authorized disposal methods and deletion procedures [17]

Throughout policy development, consider collaborating with multiple stakeholders—including HR, Legal/Compliance, and IT personnel—to ensure comprehensive coverage of technical, behavioral, and security concerns [14]. Certainly, this collaborative approach ensures the policy remains both technically sound and organizationally aligned.

Implementing Control 5.10 in Practice

Practical implementation of Control 5.10 requires systematic processes that transform policy into action. Organizations must move beyond documentation to establish effective mechanisms that enforce acceptable use guidelines throughout their information ecosystem.

Access Restrictions Based on Classification

Effective implementation starts with aligning access controls to information classification levels. Organizations should apply the principle of least privilege, granting users only the minimum access needed to perform their roles. Therefore, information classified as confidential typically requires stricter access limitations than public data [20].

Technical controls must support classification-based restrictions through:

  • Authentication technologies, credentials, or certificates for information access
  • Time-based restrictions allowing access only during specific periods
  • Encryption protecting information at both device and content levels [21]

Role-based access control (RBAC) proves particularly effective for implementing these restrictions, as it allows organizations to assign permissions based on job functions rather than individual identities [6].

Maintaining a Register of Authorized Users

A formal user registration and deregistration process forms the backbone of access management. This process must link individual IDs to real people while limiting shared access accounts [6].

Organizations should maintain comprehensive documentation of:

  • Who is authorized to access specific information assets
  • When access was granted and by whom
  • Regular reviews confirming continued business need

Periodic audits should identify and suspend redundant user accounts, with suspended IDs deleted after confirming they're no longer needed [22]. Additionally, user IDs should never be reassigned to other individuals, as this creates security and traceability issues.

Secure Storage and Disposal Procedures

Secure disposal represents a critical phase of the information lifecycle. Organizations must verify that equipment containing storage media has had sensitive data removed before disposal or reuse [23]. This process should be proportional to information classification—higher classification levels require more thorough sanitization methods [24].

Disposal options include:

  • Physical destruction (shredding, degaussing, incineration) for highly sensitive data
  • Secure data overwriting using standards like DoD 5220.22-M or NIST 800-88
  • Cryptographic erasure by destroying encryption keys [25]

All disposal activities should be documented in logs that record who performed the procedure, when, and which method was used [24].

Handling Cloud-Based and Third-Party Assets

Cloud services introduce unique implementation challenges due to the shared responsibility model [26]. Organizations must clearly define security responsibilities between themselves and cloud providers, addressing:

  • Data confidentiality, integrity, and availability requirements
  • Service level objectives and performance metrics
  • Backup, recovery, and secure storage procedures
  • Incident management protocols
  • Secure exit strategies [26]

For third-party relationships, implement structured processes to identify, assess and manage security risks in supplier relationships [27]. Furthermore, agreements should explicitly define required security controls covering data encryption, access management, incident response, and compliance with relevant standards [27].

Audit Readiness and Common Pitfalls

Preparing for an ISO 27001 audit requires meticulous attention to documentation and evidence collection. Successful certification depends not only on implementing Control 5.10 correctly but likewise on demonstrating compliance effectively to auditors.

Evidence Required During ISO 27001 Audits

Auditors typically seek concrete proof that rules for proper use of information assets are defined, documented, and implemented [2]. Key evidence includes:

  • A formally approved and signed-off Acceptable Use Policy
  • Documentation showing policy communication to all staff
  • Records of employee acknowledgment and acceptance
  • Proof that the policy covers the entire information lifecycle [9]

First, ensure all documents have appropriate markups including version control numbers, document owners, and security classifications [28]. Second, maintain easily accessible records of policy reviews and approvals to demonstrate ongoing governance [29].

Top 3 Mistakes in Acceptable Use Implementation

Organizations often struggle with these common implementation pitfalls:

  1. Neglecting User Acceptance - Many organizations create policies but fail to obtain and document user acknowledgment, which auditors specifically look for [9]
  2. Incomplete Lifecycle Coverage - Overlooking non-obvious aspects such as remote work policies, third-party data sharing, and social media usage [30]
  3. Poor Document Management - Failing to maintain proper version control, allowing outdated document markups, or neglecting regular policy reviews [9]

Version Control and Policy Review Best Practices

Effective document control serves as the foundation of audit readiness. Ensure documentation includes:

  • Clear version numbering consistent across all references
  • Evidence of review within the last 12 months
  • Clean documents without comments or markup artifacts
  • Appropriate approvals from senior management [31]

Eventually, prepare by double-checking that old employees no longer have access to sensitive documents, as inappropriate access control remains among the top five audit findings [31].

Conclusion

Establishing robust information security policies under Control 5.10 stands as a critical component of ISO 27001:2022 certification. Throughout this guide, we examined how this consolidated control requires organizations to implement comprehensive rules governing the acceptable use of information assets.

Organizations must therefore create policies that clearly distinguish between permitted and prohibited activities while addressing the entire information lifecycle. These policies essentially serve as the first line of defense against both internal misuse and external threats. Additionally, well-crafted acceptable use guidelines directly support the CIA triad—confidentiality, integrity, and availability—that forms the foundation of effective information security.

Practical implementation requires several key elements working together. First, access restrictions must align with classification levels, applying the principle of least privilege. Second, maintaining an accurate register of authorized users ensures appropriate accountability. Third, secure storage and disposal procedures protect information assets throughout their lifecycle, including the newly emphasized disposal requirements unique to the 2022 standard.

Audit readiness demands meticulous documentation, proper version control, and evidence of user acknowledgment. Organizations frequently stumble by neglecting user acceptance, providing incomplete lifecycle coverage, or maintaining poor document management practices.

Ultimately, Control 5.10 represents more than a compliance checkbox—it establishes the foundation for a security-conscious organizational culture. As threats evolve and regulatory requirements intensify, comprehensive acceptable use policies will undoubtedly remain essential for protecting valuable information assets. Organizations that thoughtfully implement this control position themselves not only for successful certification but also for genuinely effective information security management.

Ready to Take Control of Your Privacy Compliance?

Hicomply’s platform provides an all-in-one solution to streamline, automate, and centralise your compliance activities, ensuring complete control and efficiency.

Book a demo
Last updated
December 14, 2025
Category
Annex A Controls — Organizational
Topics
No items found.
Lucy Murphy
Head of Customer Success

Lucy works closely with customers to help them get the most out of the Hicomply platform, from onboarding to audit success. She brings a user-focused mindset to everything she does, making her well-placed to write about day-to-day challenges, shortcuts, and success strategies. Her content is grounded in what real InfoSec and compliance teams need to know — and how to get there faster.Expect helpful walkthroughs, product tips, and practical insights.

Popular Acceptable Use Of Assets | Annex A 5.10 queries, answered!

What is ISO 27001:2022 Annex A 5.10?

ISO 27001:2022 Annex A 5.10 requires organisations to define, document, and enforce rules for the acceptable use of information and associated assets. It ensures users understand what is permitted, prohibited, and expected when using company data, systems, devices, and services.

What does “acceptable use of information and other associated assets” mean?

It refers to clearly defined rules that govern how employees, contractors, and third parties may use information, IT systems, devices, software, networks, and cloud services to protect confidentiality, integrity, and availability.

Is an Acceptable Use Policy mandatory for ISO 27001 Annex A 5.10?

Yes. While ISO 27001 does not prescribe a specific format, Annex A 5.10 effectively requires a documented Acceptable Use Policy that is communicated to users, acknowledged by them, and enforced through organisational and technical controls.

Who must follow the Annex A 5.10 acceptable use rules?

Annex A 5.10 applies to all users with access to organisational information or assets, including employees, contractors, temporary staff, and third parties. It also covers personal devices used for work under BYOD arrangements.

How do organisations demonstrate compliance with Annex A 5.10 during an audit?

Compliance is demonstrated through documented acceptable use policies, evidence of user acknowledgement, awareness activities, technical enforcement measures, monitoring records, and defined disciplinary or exception-handling processes.

Unlock Your Path to ISO 27001 Success

Download our Ultimate ISO 27001 Compliance Checklist for clear, step-by-step guidance to fast-track your certification.

End to end ISO 27001 compliance documentation

Your hub for the fundamentals of ISO 27001 compliance, curated best practices, and resources for GRC professionals.

ISO 27001 Overview

Achieve ISO 27001 Certification

ISO 27001 is the globally recognised standard for building a structured Information Security Management System (ISMS) that protects the confidentiality, integrity and availability of information. This article explains what ISO 27001 is, how it works, the core principles behind it, and what organisations must do to achieve certification. You’ll learn the standard’s structure, its key requirements, how the certification process unfolds, and the practical steps needed to implement an ISMS that is both compliant and effective.

Learn more about Achieve ISO 27001 Certification

Benefits Of ISO 27001 For Businesses

ISO 27001 certification is one of the most credible ways for businesses to prove they protect sensitive information with structure, consistency, and internationally recognised best practice. This guide explains what ISO 27001 certification is, why companies pursue it, the core business benefits, the costs involved, and how organisations of any size can achieve and maintain certification. Whether you're preparing for your first audit or strengthening your security posture, this article gives you the clarity, detail, and practical steps to move forward with confidence.

Learn more about Benefits Of ISO 27001 For Businesses

History And Evolution Of ISO 27001

ISO 27001 is now recognised as the world’s leading standard for managing information security, but its journey spans decades of technological change, emerging cyber threats, and global collaboration. This article traces the origins of ISO 27001, from its earliest foundations to the modern 2022 revision. You’ll learn how the framework developed, why it became globally adopted, how ISO 27002 fits into the picture, and how ISO standards evolved more broadly over time.

Learn more about History And Evolution Of ISO 27001
ISO 27001:2022 Requirements

Actions To Address Risks And Opportunities | Clause 6.1

Clause 6.1 of ISO 27001 defines how organisations must identify, assess, and treat information security risks — and how they must uncover opportunities to strengthen their Information Security Management System (ISMS). This clause acts as the engine of the ISO framework: it drives risk-based thinking, aligns controls to real-world threats, and ensures continual improvement. In this guide, we break down Clause 6.1 line by line, explain its relationship with Annex A, show you what documentation is required, and provide examples and best practices to help you implement it correctly and confidently.

Learn more about Actions To Address Risks And Opportunities | Clause 6.1

ISO27001 Awareness | Clause 7.3

In this article, we explore everything you need to know about ISO 27001 Clause 7.3—its purpose, what the standard requires, how awareness strengthens your ISMS, and how to build a practical, auditor-ready awareness program that supports continuous security improvement.

Learn more about ISO27001 Awareness | Clause 7.3

ISO 27001 Communication | Clause 7.4

In this guide, we break down exactly what ISO 27001 Clause 7.4 requires, why structured communication is essential to an effective ISMS, and how organisations can build a clear, compliant communication process supported by practical, real-world examples.

Learn more about ISO 27001 Communication | Clause 7.4
Information Security Management System (ISMS)

ISO 27001 ISMS Audit And Review Process

The audit and review process is one of the most important pillars of ISO 27001. It ensures your Information Security Management System (ISMS) is working as intended, risks are managed effectively, controls are operating correctly, and continual improvement is actively taking place. This guide explains every component of the ISO 27001 audit lifecycle — internal audits, external audits, certification audits, surveillance audits, and management reviews — and shows you how to prepare, what evidence auditors expect, and how to maintain long-term compliance.

Learn more about ISO 27001 ISMS Audit And Review Process

ISO 27001 ISMS Continuous Improvement Cycle

In this end-to-end guide, you’ll learn how continual improvement works in ISO 27001, why it’s essential for long-term security maturity, how the PDCA cycle operates inside an ISMS, and what processes, documentation, and actions are required to maintain compliance year after year.

Learn more about ISO 27001 ISMS Continuous Improvement Cycle
Annex A Controls — Organizational

Acceptable Use Of Assets | Annex A 5.10

Information security policies serve as the foundation of any robust cybersecurity program. Without clearly defined rules for acceptable use of information assets, organizations face increased vulnerability to data breaches, compliance violations, and operational disruptions. Control 5.10 of ISO 27001:2022 specifically addresses this critical aspect of information security management, requiring organizations to establish formal guidelines for how information and associated assets should be handled.

Learn more about Acceptable Use Of Assets | Annex A 5.10

Access Control Policies | Annex A 5.14

Information rarely stays still. Every organisation transfers data daily—between teams, systems, partners, customers, cloud platforms, and suppliers. Emails are sent, files are shared, storage media is moved, meetings are held, and conversations take place across calls and video conferences. Each transfer represents a moment of heightened risk.

Learn more about Access Control Policies | Annex A 5.14

Access Rights Management | Annex A 5.16

ISO 27001 Annex A 5.16 focuses on how organisations manage access rights by governing the full lifecycle of identities. This control ensures that only authorised users, systems, and services can access information assets, and that access is removed when no longer required.

Learn more about Access Rights Management | Annex A 5.16
Annex A Controls — People

Confidentiality And NDA Management | Annex A 6.6

Confidentiality obligations sit at the very core of information security. Without enforceable confidentiality controls, even the strongest technical safeguards can be rendered ineffective by human behaviour, contractual gaps, or unclear responsibilities. ISO 27001:2022 Annex A 6.6 formalises this reality by requiring organisations to define, implement, communicate, and enforce confidentiality and non-disclosure obligations across employees, contractors, suppliers, and other relevant parties.

Learn more about Confidentiality And NDA Management | Annex A 6.6

Disciplinary Process And Enforcement | Annex A 6.4

Establishing a fair disciplinary process is essential for organizations that want to effectively manage security violations while maintaining employee trust. When security breaches occur, organizations often struggle to respond consistently, which can lead to resentment, legal complications, or ineffective deterrence. Consequently, ISO 27001 includes specific requirements under Annex A 6.4 to ensure disciplinary processes are both fair and effective.

Learn more about Disciplinary Process And Enforcement | Annex A 6.4

Employee Screening And Background Checks | Annex A 6.1

In this guide, we explain everything organisations need to know about ISO 27001:2022 Annex A 6.1 — Employee Screening and Background Checks. You’ll learn what the control requires, why it exists, how auditors assess compliance, what evidence is expected, and how to design a screening process that is legally compliant, proportionate, and effective across different roles and risk levels.

Learn more about Employee Screening And Background Checks | Annex A 6.1
Annex A Controls — Physical

Access Control To Premises | Annex A 7.2

Physical security remains one of the most underestimated components of information security. While organisations invest heavily in cybersecurity tools, a single uncontrolled door, shared workspace, or unlogged visitor can undermine even the most mature digital controls. ISO 27001 Annex A 7.2 exists to address this exact risk by requiring organisations to establish and maintain effective access control to premises where information and information-processing facilities are located.

Learn more about Access Control To Premises | Annex A 7.2

Cabling And Electrical Security | Annex A 7.12

Modern technologies rely heavily on fiber, network, and power cables to function correctly. When we focus on ISO cyber security, we often overlook these critical components' physical vulnerabilities. Power and information cables face risks of damage and interception. Cyber criminals who gain access to fiber cables can disrupt all network traffic with simple techniques like 'bending the fiber.' This makes data and information unavailable.

Learn more about Cabling And Electrical Security | Annex A 7.12

Your ISO 27001 Compliance Newsletter

Stay ahead with the latest expert insights, news, and updates on compliance.
Decorative