ISO27001 Clause 7.3: The Ultimate Certification Guide

ISO27001 Clause 7.3: The Ultimate Certification Guide

Organisations around the world are adopting ISO 27001, the international standard for information security management systems, to protect their data assets.

A key feature of supporting and maintaining a strong security posture and an effective ISMS is around driving security awareness and training.

ISO27001 Clause 7.3 deals with this very matter.

In this article, we will take a detailed look at the importance, structure, implementation, challenges, and future of Clause 7.3, shedding light on how organisations can effectively raise awareness and enhance information security.

Table of Contents

Breaking Down ISO 27001 Clause 7.3: Awareness

Introduction to ISO 27001 Clause 7.3

Clause 7.3 is an integral part of the ISO27001 standard. It focuses on the importance of awareness within an organisation's information security management system (ISMS). 

It emphasises the need for organisations to establish a comprehensive awareness program that addresses key security risks.

By following the structure of Clause 7.3, organisations can systematically build a solid foundation of awareness within their workforce.

Understanding the Importance of ISO27001 Clause 7.3

Information security is only as strong as its weakest link.

The industry will tell you that "people are the weakest link".

However, I prefer to think of "people as your first line of defence."

Organisations frequently invest in the latest generation of security technology to defend their business.

However a question I often ask myself is "How much do these organisations invest in their people?"

Because when individuals are aware of the importance of information security and their responsibilities in safeguarding it, the overall security posture is significantly bolstered.

This is what ISO27001 Clause 7.3 is all about. It is about developing a systematic approach to driving security awareness within the workforce. 

The Role of Awareness in Information Security

Developing a culture of awareness is the cornerstone of an effective information security management system.

It ensures that employees at all levels understand the risks they face and the measures they need to take to mitigate those risks.

By cultivating awareness, organisations empower their workforce to be active participants in protecting sensitive data, making information security everyone's responsibility.

Key Elements of ISO27001 Clause 7.3

ISO27001 Clause 7.3 entails various components that contribute to the establishment of an organisation-wide awareness program. 

The Clause itself is divided into three subclauses, each addressing specific aspects of awareness:

  • Subclause #1 - the information security policy
  • Subclause #2 - the (persons) contribution to the effectiveness of the information security management system, including the benefits of improved information security
  • Subclause #3 - the implications of not conforming with the information security management system requirements.

Adhering to these elements enables a robust implementation of Clause 7.3.

The Scope of ISO27001 Clause 7.3

An important thing to understand about ISO27001 Clause 7.3 is its scope.

According to the Standard, the scope of Clause 7.3 includes:

Persons doing work under the organisations control. Source: ISO/IEC 27001:2022

So depending on the nature of your business and the context of your organisation, this could include:

  • full time employees,
  • fixed term contractors,
  • contingency workers,
  • contractors,
  • subcontractors, and even
  • suppliers

Interpreting the Language of Clause 7.3

At first glance, the language used in ISO 27001 standards may seem daunting.

However, interpreting the requirements of Clause 7.3 is essential for effective implementation.

To simplify its language, organisations can break it down into actionable steps, ensuring that every clause is understood and fulfilled.

By demystifying the language, organisations can smoothly navigate the implementation of Clause 7.3.

They can develop a clear roadmap for establishing an effective awareness program that aligns with the organisation's objectives and addresses its unique security risks.

This approach not only ensures compliance with ISO 27001 requirements but also strengthens the organisation's overall security posture.

It is important to note that awareness is not a one-time effort but an ongoing process.

Organisations must continuously reinforce the importance of information security and keep employees informed about the latest threats and best practices.

By doing so, organisations can create a culture of security awareness, where every employee becomes a vigilant defender of the organisation's information assets.

5 Steps to Implementing ISO27001 Clause 7.3 in Your Organisation

Now that we have a comprehensive understanding of the importance and structure of Clause 7.3, let's explore practical steps to successfully implement it within your organisation.

As we've discussed already, ISO27001 Clause 7.3 focuses on the need to raise awareness and promote a culture of information security within an organisation.

Implementing Clause 7.3 requires a systematic approach. By implementing this clause effectively, you can ensure that all employees understand their roles and responsibilities in maintaining the confidentiality, integrity, and availability of information.

To help you on your journey, here is my 5 step process for implementing ISO27001 Clause 7.3:

Step #1 - Identify your audience

As silly as it might sound, the starting point for implementing ISO27001 Clause 7.3 is about identifying your audience.

Earlier in this article, we discussed the scope of ISO27001 Clause 7.3 as being Persons doing work under the organisations control.

Depending on the nature of your business and the context of your organisation, this may include:

  • full time employees,
  • fixed term contractors,
  • contingency workers,
  • contractors,
  • subcontractors, and even
  • suppliers

Each of these audiences have different information security roles and responsibilities, in the context of your information security management system.

Equally, they each face different risks that impact the effectiveness of your information security management system.

The objective of step #1 is to:

  1. Identify each audience in scope of ISO27001 Clause 7.3 for your organisation
  2. Define their information security roles and responsibilities
  3. Quantify the awareness and training levels that are required for them to deliver against their information security roles and responsibilities.

Step #2 - Assess current awareness levels

Now that we have identified our audience(s), defined their roles and responsibilities, and quantified the required awareness and training levels; we now need to assess current awareness levels in relation to information security.

This assessment can involve a variety of tactics and techniques. For example:

  • surveys,
  • interviews,
  • observations,
  • simulations, and
  • table top exercises

You can also leverage more quantitative data sources to help assess current awareness levels. For example:

  • Incidents and tickets - Incidents and tickets that are raised within your business are a valuable source of data. They indicate real life examples of what your employees are experiencing and can help you assess current awareness levels. You might find that there are certain types of incidents/tickets that regularly occur, which could be an indication of a lack of knowledge, awareness or training.
  • Sign in logs - The sign in logs from your identity provider (e.g. Microsoft Entra ID, formerly known as Azure AD) can provide insights around who is logging in from where, and when. For example, repeated sign in's from unauthorised locations could indicate a lack of awareness around your remote working policy. Alternatively, unauthorised access attempts, indicating an issue with compromised identities or password strength.
  • Email security logs - Your email security logs can provide insights around things like phishing attempts, indicating the level of risk your exposed too. Drill down to specific roles in your organisation (e.g. finance, legal, supply chain) and you may find the individuals who are at greater risk.
  • Security logs - Security logs are another valuable source of quantitative data. They provide you real life examples that help you quantify a risk that may be grounded in a lack of awareness and/or training. For example, If your vulnerability management system highlights a certain type of vulnerability that consistently appears. This could indicate a root cause grounded in a lack of security awareness and/or training.

 Combined, this can help you gather valuable insights into the existing knowledge and practices of your employees.

Step #3 - Develop an awareness and training plan

Based on the assessment findings, develop an awareness and training plan that caters to the specific needs of your organisation.

This plan should:

  • Deliver against the outcomes defined in your information security policy
  • Have clearly defined objectives that are specific, measurable, achievable, realistic and time-bound (SMART)
  • Include Key Performance Indicators (KPIs) that gauge the effectiveness of your awareness program (e.g. the number of reported security incidents, the frequency of employee feedback, and the level of participation in training sessions.)
  • Be relevant and aligned to the specific information security roles and responsibilities within your organisation
  • Leverage engaging learning material and interactive sessions to maximise knowledge retention
  • Consider using real-life examples and case studies to illustrate the importance of information security and its impact on your organisation
  • Include a communications plan that delivers regular updates and best practices through various channels (such as email newsletters, intranet articles, posters and even short videos from key stakeholders.)

Some key things to consider:

  • Volume - It's important that you balance the volume of awareness and training against the outcomes your business is trying to achieve.
  • Variety - As the saying goes, "Variety is the spice of life." Your messaging and content needs to be consistent but consider different methods of delivery to keep your people engaged, whilst catering for the different learning styles. 
  • Velocity - The speed people learn varies from one to an other. You need to balance speed and frequency of delivery in order that you can arm your people with the skills they need to achieve the objectives you want.
  • Validation - Celebrating success is vital. Think about how you can celebrate success, validate your peoples contributions and empower them to do more.
  • Value - Ultimately, your awareness and training program needs to deliver value. 

Step #4 - Deliver your awareness and training plan

Now that you have your awareness and training plan, we now move into execution.

To avoid disruption and maximise impact, my advise is to schedule in advance.

I'd also recommend including some form of feedback loop so that you can gather both qualitative and quantitative feedback along the way.

Step #5 - Monitor and review

Regularly monitor the effectiveness of your awareness and training program. Conduct periodic reviews to identify any changes or improvements required.

This iterative process allows you to drive a culture of continuous improvement, ensuring that your organisation's information security practices are always evolving and adapting to new threats.

Remember, implementing Clause 7.3 is not a one-time task but an ongoing commitment.

By consistently raising awareness and promoting a culture of information security, you can create a resilient and secure environment for your organisation's valuable information assets.

Overcoming Challenges in Applying ISO27001 Clause 7.3

Implementing Clause 7.3 of ISO27001 is not without its challenges. Let's explore some common obstacles organisations may face during its application and discuss strategies to overcome them.

Common Obstacles in Raising Awareness

One of the most common obstacles organisations encounter when implementing Clause 7.3 is resistance to change.

Employees may be accustomed to their current practices and may be hesitant to adopt new information security measures.

Additionally, there may be a lack of understanding about the importance of information security and how it relates to the organisation's overall goals and objectives.

Furthermore, competing priorities within the organisation can divert attention away from the implementation of Clause 7.3.

To address these challenges, organisations need to focus on effective change management.

This involves creating a clear and compelling case for why information security is crucial for the organisation's success.

Executive buy-in is essential in gaining support and commitment from top-level management, which can help overcome resistance to change.

Clear communication is also vital in ensuring that employees understand the value of information security and how it directly impacts their work and the organisation as a whole.

Strategies for Successful Implementation

To overcome the obstacles mentioned above, organisations should develop a comprehensive communication plan that educates employees about the benefits of proactive information security measures.

This plan should include various channels and methods to reach employees, such as training sessions, regular reminders, and gamified approaches.

Training sessions can provide employees with the knowledge and skills they need to implement Clause 7.3 effectively.

These sessions can cover topics such as identifying and managing information security risks, understanding the organisation's policies and procedures, and promoting a culture of security awareness.

Regular reminders, such as email newsletters or internal announcements, can help reinforce the importance of security practices and keep information security at the forefront of employees' minds.

These reminders can highlight success stories, best practices, and any updates or changes to the organisation's information security policies.

Gamified approaches can also be effective in engaging employees and encouraging their active participation in information security initiatives.

For example, organisations can create quizzes, challenges, or competitions that test employees' knowledge of information security concepts and reward them for their achievements.

This gamification can make the learning process more enjoyable and increase employee engagement and motivation.

By combining these strategies, organisations can ensure a smooth and successful implementation of ISO 27001 Clause 7.3.

It is crucial to continuously evaluate and adapt these strategies based on feedback and the evolving needs of the organisation.

With a well-executed communication plan and a commitment to overcoming obstacles, organisations can effectively apply Clause 7.3 and enhance their information security posture.

The Future of ISO27001 Clause 7.3: Awareness

As technology continues to evolve, so do the threats to information security. ISO27001, including Clause 7.3, is a dynamic standard that adapts to the changing landscape.

Let's explore the potential updates and long-term impact of Clause 7.3 on information security.

Potential Updates and Changes

ISO27001 standards undergo regular updates to address emerging security risks and industry best practices.

Organisations should stay abreast of these changes and modify their awareness programs accordingly, ensuring that their information security practices are always aligned with the latest requirements.

The Long-Term Impact of Clause 7.3 on Information Security

Clause 7.3 sets the foundation for a strong information security culture within organisations.

By continuously raising awareness and nurturing a security-conscious workforce, organisations can mitigate risks, minimise security incidents, and maintain the confidentiality, integrity, and availability of their valuable data assets.

The long-term impact of ISO 27001 Clause 7.3 goes beyond compliance, fostering a resilient and proactive approach to information security.

Conclusion

Awareness, in the context of ISO27001 Clause 7.3, is an indispensable component of any organisation's information security management system. 

I hope this article has explained why.

By understanding its significance, structure, and implementation challenges, organisations can create a strong culture of awareness, empowering employees to become active guardians of sensitive information.

Back to you. How can your organisation drive greater awareness to empower employees to become active guardians of your sensitive information? 

P.S. Whenever you're ready, here are 3 ways I can help you:

  1. Subscribe to GRCMANA and each week you will get more tips, strategies and resources that will help you accelerate your GRC career.
  2. Join the Cyber Resilience Network: Join 16,000+ other members in the largest LinkedIn Community dedicated to building cyber resilience in the cloud.
  3. Follow me on LinkedIn for more tools, strategies and insights on how to govern your clod, secure your cloud and defend your cloud.
About the author
Harry is a technologist and security leader with 20+ years experience in helping organisations govern their cloud, secure their cloud and defend their cloud.