BSI Standards Publication
BSI Standards Publication
BSI Standards Publication
National foreword
This British Standard is the UK implementation of
EN ISO/IEC 27701:2021. It is identical to ISO/IEC 27701:2019. It
supersedes BS ISO/IEC 27701:2019, which is withdrawn.
The UK participation in its preparation was entrusted to Technical
Committee IST/33/5, Identity Management and Privacy Technologies.
A list of organizations represented on this committee can be obtained on
request to its committee manager.
Contractual and legal considerations
This publication has been prepared in good faith, however no
representation, warranty, assurance or undertaking (express or
implied) is or will be made, and no responsibility or liability is or will be
accepted by BSI in relation to the adequacy, accuracy, completeness or
reasonableness of this publication. All and any such responsibility and
liability is expressly disclaimed to the full extent permitted by the law.
This publication is provided as is, and is to be used at the
recipient’s own risk.
The recipient is advised to consider seeking professional guidance with
respect to its use of this publication.
This publication is not intended to constitute a contract. Users are
responsible for its correct application.
© The British Standards Institution 2021
Published by BSI Standards Limited 2021
ISBN 978 0 539 15799 4
ICS 35.030
Compliance with a British Standard cannot confer immunity from
legal obligations.
This British Standard was published under the authority of the
Standards Policy and Strategy Committee on 31 August 2019.
ICS 35.030
English version
CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.
CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
© 2021 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 27701:2021 E
reserved worldwide for CEN national Members and for
CENELEC Members.
BS EN ISO/IEC 27701:2021
EN ISO/IEC 27701:2021 (E)
European foreword
The text of ISO/IEC 27701:2019 has been prepared by Technical Committee ISO/IEC JTC 1 "Information
technology” of the International Organization for Standardization (ISO) and has been taken over as
EN ISO/IEC 27701:2021 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and Data Protection”
the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by October 2021, and conflicting national standards shall
be withdrawn at the latest by October 2021.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 27701:2019 has been approved by CEN as EN ISO/IEC 27701:2021 without any
modification.
BS EN ISO/IEC 27701:2021
ISO/IEC 27701:2019(E)
Contents Page
Foreword......................................................................................................................................................................................................................................... vi
Introduction............................................................................................................................................................................................................................... vii
1 Scope.................................................................................................................................................................................................................................. 1
2 Normative references....................................................................................................................................................................................... 1
3 Terms, definitions and abbreviations............................................................................................................................................. 1
4 General............................................................................................................................................................................................................................. 2
4.1 Structure of this document............................................................................................................................................................ 2
4.2 Application of ISO/IEC 27001:2013 requirements.................................................................................................. 2
4.3 Application of ISO/IEC 27002:2013 guidelines.......................................................................................................... 3
4.4 Customer....................................................................................................................................................................................................... 4
5 PIMS-specific requirements related to ISO/IEC 27001................................................................................................. 4
5.1 General............................................................................................................................................................................................................ 4
5.2 Context of the organization........................................................................................................................................................... 4
5.2.1 Understanding the organization and its context................................................................................... 4
5.2.2 Understanding the needs and expectations of interested parties......................................... 5
5.2.3 Determining the scope of the information security management system...................... 5
5.2.4 Information security management system................................................................................................ 5
5.3 Leadership................................................................................................................................................................................................... 5
5.3.1 Leadership and commitment................................................................................................................................. 5
5.3.2 Policy........................................................................................................................................................................................... 5
5.3.3 Organizational roles, responsibilities and authorities..................................................................... 5
5.4 Planning......................................................................................................................................................................................................... 6
5.4.1 Actions to address risks and opportunities............................................................................................... 6
5.4.2 Information security objectives and planning to achieve them............................................... 7
5.5 Support........................................................................................................................................................................................................... 7
5.5.1 Resources................................................................................................................................................................................ 7
5.5.2 Competence........................................................................................................................................................................... 7
5.5.3 Awareness............................................................................................................................................................................... 7
5.5.4 Communication.................................................................................................................................................................. 7
5.5.5 Documented information.......................................................................................................................................... 7
5.6 Operation...................................................................................................................................................................................................... 7
5.6.1 Operational planning and control...................................................................................................................... 7
5.6.2 Information security risk assessment............................................................................................................ 7
5.6.3 Information security risk treatment................................................................................................................ 7
5.7 Performance evaluation................................................................................................................................................................... 8
5.7.1 Monitoring, measurement, analysis and evaluation.......................................................................... 8
5.7.2 Internal audit....................................................................................................................................................................... 8
5.7.3 Management review...................................................................................................................................................... 8
5.8 Improvement............................................................................................................................................................................................. 8
5.8.1 Nonconformity and corrective action............................................................................................................. 8
5.8.2 Continual improvement.............................................................................................................................................. 8
6 PIMS-specific guidance related to ISO/IEC 27002.............................................................................................................. 8
6.1 General............................................................................................................................................................................................................ 8
6.2 Information security policies...................................................................................................................................................... 8
6.2.1 Management direction for information security................................................................................... 8
6.3 Organization of information security................................................................................................................................... 9
6.3.1 Internal organization.................................................................................................................................................... 9
6.3.2 Mobile devices and teleworking....................................................................................................................... 10
6.4 Human resource security............................................................................................................................................................. 10
6.4.1 Prior to employment.................................................................................................................................................. 10
6.4.2 During employment.................................................................................................................................................... 10
6.4.3 Termination and change of employment.................................................................................................. 11
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that
are members of ISO or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal with particular fields of
technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also
take part in the work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see http://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso
.org/iso/foreword.html.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Security techniques.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.