The organisation has a clear password policy: minimum 12 characters, complexity requirements, 90-day rotation. A compliance check reveals that 40% of service accounts use passwords that were last changed three years ago, and the legacy ERP system still accepts 6-character passwords. A.5.36 ensures that policies are verified in practice — because a policy that exists only on paper provides no security.
Writing policies is the first step. Verifying that they are followed is what makes them effective. A.5.36 closes the gap between documented rules and operational reality by requiring regular, systematic compliance checks.
What does the standard require?
- Review compliance regularly. The organisation must regularly review whether information security is implemented and operated in accordance with its policies, topic-specific policies, rules and standards.
- Assign management responsibility. Managers are responsible for ensuring compliance within their areas of authority.
- Identify and address non-compliance. When non-compliance is detected, the organisation must determine the cause, implement corrective action and verify the effectiveness of the correction.
- Record results. Compliance review results, non-conformities and corrective actions must be documented.
- Use automated tools where appropriate. Automated compliance checking tools can support regular technical verification.
In practice
Create a compliance check schedule. Define which policies and standards are checked, how often, by whom and using what method. Distribute checks across the year to avoid concentration. High-risk areas warrant more frequent checks.
Empower department managers. Managers must understand the policies that apply to their area and have the tools and authority to verify compliance. Provide them with checklists and clear criteria for what constitutes compliance.
Implement technical compliance scanning. Use configuration management tools, vulnerability scanners and access review tools to automate the verification of technical standards. Compare scan results against the documented baseline and flag deviations.
Treat non-compliance as an improvement opportunity. When a compliance check reveals a gap, investigate whether the root cause is a training gap, a process failure, a tool limitation or an unrealistic policy requirement. Sometimes the policy needs updating — a finding can reveal that a policy is impractical and should be revised.
Typical audit evidence
Auditors typically expect the following evidence for A.5.36:
- Compliance check schedule — annual plan showing which policies are reviewed, when and by whom
- Compliance check reports — results of manual and automated reviews with findings and ratings
- Non-compliance records — documented non-conformities with root-cause analysis
- Corrective action records — evidence that non-conformities were addressed and effectiveness was verified
- Automated scan reports — output from technical compliance scanning tools with trend data
KPI
% of IS policies and standards verified as compliant in latest audit
This KPI measures the overall compliance posture. For each policy and standard in scope, track whether the latest compliance check confirmed full compliance, partial compliance or non-compliance. Target: 100% full compliance, with intermediate targets based on maturity.
Supplementary KPIs:
- Number of non-conformities identified per review cycle
- Average time from non-conformity identification to corrective action completion
- Percentage of corrective actions verified as effective within the defined timeframe
BSI IT-Grundschutz
A.5.36 maps to the BSI requirements for compliance verification:
- BSI-Standard 200-2, Chapter 10 — continual improvement of the ISMS, including regular compliance reviews.
- DER.3.1 (Audits and revisions) — framework for conducting compliance audits.
- DER.3.2 (Revisions for specific areas) — detailed compliance verification for specific security domains.
- ISMS.1.A11 (Internal ISMS audits) — internal audit requirements that support compliance verification.
Related controls
A.5.36 verifies the operational effectiveness of policies:
- A.5.34 — Privacy and PII: Privacy policies require the same compliance verification as security policies.
- A.5.35 — Independent review: Provides independent verification that complements the operational compliance checks of A.5.36.
- A.5.37 — Documented operating procedures: Compliance checks verify that documented procedures are followed.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.5.36 — Compliance with policies, rules and standards for information security
- ISO/IEC 27002:2022 Section 5.36 — Implementation guidance
- BSI IT-Grundschutz, DER.3.1 — Audits and revisions