An employee receives a well-crafted phishing email, clicks the link and enters their credentials. The attacker gains access to the internal ticketing system, exfiltrates customer data and sells it on a dark-web marketplace. The post-mortem reveals that the employee never received any security training — and the organization has no awareness program. A.6.3 is the control that prevents this starting condition.
The control requires organizations to establish and maintain a security awareness program that covers all personnel and relevant external parties. The program must be tailored to roles, regularly updated and verifiably effective.
What does the standard require?
The core requirements can be grouped into five areas:
- Awareness program. The organization must establish a program that keeps all personnel informed about information-security policies, procedures and their individual responsibilities.
- Role-based training. Training content must be tailored to the person’s role and the sensitivity of the information they handle. A developer needs different modules than a receptionist.
- Onboarding integration. New joiners must receive awareness training before or shortly after they begin their work.
- Continuous reinforcement. A one-off annual session is a minimum. The standard expects ongoing reinforcement through campaigns, reminders, simulations and updates.
- Effectiveness measurement. The organization must verify that personnel understand their obligations — through tests, exercises or other measurable means.
In practice
Build a training calendar. Plan the annual cycle: onboarding training for new joiners, annual refresher for all staff, role-specific deep dives (e.g. secure coding, incident response), phishing simulations (quarterly), and ad-hoc sessions after incidents or policy changes.
Use an e-learning platform. E-learning makes it easy to deliver, track and prove training completion. Look for platforms that support quizzes, certificates and automated reminders for overdue training.
Run phishing simulations. Simulated phishing campaigns are the single most effective way to measure and improve awareness. Track click rates, reporting rates and repeat-offender rates over time.
Maintain a training register. For every training event, record: topic, date, delivery method, attendees, completion status and test results. This register is the primary audit artifact (link to Training Register in the Starter Kit).
Typical audit evidence
Auditors typically expect the following evidence for A.6.3:
- Awareness program documentation — the program plan, calendar and curriculum
- Training register — per-person completion records with dates and results (link to Training Register in the Starter Kit)
- Training materials — slide decks, e-learning modules, handouts
- Phishing simulation reports — campaign results showing click and report rates
- Onboarding records — proof that new joiners received training within the defined timeframe
- Effectiveness metrics — quiz pass rates, simulation trends, feedback surveys
KPI
% of employees who completed annual security awareness training
Measured as a percentage: how many of your active personnel (employees, contractors with access) have completed the required awareness training in the current cycle? Target: 100%. Typical starting points range from 50–75%; reaching 95%+ is realistic within one year if automated reminders are in place.
Supplementary KPIs:
- Phishing simulation click rate (target: below 5%)
- Average quiz score across all personnel
- % of new joiners trained within 30 days of start date
- Number of security events reported by trained personnel (higher is better — it means awareness is working)
BSI IT-Grundschutz
A.6.3 maps directly to BSI ORP.3 (Awareness and Training):
- ORP.3.A1 (Awareness of information security) — requires that all employees are made aware of their security responsibilities and the relevant policies.
- ORP.3.A4 (Conception of an awareness and training program) — requires a structured, planned program with defined target groups and content.
- ORP.3.A6 (Implementation of awareness and training measures) — covers delivery, scheduling and attendance tracking.
- ORP.3.A7 (Evaluation and improvement) — requires measurement of effectiveness and continuous improvement of the program.
- ORP.3.A8 (Measurement and reporting of awareness activities) — requires reporting on training KPIs to management.
Related controls
A.6.3 connects to multiple controls across the ISMS:
- A.6.1 — Screening: Screening verifies suitability; training builds competence.
- A.6.2 — Terms and conditions of employment: The contract defines obligations; training ensures people understand them.
- A.6.4 — Disciplinary process: Training is a prerequisite for fair disciplinary action — you cannot penalize behavior that was never communicated.
- A.6.5 — Responsibilities after termination: Exit briefings remind departing staff of their continuing obligations.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.6.3 — Information security awareness, education and training
- ISO/IEC 27002:2022 Section 6.3 — Implementation guidance for awareness, education and training
- BSI IT-Grundschutz, ORP.3 — Awareness and training