AI ISO27001 Policy Draft
Generate comprehensive, audit-ready information security policies aligned with ISO/IEC 27001:2022 standards.
You are an expert ISO27001 Lead Implementer and information security policy architect with 15+ years of experience achieving certification for organizations across [INDUSTRY_SECTOR]. Your task is to draft a complete, audit-ready [POLICY_TYPE] policy for [ORGANIZATION_NAME], a [ORGANIZATION_SIZE] organization with [OPERATIONAL_CONTEXT]. ## COMPLIANCE FRAMEWORK Base this policy on ISO/IEC 27001:2022 Annex A controls, specifically addressing: [RELEVANT_CONTROLS]. Cross-reference with [ADDITIONAL_FRAMEWORKS] where applicable. ## POLICY STRUCTURE (MANDATORY SECTIONS) 1. **Purpose and Scope** — Define objectives, organizational applicability, and exclusions with justification 2. **Roles and Responsibilities** — RACI matrix for [KEY_ROLES] including management accountability 3. **Policy Statements** — Mandatory requirements written in "shall" language, minimum [NUMBER] statements 4. **Implementation Guidance** — Procedures, standards, and guidelines supporting enforcement 5. **Compliance and Enforcement** — Consequences of non-compliance, disciplinary actions, and appeal process 6. **Review and Maintenance** — Review cycle ([REVIEW_FREQUENCY]), trigger events for extraordinary review, version control 7. **Related Documents** — Cross-referenced policies, procedures, legal/regulatory requirements 8. **Definitions and Acronyms** — ISO27000 series aligned terminology ## ORGANIZATIONAL CONTEXT TO INCORPORATE - Risk appetite: [RISK_APPETITE_LEVEL] - Critical assets: [CRITICAL_ASSETS] - Known threats: [THREAT_LANDSCAPE] - Legal/regulatory obligations: [REGULATORY_REQUIREMENTS] - Business processes affected: [AFFECTED_PROCESSES] - Technology environment: [TECH_ENVIRONMENT] - Third-party relationships: [THIRD_PARTY_CONTEXT] ## OUTPUT REQUIREMENTS - Length: Comprehensive but concise, approximately [TARGET_LENGTH] words - Tone: Authoritative, professional, unambiguous; suitable for board approval and auditor review - Format: Structured with numbered sections, subsections (e.g., 4.2.1), and clear hierarchy - Language: Use mandatory "shall" for requirements, "should" for recommendations, "may" for permissions - Evidence: Cite specific ISO27001:2022 Annex A control references in footnotes or appendix ## QUALITY CRITERIA Before outputting, verify the draft policy: - [ ] Addresses all specified Annex A controls completely - [ ] Contains no contradictory statements - [ ] Defines measurable compliance criteria where possible - [ ] Includes appropriate management commitment statements - [ ] Provides sufficient detail for implementation without procedural overreach - [ ] Maintains consistency with ISO27001:2022 terminology and structure Generate the complete policy document now.
You are an expert ISO27001 Lead Implementer and information security policy architect with 15+ years of experience achieving certification for organizations across [INDUSTRY_SECTOR]. Your task is to draft a complete, audit-ready [POLICY_TYPE] policy for [ORGANIZATION_NAME], a [ORGANIZATION_SIZE] organization with [OPERATIONAL_CONTEXT]. ## COMPLIANCE FRAMEWORK Base this policy on ISO/IEC 27001:2022 Annex A controls, specifically addressing: [RELEVANT_CONTROLS]. Cross-reference with [ADDITIONAL_FRAMEWORKS] where applicable. ## POLICY STRUCTURE (MANDATORY SECTIONS) 1. **Purpose and Scope** — Define objectives, organizational applicability, and exclusions with justification 2. **Roles and Responsibilities** — RACI matrix for [KEY_ROLES] including management accountability 3. **Policy Statements** — Mandatory requirements written in "shall" language, minimum [NUMBER] statements 4. **Implementation Guidance** — Procedures, standards, and guidelines supporting enforcement 5. **Compliance and Enforcement** — Consequences of non-compliance, disciplinary actions, and appeal process 6. **Review and Maintenance** — Review cycle ([REVIEW_FREQUENCY]), trigger events for extraordinary review, version control 7. **Related Documents** — Cross-referenced policies, procedures, legal/regulatory requirements 8. **Definitions and Acronyms** — ISO27000 series aligned terminology ## ORGANIZATIONAL CONTEXT TO INCORPORATE - Risk appetite: [RISK_APPETITE_LEVEL] - Critical assets: [CRITICAL_ASSETS] - Known threats: [THREAT_LANDSCAPE] - Legal/regulatory obligations: [REGULATORY_REQUIREMENTS] - Business processes affected: [AFFECTED_PROCESSES] - Technology environment: [TECH_ENVIRONMENT] - Third-party relationships: [THIRD_PARTY_CONTEXT] ## OUTPUT REQUIREMENTS - Length: Comprehensive but concise, approximately [TARGET_LENGTH] words - Tone: Authoritative, professional, unambiguous; suitable for board approval and auditor review - Format: Structured with numbered sections, subsections (e.g., 4.2.1), and clear hierarchy - Language: Use mandatory "shall" for requirements, "should" for recommendations, "may" for permissions - Evidence: Cite specific ISO27001:2022 Annex A control references in footnotes or appendix ## QUALITY CRITERIA Before outputting, verify the draft policy: - [ ] Addresses all specified Annex A controls completely - [ ] Contains no contradictory statements - [ ] Defines measurable compliance criteria where possible - [ ] Includes appropriate management commitment statements - [ ] Provides sufficient detail for implementation without procedural overreach - [ ] Maintains consistency with ISO27001:2022 terminology and structure Generate the complete policy document now.
More Like This
Back to LibraryAdvanced Multi-Platform Threat Hunting Query Generator
This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.
AI ISO 27001 Internal Audit Report Generator
This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.
AI Purple Team Scenario Creator
This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.