ISO 27001:2022 Annex A 5.11 – Return of Assets Explained

Information security risk does not end when someone leaves.

Annex A 5.11 exists to ensure that organisation-owned assets are returned when employment, contracts, or agreements change or end, reducing the risk of data loss, unauthorised access, or misuse after separation.

This control focuses on protecting the organisation at transition points, where oversight often weakens and risk increases.

ISO 27001

Quick Guide: Annex A 5.11 at a Glance

Annex A 5.11 of ISO 27001:2022 addresses the return of information and other associated assets upon change or termination of employment, contract, or agreement.

At a practical level, this means:

  • Identifying assets that must be returned
  • Making return expectations clear in advance
  • Ensuring assets are accounted for during exit
  • Preventing continued access after separation
  • Reducing the risk of data leakage or misuse

The control does not require complex recovery processes. It expects a clear, repeatable approach that ensures assets do not remain outside organisational control once access is no longer justified.

In-Depth Guide to Annex A 5.11

What Is Annex A 5.11 and Why Does It Matter?

When people leave an organisation, they often retain:

  • Devices
  • Documents
  • Access credentials
  • Knowledge and data

Without a structured return process, this creates risk, including:

  • Unauthorised access to systems
  • Loss of sensitive information
  • Exposure of intellectual property
  • Difficulty proving accountability after incidents

Annex A 5.11 ensures that asset return is treated as a formal security activity, not an administrative afterthought.

This control applies to:

  • Employees
  • Contractors
  • Temporary staff
  • External parties with organisational assets

Consistency matters more than complexity.

How to Implement Annex A 5.11 Effectively

A pragmatic approach to Annex A 5.11 typically includes the following elements.

1. Identify Assets That Must Be Returned

Assets subject to return often include:

  • End-user devices (e.g. laptops, phones)
  • Removable storage media
  • Authentication items (keys, cards, tokens)
  • Physical documents
  • Software or licensed materials

Clarity prevents dispute and oversight.

2. Set Expectations in Advance

Return obligations are most effective when they are defined before separation occurs.

This is commonly achieved through:

  • Employment contracts
  • Supplier or contractor agreements
  • Acceptable use or asset policies

Advance clarity reduces friction during exit.

3. Integrate Asset Return into Exit Processes

Asset return should form part of a formal change or termination process.

This often includes:

  • Checklists or sign-off steps
  • Confirmation of returned items
  • Coordination between HR, IT, and management

A structured approach reduces reliance on memory and goodwill.

4. Address Access and Asset Control Together

Physical return alone is not sufficient.

Asset return is often coordinated with:

  • Removal of system access
  • Revocation of credentials
  • Disabling of accounts
  • Removal of remote access

This ensures assets and access are handled consistently.

5. Handle Exceptions Deliberately

In some cases, assets may not be immediately returned.

Where this occurs:

  • Exceptions should be agreed and documented
  • Residual risk should be understood
  • Follow-up actions should be defined

Unmanaged exceptions create hidden exposure.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Common Challenges and How to Overcome Them

  • Informal or inconsistent exit processes
  • Use a standard, repeatable return approach
  • Assuming access removal is enough
  • Ensure physical and logical assets are both addressed
  • Poor coordination between teams
  • Align HR, IT, and management responsibilities
  • Unclear ownership of asset recovery
  • Assign accountability for return and verification

Most issues arise at speed or under pressure — structure helps.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 5.11 is about closing the loop on access and ownership.

When asset return is handled properly:

  • Data loss risk is reduced
  • Unauthorised access is prevented
  • Accountability is clearer
  • Exit processes are more controlled

Transitions are a predictable source of risk. Treating asset return as a defined security activity helps ensure information and associated assets remain protected beyond the point of departure.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls