ISO 27001:2022 Annex A 5.13 – Labelling of Information Explained

Information classification only works if people can recognise it in practice.

Annex A 5.13 exists to ensure that classified information is clearly and consistently labelled, so that those handling it understand how it should be protected, shared, and managed.

This control translates classification from theory into day-to-day behaviour.

ISO 27001

Quick Guide: Annex A 5.13 at a Glance

Annex A 5.13 of ISO 27001:2022 focuses on the labelling of information in line with the organisation’s information classification scheme.

At a practical level, this means:

  • Applying labels that reflect information classification
  • Ensuring labels are clear and recognisable
  • Using labelling methods appropriate to the format of information
  • Supporting consistent handling internally and externally
  • Avoiding unnecessary or counterproductive labelling

The control does not require every item of information to be labelled manually. It expects a practical, usable approach that supports correct handling without creating friction.

The objective is clarity, not decoration.

In-Depth Guide to Annex A 5.13

What Is Annex A 5.13 and Why Does It Matter?

Classification alone does not change behaviour.

If people cannot easily tell whether information is public, internal, confidential, or sensitive, they will rely on guesswork. That introduces risk.

Annex A 5.13 ensures that classification:

  • Is visible at the point of use
  • Travels with information when it is shared
  • Supports consistent decision-making
  • Reduces accidental mishandling

Labelling acts as a practical signal, helping people apply the right level of care without needing to interpret policy every time.

How to Implement Annex A 5.13 Effectively

A pragmatic approach to Annex A 5.13 typically includes the following elements.

1. Align Labelling With the Classification Scheme

Labelling should directly reflect the organisation’s classification levels.

This ensures:

  • Consistent interpretation
  • Clear linkage between classification and handling
  • Reduced confusion across teams

Labelling procedures should follow the scheme defined under information classification.

2. Define When and How Information Is Labelled

Not all information needs the same labelling approach.

Organisations commonly define:

  • When labels are required
  • Which formats need labels (digital, physical, exported data)
  • Where labels should appear (headers, footers, metadata, covers)

The approach should match how information is actually created and used.

3. Use Metadata for Digital Information

For digital information, labelling is often implemented through metadata.

This supports:

  • Automated handling and discovery
  • Consistent application across systems
  • Reduced reliance on manual labelling

Metadata-based labelling is particularly effective where information is shared between systems or organisations.

4. Consider Risks of Over-Labelling

Highly visible labels can sometimes increase risk by drawing attention to sensitive information.

Organisations should consider:

  • Whether default classifications are more appropriate
  • When explicit labels add value
  • How labels affect usability and exposure

Labelling should support protection, not undermine it.

5. Ensure People Understand Labelling Expectations

Labelling is only effective if people know how to apply and interpret it.

This is often supported through:

  • Awareness and training
  • Clear guidance on common scenarios
  • Consistent management behaviour

Understanding matters more than enforcement.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Common Challenges and How to Overcome Them

  • Labelling everything manually
  • Use defaults and automation where possible
  • Inconsistent labels across systems
  • Align terminology and application centrally
  • Labels that are ignored or misunderstood
  • Keep schemes simple and intuitive
  • Over-emphasising visible labels for sensitive data
  • Balance visibility with risk awareness

Effective labelling should reduce effort, not add to it.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 5.13 is about making classification usable.

When information is labelled appropriately:

  • Handling decisions are easier
  • Accidental misuse is reduced
  • Consistency improves across the organisation
  • Other controls work more effectively

Labelling does not need to be perfect. It needs to be clear, consistent, and practical.

That is the outcome Annex A 5.13 is designed to achieve.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls