ISO 27001:2022 clause
What it requires
What TAF delivers
Clause 7.3(a)
Personnel must be aware of the information security policy and any
topic-specific policies relevant to their role.
Policy acknowledgement module with digital sign-off logs —
branded to your ISMS. Every policy version change triggers re-acknowledgement,
timestamped and exportable.
Clause 7.3(b)
Staff must understand their contribution to ISMS effectiveness, including
the benefits of improved information security performance.
Role-based learning paths — clinical, finance, IT, HR,
developers, executives each see how their work supports ISMS objectives.
Gamified performance metrics make the contribution visible.
Clause 7.3(c)
Staff must understand the implications of not conforming with ISMS
requirements.
Consequences-focused scenarios — realistic incident case
studies showing the business, regulatory, and personal consequences of
non-conformity. Not scare-tactics, just honest framing.
Annex A.6.3
Appropriate awareness, education, and training — with regular updates
to policies and procedures, relevant to job function.
12-month structured programme — 60+ interactive modules,
4 AI phishing simulations per year, 1 voice phishing drill, role-based
content, monthly security-tip broadcasts. Regular updates, by design.
Clause 7.2 (Competence)
Personnel doing work affecting ISMS performance shall be competent on
the basis of education, training, or experience.
Competence evidence — 70% pass threshold on every module,
assessment scores per employee, remediation paths for underperformers,
role-based competency records the auditor can sample.
Annex A.5.24 / A.5.25–5.27
Incident management — staff must know how to recognise, report, and escalate
information security events.
Incident-reporting module + 3-hour tabletop exercise
for IT and senior management — tests the full detect/report/escalate/contain
chain. Debrief produces auditable lessons-learned evidence.
Annex A.8.7 (Malware)
Protection against malware, including user-level behavioural controls
and awareness of phishing/social-engineering vectors.
AI-powered phishing simulations — 4 per year including
conversational AI phishing that adapts to employee replies in real time.
Per-employee click, report, and credential-submission tracking.
Annex A.6.4 (Disciplinary)
A disciplinary process for staff who have committed an information
security policy breach.
Escalation-ready evidence — per-employee policy-acknowledgement,
training, assessment, and simulation records that substantiate the disciplinary
file when action is warranted.