1. Framework FAQs

What are good information security objectives?

Set information security objectives that drive continuous improvement

Your information security objectives should align with your organisation's overall goals, address current and emerging threats, and focus on continuous improvement. It is good practise to set new objectives each year and expected if you are complying with standards including ISO 27001.

It's good practice to have separate Key Performance Indicators (KPIs) for your annual information security objectives. Separate KPIs help you measure the progress and effectiveness of each objective individually, ensuring that you're on track to achieve your goals. They also provide clarity and focus for your team, allowing you to identify areas that may need more attention or resources. Review this article on creating and tracking KPI's. 

Example Information Security Objectives:

Enhance Data Protection

Objective: Implement advanced encryption techniques across all data storage and transmission processes.

Target: Achieve 100% encryption of sensitive data by year-end.

Why: Ensures data confidentiality and integrity, reducing the risk of breaches.

Improve Incident Response Capabilities

Objective: Reduce incident detection and response time by 30%.

Target: Average time to detect and respond to incidents reduced from X hours to Y hours by Q4.

 Why: Faster response times can mitigate the impact of security incidents.

Achieve Compliance with Industry Standards

Objective: Attain or maintain compliance with ISO 27001, SOC 2, GDPR, or other relevant standards.

Target: Successfully pass all compliance audits with zero critical findings by the end of the year.

Why: Compliance ensures that the organisation meets legal and regulatory requirements, protecting against legal risks.

Strengthen Employee Awareness and Training

Objective: Increase employee participation in security training programs.

Target: 100% of employees complete mandatory security training and at least one additional advanced training session by Q3.

Why: Educated employees are less likely to fall victim to phishing or other social engineering attacks.

Enhance Vulnerability Management

Objective: Reduce the number of high-risk vulnerabilities by 50%.

Target: High-risk vulnerabilities are reduced from X to Y by year-end through regular patch management and vulnerability scanning.

Why: Addressing vulnerabilities reduces the attack surface, minimising the likelihood of a breach.

Increase Security of Remote Work Environments

Objective: Implement and enforce security policies for remote work, including the use of VPNs and multi-factor authentication (MFA).

Target: 100% adoption of MFA and secure VPN usage by all remote employees by mid-year.

Why: Secures remote access points and reduces potential vulnerabilities in a distributed workforce.

Implement Continuous Monitoring

Objective: Deploy continuous monitoring tools to track and respond to security threats in real-time.

Target: Real-time monitoring implemented across 100% of critical systems by Q3.

Why: Continuous monitoring allows for quicker detection and response to security incidents.

Reduce Third-Party Risk

Objective: Strengthen third-party risk management by auditing key vendors and partners.

Target: Conduct security audits on all critical third-party vendors and address any identified risks by year-end.

Why: Ensures that third-party partners do not become a weak link in your security chain.

Enhance Identity and Access Management

Objective: Implement role-based access control (RBAC) across all systems.

Target: 100% of systems using RBAC by Q2, with regular reviews to ensure appropriate access levels.

Why: Limits access to sensitive information to only those who need it, reducing the risk of insider threats.

Increase Automation in Security Processes

Objective: Automate routine security tasks, such as log analysis and patch management.

Target: Automate 50% of security operations processes by year-end.

Why: Automation reduces human error and allows the security team to focus on more strategic initiatives.


These objectives should be tailored to your organisation's specific needs, risk profile, and regulatory environment. Additionally, they should be measurable, achievable, and revisited regularly to ensure they remain relevant and aligned with your evolving security landscape.