This website uses cookies. View our cookie policy
Select regional store:

ISO 27001 Risk Assessments

ISO 27001 is the international standard that sets out the specifications of an information security management system (ISMS), a best-practice approach to addressing information security that encompasses people, processes and technology. The assessment and management of information security risks is at the core of the ISO 27001 approach.

How an ISO 27001 risk assessment works

An ISMS is based on the outcomes of a risk assessment. Businesses need to produce a set of controls, based on the identified risks, in order to minimise those risks.

Risk assessments are conducted across the whole organisation. They cover all the possible risks that information could be exposed to, balanced against the likelihood of those risks materialising and their potential impact.

Once the risk assessment has been conducted, the company needs to decide how it will manage and mitigate those risks, based on allocated resources and budget.

ISO 27001 suggests that there are four ways to treat risks:

  1. ‘Terminate’ (or avoid) the risk by eliminating it entirely.
  2. ‘Treat’ the risk by applying security controls.
  3. ‘Transfer’ the risk to a third party.
  4. ‘Tolerate’ the risk.

Controls are not only technology but also cover people and organisational processes

There are 114 controls in Annex A, covering the breadth of information security management, including such areas as physical access control, firewall policies, security staff awareness programmes, procedures for monitoring threats, incident management processes and encryption.

The recommended controls from Annex A are divided into 14 categories

  • A .5 Information security policies
  • A.6 Organisation of information security
  • A.7 Human resources security
  • A.8 Asset management
  • A.9 Access control
  • A.10 Cryptography
  • A.11 Physical and environmental security
  • A.12 Operational security
  • A.13 Communications security
  • A.14 System acquisition, development and maintenance
  • A.15 Supplier relationships
  • A.16 Information security incident management
  • A.17 Information security aspects of business continuity management
  • A.18 Compliance

Risk reporting

ISO 27001 requires the organisation to produce a set of reports based on the risk assessment, for audit and certification purposes. The following two reports are the most important:

  • Statement of Applicability (SoA)
    The SoA should set out a list of all controls recommended by Annex A of ISO/IEC 27001:2013, together with a statement of whether or not the control has been applied, and a justification for its inclusion or exclusion.

  • Risk treatment plan (RTP)
    The RTP describes how the organisation plans to deal with the risks identified in the risk assessment.

Review, monitor, audit and report

ISO 27001 requires the organisation to continually review, update and improve the ISMS to make sure it is functioning optimally, and adjusts to the constantly changing threat environment.

One aspect of reviewing and testing is internal audit. This requires the ISMS manager to produce a set of reports that provide evidence that risks are being adequately treated.

An even more effective way in which the company can obtain the assurance that its risk treatment plan is working as intended, is by obtaining accredited certification.

Getting certified to ISO 27001

Achieving accredited certification to ISO 27001 demonstrates that an organisation is following information security best practice.

An independent auditor, appointed by an official certification body, will conduct a detailed assessment of the ISMS, interview key staff members, and review various documentation and reports to establish whether there are any conformities that need to be addressed. Based on the outcome of the audit, the company may be able to obtain certification that is valid for three years.

Risk assessment standards

A number of other information security and risk assessment standards support ISO 27001:

  • ISO/IEC 27005:2011 - Guidance for information security risk management.
  • ISO/IEC 31000:2009 - Guidance on the selection and application of systematic techniques for risk assessment.
  • ISO/IEC 31010:2009 - Guidance on the selection and application of systematic techniques for risk assessment.


Free download

Download now >>

Download this paper to find out more and unravel some of the issues surrounding the risk assessment process.