ISO 27001 Risk Assessment

Simplifying ISO 27001 Certification

What is an ISO 27001 Risk Assessment?

ISO/IEC 27001:2022 clause 6.1.2 requires every certified organization to establish, implement, and maintain a documented risk-assessment process. 

The clause insists on clear risk assessment criteria and auditable outputs (a live risk register and a risk treatment plan) but purposefully stops short of prescribing a specific method for how to do risk assessments in ISO 27001. 

iso 27001 risk assessment

Related ISO 27001 Risk Assessment Terms

Risk Assessment

A formal process within ISO/IEC 27001:2022 for identifying, analyzing, and evaluating risks to an organization’s information assets. The goal is to determine which risks are unacceptable and require treatment.

Inherent Risk

The level of risk before any controls are applied. It represents the potential impact and likelihood of a threat occurring in an unmitigated state.

Residual Risk

The remaining level of risk after controls and mitigation strategies have been implemented.

Risk Treatment

The process of selecting and applying measures (controls) to reduce or manage risks to acceptable levels.

Risk Appetite

The level and type of risk an organization is willing to accept in pursuit of its objectives.

Risk Criteria

The benchmarks or thresholds against which risk is evaluated. Includes likelihood scales, impact definitions, and acceptability thresholds.

Annex A Controls

The 93 security controls listed in ISO 27001:2022 are used to treat risks identified during the assessment.

ISO 27001 Risk Assessments: Build Security on Your Terms

Clause 6.1.2 of ISO/IEC 27001:2022 requires every certified organization to establish, implement, and maintain a documented information security risk assessment process.

  • Use defined risk-assessment criteria (likelihood, impact, acceptance levels)
  • Be repeatable and produce consistent, valid, and comparable results
  • Deliver a risk register and feed into the risk-treatment plan

This flexibility is essential, because a fintech startup in the cloud, for example,  faces different risks than a hospital running on legacy systems.

What The Standard Requires

ISO 27001 ClauseWhat Auditors Look ForProof You Need
6.1.2 a–bDefined risk-assessment criteriaScales, scoring rules, and language approved by leadership
6.1.2 c–dIdentified, analyzed, and evaluated risksCurrent risk register showing assets, threats, scores, and control coverage
6.1.3Planned and justified treatment actionsSoA mapping each unacceptable risk to Annex A or other justified controls
8.2Monitoring and reviewEvidence of periodic and event-driven reassessments

ISO 27001 Risk-Assessment Process

1. Frame the ContextDefine the ISMS scope, objectives, legal/regulatory drivers, and stakeholder expectations.
2. Build / Import Asset InventoryCatalog data, devices, applications, people, facilities, and suppliers- kicking off the iso 27001 third-party risk assessment track.
3. Set Risk-Assessment CriteriaEstablish likelihood & impact scales, acceptance thresholds, and name risk owners (management-approved).
4. Identify Threats & VulnerabilitiesPull from incident logs, CVE feeds, threat libraries, and staff workshops.
5. Analyse & EvaluateScore inherent risk, map existing controls, calculate residual risk, and compare against the acceptance threshold.
6. Decide the TreatmentChoose to avoid, transfer, accept, or mitigate; link each unacceptable risk to Annex A controls.
7. Approve & RecordLeadership signs off the risk register, treatment plan, and Statement of Applicability.
8. Monitor & RefreshRun scheduled reviews plus change-triggered spot checks for ongoing ISO 27001 certificate maintenance, risk assessment, and mitigation.

Start Getting Value With
Centraleyes for Free

See for yourself how the Centraleyes platform exceeds anything an old GRC
system does and eliminates the need for manual processes and spreadsheets
to give you immediate value and run a full risk assessment in less than 30 days

Start building your risk management program

Key Reports Associated with ISO 27001 Risk Assessments

ISO 27001 Risk Assessment Report 

A narrative summary of the entire exercise: scope, methodology, criteria, findings, and business-impact overview. Auditors read this first to understand how you ran the assessment and why certain risks matter most.

Risk Register 

The live spreadsheet (or platform view) lists every identified risk with its inherent and residual scores, owner, status, and links to evidence. It is your single source of truth for day-to-day risk monitoring and audit sampling.

Risk-Assessment & Treatment Methodology

A standalone document that explains the scoring scales, likelihood/impact definitions, and decision rules you follow when accepting, mitigating, transferring, or avoiding risk. It proves consistency and repeatability across assessments.

Risk Treatment Plan

An action tracker showing what must be done to bring each unacceptable risk down to an acceptable level. It names the control(s) selected, the person accountable, deadlines, budgets, and progress updates- turning analysis into execution.

Statement of Applicability (SoA)

A control-by-control list of all 93 Annex A measures, marking each as implemented, not applicable, or planned, and giving a justification for every exclusion. The SoA is the bridge between risk findings and the control environment that auditors will test.

FAQ: ISO 27001 Risk Assessments

Q: How often do I need to perform a risk assessment?

A: ISO 27001 doesn’t mandate a frequency, but you must define one and stick to it. Most organizations reassess annually or after significant changes.

Q: Can I use a spreadsheet for my risk assessment?

A: Yes, if it’s well-structured, consistently updated, and tracks risk status, control mapping, and ownership.

Q: Is an ISO  27001 risk assessment tool required?

A: No, but platforms help automate evidence collection, versioning, and reporting.

Q: Who should be involved?

A: Risk owners across functions: IT, legal, HR, ops, and security. Broader input leads to better risk visibility.

Q: Do I have to use CVSS or FAIR?

A: No. Any defined, documented, and consistent methodology is valid under ISO.

Q: What do auditors focus on?

A: Traceability, stakeholder involvement, current documentation, and how risks link to the SoA and treatment plan.

Skip to content