ISO 27001 Risk Assessment Guide: Methodology, Process & ISO 27005 Alignment
Risk assessment is the foundation of the ISO 27001 Information Security Management System. Clause 6.1.2 requires organizations to define and apply an information security risk assessment process that establishes risk criteria, ensures consistent and repeatable results, and identifies risks to the confidentiality, integrity, and availability of information. The risk assessment drives every subsequent ISMS decision, from control selection to resource allocation. This guide covers methodology selection, the assessment process, risk treatment planning, and alignment with ISO 27005.
Table of Contents
Risk Assessment Requirements Under ISO 27001
- ISO 27001 requires a risk assessment process but does not prescribe a specific methodology
- Risk criteria including acceptance thresholds must be established and maintained
- Repeated assessments must produce consistent, valid, and comparable results
- Risks must be identified for confidentiality, integrity, and availability of information
- Risk assessment must be performed at planned intervals and when significant changes occur
Choosing a Risk Assessment Methodology
- Asset-based approaches provide granular results but can be time-consuming for large organizations
- Scenario-based approaches focus on realistic threats and are more efficient for large environments
- Factor-based methodologies like NIST SP 800-30 and OCTAVE are well-established alternatives
- Most organizations use qualitative or semi-quantitative approaches with defined scales
- The chosen methodology must be documented, management-approved, and consistently applied
Asset Inventory and Information Classification
- Asset inventory must cover information assets, supporting assets, and third-party services
- Each asset should have an assigned owner responsible for its protection
- Information classification assigns sensitivity levels based on value, legal requirements, and criticality
- Classification levels directly influence risk impact assessments
- Completing inventory and classification before risk assessment ensures comprehensive coverage
Threat Identification and Vulnerability Analysis
- Threats include natural, environmental, human (intentional/unintentional), and technical categories
- Threat intelligence from industry sources, CVE databases, and incident history informs identification
- Vulnerabilities span technical, organizational, physical, and procedural domains
- The combination of threat, vulnerability, and asset constitutes a risk for the register
- The risk register is the central artifact driving all risk treatment decisions
Risk Evaluation and Treatment Planning
- Risk evaluation combines likelihood and impact using defined scales and risk matrices
- Risks above acceptance thresholds must be treated; those below may be accepted with documentation
- Treatment options: modify (controls), avoid (eliminate activity), share (transfer), or retain (accept)
- The risk treatment plan documents controls, owners, timelines, and expected residual risk
- Control selection references Annex A as minimum but may include NIST, CIS, or other sources
ISO 27005 Alignment and Continuous Improvement
- ISO 27005 provides detailed risk management guidance aligned with ISO 27001 requirements
- ISO 27005 is not mandatory for certification but provides a well-structured implementation framework
- Risk management is iterative: full assessments annually with targeted assessments on change
- The Plan-Do-Check-Act cycle ensures risk assessment improvements feed back into the ISMS
- Management review should evaluate both risk results and the effectiveness of the process itself
Key Takeaways
- Risk assessment is the foundation of the ISMS, driving all control selection and resource allocation decisions
- ISO 27001 requires a consistent, repeatable process but does not prescribe a specific methodology
- Asset inventory and information classification must be completed before meaningful risk assessment
- Threats span natural, environmental, human, and technical categories across technical, organizational, physical, and procedural domains
- Risk treatment options include modification, avoidance, sharing, and retention with documented justification
- ISO 27005 provides detailed aligned guidance but is not mandatory for certification
- Risk assessment is continuous, with full assessments annually and targeted assessments on significant change
Frequently Asked Questions
What risk assessment methodology should I use for ISO 27001?
ISO 27001 does not prescribe a specific methodology. Common choices include asset-based approaches (aligned with ISO 27005), scenario-based approaches, and factor-based methodologies like NIST SP 800-30 or OCTAVE. Choose based on your organization's size, complexity, and existing practices. The methodology must be documented and produce consistent, repeatable results.
How often should ISO 27001 risk assessments be performed?
Full risk assessments should be performed at planned intervals, typically annually. Additionally, targeted assessments are required when significant changes occur such as new systems, business process changes, security incidents, or organizational restructuring. The risk assessment is a continuous process, not a one-time activity.
What is the difference between risk assessment and risk treatment?
Risk assessment identifies, analyzes, and evaluates risks by determining their likelihood and impact. Risk treatment determines how to address identified risks through modification (controls), avoidance, sharing, or retention. Risk assessment informs treatment decisions; treatment implements the response to assessed risks.
Do I need ISO 27005 for ISO 27001 certification?
No. ISO 27005 is a guidance standard, not a requirement for ISO 27001 certification. However, it provides detailed risk management guidance that aligns well with ISO 27001 Clause 6.1.2 requirements and many organizations find it valuable for structuring their risk assessment process.
What is a risk register in ISO 27001?
A risk register is the central document that catalogs all identified risks, their assessed likelihood and impact, current risk levels, treatment decisions, control assignments, risk owners, and residual risk levels. It serves as the foundation for risk treatment planning and ongoing risk management.
How do I determine risk acceptance criteria?
Risk acceptance criteria define the threshold below which risks are acceptable without further treatment. They should be established by management based on the organization's risk appetite, business objectives, legal requirements, and stakeholder expectations. Criteria are typically expressed as risk levels (e.g., Low and Medium risks are accepted, High and Critical require treatment).
Generate ISO 27001 policies automatically
PoliWriter creates all the policies you need for ISO 27001 compliance, customized to your organization. AI-powered, audit-ready, hours not months.
Get Started Free