ISO 27001 Requirements: Complete Guide to Clauses 4-10
ISO 27001 is built around mandatory requirements defined in Clauses 4-10. Understanding these requirements is essential for building a compliant ISMS. This guide breaks down each clause and what you need to do.
Key Takeaways
| Point | Summary |
|---|---|
| 7 mandatory clauses | Clauses 4-10 are auditable requirements; Clauses 0-3 are introductory |
| Clause 4 | Context - define ISMS scope and stakeholder requirements |
| Clause 5-6 | Leadership & Planning - management commitment, risk assessment, Statement of Applicability |
| Clause 7-8 | Support & Operation - resources, documentation, control implementation |
| Clause 9-10 | Evaluation & Improvement - internal audit, management review, corrective actions |
Quick Answer: ISO/IEC 27001:2022 has 7 mandatory clauses (4-10) plus 93 Annex A controls organized in 4 themes (Organizational, People, Physical, Technological). Key deliverables include scope document, security policy, risk assessment, Statement of Applicability, internal audit, and management review records.
Overview of ISO 27001 Clauses
Clause Structure
ISO 27001:2022 Structure:
Clauses 0-3: Introduction (not auditable):
- Introduction
- Scope
- Normative references
- Terms and definitions
Clauses 4-10: Requirements (auditable):
- Context of the organization
- Leadership
- Planning
- Support
- Operation
- Performance evaluation
- Improvement
Annex A: Control objectives and controls:
- 93 controls in 4 themes
Which Clauses Are Required?
| Clause | Requirement Level | Notes |
|---|---|---|
| 4-10 | Mandatory | Cannot exclude any |
| Annex A | Mandatory to consider | Can exclude with justification |
Clause 4: Context of the Organization
Purpose
Establish the foundation for your ISMS by understanding your organization and stakeholder needs.
4.1 Understanding the Organization and its Context
Requirement: Determine external and internal issues relevant to your purpose and affecting ISMS outcomes.
External issues to consider:
- Legal and regulatory requirements
- Market conditions
- Technological changes
- Customer expectations
- Competitive landscape
Internal issues to consider:
- Organizational structure
- Culture and values
- Resources and capabilities
- Information systems
- Business processes
Documentation: Context analysis document
4.2 Understanding Stakeholder Needs and Expectations
Requirement: Identify interested parties and their requirements.
| Stakeholder | Typical Requirements |
|---|---|
| Customers | Data protection, service availability |
| Employees | Job security, privacy |
| Regulators | Legal compliance |
| Shareholders | Risk management, reputation |
| Partners | Security assurance |
Documentation: Stakeholder register
4.3 Determining the Scope of the ISMS
Requirement: Define ISMS boundaries and applicability.
Scope considerations:
- External and internal issues (4.1)
- Stakeholder requirements (4.2)
- Interfaces and dependencies
- Organizational boundaries
- Information assets included
Example scope statement:
"The ISMS covers the development, delivery, and support of [Product Name], including all cloud infrastructure, development systems, and customer data processing activities."
Documentation: ISMS scope document
4.4 Information Security Management System
Requirement: Establish, implement, maintain, and continually improve the ISMS.
This encompasses:
- All requirements in Clauses 4-10
- Selected Annex A controls
- Additional controls as needed
- Documentation requirements
Clause 5: Leadership
Purpose
Ensure management commitment and establish organizational security direction.
5.1 Leadership and Commitment
Requirement: Top management must demonstrate leadership by:
| Commitment Area | Evidence |
|---|---|
| Ensuring ISMS achieves outcomes | Defined objectives, measured results |
| Providing resources | Budget allocation, staffing |
| Communicating importance | Communications, policy statements |
| Ensuring results are achieved | Management reviews, metrics |
| Supporting continual improvement | Investment in improvements |
5.2 Policy
Requirement: Establish an information security policy that:
| Policy Requirement | Description |
|---|---|
| Appropriate to purpose | Aligned with business objectives |
| Includes objectives | Clear security goals |
| Includes commitment | To satisfy requirements and improve |
| Communicated | Available to all relevant parties |
| Documented | Written and maintained |
Key policy elements:
- Purpose and scope
- Security objectives
- Management commitment
- Roles and responsibilities
- Review and update process
5.3 Organizational Roles, Responsibilities, and Authorities
Requirement: Assign and communicate security responsibilities.
Critical roles:
| Role | Responsibilities |
|---|---|
| Top management | Overall accountability, resource allocation |
| ISMS Manager | Implementation, coordination, reporting |
| Risk owners | Managing specific risks |
| Control owners | Operating and maintaining controls |
| Internal auditor | Verifying ISMS effectiveness |
Clause 6: Planning
Purpose
Address risks and opportunities, and establish security objectives.
6.1 Actions to Address Risks and Opportunities
6.1.1 General
Determine risks and opportunities considering:
- Context (4.1)
- Stakeholder requirements (4.2)
Plan actions to:
- Achieve intended ISMS outcomes
- Prevent or reduce undesired effects
- Achieve continual improvement
6.1.2 Information Security Risk Assessment
Requirement: Define and apply a risk assessment process.
Risk Assessment Process:
Step 1: Establish Criteria:
- Risk acceptance criteria
- Criteria for performing assessments
- Consistency and validity requirements
Step 2: Identify Risks:
- Identify information assets
- Identify threats
- Identify vulnerabilities
- Identify potential consequences
- Identify risk owners
Step 3: Analyze Risks:
- Assess likelihood
- Assess impact
- Calculate risk level
Step 4: Evaluate Risks:
- Compare against criteria
- Prioritize for treatment
- Document decisions
Documentation:
- Risk assessment methodology
- Risk register
- Risk assessment results
6.1.3 Information Security Risk Treatment
Requirement: Define and apply a risk treatment process.
| Treatment Option | When to Use |
|---|---|
| Modify (mitigate) | Implement controls to reduce risk |
| Accept | Risk within tolerance |
| Avoid | Eliminate the activity |
| Share (transfer) | Insurance, outsourcing |
Key outputs:
- Risk treatment plan
- Statement of Applicability (SoA)
Statement of Applicability must include:
- Selected controls and justification
- Implementation status
- Excluded controls and justification
6.2 Information Security Objectives and Planning
Requirement: Establish measurable security objectives.
Objectives must be:
| Characteristic | Example |
|---|---|
| Consistent with policy | Aligned with security policy commitments |
| Measurable | "Achieve 100% MFA adoption" |
| Consider requirements | Address stakeholder needs |
| Monitored | Regular tracking |
| Communicated | Known to relevant parties |
| Updated | Revised as needed |
Planning must determine:
- What will be done
- Required resources
- Responsible parties
- Completion timeline
- How results will be evaluated
Clause 7: Support
Purpose
Provide resources needed for ISMS effectiveness.
7.1 Resources
Requirement: Determine and provide necessary resources.
| Resource Type | Examples |
|---|---|
| Financial | Budget for tools, training, audits |
| Human | Security staff, ISMS manager |
| Infrastructure | Security tools, systems |
| Time | Allocation for ISMS activities |
7.2 Competence
Requirement: Ensure personnel competence for ISMS roles.
Actions required:
- Determine required competence
- Ensure competence through education, training, or experience
- Take actions to acquire competence where needed
- Retain evidence of competence
Evidence: Training records, certifications, qualifications
7.3 Awareness
Requirement: Personnel must be aware of:
| Awareness Area | Details |
|---|---|
| Security policy | Understand the policy |
| Their contribution | How they support ISMS |
| Implications of nonconformity | Consequences of not complying |
Evidence: Training completion records, acknowledgments
7.4 Communication
Requirement: Determine internal and external communication needs.
| Communication Aspect | Determination Needed |
|---|---|
| What to communicate | Security updates, incidents, policies |
| When to communicate | Triggers and schedules |
| With whom | Internal teams, external parties |
| How to communicate | Channels and methods |
| Who communicates | Responsible parties |
7.5 Documented Information
Requirement: Create and maintain required documentation.
7.5.1 General
Include:
- Documentation required by ISO 27001
- Documentation needed for ISMS effectiveness
7.5.2 Creating and Updating
Ensure appropriate:
- Identification and description
- Format and media
- Review and approval
7.5.3 Control of Documented Information
Ensure:
- Availability and suitability
- Adequate protection
- Distribution and access control
- Storage and preservation
- Change control
- Retention and disposition
Clause 8: Operation
Purpose
Execute the ISMS through operational planning and risk management.
8.1 Operational Planning and Control
Requirement: Plan, implement, and control processes needed for ISMS.
| Activity | Description |
|---|---|
| Establish criteria | Define process requirements |
| Implement control | Execute according to criteria |
| Keep records | Maintain evidence of execution |
| Control changes | Manage planned and unplanned changes |
| Control outsourced processes | Ensure third-party compliance |
8.2 Information Security Risk Assessment
Requirement: Perform risk assessments at planned intervals or when significant changes occur.
Triggers for reassessment:
- Planned intervals (typically annual)
- Significant organizational changes
- Major system changes
- After security incidents
- New threats identified
Documentation: Risk assessment results
8.3 Information Security Risk Treatment
Requirement: Implement the risk treatment plan.
Evidence required:
- Risk treatment actions completed
- Control implementation status
- Residual risk assessment
- Risk treatment results
Clause 9: Performance Evaluation
Purpose
Monitor, measure, audit, and review ISMS effectiveness.
9.1 Monitoring, Measurement, Analysis, and Evaluation
Requirement: Evaluate ISMS and control performance.
| Determination | Description |
|---|---|
| What to monitor | Processes, controls, objectives |
| Methods | How to measure |
| When | Frequency of monitoring |
| Who | Responsible parties |
| When to analyze | Timing of analysis |
| Who analyzes | Responsible parties |
Metrics examples:
| Metric | Target |
|---|---|
| Training completion | 100% |
| Access review completion | Quarterly |
| Vulnerability remediation SLA | 95% met |
| Incident response time | < 4 hours |
9.2 Internal Audit
Requirement: Conduct internal audits at planned intervals.
9.2.1 Audit Requirements
Audit must determine if ISMS:
- Conforms to organization's requirements
- Conforms to ISO 27001 requirements
- Is effectively implemented and maintained
9.2.2 Audit Program
| Aspect | Requirement |
|---|---|
| Frequency | Based on importance and previous results |
| Methods | Defined approach |
| Responsibilities | Clear ownership |
| Planning | Documented schedule |
| Reporting | Results to management |
| Independence | Auditors objective and impartial |
Documentation: Audit program, audit reports
9.3 Management Review
Requirement: Review ISMS at planned intervals.
9.3.1 General
Top management must review ISMS to ensure suitability, adequacy, and effectiveness.
9.3.2 Management Review Inputs
| Input | Description |
|---|---|
| Previous review actions | Status of prior decisions |
| Changes | External/internal issues affecting ISMS |
| Performance feedback | Nonconformities, monitoring, audits, objectives |
| Stakeholder feedback | From interested parties |
| Risk assessment results | Current risk status |
| Improvement opportunities | Potential enhancements |
9.3.3 Management Review Outputs
| Output | Description |
|---|---|
| Improvement decisions | What to improve |
| ISMS changes | Modifications needed |
| Resource needs | Additional resources required |
Documentation: Management review minutes/records
Clause 10: Improvement
Purpose
Continually improve ISMS suitability, adequacy, and effectiveness.
10.1 Nonconformity and Corrective Action
Requirement: React to nonconformities and take corrective action.
When nonconformity occurs:
Nonconformity Management Process:
1. React to nonconformity:
- Control and correct it
- Deal with consequences
2. Evaluate corrective action need:
- Review the nonconformity
- Determine causes
- Check for similar issues
3. Implement corrective actions:
- Address root cause
4. Review effectiveness:
- Verify action worked
5. Update ISMS if needed:
- Make necessary changes
Documentation: Nonconformity records, corrective action records
10.2 Continual Improvement
Requirement: Continually improve ISMS suitability, adequacy, and effectiveness.
Improvement sources:
| Source | Examples |
|---|---|
| Audit findings | Internal and external audits |
| Risk changes | New or changed risks |
| Performance data | Metrics and monitoring |
| Incident analysis | Lessons learned |
| Technology changes | New tools and methods |
| Best practices | Industry developments |
Requirements Summary Table
| Clause | Key Deliverables |
|---|---|
| 4. Context | Context analysis, stakeholder register, scope document |
| 5. Leadership | Security policy, roles and responsibilities |
| 6. Planning | Risk methodology, risk register, SoA, objectives |
| 7. Support | Resources, training records, awareness evidence, documentation |
| 8. Operation | Control implementation, risk assessment results |
| 9. Evaluation | Metrics, internal audit reports, management review records |
| 10. Improvement | Corrective action records, improvement evidence |
The Bastion Approach
Simplified Requirements Management
Bastion helps you address all ISO 27001 requirements:
| Challenge | Bastion Solution |
|---|---|
| Understanding requirements | Expert guidance from vCISO |
| Creating documentation | Pre-built templates for all clauses |
| Risk assessment | Guided methodology with automation |
| Evidence collection | Automated collection and tracking |
| Audit preparation | Requirement-mapped evidence |
Need help meeting ISO 27001 requirements? Talk to our team →
Sources
- ISO/IEC 27001:2022 - Official ISO 27001 standard overview
- ISO 27001 Clauses Explained (ISO) - Information security management system requirements
- ISO/IEC 27002:2022 - Guidance on implementing Annex A controls
- ISMS Online ISO 27001 Requirements - Clause-by-clause implementation guidance
- BSI ISO 27001 Certification - UK certification body guidance
