ISO 27001 Risk Assessment: Complete Process Guide
Risk assessment is at the heart of ISO 27001. It drives your control selection and shapes your entire ISMS. This guide walks you through the complete risk assessment process.
Key Takeaways
| Point | Summary |
|---|---|
| Required by | Clauses 6.1.2 (define process), 8.2 (perform at intervals), 8.3 (implement treatment) |
| 4-step process | Establish Context → Risk Identification → Risk Analysis → Risk Evaluation |
| Treatment options | Modify (implement controls), Accept, Avoid, or Share (transfer) |
| Outputs | Risk register, risk treatment plan, Statement of Applicability |
| Frequency | Initial assessment + annual reviews + when significant changes occur |
Quick Answer: Risk assessment is mandatory for ISO 27001. Identify information assets, threats, and vulnerabilities, then assess likelihood and impact. Choose treatment options (modify/accept/avoid/share) and document in your risk register and Statement of Applicability.
Why Risk Assessment Matters
ISO 27001 Requirements
Risk assessment isn't optional. It's a core requirement:
| Clause | Requirement |
|---|---|
| 6.1.2 | Define and apply a risk assessment process |
| 8.2 | Perform risk assessments at planned intervals |
| 8.3 | Implement risk treatment plan |
Business Value
Beyond compliance, risk assessment provides:
| Value | Description |
|---|---|
| Informed decisions | Know where to invest in security |
| Resource prioritization | Focus on what matters most |
| Management buy-in | Justify security investments |
| Audit evidence | Demonstrate systematic approach |
Risk Assessment Framework
Overview
ISO 27001 Risk Assessment Framework:
1. Establish Context:
- Define scope and criteria
- Set risk acceptance thresholds
2. Risk Identification:
- Identify assets
- Identify threats
- Identify vulnerabilities
- Identify consequences
3. Risk Analysis:
- Assess likelihood
- Assess impact
- Calculate risk level
4. Risk Evaluation:
- Compare against criteria
- Prioritize risks
- Determine treatment need
5. Risk Treatment:
- Select treatment option
- Choose controls
- Document in SoA
Step 1: Establish Context
Define Scope
Before assessing risks, establish boundaries:
| Question | Answer Needed |
|---|---|
| What systems are included? | List of in-scope systems |
| What data is covered? | Data types and classification |
| What locations? | Geographic scope |
| What processes? | Business processes |
Set Risk Criteria
Likelihood Scale (Example):
| Level | Rating | Description |
|---|---|---|
| 1 | Rare | Less than once every 5 years |
| 2 | Unlikely | Once every 2-5 years |
| 3 | Possible | Once per year |
| 4 | Likely | Several times per year |
| 5 | Almost Certain | Monthly or more |
Impact Scale (Example):
| Level | Rating | Financial | Operational | Reputational |
|---|---|---|---|---|
| 1 | Negligible | <$10K | Minutes | Minimal |
| 2 | Minor | $10K-$50K | Hours | Limited |
| 3 | Moderate | $50K-$250K | Days | Moderate |
| 4 | Major | $250K-$1M | Weeks | Significant |
| 5 | Severe | >$1M | Months | Severe |
Risk Acceptance Threshold:
| Risk Level | Acceptance |
|---|---|
| Low (1-4) | Generally acceptable |
| Medium (5-12) | Management decision required |
| High (15-25) | Not acceptable, must treat |
Step 2: Risk Identification
Asset Identification
Identify what you're protecting:
Information Assets:
| Category | Examples |
|---|---|
| Customer data | PII, payment info, usage data |
| Business data | Financial records, contracts |
| Intellectual property | Source code, algorithms |
| Operational data | Logs, configurations |
Supporting Assets:
| Category | Examples |
|---|---|
| Hardware | Servers, laptops, network equipment |
| Software | Applications, operating systems |
| Services | Cloud services, SaaS tools |
| People | Employees, contractors |
Asset Register Template:
| Asset ID | Asset Name | Type | Owner | Classification | Location |
|---|---|---|---|---|---|
| A001 | Customer database | Data | CTO | Confidential | AWS RDS |
| A002 | Production servers | Infrastructure | DevOps Lead | Internal | AWS EC2 |
| A003 | Source code | IP | Engineering Lead | Confidential | GitHub |
Threat Identification
Identify what could go wrong:
| Threat Category | Examples |
|---|---|
| Deliberate | Hacking, malware, insider attack, theft |
| Accidental | Misconfiguration, human error, data loss |
| Environmental | Fire, flood, power failure |
| Technical | System failure, software bugs |
Common Threats for SaaS Companies:
| Threat | Target | Likelihood |
|---|---|---|
| Phishing attack | Employees | High |
| Credential compromise | User accounts | High |
| Ransomware | All systems | Medium |
| Insider data theft | Customer data | Low |
| Cloud misconfiguration | Infrastructure | Medium |
| DDoS attack | Application | Medium |
| Supply chain attack | Third-party software | Medium |
Vulnerability Identification
Identify weaknesses that threats could exploit:
| Vulnerability Type | Examples |
|---|---|
| Technical | Unpatched systems, weak encryption, open ports |
| Process | No access reviews, weak change management |
| People | Lack of training, no background checks |
| Physical | Inadequate access controls, no monitoring |
Consequence Identification
Identify potential impacts:
| Consequence | Description |
|---|---|
| Confidentiality breach | Unauthorized data disclosure |
| Integrity violation | Data modification or corruption |
| Availability loss | System downtime or data loss |
| Compliance violation | Regulatory penalties |
| Reputation damage | Customer trust loss |
| Financial loss | Direct costs, lost revenue |
Step 3: Risk Analysis
Risk Calculation
(Note: ISO/IEC 27001 does not prescribe a specific risk calculation formula; organizations must define and justify their approach. The following is a commonly used method.)
Risk Level = Likelihood × Impact
Risk Matrix:
| Likelihood / Impact | 1 | 2 | 3 | 4 | 5 |
|---|---|---|---|---|---|
| 5 | 5 | 10 | 15 | 20 | 25 |
| 4 | 4 | 8 | 12 | 16 | 20 |
| 3 | 3 | 6 | 9 | 12 | 15 |
| 2 | 2 | 4 | 6 | 8 | 10 |
| 1 | 1 | 2 | 3 | 4 | 5 |
Risk Levels: Low (1-4), Medium (5-12), High (15-25)
Risk Analysis Example
| Risk ID | Threat | Asset | Likelihood | Impact | Risk Level |
|---|---|---|---|---|---|
| R001 | Phishing attack | Employee credentials | 4 | 4 | 16 (High) |
| R002 | Cloud misconfiguration | Customer data | 3 | 5 | 15 (High) |
| R003 | Insider data theft | Customer data | 2 | 5 | 10 (Medium) |
| R004 | DDoS attack | Application availability | 3 | 3 | 9 (Medium) |
| R005 | Laptop theft | Corporate data | 3 | 2 | 6 (Medium) |
Step 4: Risk Evaluation
Compare to Criteria
| Risk Level | Treatment Required? |
|---|---|
| High (15-25) | Yes, mandatory treatment |
| Medium (5-12) | Management decision |
| Low (1-4) | Accept, monitor |
Prioritize Risks
Rank risks for treatment based on:
- Risk level (highest first)
- Business impact
- Treatment cost
- Quick wins available
Priority Matrix:
| Risk Level / Treatment Effort | Low Effort | High Effort |
|---|---|---|
| High Risk | Priority 1 | Priority 2 |
| Low Risk | Priority 3 | Priority 4 |
Step 5: Risk Treatment
Treatment Options
| Option | Description | When to Use |
|---|---|---|
| Modify | Implement controls to reduce risk | Most common option |
| Retain | Retain risk as-is | Risk within tolerance |
| Avoid | Eliminate the activity | Risk unacceptable |
| Share | Transfer to third party | Insurance, outsourcing |
Control Selection
For each risk to be modified, select appropriate controls:
| Risk | Treatment | Controls |
|---|---|---|
| Phishing attack | Modify | Security awareness training (6.3), MFA (8.5) |
| Cloud misconfiguration | Modify | Configuration management (8.9), Cloud security (5.23) |
| Insider data theft | Modify | Screening (6.1), Access control (5.15), Monitoring (8.16) |
| DDoS attack | Share + Modify | DDoS protection service, Redundancy (8.14) |
| Laptop theft | Modify | Encryption (8.24), MDM (8.1) |
Residual Risk
After treatment, assess remaining risk:
Risk Treatment Effect:
| Inherent Risk | Controls Applied | Residual Risk |
|---|---|---|
| 16 | MFA, Training | 6 |
| 15 | Config Mgmt | 5 |
| 10 | Access Control | 4 |
| 9 | DDoS Service | 3 |
| 6 | Encryption | 2 |
Risk Register Template
Essential Fields
| Field | Purpose |
|---|---|
| Risk ID | Unique identifier |
| Risk description | What could happen |
| Asset affected | What's at risk |
| Threat | What could cause it |
| Vulnerability | What weakness exists |
| Likelihood | How likely (1-5) |
| Impact | How severe (1-5) |
| Risk level | Calculated score |
| Treatment decision | Modify/Accept/Avoid/Share |
| Controls | Selected mitigations |
| Risk owner | Who's responsible |
| Residual risk | Risk after treatment |
| Status | Open/In progress/Closed |
Sample Risk Register Entry
Sample Risk Register Entry:
Risk ID: R001
Description: Successful phishing attack leading to credential compromise
Asset: Employee credentials, corporate systems
Threat: Phishing/social engineering
Vulnerability: Insufficient security awareness
Inherent Risk Assessment:
- Likelihood: 4 (Likely)
- Impact: 4 (Major)
- Risk Level: 16 (High)
Treatment: Modify
Controls:
- 6.3 Security awareness training
- 8.5 MFA on all systems
- 8.7 Email security/anti-phishing
Residual Risk Assessment:
- Likelihood: 2 (Unlikely)
- Impact: 3 (Moderate - contained by MFA)
- Residual Risk: 6 (Medium - Acceptable)
Risk Owner: CISO
Status: Controls implemented, monitoring
Review Date: Quarterly
Common Risk Assessment Mistakes
Mistake 1: Over-Complexity
Problem: 500+ risks, impossible to manage
Solution:
- Focus on significant risks
- Group similar risks
- Use appropriate granularity
- Target 30-75 key risks for most organizations
Mistake 2: Asset-Only Focus
Problem: Risk = "database gets hacked"
Solution:
- Link threats to specific vulnerabilities
- Consider threat actors and motivations
- Make risks actionable
Mistake 3: Inconsistent Criteria
Problem: Different people rate same risk differently
Solution:
- Clearly defined scales with examples
- Calibration exercises
- Consistent methodology
Mistake 4: Set and Forget
Problem: Risk register becomes outdated
Solution:
- Regular reviews (quarterly minimum)
- Update after incidents
- Review after significant changes
- Integrate into business processes
Mistake 5: Risk Assessment Theater
Problem: Going through motions without insight
Solution:
- Focus on actionable findings
- Connect to real business concerns
- Use results for decisions
- Report to management meaningfully
Risk Assessment for Auditors
What Auditors Look For
| Requirement | Evidence |
|---|---|
| Defined methodology | Risk assessment procedure document |
| Consistent application | Risk register following methodology |
| Appropriate criteria | Defined scales, acceptance thresholds |
| Complete coverage | All assets/threats considered |
| Regular updates | Evidence of periodic review |
| Risk treatment decisions | Documented rationale |
| Statement of Applicability | Controls mapped to risks |
Common Audit Findings
| Finding | Prevention |
|---|---|
| Methodology not documented | Write procedure before starting |
| Criteria not defined | Establish scales upfront |
| Risk register incomplete | Systematic asset/threat identification |
| No evidence of review | Document reviews, keep history |
| SoA not linked to risks | Map controls to risks explicitly |
The Bastion Approach
Streamlined Risk Assessment
Bastion simplifies risk assessment without sacrificing rigor:
| Challenge | Bastion Solution |
|---|---|
| Methodology development | Pre-built, auditor-approved methodology |
| Asset identification | Automated discovery from integrations |
| Threat identification | Industry-specific threat library |
| Risk analysis | Guided scoring with calibration |
| Control mapping | Automatic control recommendations |
| Documentation | Risk register with full audit trail |
Expert Guidance
Your vCISO helps with:
- Risk assessment facilitation
- Consistent scoring across organization
- Appropriate level of detail
- Management reporting
- Auditor preparation
Need help with your risk assessment? Talk to our team →
Sources
- ISO/IEC 27001:2022, Clause 6.1.2 - Information security risk assessment requirements
- ISO/IEC 27001:2022, Clause 6.1.3 - Risk treatment options (modify, retain, avoid, share)
- ISO/IEC 27001:2022, Clause 8.2 - Requirements for performing risk assessments at planned intervals
- ISO/IEC 27001:2022, Clause 8.3 - Risk treatment implementation requirements
