ComplyGuideComplyGuide
HomeSoftwareLearn
Submit a Tool
ComplyGuideComplyGuide

Find and compare the best compliance automation tools. Trusted by thousands of compliance professionals.

Directory

  • All Vendors

Frameworks

  • SOC 2
  • HIPAA
  • GDPR
  • ISO 27001
  • PCI DSS
  • FedRAMP
  • NIST CSF

Resources

  • Learn

For Vendors

  • Submit a Tool
  • Premium Subscription
  • Claim Your Listing

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 ComplyGuide. All rights reserved.

Made for compliance professionals

Get a RecommendationBrowse Tools
Home/Learn/ISO 27001/ISO 27001 Risk Assessment: Complete Guide
Implementation
10 min read|January 15, 2025|Reviewed: March 20, 2026

ISO 27001 Risk Assessment: Complete Guide

Quick Answer

The ISO 27001 risk assessment is the cornerstone of the ISMS. It requires you to identify information security risks, analyze their likelihood and impact, evaluate them against your risk criteria, and select appropriate controls from Annex A to treat unacceptable risks.

Reviewed by ComplyGuide Editorial Team·Updated January 15, 2025

Why Risk Assessment Is Central to ISO 27001

Unlike prescriptive frameworks that tell you exactly what to do, ISO 27001 is risk-based. The risk assessment determines which security controls you implement and why. Everything flows from it: your Statement of Applicability, your control selection, your resource allocation, and your security priorities.

Key Takeaways

  • Risk assessment is mandatory under Clause 6.1.2 — you cannot skip or shortcut it
  • ISO 27001 doesn't prescribe a specific methodology — you choose your own approach
  • The risk assessment must be repeatable and produce consistent, comparable results
  • Risk treatment connects to Annex A controls — each selected control should trace to a risk
  • Must be reviewed and updated at least annually or when significant changes occur

Risk Assessment Process

Conducting an ISO 27001 Risk Assessment

1
Define your risk assessment methodology

Choose and document your approach: asset-based (identify assets first, then threats/vulnerabilities), scenario-based (identify risk scenarios), or threat-based. Define risk criteria: how you measure likelihood and impact, and what level of risk is acceptable.

2
Identify information assets

Catalog information assets within the ISMS scope: data, systems, processes, people, physical locations. Consider all forms — digital, paper, verbal. Assign owners to each asset.

3
Identify threats and vulnerabilities

For each asset, identify potential threats (what could go wrong) and vulnerabilities (weaknesses that threats could exploit). Common sources: threat catalogs, incident history, industry reports, penetration test results.

4
Analyze risks (likelihood x impact)

Assess each risk's likelihood of occurring and potential impact if it does. Use a consistent scale (e.g., 1-5 for each). Calculate risk level. Many organizations use a risk matrix (e.g., 5x5 grid).

5
Evaluate risks against criteria

Compare assessed risk levels against your predefined risk acceptance criteria. Determine which risks are acceptable (retain) and which require treatment. Prioritize risks for treatment.

6
Select risk treatment options

For each unacceptable risk, choose a treatment: mitigate (apply controls), transfer (insurance, outsourcing), avoid (stop the activity), or accept (with management approval). Map mitigating controls to Annex A.

7
Create the risk treatment plan

Document the selected treatment for each risk, responsible owners, timelines, and resources needed. This plan drives your ISMS implementation.

Risk Treatment Options

Risk Treatment Strategies
OptionDescriptionWhen to UseExample
Mitigate (Modify)Apply controls to reduce likelihood or impactMost common option for significant risksImplement encryption, access controls, backup procedures
Transfer (Share)Move risk to a third partyWhen another party can manage it betterCyber insurance, outsourcing to specialized provider
Avoid (Terminate)Stop the activity that creates the riskWhen the risk outweighs the business benefitDiscontinue a high-risk service, stop collecting certain data
Accept (Retain)Acknowledge and accept the riskWhen risk is within acceptable levels or treatment cost exceeds impactDocument acceptance with management sign-off

Common Risk Assessment Methodologies

  • Asset-based approach: Start with information assets, identify threats and vulnerabilities for each. Most traditional and thorough, but can be time-consuming for large organizations
  • Scenario-based approach: Identify risk scenarios (e.g., 'ransomware encrypts production database') and assess each. More intuitive and faster, increasingly popular
  • NIST SP 800-30: Risk assessment methodology from NIST. Well-documented and widely referenced. Compatible with ISO 27001 requirements
  • OCTAVE: Operationally Critical Threat, Asset, and Vulnerability Evaluation. Developed by Carnegie Mellon. Focuses on organizational risk
  • FAIR: Factor Analysis of Information Risk. Quantitative approach that estimates financial impact. Useful for communicating risk to business stakeholders

✅ Keep It Practical

The biggest mistake organizations make is overcomplicating the risk assessment. A simple 5x5 likelihood-impact matrix with 30-50 well-identified risks is better than a complex methodology with 500 poorly assessed risks. Auditors care that your methodology is consistent, documented, and repeatable — not that it's the most sophisticated approach available.

Clause 6.1.2

ISO 27001 Requirement

Mandates risk assessment process

30-80

Typical Risk Count

Risks identified in most assessments

Annual

Minimum Review Frequency

Or when significant changes occur

4 Options

Risk Treatment

Mitigate, transfer, avoid, accept

Does ISO 27001 require a specific risk assessment methodology?

No. Clause 6.1.2 requires that the methodology produces consistent, valid, and comparable results, but doesn't specify which methodology to use. You can use asset-based, scenario-based, NIST, OCTAVE, FAIR, or your own approach — as long as it's documented and repeatable.

How many risks should we identify?

There's no magic number. Most organizations identify 30-80 risks. Too few suggests you haven't looked hard enough; too many suggests you're being too granular. Focus on meaningful risks that could genuinely impact your information security. Quality over quantity.

Can we use a compliance platform for risk assessment?

Yes. Platforms like Vanta, Drata, and Secureframe include risk assessment modules with pre-built risk libraries, scoring matrices, and treatment tracking. They streamline the process and maintain the documentation auditors need. They're especially useful for organizations new to formal risk management.

How does the risk assessment connect to the SoA?

The risk assessment drives the Statement of Applicability (SoA). For each Annex A control, the SoA documents whether it's applicable based on identified risks. Controls selected for risk mitigation are marked as applicable with justification traced to specific risks. Controls not needed based on your risk profile can be excluded with documented reasoning.

Simplify Your Risk Assessment

Compare platforms with built-in risk assessment frameworks, pre-built risk libraries, and automated risk tracking.

Browse ISO 27001 Tools
ISO 27001
risk assessment
risk management
ISMS

On this page

Why Risk Assessment Is Central to ISO 27001Risk Assessment ProcessRisk Treatment OptionsCommon Risk Assessment Methodologies

ISO 27001 Tools & Comparisons

Explore ISO 27001 compliance tools, pricing, and side-by-side comparisons.

Best ISO 27001 ToolsAll ISO 27001 VendorsMore ISO 27001 Guides

Related Articles

Overview
10 min read

What Is ISO 27001? The Complete Guide

ISO 27001 is the international standard for information security management systems (ISMS). It provides a systematic framework for managing sensitive company and customer information through risk assessment, security controls, and continuous improvement processes.

Requirements
11 min read

ISO 27001 Annex A Controls Explained

ISO 27001:2022 Annex A contains 93 controls organized into 4 themes: Organizational (37), People (8), Physical (14), and Technological (34). These controls cover everything from access management and encryption to supplier relationships and incident response.

Implementation
8 min read

ISO 27001 Statement of Applicability (SoA) Guide

The Statement of Applicability (SoA) is a mandatory ISO 27001 document that lists all 93 Annex A controls and states whether each is applicable or not, with justification. It's the bridge between your risk assessment and your implemented controls.