How to Complete an ISO 27001 Risk Assessment

A practical, step-by-step guide to conducting an ISO 27001 risk assessment โ€” covering methodology, scoring, and documentation that satisfies auditors.

The risk assessment is the engine of your ISMS (Information Security Management System). It is the very heart of ISO 27001. Everything else (your controls, your Statement of Applicability, your risk treatment plan) flows from it. Get it right, and the rest of the implementation becomes much clearer. Get it wrong, and you’ll find yourself implementing controls without really knowing why, and unable to explain it in an audit.

This guide walks you through the entire ISO 27001 risk assessment process, from choosing a methodology to producing the documentation auditors want to see.


What Is an ISO 27001 Risk Assessment?

A risk assessment under ISO 27001 is the process of identifying risks to your information assets, analysing their likelihood and the severity of the impact, and deciding what to do about them.

Every organisation has a different risk profile (for example, the level of risk associated with the data it handles) and risk appetite (how risk-averse it is).

A risk methodology is required by Clause 6.1.2 of the standard, which sets out specific requirements for conducting the risk assessment. The output of the risk assessment feeds directly into your risk treatment plan and your Statement of Applicability.

The standard gives you significant flexibility in how you conduct the assessment โ€” you can choose your own methodology as long as it produces consistent, comparable, and repeatable results.


What Does ISO 27001 Actually Require?

The standard requires you to:

  • Define and apply a risk assessment process that produces consistent, comparable, and repeatable results
  • Identify the risks associated with the loss of confidentiality, integrity, and availability of information
  • Analyse the risks (assess likelihood and impact)
  • Evaluate the risks against your risk acceptance criteria to determine which require treatment
  • Document the results of the risk assessment

Note what’s not required: a specific methodology, a specific scoring scale, or a specific format. ISO 27001 is outcome-focused, not prescriptive about method. So, if you already have something in your organisation, then use that. There’s no need to reinvent the wheel.


Choosing a Risk Assessment Methodology

The most common approach used by small and medium-sized organisations is a qualitative risk matrix using likelihood and impact scores. This is straightforward, easy to explain to auditors, and produces results that are easy to prioritise.

The basic approach:

Step 1: Identify your information assets (from your asset register)

Step 2: Identify the threats to each asset and the vulnerabilities that could be exploited

Step 3: Score each risk for likelihood (how likely is this to happen?) and impact (how bad would it be?)

Step 4: Calculate a risk score (likelihood ร— impact, or using a matrix)

Step 5: Compare each risk score against your risk acceptance criteria to decide what needs treating

A typical 3ร—3 or 5ร—5 scoring matrix works well. For example:

LikelihoodLow Impact (1)Medium Impact (2)High Impact (3)
Low Likelihood (1)123
Medium Likelihood (2)246
High Likelihood (3)369

Risks scoring 6 or above require treatment. Risks scoring 3โ€“5 require a decision. Risks scoring 1โ€“2 may be accepted.

In a moment I’ll show you my preferred model, but the above is entirely ok.

Your risk acceptance criteria (what score is “acceptable”) should be agreed by senior management and documented before you conduct the assessment โ€” not set retrospectively to make the numbers work.


Step-by-Step: How to Conduct the Assessment

The ISO 27001 Risk Assessment Process

A step-by-step overview aligned to ISO/IEC 27001:2022 Clause 6.1

1
Foundation

Define the Risk Assessment Methodology

Establish your approach before you start: how you'll identify risks, how you'll score likelihood and impact, what your risk appetite is, and how you'll document decisions. This methodology must be consistent and repeatable.

2
Identify

Identify Information Assets

Start with your asset register. For each asset in scope, consider what information it holds, how it's used, and who relies on it. Assets are the starting point for every risk you'll identify.

3
Identify

Identify Threats & Vulnerabilities

For each asset, identify what could go wrong. Threats are external events (ransomware, phishing, hardware failure). Vulnerabilities are internal weaknesses (no MFA, unpatched systems, no offboarding process) that threats can exploit.

4
Analyse

Assess Likelihood & Impact

Score each risk using your defined methodology โ€” typically a 1โ€“5 scale for both likelihood (how probable is this?) and impact (how damaging would it be?). Multiply the scores to get a risk rating. Apply scores consistently across all risks.

5
Evaluate

Evaluate & Prioritise Risks

Plot risks on your heat map and compare scores against your risk appetite. Risks above your acceptable threshold require treatment. Risks below it may be accepted. This step tells you where to focus your limited resources.

6
Treat

Select Risk Treatment Options

For each risk requiring treatment, decide: Mitigate (implement controls to reduce it), Transfer (insure or outsource), Avoid (stop the activity), or Accept (document the decision). Link each treatment decision to the relevant Annex A controls in your Statement of Applicability.

7
Document & Monitor

Document in the Risk Register & Review

Record every risk, its score, its owner, the treatment decision, and the target review date in your risk register. Review the register at least annually and after significant changes. Risk assessment is not a one-time exercise โ€” it's a continuous process.

โ™ป๏ธ Continual improvement: ISO 27001 requires the risk assessment to be repeated at planned intervals and when significant changes occur โ€” new systems, new threats, organisational changes, or audit findings.

How to score each risk

I said earlier you don’t have to have a specific methodology, and you don’t, but a common approach is to define a scoring scale to assess and prioritise risk.

For each threat-vulnerability combination, score:

How likely is this to occur, given your current controls? Here’s the scale I use;

LikelihoodDescriptionScore
RemoteThe risk is improbable to occur under normal circumstances. There may be no known instances or only a few rare cases in similar organisations or environments. This category is typically reserved for risks considered negligible or theoretical.  1
UnlikelyThe risk has a low chance of occurring.It might happen in exceptional circumstances but is not expected to occur regularly. This level is for recognised risks uncommon in your industry or operational environment.  2
PossibleThe risk has a moderate likelihood of occurring. There is an equal chance of the risk occurring or not occurring. It’s a realistic possibility in your current environment and should be given a fair amount of attention.  3
ProbableThe risk is more likely to occur than not. There have been instances of this risk materialising in similar contexts, or there are factors in your environment that increase its likelihood. It requires proactive management and monitoring.  4
Highly ProbableThe risk is almost certain to occur. Strong evidence or historical data suggests this risk is frequent in your setting. This level indicates a high-priority risk that demands immediate and effective mitigation measures.  5

How bad would the consequences be if this risk materialised?

ImpactDescriptionScore
InsignificantThe impact is negligible, with no notable consequences on operations, reputation, or finances. It would not cause any interruption to normal business activities or require significant effort to address.  1
MinorThe impact causes a minor inconvenience that can be easily managed or resolved through routine procedures. It may result in a slight delay or minor costs, but it does not significantly affect business operations or objectives.  2
ModerateThe impact is noticeable and may cause some disruption but can be managed or worked around without significant difficulty. This level might involve moderate financial costs, a temporary reduction in productivity, or some strain on resources. It requires management attention but is within the organisation’s capacity to handle effectively.  3
MajorThe impact causes significant disruption to services or operations. It may result in substantial financial loss, severe damage to reputation, or considerable resource allocation to address. Recovery from this level of impact requires significant effort and may affect the organisation’s strategic objectives or long-term plans.  4
CatastrophicThe impact is so severe that it threatens the existence and continued operation of the organisation. It could lead to long-term or permanent damage to the organisation’s reputation, financial stability, or market position. This impact may involve legal ramifications, significant financial losses, and critical damage to organisational assets or stakeholder relationships.  5

Calculate the risk score (likelihood ร— impact) and note whether it falls above or below your acceptance threshold.

ISO 27001 Risk Heat Map

Likelihood ร— Impact matrix โ€” used to score and prioritise information security risks

Likelihood โ†’
5
5
L5 ร— I1 = 5 โ€” Medium
10
L5 ร— I2 = 10 โ€” High
15
L5 ร— I3 = 15 โ€” High
20
L5 ร— I4 = 20 โ€” Critical
25
L5 ร— I5 = 25 โ€” Critical
4
4
L4 ร— I1 = 4 โ€” Low
8
L4 ร— I2 = 8 โ€” Medium
12
L4 ร— I3 = 12 โ€” High
16
L4 ร— I4 = 16 โ€” Critical
20
L4 ร— I5 = 20 โ€” Critical
3
3
L3 ร— I1 = 3 โ€” Low
6
L3 ร— I2 = 6 โ€” Medium
9
L3 ร— I3 = 9 โ€” Medium
12
L3 ร— I4 = 12 โ€” High
15
L3 ร— I5 = 15 โ€” Critical
2
2
L2 ร— I1 = 2 โ€” Low
4
L2 ร— I2 = 4 โ€” Low
6
L2 ร— I3 = 6 โ€” Medium
8
L2 ร— I4 = 8 โ€” Medium
10
L2 ร— I5 = 10 โ€” High
1
1
L1 ร— I1 = 1 โ€” Low
2
L1 ร— I2 = 2 โ€” Low
3
L1 ร— I3 = 3 โ€” Low
4
L1 ร— I4 = 4 โ€” Medium
5
L1 ร— I5 = 5 โ€” Medium
12345
โ† Impact
Low (1โ€“4) โ€” Monitor
Medium (5โ€“9) โ€” Review
High (10โ€“15) โ€” Treat
Critical (16โ€“25) โ€” Act immediately

Example risks plotted โ—

Ransomware via phishing email Critical
Phishing attack on staff High
Cloud provider outage High
Weak passwords / no MFA High

The Risk Register

The risk register is the primary output of the risk assessment. At minimum, each row in your risk register should capture:

  • Risk ID (a reference number)
  • Asset affected
  • Threat and vulnerability
  • Likelihood score
  • Impact score
  • Risk score
  • Risk owner (who is responsible for managing this risk)
  • Risk treatment decision (see below)
  • Controls applied (references to Annex A controls or other measures)
  • Residual risk score (after controls)
  • Review date

A well-structured risk register in a spreadsheet is perfectly acceptable for ISO 27001 purposes. You don’t need specialist software, though there are tools available if you prefer.


Risk Treatment Options

For each risk above your acceptance threshold, you have four options:

ISO 27001 Risk Treatment Options

Once a risk is identified and scored, you must decide how to respond. There are four options.

๐Ÿ›ก๏ธ
Option 1
Mitigate
Implement controls to reduce the likelihood or impact of the risk to an acceptable level. This is the most common treatment option and maps directly to the Annex A controls.
Use when
  • The risk is above your appetite threshold
  • Controls exist that are practical to implement
  • The cost of controls is proportionate to the risk
"We will implement MFA across all systems to reduce the risk of unauthorised access from compromised credentials."
๐Ÿค
Option 2
Transfer
Share the risk with a third party โ€” typically through cyber insurance or by outsourcing an activity to a provider who assumes responsibility. The risk is not eliminated, but the financial consequence is shared.
Use when
  • The risk cannot be fully mitigated internally
  • Insurance provides cost-effective coverage
  • A specialist third party manages the activity better
"We will maintain cyber liability insurance to cover financial losses in the event of a data breach."
๐Ÿšซ
Option 3
Avoid
Stop doing the activity that gives rise to the risk entirely. The most decisive treatment โ€” if you don't do the thing, the risk disappears. Not always practical, but sometimes the right answer.
Use when
  • The risk is too high to accept or mitigate
  • The activity is not critical to the business
  • No practical controls exist to reduce the risk
"We will not allow personal data to be processed on unmanaged personal devices โ€” removing this risk entirely."
โœ…
Option 4
Accept
Acknowledge the risk and decide to live with it โ€” because the cost of treatment outweighs the potential impact, or because the risk is already within your appetite. Acceptance must be documented and authorised.
Use when
  • The risk score falls within your risk appetite
  • Treatment costs outweigh potential impact
  • A conscious, documented decision is made
"We accept the risk of minor office equipment theft given low impact and existing physical security controls."
Every treatment decision must be documented in your risk register and linked to your Statement of Applicability (SoA). Auditors will check that accepted risks have been formally authorised โ€” "we just didn't get round to it" is not risk acceptance.

Your treatment decisions feed into your risk treatment plan and your Statement of Applicability.


How Often Should You Review the Risk Assessment?

ISO 27001 requires the risk assessment to be reviewed at planned intervals and when significant changes occur. In practice:

  • Annual review as a minimum โ€” aligned with your management review cycle
  • Ad-hoc reviews when significant things change: new systems, new suppliers, new data types, major incidents, or changes to the regulatory environment

Each review should be documented and approved by the appropriate person. Don’t just update the scores silently โ€” record that the review happened, who conducted it, and what changed.


Common Mistakes

Conducting the assessment alone, without involving asset owners. Risk owners need to be engaged โ€” they understand the business context of their assets better than the ISO 27001 project lead.

Setting acceptance criteria after scoring. This is circular. Define what’s “acceptable” before you start, not after you see the results.

Treating every risk as unique. Many risks are similar across different assets. Group them where appropriate to make the register manageable.

Never reviewing it. A risk assessment from two years ago that’s never been touched is a significant audit finding. Build reviews into your annual calendar.

Focusing only on technical risks. ISO 27001 is about information security, not just IT security. Physical risks, people risks, and process risks belong in the assessment too.


Getting Started

The ISO 27001 toolkit includes a pre-built risk assessment template with a pre-populated methodology document, risk register, and risk treatment plan โ€” all linked together and ready to adapt. It’s the fastest way to produce a risk assessment that passes audit without starting from scratch.

For the full picture on what to do with your risk assessment outputs, read the guide to creating a risk treatment plan and the Statement of Applicability.


ISO 27001 Full Document Toolkit

Every document your auditor
expects to see.

130 Word & Excel templates, ready to edit. Policies, risk register, Statement of Applicability, audit pack, staff communications โ€” all updated for ISO 27001:2022.

130 templates

Instant download

Written by practising consultant

ISO 27001:2022

FAQs

What’s the difference between a threat and a vulnerability in ISO 27001?

A threat is something that could cause harm โ€” ransomware, a disgruntled employee, a fire. A vulnerability is a weakness that a threat can exploit โ€” unpatched software, no offboarding process, an unsecured server room. The risk exists where a threat meets a vulnerability. This distinction matters because your controls should target the vulnerability, not the threat โ€” you can’t stop ransomware from existing, but you can close the gaps that let it in.

How many risks should an ISO 27001 risk register contain?

There’s no required number, but a register with fewer than 15โ€“20 risks usually signals that the assessment hasn’t been thorough enough, while one with 300+ risks is often unmanageable and suggests the organisation has gone too granular. For most small and medium-sized businesses, a well-considered register of 30โ€“60 risks covers the realistic threat landscape without becoming a document nobody reads. Quality and consistency matter more than volume.

Do we need to reassess every risk from scratch each year?

No โ€” the annual review is about confirming whether existing risks have changed and identifying any new ones, not rebuilding the register from zero. Walk through each risk and ask: has the likelihood or impact changed? Have the controls changed? Has the business context changed? Update what needs updating, document that the review happened, and get it signed off. A clean, dated review record is what auditors want to see.

Can we use a 3ร—3 risk matrix instead of 5ร—5?

Yes. None of the above is mandated. ISO 27001 doesn’t specify the scale โ€” it requires a consistent, comparable, and repeatable methodology. A 3ร—3 matrix (Low/Medium/High for both likelihood and impact) is simpler to apply and often more appropriate for smaller organisations. The risk is that it gives you less differentiation between risks at the middle scores, making prioritisation harder. A 5ร—5 matrix provides more granularity but requires more careful calibration of what each score means. Pick the scale that your team can apply consistently, and define each level clearly before you start.

Does the risk assessment need to be done by a qualified person?

No formal qualification is required โ€” ISO 27001 doesn’t specify one. What the standard does require is that the process is documented, consistent, and produces repeatable results. In practice, the assessment is usually led by the person driving the ISO 27001 project, with input from asset owners across the business. If you’re conducting it for the first time without prior experience, using a structured template with pre-defined criteria and a clear methodology will help ensure the output holds up under auditor scrutiny.

Photo of author

Written by

Alan Parker

Alan Parker is an ISO 27001 consultant who has helped dozens of UK small businesses achieve certification โ€” often without a dedicated security team or a large budget. With over 30 years in IT governance and qualifications including ITIL v3 Expert, ITIL v4 Bridge, and PRINCE2 Practitioner, Alan writes in plain English for busy teams who need to get things done. Named IT Project Expert of the Year (2024, UK).