The ISO 27001 requirements can be overwhelming.
Whether you're new to the standard or a seasoned practitioner, there is a lot to remember.
And that is ok.
This articles gives you a definitive reference guide on each of the ISO 27001 requirements, including:
You will learn exactly what you need to know and what you need to do to drive success in the world of ISO 27001.
ISO 27001 is made up of 7 requirements (or mandatory clauses) that you must comply with ISO 27001.
These include:
Within these mandatory clauses are a collection of 34 subclauses that detail the requirements for specific characteristics of an ISMS.
Combined, these clauses establish the foundations of an ISMS that applies a risk-based approach, underpinned by the principle of continuous improvement.
ISO 27001 Clause 4 sets the stage of your entire Information Security Management System.
It is made up of four sub-clauses that form the foundation of your security journey:
This isn’t just paperwork — it’s about knowing what you’re protecting and why it matters.
It's about understanding the threats, stakeholders, and internal factors that shape your company’s security landscape.
Think of it as the foundation of your security journey.
Without a strong understanding of context, your efforts might be wasted on the wrong areas.
Moreover, if certification is the goal - the auditor can only make an accurate assessment of the effectiveness of your ISMS once they understand what it's trying to achieve.
Here’s how to get it right:
Start here, and you’re laying the groundwork for a secure, resilient organization.
If you want your security efforts to succeed, it all starts at the top.
ISO 27001 Clause 5 is all about leadership — where real commitment happens, where accountability begins.
So what does the standard say?
Well, ISO 27001 breaks Clause 5: Leadership into 3 parts:
Combined, they form the basis upon which leadership can...well, Lead.
But it's not about checking a box.
It's about showing up and leading by example.
When leadership gets involved, security isn’t just an IT thing.
It becomes part of your organisation's DNA, part of every decision.
Leaders bring focus, direction, and, most importantly, support.
Without this? It’s like building a house with no foundation. Everything can crumble under pressure.
So, what does Clause 5 demand from leadership?
Vision, support, and action.
This isn’t hands-off; it’s all-in.
Here’s how to make it count:
Get leadership on board, and you’re building security that sticks, backed by a team that believes in the mission.
Clause 6 is your roadmap to security success.
This is where the rubber meets the road in ISO 27001 — no more guessing, just clear, practical steps.
Clause 6 sets you up to identify risks, set objectives, and outline how you’ll tackle everything.
It’s all about planning for the real world, making sure your security approach is solid.
We already know that security is a moving target.
ISO 27001 Clause 6 is about being prepared and adaptive to the evolving threat landscape instead of scrambling in a crisis.
So how does ISO 27001 Clause 6 help us with this?
It focuses on three key outcomes:
It helps in the form of two sub-clauses:
Clause 6.1 focuses on how you identify, evaluate, treat, manage and monitor risk.
But what is risk?
Well at it's most basic level, it is the "likelihood and impact of undesired effect" on the operations of your business.
In the security world, this could include:
What ISO 27001 wants from you in Clause 6.1 is a methodology for performing information security risk assessments, evidence of the results (in the form of documentation and a risk register) and plans to treat your risks.
The second part of Clause 6 is ISO 27001 Clause 6.2 Information security objectives and planning to achieve them.
In essence, this is about defining Specific, Measurable, Attainable, Realistic and Timely (SMART) objectives to drive continuous improvement of your information security in the context of:
ISO 27001 Clause 7 is all about support — it’s the glue that keeps your security efforts together.
The purpose of Clause 7 is straightforward.
Make sure your team has everything it needs to establish, implement, maintain and continuously improve your information security management system.
This isn’t just about tools — it’s about people, training, and clear communication.
ISO 27001 Clause 7 brings this to life in the form of five sub-clauses:
First off, ISO 27001 wants to make sure that you have the human expertise to support information security in your business.
Security requires effort.
Technology and tools help, but there are still human tasks that need to be performed to protect your business effectively.
This requires the right resources and ensuring that they are trained and have the necessary competence to support your business.
Next it addresses one of the most critical aspects of security - awareness, training and communication.
According to a study by KnowBe4, approximately 88% of data breaches are caused by human error.
Why?
Simply put - threat actors know that manipulating human behaviour through phishing, social engineering etc is far more effective than trying to crack through your firewall.
This doesn't mean that your people are the weakest link.
It means that your people are your first line of defence.
So if you want to avoid 88% of your data breaches then you need to focus on your people and ensure that you have appropriate awareness, training and communication in place.
The success of your security program hinges on your ability to embed security into your culture, your DNA.
To support this, you also need to make sure that you have appropriate documented information such as:
Not only does this support your security culture by providing a north star, it provides a knowledgebase for your people and provides the necessary evidence to auditors that your ISMS is operating effectively.
The good news is that the standard is very clear on what documentation is required for ISO 27001.
In summary, to master Clause 7, here are five things you need to focus on:
With the right support, your security plan becomes more than just a strategy — it becomes a powerful, people-driven defence.
In Clause 6 we talked about risk assessments, risk treatment and defining information security objectives.
ISO 27001 Clause 8 is where all the planning and preparation meet action.
You’re not just talking about security — you’re doing it.
Clause 8 ensures that every risk you’ve prioritised gets handled and every response is ready to go.
This is brought to life in the form of three sub-clauses:
Clause 8.1 focuses on ensuring that you have have planned and implemented appropriate processes to meet your security objectives.
These processes should be documented (as per Clause 7.5 above) and appropriate controls in place to ensure their effectiveness.
Next we need to operationalise our risk assessment process.
What this means is that you need to plan information security risk assessments at regular intervals or when significant changes to your environment occur.
These changes could be:
#ProTip The results of these risk assessments should be documented and stored in a secure location for future reference.
Once you've done your risk assessment, you are no doubt going to identify something that could cause an "undesired event" to your business (i.e. a risk).
This is where your information security risk treatment plan comes in.
What does this mean?
Essentially, what action are you going to take to reduce the likelihood and/or impact of the risk materialising.
Again, these risk treatment plans should be documented, monitored and managed to ensure that your risks are being addressed.
So, in summary, to deliver against the requirements of Clause 8 you need to:
Remember, Clause 8 turns your security plan into action.
Clause 9 is where you check your security pulse.
It’s all about evaluating how well your security measures are working.
This isn’t guesswork — it’s a structured way to see if your plan is effective.
With Clause 9, you get to look at the big picture, spot gaps, and make improvements.
It does this in three ways:
ISO 27001 asks you to monitor, measure, and analyse your security performance.
This will require you to decide:
As you'd expect, ISO 27001 wants you to capture this as documented information as well.
This could include:
Another key aspect of ISO 27001 Clause 9 is the use of an internal audit program to evaluate the performance of your ISMS.
The primary goal of internal audit is for the business to get it's own assurance that it's own requirements are being met.
Your internal audit program needs to be structured, planned, documented and maintained.
Finally, the output of Clause 9.1 and Clause 9.2 needs to be packaged in an appropriate format for management review.
Remember Clause 5: Leadership?
We talked about leadership, commitment and active involvement from top management.
This is where it all comes full circle.
Leadership need visibility and insight into the effectiveness of the ISMS in order that they can take responsibility.
If there are emerging risks, challenges, operational issues, performance issues - leadership need to know.
They then make a decision about whether they're prepared to accept the risk.
Or, whether they are prepared to give you the support and resources you need in order to drive continuous improvement.
So, in summary. ISO 27001 Clause 9 is about turning security into a cycle of constant improvement by:
Last, but by no means least we have ISO 27001 Clause 10 - continuous improvement.
Effective information security management systems are adaptive.
They evolve and improve in response to changes in your business, technology and of course, the threat landscape.
ISO 27001 calls you to actively seek out improvement. Identify weaknesses, make changes, and look for ways to get ahead of the curve.
Without improvement, your security can become outdated.
Clause 10 keeps you sharp, helping you stay resilient against new challenges.
ISO 27001 continuous improvement comes to life in the form of two sub-clauses:
Clause 10.1 focuses on improving the suitability, adequacy and effectiveness of your information security management system.
This can be achieved in a number of ways:
Ultimately Clause 10.1 is looking for you to answer the simple question of "Is my ISMS better today, than it was yesterday?"
Clause 10.2 is slightly different but still anchored in the world of continuous improvement.
Clause 10.2 focuses on nonconformity, i.e. the "non-fulfilment of a requirement".
ISO 27001 is looking for you to ensure that you continue to meet the requirements of the standard - i.e. Clauses 4 to 10 discussed in this article.
Examples of nonconformity could include:
It's important to understand that not all nonconformities are created equal.
Broadly speaking, there are three types of nonconformity:
If a nonconformity is identified - either through an internal audit, external audit or certification audit then an action must be taken to correct it.
This is called a Corrective Action.
Hence why ISO 27001 10.2 is called "Nonconformity and Corrective Action.
To satisfy the requirement of 10.2, there are some specific things that you need to do:
In summary. Clause 10 ensures that your security isn’t static; it’s always improving, always evolving.
Here’s 5 ways to how to make it count:
ISO 27001 can seem complex, but step by step, each requirement helps create a resilient security framework for your organisation.
Remember, the key is not to aim for perfection overnight, but to foster continuous improvement.
Keep building, learning, and refining.
Want more expert advice on ISO 27001 and other GRC topics? Subscribe to the GRCMana newsletter and stay ahead of the curve.