Building a Resilient ISMS: Risk Management and Security Objectives in ISO/IEC 27001:2022

Effective risk management is the foundation of a strong Information Security Management System (ISMS). ISO/IEC 27001:2022 provides a structured approach to identifying, analyzing, and mitigating risks while establishing measurable security objectives. By implementing these best practices, organizations can strengthen their security posture, enhance regulatory compliance, and ensure business continuity.
Definitions Related to Risk
Level of Risk:
Magnitude of a risk expressed in terms of the combination of consequences and their likelihood.
Likelihood
Chance of something happening.
Risk Analysis
Effect of uncertainty on objectives.
Note: The effect could be either positive or negative.
Risk Identification:
Process of finding, recognizing, and describing risks.
Note 1: Risk identification involves identifying risk sources, events, their causes, and potential consequences.
Note 2: It can involve historical data, theoretical analysis, informed and expert opinions, and stakeholders’ needs.
Risk Analysis
Process to comprehend the nature of risk and determine the level of risk.
Risk Evaluation
Process of comparing the results of risk analysis with risk criteria to determine whether the risk and/or its magnitude are acceptable or tolerable.
Note: This assists in the decision about risk treatment.
Types Of Certification
- ISO Certification
- ISO 9001 Certification
- ISO 14001 Certification
- ISO 45001 Certification
- ISO 22000 Certification
- ISO 27001 Certification
- ISO 17025 Certification
- ISO 13485 Certification
- ISO 20000-1 Certification
- ISO 22301 Certification
- ISO 50001 Certification
- ISO 37001 Certification
- IATF 16949 Certification
- ISO 29001 Certification
- ISO 31000 Certification
- ISO 20121 Certification
- ISO 10002 Certification
- ISO 41001 Certification
Get Free Consultation
Our Clients


















Risk Treatment:
Process to modify risk.
Note 1: Risk treatment can involve the following steps:
- Avoiding the risk by deciding not to start or continue the activity that gives rise to the risk.
- Taking or increasing the risk to pursue an opportunity.
- Removing the risk source.
- Changing the likelihood.
- Changing the consequences.
- Sharing the risk with another party (including contracts and risk financing).
- Retaining the risk by informed choice.
Note 2: Risk treatments that deal with negative consequences are referred to as “risk mitigation,” “risk elimination,” “risk prevention,” and “risk reduction.”
Note 3: Risk treatment can create new risks or modify existing risks.
Residual Risk:
The risk remains after risk treatment.
Risk Acceptance:
Decision to accept a risk (e.g., risk is within acceptance criteria or top management accepts it even if it is above criteria).
Risk Management Process
Risk Management = Risk Assessment (Risk Analysis + Risk Evaluation) + Risk Treatment + Risk Monitoring + Risk Review
Annex SL - 6.2: Information Security Objectives and Planning
The organization shall establish Information Security objectives at relevant functions and levels. The objectives shall:
- Be consistent with the INFORMATION SECURITY policy.
- Be measurable (if practicable).
- Take into account applicable requirements.
- Be monitored.
- Be communicated.
- Be updated as appropriate.
The organization shall retain documented information on the Information Security objectives.
When planning how to achieve its INFORMATION SECURITY objectives, the organization shall determine:
- What will be done?
- What resources will be required?
- Who will be responsible?
- When it will be completed.
- How the results will be evaluated.
ISO/IEC 27001:2022 - 6.2: Information Security Objectives and Planning
The organization shall establish information security objectives at relevant functions and levels.
These objectives shall:
- Be consistent with the information security policy.
- Be measurable (if practicable).
- Take into account applicable information security requirements and results from risk assessment and treatment.
- Be communicated.
- Be updated as appropriate.
The organization shall retain documented information on information security objectives.
When planning how to achieve its information security objectives, the organization shall determine:
- What will be done?
- What resources will be required?
- Who will be responsible?
- When it will be completed.
- How the results will be evaluated.
Annexure A: Control Objectives and Controls:
Annexure A is the starting point for control objectives and controls, which include 35 control objectives and 114 controls. Depending on the threat and vulnerability, appropriate controls are selected.
- It is not necessary to select all controls in Annexure A under each control objective category.
- Approval should be obtained from risk owners for selected controls.
- Review the list and justification for selected controls (e.g., “based on risk assessment” is sufficient).
- Ensure that the risk register and Statement of Applicability (SOA) reflect the controls.
Example of controls not selected:
- No outsourced software development.
- No encrypted data.
- No e-commerce transactions.
SOA (Statement of Applicability):
- SOA lists all 114 controls and indicates which have been selected or excluded, with justifications.
- It should not be prepared before the risk register is ready.
Key Audit Instruments
- Documented Information to Review: Risk Assessment Document, Risk Treatment Plan, Metrics Document, Responsibility Matrix, SOA.
- Audit Questions:
- What are your measurement criteria for incident response?
- How are resource requirements calculated for achieving the security objective?
Note: Auditors should understand risks relevant to the organization, the likelihood of security events, and methods to avoid, mitigate, or eliminate risks. They should also focus on identifying opportunities.
Conclusion
Managing risk effectively is critical to achieving organizational goals, ensuring compliance, and maintaining continuous improvement. By following standardized processes such as risk identification, analysis, evaluation, and treatment, organizations can make informed decisions to mitigate threats and capitalize on opportunities. Proper planning and adherence to information security objectives, along with the implementation of Annex A controls, play a vital role in ensuring a robust and resilient management system.
At PopularCert, we are dedicated to helping organizations enhance their risk management processes and achieve ISO certification. Our experienced consultants are ready to guide you through every step of compliance and continuous improvement.
GET A FREE CONSULTATION NOW
FAQ
What is the difference between risk assessment and risk treatment?
Risk assessment involves identifying, analyzing, and evaluating risks, while risk treatment focuses on modifying risks through mitigation, avoidance, transfer, or acceptance strategies.
Why is it important to document information security objectives?
Documenting security objectives ensures alignment with the organization’s security policy, provides measurable goals, and enables continuous monitoring and improvement of the ISMS.
How does ISO/IEC 27001:2022 improve security?
It provides a structured framework for risk management, helping organizations mitigate threats, ensure compliance, and enhance resilience.