Continual improvement

Updated: 2026-02-18

Plain English Translation

Clause 10.1 requires the organization to proactively enhance its Information Security Management System (ISMS) over time. It is not enough to simply maintain the status quo; you must actively identify opportunities to make security controls more suitable, adequate, and effective. This is achieved by analyzing data from audits, risk assessments, and management reviews to implement strategic changes that reduce risk or improve efficiency.

Executive Takeaway

The organization must demonstrate a trajectory of maturity by actively identifying and implementing enhancements to the security program.

ImpactHigh
ComplexityMedium

Why This Matters

  • Prevents the security program from becoming stagnant or misaligned with business goals
  • Ensures the organization adapts to evolving threats and technologies
  • Demonstrates due diligence and commitment to excellence for customers and auditors

What “Good” Looks Like

  • Documented evidence of specific improvements made (e.g., new tools, optimized processes)
  • Tracking of 'Opportunities for Improvement' alongside non-conformities
  • Management reviews that explicitly authorize resources for enhancement initiatives

The primary requirement is to continually improve the suitability, adequacy, and effectiveness of the ISMS. This means the system must get better over time at managing risks and meeting business needs.

Organizations demonstrate improvement through documented evidence such as completed corrective actions, updated policies, deployment of better security tools, and positive trends in security metrics/KPIs.

Steps typically include: 1) Analyzing performance data (audits, reviews), 2) Identifying opportunities, 3) Planning actions (resources/timelines), 4) Implementing changes, and 5) Verifying effectiveness.

The PDCA (Plan-Do-Check-Act) cycle is the engine of improvement. Clause 10.1 represents the 'Act' phase (or the result of the cycle), where lessons learned from 'Checking' are used to adjust and improve the 'Plan'.

Examples include automating manual access reviews, upgrading encryption standards, refining incident response times, or expanding the scope of the ISMS to cover new departments.

Internal audits identify non-conformities and gaps (inputs), while management reviews provide the strategic direction and resource authorization (decisions) needed to implement improvements.

Metrics might include the reduction in the number of non-conformities over time, improved scores in maturity assessments, faster incident response times (MTTR), or higher training completion rates.

Leadership (Clause 5.1) is responsible for promoting a culture of improvement, ensuring resources are available for enhancements, and ensuring the ISMS remains aligned with strategic direction.

ISO-27001 10.1

"The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system."

VersionDateAuthorDescription
1.0.02026-02-18WatchDog Security GRC TeamInitial publication