WikiFrameworksISO/IEC 27001:2022General (Actions to address risks and opportunities)

General (Actions to address risks and opportunities)

Updated: 2025-05-27

Plain English Translation

Clause 6.1.1 is the strategic bridge between understanding your organization (Context) and taking action. Before implementing security controls, you must plan how to handle risks and opportunities derived from your internal/external issues and stakeholder requirements. It requires you to design a plan that ensures the ISMS achieves its goals, reduces negative side effects (like data breaches), and continually improves over time.

Executive Takeaway

This clause compels the organization to proactively plan for risks and opportunities ensuring the ISMS is not just reactive but aligned with strategic goals.

ImpactHigh
ComplexityHigh

Why This Matters

  • Prevents security efforts from being disconnected from business reality
  • Ensures resources are focused on the most critical threats and opportunities
  • Required to demonstrate that the ISMS is capable of achieving its intended outcomes

What “Good” Looks Like

  • A defined risk management methodology is in place and followed, with supporting workflows and evidence tracking in tools like WatchDog Security's Compliance Center to keep decisions audit-ready.
  • Risks are clearly linked to business context and interested party requirements, and tracked in a living register where tools like WatchDog Security's Risk Register can help assign owners, treatments, and review cadence.
  • Opportunities for improvement (e.g., efficiency, market trust) are identified alongside threats

It is the requirement to plan the ISMS by identifying what could affect its success (risks and opportunities), based on the organization's context (Clause 4.1) and stakeholder needs (Clause 4.2).

You establish a methodology (risk criteria), identify risks (often by asset or scenario), analyze their likelihood and impact, evaluate them against your acceptance criteria, and prioritize them for treatment.

Clause 6.1.1 is the high-level requirement to plan for risks and opportunities generally. Clause 6.1.2 details the specific assessment process (identification/analysis). Clause 6.1.3 details the treatment process (mitigation/controls).

Risks include threats like data breaches, ransomware, or insider threats. Opportunities include entering new markets due to certification, improving process efficiency, or enhancing customer trust.

Clause 4.1 (internal/external issues) and 4.2 (interested party requirements) provide the inputs or the 'why' for the risk assessment. For example, a regulatory requirement from 4.2 creates a compliance risk if not met.

It is the set of rules your organization defines for how to calculate risk (e.g., Risk = Likelihood x Impact) and what criteria must be met to accept a risk without further action.

You need documented information regarding the risk assessment process, the results of the assessments (Risk Register/Report), and the risk treatment plan.

Opportunities are positive outcomes identified during planning, such as consolidating vendors for cost savings, automating manual security tasks, or using the ISMS to pass vendor reviews faster.

Clause 6.1 becomes hard to sustain when risks, owners, evidence, and treatment plans live in separate documents. A centralized workflow helps you keep risk criteria consistent, link risks to business context, and track treatment actions through to completion and review. For example, WatchDog Security's Compliance Center can help map Clause 6.1 activities to your ISMS objectives, flag gaps, and keep audit-ready evidence tied to each planning decision.

A risk register stays useful when it has clear scoring criteria, assigned owners, treatment plans with due dates, and a cadence for review triggered by meaningful change (new systems, major incidents, new vendors). Many organizations struggle with stale spreadsheets and inconsistent scoring across teams. WatchDog Security's Risk Register can help standardize scoring, track treatment progress, and produce board-friendly summaries without changing the underlying methodology you define.

ISO-27001 6.1.1

"When planning for the information security management system, the organization shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed."

VersionDateAuthorDescription
1.0.02025-05-27WatchDog Security GRC TeamInitial publication