WikiFrameworksISO/IEC 27001:2022Nonconformity and corrective action

Nonconformity and corrective action

Updated: 2026-02-18

Plain English Translation

Clause 10.2 mandates that when something goes wrong (a nonconformity), the organization cannot simply fix the immediate issue and move on. You must react to control the situation (correction) and then perform a root cause analysis to understand why it happened. Based on this analysis, you must implement a 'corrective action' to modify the system or process so the error does not reoccur, and finally, verify that this new measure was effective.

Executive Takeaway

The organization must have a formal, documented process for investigating failures (from audits or incidents) and implementing permanent fixes to prevent recurrence.

ImpactHigh
ComplexityMedium

Why This Matters

  • Prevents recurring security incidents which drain resources and damage reputation
  • Demonstrates a culture of continuous learning and maturity to auditors and customers
  • Mandatory for certification; unresolved nonconformities will block ISO 27001 certification

What “Good” Looks Like

  • A centralized log tracks all nonconformities, their root causes, and status of fixes
  • Corrective actions are not just 'retraining' but often involve process or technology changes
  • Evidence exists showing that closed corrective actions were verified for effectiveness

A nonconformity is the non-fulfillment of a requirement. This could be a failure to follow your own internal policies, a failure to meet a specific ISO 27001 clause, or a breach of a legal/contractual requirement.

A Major Nonconformity describes a total breakdown of a system or process (e.g., no risk assessment performed). A Minor Nonconformity is a single lapse or isolated incident (e.g., one employee missed training) where the system is otherwise functioning.

You must: 1) React to control/correct it; 2) Evaluate the need for action to eliminate the root cause; 3) Implement the action; 4) Review the effectiveness; and 5) Make changes to the ISMS if necessary.

Correction is the immediate fix to the specific problem (e.g., patching a server). Corrective Action is the deeper change to the process to prevent it from happening again (e.g., implementing an automated patch management system).

Examples include: Access rights not revoked upon termination, lack of evidence for a management review, failure to test backups, or a policy document that hasn't been reviewed in years.

Common methods include the '5 Whys' technique (asking why until the fundamental cause is found) or Fishbone diagrams. The goal is to move beyond 'human error' to find process or system flaws.

It should include a description of the nonconformity, the immediate containment actions, the root cause analysis, the planned long-term corrective action, the owner, the due date, and the method for verifying effectiveness.

Verification involves checking, after a suitable period, that the action was implemented and that the nonconformity has not recurred. This can be done via a follow-up audit, spot check, or reviewing metrics.

ISO-27001 10.2

"When a nonconformity occurs, the organization shall: a) react to the nonconformity... b) evaluate the need for action to eliminate the causes... c) implement any action needed; d) review the effectiveness of any corrective action taken."

VersionDateAuthorDescription
1.0.02026-02-18WatchDog Security GRC TeamInitial publication