Planning of changes

Updated: 2025-05-27

Plain English Translation

Clause 6.3 requires that any significant changes to the Information Security Management System (ISMS) be carried out in a deliberate, planned manner rather than ad-hoc. Whether you are introducing a new security policy, migrating to a new cloud provider, or restructuring the security team, you must assess the purpose, potential consequences, and resource availability before executing the change. This ensures that improvements or modifications do not accidentally disrupt existing security controls or business operations.

Executive Takeaway

Major changes to security structure, scope, or policies must be formally planned, resourced, and approved to prevent disruption.

ImpactHigh
ComplexityMedium

Why This Matters

  • Prevents 'improvements' from causing unexpected security gaps or outages
  • Ensures resources (budget/people) are available before a change begins
  • Maintains the integrity of the ISMS during transition periods

What “Good” Looks Like

  • Major ISMS changes are discussed and minuted in management review meetings
  • A formal change management process is used for significant policy or structural updates, and tools like WatchDog Security's Policy Management can track versioned updates, approvals, and staff acceptance to keep ISMS changes controlled and auditable.
  • Risk assessments are updated before changes are implemented, and tools like WatchDog Security's Risk Register can link each planned change to impacted risks, treatment decisions, and post-implementation validation.

It is a requirement ensuring that any modifications to the ISMS (like scope, policies, or major controls) are executed in a planned, controlled manner to maintain the system's integrity and effectiveness.

Define a process where changes are identified, their purpose and consequences are evaluated, necessary resources are allocated, and authority/responsibility is assigned before the change occurs.

Changes to the ISMS scope, information security policy, organizational structure, risk assessment methodology, or major technology migrations require planned implementation under Clause 6.3.

Clause 6.3 refers to high-level changes to the management system itself (policies, scope, governance). Annex A 8.32 (Change Management) refers to operational changes to information processing facilities (systems, software, networks).

Document the plan, the risk assessment of the change, the approval decision (e.g., meeting minutes or ticket approval), and the outcome/evaluation of the change after implementation.

It means the change is not impulsive. You have considered the 'who, what, when, why, and how', allocated budget/people, and assessed what could go wrong before starting.

Yes, while the complexity scales with the organization, there must be a defined mechanism to ensure changes are not made arbitrarily and that their impacts are considered.

Update your risk assessment to consider if the change introduces new threats (e.g., new vendor) or vulnerabilities (e.g., new software bugs) and if existing controls are sufficient.

Planning ISMS changes often breaks down when approvals, risk reviews, and evidence are scattered across tickets, emails, and meeting notes. A GRC tool helps by turning each significant change into a traceable workflow with required steps (purpose, impact, resources, approvals, and review) and a clear audit trail. For example, WatchDog Security's Compliance Center can link the change record to Clause 6.3, attach approvals and meeting minutes as evidence, and flag gaps if a risk review or post-change evaluation is missing.

Risk analysis can drift from reality if it is not updated when you change scope, vendors, cloud environments, or key controls. The practical approach is to require a risk update before implementation and then confirm the residual risk after rollout as part of the change close-out. For example, WatchDog Security's Risk Register can tie each planned ISMS change to the affected risks, record treatment decisions and owners, and produce board-ready summaries showing what changed, why it was approved, and how the risk posture was adjusted.

ISO-27001 6.3

"When the organization determines the need for changes to the information security management system, the changes shall be carried out in a planned manner."

VersionDateAuthorDescription
1.0.02025-05-27WatchDog Security GRC TeamInitial publication