Each section includes actionable guidance, real-world examples, and tailored AvISO and ISOvA support to help you implement a resilient and audit-ready ISMS.
(Clause 4 – Context of the Organisation)
What Clause 4 Covers
Organisations must:
• Identify internal and external information security issues
• Understand stakeholder needs, including legal and regulatory requirements
• Define the scope of the ISMS
• Map key processes and their interactions
How to
• Conduct a context analysis covering cyber threats, compliance obligations, and third-party risks
• Identify key interested parties (e.g. clients, regulators, IT partners, end-users) and their information security expectations
• Define and justify your ISMS scope — including departments, technologies, and locations
• Create a process interaction map aligned with your scope and risk
Example
A SaaS provider includes development, hosting, and customer support services in scope, excluding marketing and finance as out-of-scope areas.
Risks if Overlooked
• Misalignment between actual risk exposure and defined ISMS scope
• Unclear ownership of information assets and data flows
• Overlooked compliance requirements from clients or legislation
How AvISO and ISOvA Help
• ISMS scope definition and stakeholder mapping support
• Context analysis templates and risk-based boundary setting
• Live process maps, scope records, and interested party registers in ISOvA
(Clause 5 – Leadership)
What Clause 5 Covers
Organisations must:
• Create an Information Security Policy aligned with business strategy
• Define roles and responsibilities for information security
• Promote leadership commitment and top-level engagement
How to
• Draft an Information Security Policy that references confidentiality, integrity, and availability
• Assign a senior Information Security Officer or ISMS lead
• Define accountability for controls, audits, risk treatment, and incident response
Example
A digital health provider embeds the ISMS into board reporting and assigns policy ownership to the CTO, with oversight from a governance group.
Risks if Overlooked
• Lack of senior buy-in undermines implementation
• Undefined roles lead to accountability gaps during incidents
• ISMS treated as an IT-only initiative, not a business-wide function
How AvISO and ISOvA Help
• Policy development workshops and leadership training
• RACI charts and governance frameworks
• Executive dashboards and role-linked document access in ISOvA
(Clause 6 – Planning)
What Clause 6 Covers
Organisations must:
• Identify and assess information security risks
• Plan treatment actions and objectives
• Address opportunities for improvement and Annex A control selection
How to
• Conduct a risk assessment based on asset, threat, and vulnerability models
• Create a Risk Treatment Plan and Statement of Applicability (SoA)
• Set measurable information security objectives (e.g. zero critical incidents, improved response time)
Example
An edtech platform defines monthly phishing simulations and a 24-hour incident response target as key security objectives.
Risks if Overlooked
• Weak or generic risk assessment undermines effectiveness
• SoA incomplete or not linked to actual risks
• Poor objective setting results in audit nonconformance
How AvISO and ISOvA Help
• Information risk assessment and SoA guidance
• Customisable risk registers and objectives tracking in ISOvA
• Annex A integration and risk-treatment links to controls
(Clause 7 – Support)
What Clause 7 Covers
Organisations must:
• Provide resources, competence, and awareness
• Maintain documented information including procedures and records
• Ensure effective communication about information security
How to
• Create a training matrix and deliver targeted security awareness sessions
• Establish documentation for procedures, asset registers, and incident response
• Ensure all staff understand their security roles and data protection responsibilities
Example
An MSP provides quarterly refresher training on password hygiene, secure handling of client data, and phishing detection.
Risks if Overlooked
• Outdated documents or uncontrolled change
• Gaps in training or low awareness of policies
• Missed audit evidence or weak records
How AvISO and ISOvA Help
• Training sessions for awareness and internal auditors
• Controlled templates and document change tracking in ISOvA
• Role-linked access and automated reminders for training or documentation review
(Clause 8 – Operation)
What Clause 8 Covers
Organisations must:
• Plan and implement risk treatment actions
• Operate and control processes and third-party relationships
• Respond to security incidents and manage change
How to
• Deploy technical and procedural controls (e.g. access control, backups, change management)
• Maintain incident logs, response procedures, and evidence trails
• Monitor outsourced services or supply chain security
Example
A recruitment tech platform integrates ISO 27001-aligned controls into their DevSecOps pipeline and vendor assessment criteria.
Risks if Overlooked
• Operational gaps in applying risk treatment
• Unpreparedness for security incidents or data breaches
• Supply chain vulnerabilities not actively managed
How AvISO and ISOvA Help
• Security process mapping and control implementation support
• Incident reporting and action log modules in ISOvA
• Third-party control tracking and security assurance documentation
(Clause 9 – Performance Evaluation)
What Clause 9 Covers
Organisations must:
• Measure and monitor ISMS effectiveness
• Conduct internal audits
• Run management reviews and performance evaluations
How to
• Create an internal audit schedule that covers all processes and Annex A control areas
• Track KPIs such as incident response time, training completion, and risk treatment progress
• Hold management reviews that incorporate security posture, nonconformities, and objectives
Example
An energy services firm conducts quarterly internal audits across departments and uses KPIs to identify control performance gaps.
Risks if Overlooked
• Missed or ineffective audits
• Lack of evidence for continual improvement
• Unclear metrics or reporting delays
How AvISO and ISOvA Help
• Internal audit support and management review tools
• Real-time dashboards and audit programmes in ISOvA
• Templates and guidance for KPI definition, analysis, and improvement reporting
(Clause 10 – Improvement)
What Clause 10 Covers
Organisations must:
• Identify and respond to nonconformities
• Take corrective action and review effectiveness
• Demonstrate continual improvement in the ISMS
How to
• Maintain logs of incidents, nonconformities, audit findings, and root cause analyses
• Validate that corrective actions are effective and linked to risk reduction
• Use improvements to refine controls, processes, and policy updates
Example
After a data sharing error, a healthcare provider updates its encryption policy and retrains staff on email protocols.
Risks if Overlooked
• Repeat incidents or findings due to poor root cause analysis
• Lack of evidence for continual improvement
• Missed alignment with evolving threats or business change
How AvISO and ISOvA Help
• CAPA process design and root cause analysis workshops
• Improvement log and follow-up tracking in ISOvA
• Integration with ISO 27701, Cyber Essentials, and other security frameworks
Need help with our how-to guide, have a question, or want to know more about how we can help you gain certification? Get in touch.
Kent: 01892 800476 | London: 02037 458 476 | info@avisoconsultancy.co.uk