ISO27001:2022

ISO27001 Organisation Controls

ISO27001 Annex A 5.1 Policies for information security

ISO27001 Annex A 5.2 Information Security Roles and Responsibilities

ISO27001 Annex A 5.3 Segregation of duties

ISO27001 Annex A 5.4 Management responsibilities

ISO27001 Annex A 5.5 Contact with authorities

ISO27001 Annex A 5.6 Contact with special interest groups

ISO27001 Annex A 5.7 Threat intelligence

ISO27001 Annex A 5.8 Information security in project management

ISO27001 Annex A 5.9 Inventory of information and other associated assets

ISO27001 Annex A 5.10 Acceptable use of information and other associated assets

ISO27001 Annex A 5.11 Return of assets

ISO27001 Annex A 5.12 Classification of information

ISO27001 Annex A 5.13 Labelling of information

ISO27001 Annex A Cotrol 5.14 Information transfer

ISO27001 Annex A 5.15 Access control

ISO27001 Annex A 5.16 Identity management

ISO27001 Annex A 5.17 Authentication information

ISO27001 Annex A 5.18 Access rights

ISO27001 Annex A 5.19 Information security in supplier relationships

ISO27001 Annex A 5.20 Addressing information security within supplier agreements

ISO27001 Annex A 5.21 Managing information security in the ICT supply chain

ISO27001 Annex A 5.22 Monitoring, review and change management of supplier services

ISO27001 Annex A 5.23 Information security for use of cloud services

ISO27001 Annex A 5.24 Information security incident management planning and preparation

ISO27001 Annex A 5.25 Assessment and decision on information security events

ISO27001 Annex A 5.26 Response to information security incidents

ISO27001 Annex A 5.27 Learning from information security incidents

ISO27001 Annex A 5.28 Collection of evidence

ISO27001 Annex A 5.29 Information security during disruption

ISO 27001 Annex A Cotrol 5.30 ICT readiness for business continuity

ISO27001 Annex A 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO27001 Annex A 5.32 Intellectual property rights

ISO27001 Annex A 5.33 Protection of records

ISO27001 Annex A 5.34 Privacy and protection of PII

ISO27001 Annex A 5.35 Independent review of information security

ISO27001 Annex A 5.36 Compliance with policies and standards for information security

ISO27001 Annex A 5.37 Documented operating procedures

ISO27001 Technical Controls

ISO27001 Annex A 8.1 User Endpoint Devices

ISO27001 Annex A 8.2 Privileged Access Rights

ISO27001 Annex A 8.3 Information Access Restriction

ISO27001 Annex A 8.4 Access To Source Code

ISO27001 Annex A 8.5 Secure Authentication

ISO27001 Annex A 8.6 Capacity Management

ISO27001 Annex A 8.7 Protection Against Malware

ISO27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO27001 Annex A 8.9 Configuration Management 

ISO27001 Annex A 8.10 Information Deletion

ISO27001 Annex A 8.11 Data Masking

ISO27001 Annex A 8.12 Data Leakage Prevention

ISO27001 Annex A 8.13 Information Backup

ISO27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO27001 Annex A 8.15 Logging

ISO27001 Annex A 8.16 Monitoring Activities

ISO27001 Annex A 8.17 Clock Synchronisation

ISO27001 Annex A 8.18 Use of Privileged Utility Programs

ISO27001 Annex A 8.19 Installation of Software on Operational Systems

ISO27001 Annex A 8.20 Network Security

ISO27001 Annex A 8.21 Security of Network Services

ISO27001 Annex A 8.22 Segregation of Networks

ISO27001 Annex A 8.23 Web Filtering

ISO27001 Annex A 8.24 Use of Cryptography

ISO27001 Annex A 8.25 Secure Development Life Cycle

ISO27001 Annex A 8.26 Application Security Requirements

ISO27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO27001 Annex A 8.28 Secure Coding

ISO27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO27001 Annex A 8.30 Outsourced Development

ISO27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO27001 Annex A 8.32 Change Management

ISO27001 Annex A 8.33 Test Information

ISO27001 Annex A 8.34 Protection of information systems during audit testing

Home / ISO 27001 Clauses / The Ultimate Guide to ISO 27001:2022 Clause 8.3 Information Security Risk Treatment

The Ultimate Guide to ISO 27001:2022 Clause 8.3 Information Security Risk Treatment

Last updated Sep 15, 2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

ISO 27001 Information Security Risk Treatment

The ISO 27001 standard requires an organisation to treat risks and to keep evidence of the results.

Watch the Video

In this ISO 27001 tutorial How To Implement ISO 27001 Clause 8.3 Information Security Risk Treatment I show you how to implement it and pass the audit.

What is ISO 27001 Clause 8.3?

ISO 27001 clause 8.3 addresses executing Information Security Risk Treatment. Building upon the risk treatment planning covered in clause 6.1.3, this section focuses on putting those plans into action. For ISO 27001 certification, the standard mandates the effective treatment and management of identified risks. This process requires documented evidence of the risk treatment activities, typically maintained within the risk register.

ISO 27001 Clause 8.3 Definition

ISO 27001 defines ISO 27001 Information Security Risk Treatment as:

The organisation shall implement the information security risk treatment plan.
The organisation shall retain documented information of the results of the information security risk treatment.

ISO 27001:2022 Clause 8.3 Information Security Risk Treatment
ISO 27001 Toolkit

How to implement ISO 27001 Clause 8.3

ISO 27001 clause 8.3 requires proof your risk treatment plan (from clause 6.1.3) is working. You show this by actively managing risks. Use a risk register listing all needed controls and leftover risk. Share this register with management and discuss it in their review meetings.

Your Statement of Applicability controls are meant to handle risk. Make sure your risk register and treatment link to these controls, especially those in your Statement of Applicability.

Risk Treatment Examples

Risk treatment examples include:

  • You can accept the risk. You would hold a management review meeting, get agreement to accept the risk, minute the meeting to document the decision and update the risk register.
  • You could transfer the risk. Whilst you cannot transfer the accountability for a risk you can transfer the treatment of the risk. An example of this would be having insurance in place or outsourcing to a third party.
  • You could mitigate the risk. The level of mitigation may be to reduce but not eliminate the risk or to eliminate the risk. It really depends on the risk appetite of the organisation.

ISO 27001 Clause 8.3 Implementation Checklist

1. Prioritise Risk Treatments

Focus on the most important risks first. Don’t try to fix everything at once.

Challenge: Hard to agree on which risks are truly the biggest. Limited resources can make prioritisation tough.

Solution: Use a clear risk scoring system. Involve key people in deciding priorities. Focus on risks with the biggest potential impact.

2. Develop Treatment Plans

For each key risk, make a simple plan. Say what you will do, who will do it, and when it will be done.

Challenge: Plans can become complex and hard to follow. Things change, making plans outdated quickly.

Solution: Keep plans short and to the point. Regularly review and update them. Make sure everyone knows their role.

3. Implement Controls

Put the controls you chose into action. This might be new tech, new rules, or staff training.

Challenge: New controls can be expensive or disruptive. Staff might resist changes to how they work.

Solution: Explain why the changes are needed. Provide good training and support. Choose controls that fit your business.

4. Document Everything

Keep records of your risk treatments. This shows you are serious about security.

Challenge: Lots of paperwork can be a burden. Hard to keep track of everything.

Solution: Use a simple ISO 27001 risk register. Keep it up to date. Make sure everyone can access it.

5. Communicate Clearly

Tell staff about the risks and what you are doing to manage them.

Challenge: Hard to explain complex risks simply. People might not understand why changes are needed.

Solution: Use plain language. Explain the benefits of better security. Answer people’s questions.

6. Monitor Controls

Check that your controls are working as planned. Are they actually reducing the risks?

Challenge: Monitoring can take time and effort. Hard to know if controls are truly effective.

Solution: Use regular checks and tests. Track key metrics. Get feedback from staff.

7. Review Risk Treatments

Regularly check if your risk treatments are still the right ones. Things change, so should your plans.

Challenge: Easy to forget to review things. Risks can change quickly.

Solution: Set a regular review schedule. When something big changes, review the risks again.

8. Manage Residual Risk

Even with good controls, some risk will remain. Accept this and plan for it.

Challenge: Hard to know how much risk is acceptable. Tempting to try to eliminate all risk.

Solution: Decide what level of risk you can live with. Focus on managing the most important remaining risks.

9. Learn from Mistakes

If something goes wrong, learn from it. Update your risk treatments to stop it happening again.

Challenge: People might be afraid to admit mistakes. Hard to find the root cause of problems.

Solution: Create a culture of learning. Focus on fixing problems, not blaming people. Analyse incidents carefully.

10. Get Management Support

Make sure senior managers are involved in risk treatment. They need to provide resources and support.

Challenge: Hard to get management attention. They might not understand the importance of security.

Solution: Explain the business benefits of good security. Keep them informed about key risks. Show them how security helps the business.

ISO 27001 Clause 8.3 Audit Checklist

How to audit ISO 27001 Clause 8.3 Information Security Risk Treatment

1. Assess Risk Assessment Linkage

Verify a clear link between the identified risks from the risk assessment (Clause 8.2) and the chosen risk treatment options. Treatments should directly address the assessed risks.

  • Review risk registers and treatment plans
  • trace individual risks through to their corresponding treatments
  • interview risk owners to confirm understanding of the linkage

2. Review Treatment Option Justification

Confirm that the rationale for selecting a specific risk treatment option is documented and justified. Simply stating the chosen option is insufficient; why that option was chosen is crucial.

  • Examine risk treatment documentation
  • interview risk owners and management
  • look for evidence of analysis that supports the chosen option (e.g., cost-benefit analysis, feasibility studies).

3. Get Evidence of Control Implementation

Verify that the planned controls for mitigating risks have been implemented. This goes beyond just having a policy; it requires evidence of the control’s existence and operation.

  • Inspect physical controls
  • examine system configurations for technical controls
  • review staff training records for awareness controls
  • conduct penetration testing and vulnerability scanning
  • observe processes in action

4. Test the Effectiveness of Controls

Ensure that controls are regularly tested to confirm they are operating effectively as intended. This should include both technical testing (e.g., penetration testing) and non-technical testing (e.g., process reviews).

  • Review penetration test reports vulnerability scan results, audit logs, and other testing documentation.
  • Observe control operation, interview staff about control procedures.

5. Ensure Sufficient Resources are Allocated

Verify that adequate resources (financial, human, technical) have been allocated to implement, operate, and maintain the risk treatments and associated controls.

  • Review budget documentation
  • resource allocation plans, project plans, and training records
  • Interview management and relevant staff about resource availability

6. Review Residual Risk Acceptance

Where residual risk remains after treatment, confirm that it has been formally accepted by appropriate management. The level of residual risk should be documented and justified.

  • Review risk registers and treatment plans for documented residual risk acceptance
  • interview management to confirm understanding and acceptance of residual risk

7. Check the Frequency of Monitoring and Reviews

Ensure that the effectiveness of risk treatments and controls is monitored and reviewed at appropriate frequencies. The frequency should be based on the level of risk and the changing threat landscape.

  • Review monitoring logs incident reports, vulnerability scan results, and management review minutes
  • Interview risk owners and management about the monitoring process

8. Review Metrics and Measurements

Verify that appropriate metrics are used to measure the effectiveness of risk treatments and controls. These metrics should be quantifiable and provide meaningful insights.

  • Review risk treatment plans and monitoring procedures
  • examine reports on control effectiveness
  • interview risk owners and management about the metrics used

9. Check for a Continual Improvement Process

Ensure that the risk treatment process itself is subject to continual improvement. This includes learning from incidents, audit findings, and changes in the threat landscape.

  • Review records of process improvement initiatives
  • interview management about improvement activities
  • examine how feedback from audits and incidents is used to update the risk treatment process

10. Ensure Communication of Risk Treatment

Verify that information about identified risks and their treatment plans is communicated effectively to relevant stakeholders.

  • Review communication plans
  • interview stakeholders about their understanding of risks and treatments
  • examine evidence of communication (e.g., meeting minutes, reports, emails)
  • assess the effectiveness of communication by asking stakeholders about their awareness of key risks and controls

How to conduct an ISO 27001 risk treatment

You use the risk register and sure that you provide an effective risk rating for each risk.

Using your risk treatment plan you will have identified the relevant risk treatment based on risk level.

This can be overridden by the management review team meeting.

For each risk that you identify, once you have identified the risk treatment implement the treatment you have chosen. If this is to either introduce or enhance controls, including those in the Statement of Applicability, follow your continual improvement process.

Once the risk treatment is implemented update the risk register and conduct and audit of the risk again and record the residual risk score.

This is the new risk score based on the new risk treatment.

Ideally the risk score will have gone down.

You would not want to implement a control for a risk that did not positively impact its risk score and go some way to mitigating it.

Risk Register Template

ISO 27001 Risk Register Template

Risk Management Policy Template

ISO 27001 Risk Management Policy Template

Risk Management Process Template

ISO 27001 Risk Management Procedure Template

ISO 27001 Clause 8.3 FAQ

What is ISO 27001 Clause 8.3 Information Security Risk Treatment ?

The ISO 27001 standard requires an organisation to perform risk treatment for identified risks and record evidence of the risk treatment.

Where can I download ISO 27001 Clause 8.3 Information Security Risk Treatment ?

You can download ISO 27001 Clause 8.3 Information Security Risk Treatment templates in the ISO 27001 Toolkit.

ISO 27001 Clause 8.3 Information Security Risk Treatment example?

An example of ISO 27001 Clause 8.3 Information Security Risk Treatment can be found in the ISO 27001 Toolkit.

Is there an ISO 27001 Clause 8.3 Information Security Risk Treatment risk register?

Yes. A complete guide to the ISO 27001 Clause 8.3 Information Security Risk Treatment risk register can be found here.

Is there a guide to the risk management policy used in ISO 27001 Clause 8.3?

A guide to the ISO 27001 risk management policy used by ISO 27001 Clause 8.3 is located here.

How do you keep evidence of a risk treatment?

There are several ways to keep and how evidence of a risk assessment:
1. Hold an annual risk review meeting and minute the results
2. Maintain and use a risk register
3. Follow the structure agenda of the management review team meeting which covers risk assessment
4. Include risk assessment as part of your operational processes

How often do you conduct a risk treatment?

At any point that the risk identified is unacceptable and needs to be addressed

How do you conduct an ISO 27001 risk treatment?

Read the complete guide to ISO 27001 risk assessment here.

Further Reading

For more on planning for risk assessment be sure to read: ISO 27001 Clause 6.12 Information security risk assessment Guide

For more on planning for risk treatment be sure to read: ISO 27001 Clause 6.1.3 Information Security Risk Treatment Guide

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.