The Ultimate Guide To ISO 27001 Clause 6 Planning

ISO 27001 Clause 6 Planning Guide

In this article we lay bare ISO 27001 Clause 6 Planning. Exposing the insider trade secrets, giving you the templates that will save you hours of your life and showing you exactly what you need to do to satisfy it for ISO 27001 certification.

What is ISO 27001 Clause 6?

 The ISO 27001 standard requires an organisation to establish and maintain information security risk assessment processes that include the risk acceptance and assessment criteria.

It requires that the organisation implements and manages risk treatment.

As part of planning it also requires the organisation to set out the information security objectives and have a plan in place to meet those objectives.

ISO 27001 Clause 6 Definition

This ISO 27001 Standard defines clause 6 as:

When planning for the information security management system, the organisation shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to:

a) ensure the information security management system can achieve its intended outcome(s);

b) prevent, or reduce, undesired effects; and

c) achieve continual improvement.

The organisation shall plan:

d) actions to address these risks and opportunities; and

e) how to

1) integrate and implement these actions into its information security management system processes; and

2) evaluate the effectiveness of these actions.

ISO 27001 Clause 6

ISO 27001 6.1.2 Information Security Risk Assessment Requirement

Read the ISO 27001 6.1.2 Information Security Risk Assessment Requirement Guide

ISO 27001 Clause 6.1.2 Information security risk assessment guide

The organisation shall define and apply an information security risk assessment process that:
a) establishes and maintains information security risk criteria that include:
1) the risk acceptance criteria; and
2) criteria for performing information security risk assessments;
b) ensures that repeated information security risk assessments produce consistent, valid and comparable results;
c) identifies the information security risks:
1) apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability for information within the scope of the information security management system; and
2) identify the risk owners;
d) analyses the information security risks:
1) assess the potential consequences that would result if the risks identified in 6.1.2c) 1) were to materialise;
2) assess the realistic likelihood of the occurrence of the risks identified in 6.1.2 c) 1); and
3) determine the levels of risk;
e) evaluates the information security risks:
1) compare the results of risk analysis with the risk criteria established in 6.1.2 a); and
2) prioritise the analysed risks for risk treatment.

ISO 2001 6.1.3 Information Security Risk Treatment

The organisation shall define and apply an information security risk treatment process to:

Read the ISO 27001 ISO 2001 6.1.3 Information Security Risk Treatment Guide

ISO 27001 Clause 6.1.3 Information Security Risk Treatment Guide

a) select appropriate information security risk treatment options, taking account of the risk assessment results;
b) determine all controls that are necessary to implement the information security risk treatment option(s) chosen;
c) compare the controls determined in 6.1.3 b) above with those in Annex A and verify that no necessary controls have been omitted;
d) produce a Statement of Applicability that contains the necessary controls and justification for inclusions, whether they are implemented or not, and the justification for exclusions of controls from Annex A;
e) formulate an information security risk treatment plan; and
f ) obtain risk owners’ approval of the information security risk treatment plan and acceptance of the residual information security risks.

ISO 27001 6.2.1 Information Security Objectives and Planning To Achieve Them Requirement

Read the ISO 27001 6.2.1 Information Security Objectives and Planning To Achieve Them Requirement Guide

ISO 27001 Clause 6.2.1 Information Security Objectives and Planning to Achieve Them Guide

The organisation shall establish information security objectives at relevant functions and levels. The information security objectives shall:
a) be consistent with the information security policy;
b) be measurable (if practicable);
c) take into account applicable information security requirements, and risk assessment and risk treatment results;
d) be communicated; and
e) be updated as appropriate.
When planning how to achieve its information security objectives, the organisation shall determine;

f ) what will be done;
g) what resources will be required;
h) who will be responsible;
i) when it will be completed; and
j) how the results will be evaluated.

ISO 27001 Clause 6 FAQ

What is ISO 27001 Clause 6 Planning?

The ISO 27001 standard requires an organisation to establish and maintain information security risk management processes and that it defines information security objectives in line with the risks identified.

Where can I download ISO 27001 Clause 6 Planning templates?

You can download ISO 27001 Clause 6 Planning templates here: https://hightable.io/product/iso-27001-templates-toolkit/

ISO 27001 Clause 6.1 Planning templates example?

An example of ISO 27001 Clause 6 Planning can be found here: https://hightable.io/product/iso-27001-templates-toolkit/

ISO 27001 Certification Requirements

See Also

Reference

ISO/IEC 27001 Information Security Management

ISO 27001 Strategy Session
ISO 27001 ISO 27001 Toolkit
ISO 27001 Policy Bundle

ISO 27001 Templates Toolkit: Business Edition

ISO 27001 Policy Templates: Professional Edition

Stuart Barker

About the Author

Stuart Barker

Stuart is an ISO 27001 Consultant and author of the ISO 27001 Templates Toolkit. Over 20 years he has helped hundreds of organisations with the ISO 27001 standard and getting them ISO 27001 certification with a 100% success rate.

Shopping Cart