Phase 2: Risk Assessment and Treatment
• Identify information assets and their owners across the organisation, including data, systems, processes, and third-party services within the ISMS scope.
• Assess threats and vulnerabilities for each asset, considering both internal and external risk factors relevant to your industry and operational context.
• Calculate risk levels using a consistent methodology that accounts for likelihood and impact, ensuring repeatable and defensible results.
• Define risk treatment options — accept, mitigate, transfer, or avoid — based on your organisation's risk appetite and business objectives.
• Create a Statement of Applicability (SoA) documenting which Annex A controls apply to your organisation and the justification for any exclusions.
• Develop a Risk Treatment Plan with clear timelines, responsible owners, and measurable objectives for implementing the required controls.