Cyberzoni Iso 27001

ISO 27001 Clause 8 Operation – ISMS Operational Control & Risk Treatment Guide

ISO/IEC 27001 Clause 8 – Operation is where you put all your plans from earlier clauses into action. In essence, Clause 8 says: do what you planned to do about your information security risks, and do it in a managed, consistent way.

Navigate
ISO/IEC 27001

ISO/IEC 27001 Clause 8 – From Plans to Action

ISO/IEC 27001 Clause 8 – Operation is where you put all your plans from earlier clauses into action. In the ISO 27001 implementation cycle, Clause 8 represents the “Do” stage – executing the information security processes and controls you planned in Clause 6 (Planning) under controlled conditions. 

This clause ensures that operational activities for security are carried out as intended, that risk assessments are ongoing rather than one-time, and that risk treatments (controls) are applied and documented.

Clause 8 is subdivided into three key areas:

Below, we break down each sub-clause and provide guidance on meeting its requirements (with practical tips).

Clause 8.1 – Operational Planning and Control

Clause 8.1 requires your organization to plan, implement, and control the operational processes needed to meet your information security requirements and the actions identified in Clause 6 (Planning). In simpler terms, all the policies, plans, and controls you decided on must now be carried out and managed in practice, not just exist on paper. Key aspects of Clause 8.1 include establishing criteria for these processes, implementing them according to plan, and maintaining evidence that they’ve been performed as intended.

Some practical guidance for Operational Planning and Control under Clause 8.1:

  • Follow Established Procedures: Ensure you have documented procedures or criteria for security processes (e.g. user account provisioning, data backup, incident response) and follow them consistently. For example, if you have a backup policy, verify that backups are actually running on schedule and keep logs or reports as evidence.
  • Maintain Documented Evidence: Keep records to prove that operational controls are executed as planned. This could include logs of backups, user access review reports, incident logs, change records, etc. Documented information gives confidence that processes have been carried out as expected. Auditors will look for evidence (records, reports) showing you perform these activities regularly.
  • Control Changes: Manage changes to your ISMS processes in a controlled manner. For any planned changes, assess their impact on information security (this ties in with the new Clause 6.3 on planning changes in the 2022 standard). If unexpected changes occur (e.g. a sudden staff change or a new threat emerges), review the consequences and mitigate any adverse effects. Having a change management process ensures changes do not weaken security.
  • Manage External Providers: If you outsource any process or use external products/services that affect information security, ensure those external parties are under control. This means extending your security requirements to suppliers and partners – for example, using contracts or SLAs to require a cloud provider or data center to meet certain security standards. You should coordinate with third-party providers so that their operations align with your ISMS. (We help clients assess third-party risks – e.g. through a supplier risk assessment template – to make sure partners meet your security requirements.)

In an ISO 27001 audit, evidence for Clause 8.1 might include operational records like backup logs, access control review reports, patching records, and any proof that security controls from your risk treatment plan have been implemented on schedule.

Clause 8.2 – Information Security Risk Assessment (Operational)

Clause 8.2 ensures that risk assessment is an ongoing process and not a one-time activity done only during initial ISMS planning. The standard requires organizations to perform information security risk assessments at planned intervals, or when significant changes occur, taking into account the risk criteria defined in Clause 6.1.2 (e.g. your risk evaluation methodology and acceptance criteria). You must also retain documented information of the results. In short, you need to continuously monitor and re-evaluate risks to adapt to new threats and changes.

To comply with Clause 8.2 – Information Security Risk Assessment, consider the following guidance:

  • Schedule Regular Risk Assessments: Define how often you will reassess information security risks. Many organizations conduct a formal risk assessment annually as a minimum. If your environment is very dynamic or high-risk, you might do it more frequently (e.g. semi-annually or quarterly). The key is to have a planned interval and stick to it.
  • Assess Risks After Significant Changes: Don’t wait for the next scheduled cycle if a major change happens. Clause 8.2 explicitly says to re-assess when significant changes are proposed or occur. For example, if you launch a new product, undergo a big infrastructure change, experience a serious security incident, or face new regulations, perform a targeted risk assessment for that change. This ensures new or changed risks are identified promptly.
  • Keep the Risk Register Updated: Maintain documented results of each risk assessment. This usually means updating your risk register or risk log with any new risks, changed risk levels, or status updates. Each time you reassess, record the date and what was changed or added. Over time, you’ll have a history of how your risk landscape evolves (e.g. “Reviewed risks in Q1 2025 – added 2 new risks related to cloud services, raised impact level for 1 risk due to recent incident”). These records demonstrate continuous risk management.
  • Make Risk Assessment a “Living” Process: Clause 8.2 ties back to your risk framework from Clause 6.1 – it ensures that risk assessment is not static but ongoing. Treat risk assessment as a cycle that never really stops. After the initial risk assessment in the planning phase, you continuously refine it. Auditors will expect to see that by the time of certification, you’ve completed at least one full cycle of risk review beyond the initial assessment. In surveillance audits (annual follow-ups), they’ll look for evidence of yearly risk assessment updates or more frequent reviews.

Cyberzoni can assist in this ongoing risk assessment process – for example, by providing structured Risk Assessment Template and Tools to identify and evaluate risks consistently. Our experts can also help facilitate periodic risk review workshops or provide Virtual CISO services to guide your team through assessing new threats as your business evolves.

Clause 8.3 – Information Security Risk Treatment (Operational)

Clause 8.3 is about applying the risk treatment plan that you developed in Clause 6.1.3 and ensuring that risk treatments (i.e. chosen controls and actions) are actually implemented in operations. In other words, for each risk that you decided to treat, the planned control or mitigation must be carried out and its results documented. Just as Clause 8.2 keeps risk assessment ongoing, Clause 8.3 keeps risk treatment ongoing – it closes the loop by continuously mitigating risks as they are identified or change.

Key guidance for Clause 8.3 – Information Security Risk Treatment:

  • Implement Controls as Planned: Carry out the risk treatment plan by putting in place the security controls or measures you committed to. For example, if the plan says to deploy multi-factor authentication (MFA) for all remote logins, ensure that MFA has been rolled out and is enforced in practice. Clause 8.3 essentially says: do what you said you would do to treat the risks. This should be an ongoing activity, not a one-off – security controls need to be maintained and periodically verified.
  • Address New or Changing Risks: If new risks are discovered (through Clause 8.2’s assessments or other means) or if certain risks evolve, update your risk treatment plans accordingly. This might involve selecting new controls from Annex A, modifying existing controls, or changing priorities. Keep your Statement of Applicability (SoA) up to date to reflect any added or removed controls. Clause 8.3 requires that risk treatment remains current with your risk picture.
  • Retain Evidence of Treatments: Just like with operations and risk assessments, maintain documented information for risk treatments. For every control implemented or action taken, there should be some record or proof. Examples: change logs showing a firewall rule update was completed, screenshots of a new encryption setting, training attendance records for a security awareness session (which also ties to Clause 7 for awareness). By audit time, you should be able to show the status of each risk and its treatment – e.g. “Risk #5 (data breach) is mitigated by Control X, implemented on 2025-03-10”. An up-to-date risk register or treatment tracker is very helpful here.
  • Integrate with Daily Operations: Recognize that many day-to-day security tasks are part of Clause 8’s operations. The controls you chose (Annex A controls) drive much of your security operations. For instance, if you chose a control requiring user access reviews, then conducting those reviews (say, quarterly) becomes an operational activity under Clause 8. Auditors may cross-check: if your SoA says an Annex A control is implemented, they might ask to see evidence of it in operation. Therefore, ensure that all selected controls are not only documented but truly active in your organization’s routines.

Complying with Clause 8.3 means your organization doesn’t stop at planning controls – you take action to mitigate risks and can prove it. It reinforces the effectiveness of your ISMS by continuously reducing risks to acceptable levels.

How Cyberzoni Can Help with Clause 8 Implementation

As a dedicated cybersecurity service provider, Cyberzoni offers comprehensive support to help you meet Clause 8 requirements efficiently:

  • Expert Guidance & vCISO Services: Our certified experts (including Virtual CISO services) provide strategic oversight to ensure your operational controls are effective and aligned with ISO 27001. We can help establish criteria for your security processes, plan changes to your ISMS, and make sure no aspect of Clause 8 is overlooked.
  • Risk Assessment & Treatment Tools: Cyberzoni provides ready-made ISO 27001 templates and tools – from risk assessment methodologies to risk treatment plan templates. These resources help you conduct regular risk assessments and document the results with ease. For example, our risk register templates and automated tools allow you to update risk scores and track treatments over time, ensuring you have the required documented information for Clause 8.2 and 8.3.
  • Continuous Monitoring Services: Through our Managed Security Services (MSSP) offerings, we assist in the ongoing monitoring of controls and risks. Activities like vulnerability scanning, log monitoring, and incident response support all contribute to the operational evidence needed for Clause 8.1. 
  • Third-Party Risk Management: Clause 8.1 emphasizes controlling externally provided services. Cyberzoni helps you evaluate and manage vendor risks with tools like our Supplier Risk Assessment Template. We guide you in setting up third-party security requirements and reviewing your vendors’ compliance, so that outsourced services or cloud providers don’t become a weak link in your ISMS operations.
Scroll to Top