
February 11, 2026
Do we need an AI policy for ISO 27001?
Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.
Read MoreRisk management is a key component of ISO27001, covered under requirements 6 and 8 and featured in the ANNEX A controls. Risk forms the basis of ANNEX A controls decisions, and the ANNEX A controls form should be reviewed for alignment with risk treatment decisions.
I suppose we should introduce the ISO27001 standard.
ISO27001 is a globally recognised international standard for managing information security. It provides a framework for implementing and maintaining an effective Information Security Management System (ISMS) designed to protect an organisation's information assets' confidentiality, integrity, and availability.
If you want to know more, check out our "What is ISO27001" article.
Risk management is fundamental to ISO27001, and you have the following expectations from the standard's requirements
Risk is also mentioned in controls within ANNEX A when assessing Supplier Relationships, including the ICT supply chain, as well as screening employees.
The concepts of risk management in ISO 27001 are aligned with the ISO 31000 standard which is a general risk management guidelines document, this is a relatively simple standard and a good method to follow with ISO27001, although I would generally recommend adopting ISO 27005 which is focused on information security risk management which is fundamentally the focus of ISO 27001. It also has a more expectations in the risk assessment process.
A bit of a blend is probably best for most businesses. A process that meets your needs still needs to be defined.
Here, I will cover some of the key components of risk management for ISO 27001, but if you want a deeper understanding, read our "What is Risk Management" article.

February 11, 2026
Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.
Read More
August 14, 2025
Penetration testing simulates real-world cyberattacks to uncover vulnerabilities before malicious hackers can exploit them. This article explains the types of pen testing, the process, and why it’s essential for strengthening your organisation’s cyber defences.
Read More
August 6, 2025
ISO 27001 certification is a recognised security standard—but does it guarantee better protection? This article explores whether certification truly enhances security or if a risk-based approach without the badge can be just as effective.
Read More