ISO 27001 Risk Assessment: The Methodology That Satisfies Your Auditor | Lorikeet Security Skip to main content
Back to Blog

ISO 27001 Risk Assessment: The Methodology That Satisfies Your Auditor

Lorikeet Security Team February 28, 2026 10 min read

The risk assessment is the engine of your ISMS. Every control you implement, every policy you write, and every procedure you follow should trace back to an identified risk. ISO 27001 Clause 6.1 requires a systematic approach to identifying, analyzing, and evaluating information security risks, but it does not prescribe a specific methodology.

This flexibility is both an advantage and a pitfall. Organizations can choose a methodology that fits their size and complexity, but many choose poorly, resulting in risk assessments that look good on paper but do not reflect actual threats to their business.


Choosing a Methodology

Approach How It Works Best For
Asset-based Identify assets, threats to each asset, vulnerabilities, and resulting risks Organizations with well-defined asset inventories; aligns with ISO 27005
Scenario-based Identify risk scenarios (threat + vulnerability + impact) independent of specific assets Cloud-native organizations where traditional asset boundaries are fluid
Hybrid Combine asset-based for infrastructure and scenario-based for business processes Most organizations; provides comprehensive coverage

Risk Criteria and Scales

Before assessing risks, define your risk criteria: the scales for likelihood and impact, the method for calculating risk level, and the threshold for risk acceptance. These criteria must be documented and approved by management.

Likelihood scale

Impact scale


Risk Treatment

For each risk above your acceptance threshold, select a treatment option. The risk treatment plan documents which controls from Annex A (or other sources) address each risk, the implementation timeline, the responsible owner, and the expected residual risk after treatment.

After treatment, the residual risk must be formally accepted by management. This acceptance should be documented and reviewed during management reviews. If the residual risk exceeds your acceptance criteria, additional treatment is required.

Auditor focus area: Auditors check that your risk treatment plan is actionable and tracked. A risk treatment plan with vague actions like "improve security" and no deadlines or owners will receive a nonconformity. Each treatment action should be specific, assigned to a named individual, and have a completion date.


Common Risk Assessment Mistakes

Need security testing or compliance support?

We provide penetration testing, compliance assessments, and security consulting for organizations at every stage.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!