ISO 27001 Clause Compliance Register

ISO/IEC 27001:2022 — Clause 4–10 Requirement Compliance Status

Last Updated: 2026-02-20

Owner: Lucas Shin — Security Director


Clause 4 — Context of the Organisation

ClauseRequirementImplementationEvidence / RecordsStatus
4.1Understanding the organisation and its contextL1 Information Security Policy §2🟡 Needs Improvement
4.2Understanding the needs and expectations of interested partiesL1 §2 (regulatory alignment), P5 Supplier Policy §2Interested parties register required🟡 Needs Improvement
4.3Determining the scope of the ISMSL1 §2 (organisational & technical scope)Standalone Scope Statement recommended🟡 Needs Improvement
4.4Information security management systemL1 overall + ISMS document structure✅ Adequate

Clause 5 — Leadership

ClauseRequirementImplementationEvidence / RecordsStatus
5.1Leadership and commitmentL1 §4 Governance Structure (CEO, CISO role definitions)Management review minutes (not yet created)🟡 Needs Improvement
5.2PolicyL1 Information Security Policy (SEC-POL-ISP-001)Approved policy document✅ Adequate
5.3Organisational roles, responsibilities and authoritiesL1 §4.1 + Roles & Responsibilities section of each L2 policy✅ Adequate

Clause 6 — Planning

ClauseRequirementImplementationEvidence / RecordsStatus
6.1.1Actions to address risks and opportunities — GeneralL1 §6🟡 Needs Improvement
6.1.2Information security risk assessmentL1 §6.1 (mentioned only)Risk Assessment Methodology document required, Risk Register (Database) required🔴 Missing
6.1.3Information security risk treatmentL1 §6.2 (4 treatment options mentioned)Risk Treatment Plan required, SoA required🔴 Missing
6.2Information security objectives and planning to achieve themAnnual security objectives + KPI document required🔴 Missing
6.3Planning of changesDocument Control section of each policy (version control)✅ Adequate

Clause 7 — Support

ClauseRequirementImplementationEvidence / RecordsStatus
7.1ResourcesL1 §4.1 (CEO: resource allocation)Recommended to include in management review output🟡 Needs Improvement
7.2CompetenceP4 HR Policy §4.3 (Security Awareness)Competence criteria and assessment records need supplementation🟡 Needs Improvement
7.3AwarenessP4 HR Policy §4.3 (onboarding briefing, annual refresher)Training records (minutes, signatures)✅ Adequate
7.4CommunicationP6 Communications & Media Policy, P4 HR §4.3 (ad-hoc notification)✅ Adequate
7.5Documented informationDocument Control section of each policyISMS-wide document management procedure supplementation recommended🟡 Needs Improvement

Clause 8 — Operation

ClauseRequirementImplementationEvidence / RecordsStatus
8.1Operational planning and controlL2 P1–P7 policies + L3 proceduresMonitoring items in each policy✅ Adequate
8.2Information security risk assessment (execution)Risk assessment execution results required (Risk Register)🔴 Missing
8.3Information security risk treatment (execution)Risk treatment execution results required🔴 Missing

Clause 9 — Performance Evaluation

ClauseRequirementImplementationEvidence / RecordsStatus
9.1Monitoring, measurement, analysis and evaluationP1 M365 §8, P2 BYOD (distributed across policies)Integrated monitoring framework recommended🟡 Needs Improvement
9.2Internal auditInternal audit programme and result records required🔴 Missing
9.3Management reviewL1 §4.2 (annual review mentioned)Management review procedure (input/output) and minutes template required🔴 Missing

Clause 10 — Improvement

ClauseRequirementImplementationEvidence / RecordsStatus
10.1Continual improvementL1 §4.2 (review cycle defined)🟡 Needs Improvement
10.2Nonconformity and corrective actionNonconformity and corrective action procedure + records required🔴 Missing

Compliance Status Summary

StatusCountDescription
✅ Adequate8Covered by current policies/procedures
🟡 Needs Improvement8Supplement existing documents or add evidence
🔴 Missing6New process/records creation required

🔴 Critical Missing Items (Priority Actions)

  1. Risk Assessment & Treatment (6.1.2, 6.1.3, 8.2, 8.3) — Methodology + Risk Register
  2. Internal Audit Programme (9.2)
  3. Management Review (9.3) — Procedure + record templates
  4. Information Security Objectives (6.2)
  5. Nonconformity & Corrective Action (10.2)
  6. Statement of Applicability (6.1.3d) — Separate SoA Database