ISO 27001 has its own vocabulary. Terms like "risk owner", "residual risk", "Statement of Applicability", and "interested parties" appear constantly throughout the standard — and if you misunderstand them, you will misunderstand the requirements built on top of them.
This article defines the core terms you need to work fluently with ISO 27001. Rather than reproduce the dry definitions from ISO 27000 (the vocabulary standard in the series), each term here is explained in the way practitioners actually use it, with real-world context and examples grounded in the Indonesian regulated industry environment.
These are not abstract concepts. Every one of these terms connects directly to something you will need to document, implement, or explain to an auditor.
The Foundation: ISMS
Everything in ISO 27001 is built around one central concept. Before any other term makes sense, this one has to be clear.
| Information Security Management System (ISMS) · ISO 27000:2018, Clause 3.31 |
A set of policies, processes, procedures, and controls — governed by management and continually improved — that an organization uses to manage information security risks in a systematic, auditable way. The ISMS is not a product or a platform. It is a management system: a structured approach to governing how your organization handles information security. Example: A fintech company's ISMS might cover its core payment processing service, encompassing the people, systems, physical locations, and third-party relationships involved in delivering that service — with documented policies, risk assessments, implemented controls, and evidence of management oversight. |
The most important word in that definition is "systematic". Any organization can claim to take security seriously. An ISMS is the structure that makes that claim auditable — it produces evidence, tracks performance, and responds to incidents and changes in a documented, repeatable way.
Information Assets: What You Are Protecting
ISO 27001 is fundamentally asset-centric. You cannot assess risk without knowing what you are protecting. The standard uses several related terms here that are often conflated.
| Information Asset · ISO 27002:2022, Clause 5.9 |
Anything that has value to the organization and contains or processes information. This includes data (in any form), software, hardware, services, people, and intangibles like reputation. The 2022 version of ISO 27002 groups assets into information assets, software assets, physical assets, services, people, and intangible assets. Example: For a hospital: patient records (information asset), the electronic health records system (software asset), the servers hosting it (physical asset), the cloud hosting provider (service asset), and the clinical staff who access it (people). |
| Asset Owner · ISO 27002:2022, Clause 5.9 |
The individual or entity with approved management responsibility for an asset — including accountability for ensuring the asset is appropriately protected. Asset ownership is a formal accountability assignment, not just whoever uses the asset most. Example: The Head of Engineering is the asset owner for the customer database. They are accountable for ensuring access controls, backup procedures, and encryption standards are maintained — even if the daily operations are handled by their team. |
| Common mistake: Organizations list every piece of hardware and every file as a separate asset. This makes the asset register unmanageable. ISO 27001 expects a risk-relevant level of granularity — group related assets logically, focus on assets that are in scope, and prioritize those with the highest sensitivity or criticality. |
Risk: The Core Driving Concept
ISO 27001 is, at its heart, a risk management standard. The word "risk" appears over 80 times in the main clauses. Understanding precisely what it means — and how its component parts relate to each other — is essential.
| Risk · ISO 27000:2018, Clause 3.61 |
The effect of uncertainty on objectives. In the information security context: the potential that a threat will exploit a vulnerability in an asset, causing harm to the organization. Risk is always a combination of likelihood (how probable is it?) and impact (how bad would it be?). ISO 27001 does not prescribe a specific risk calculation method — it requires that your method is defined, documented, and consistently applied. Example: The risk that an unauthorized actor gains access to customer personal data through a phishing attack targeting staff with database access. |
Risk is built from several component concepts that the standard uses precisely. Understanding the chain from asset to risk is critical for producing a credible risk assessment:
| Asset | Customer database containing 50,000 personal records |
| Threat | Unauthorized access by external attacker via stolen credentials |
| Vulnerability | No multi-factor authentication on database admin accounts |
| Likelihood | High — credential theft attacks are common and MFA absence is well-known |
| Impact | Critical — UU PDP breach notification obligations, regulatory fines, reputational damage |
| Risk | HIGH — requires treatment. Control selected: implement MFA (Annex A 8.5) |
| Risk Owner · ISO 27000:2018, Clause 3.62 |
The person or entity with the accountability and authority to manage a risk. The risk owner approves the risk treatment decision, accepts any residual risk, and is accountable for the outcome. Risk owners are typically business managers, not security staff — because they own the assets and processes that carry the risk. Example: The Chief Financial Officer is the risk owner for financial reporting system risks, not the CISO. The CISO advises; the CFO decides and is accountable. |
| Residual Risk · ISO 27000:2018, Clause 3.59 |
The risk that remains after risk treatment controls have been applied. No control eliminates risk entirely — residual risk is what is left over, and it must be formally accepted by the risk owner. The level of residual risk that an organization is willing to accept is determined by its risk appetite. Example: After implementing MFA, encryption, and access logging on the customer database, a residual risk remains that a malicious insider with legitimate access could still exfiltrate data. The risk owner reviews this residual risk and formally accepts it, noting it in the risk register. |
| Risk Appetite · ISO 27000:2018, Clause 3.60 |
The amount and type of risk that an organization is willing to pursue or retain in order to achieve its objectives. Risk appetite is set by top management and defines the threshold below which residual risks are acceptable without further treatment. It is a strategic decision, not a technical one. Example: A regulated bank may have a near-zero risk appetite for risks involving customer personal data, but a moderate risk appetite for risks related to internal operational inefficiency. |
Risk Treatment: What You Do About Risk
Identifying risks is only half the work. ISO 27001 requires that every identified risk is treated — meaning a deliberate decision is made about what to do with it. There are four recognized options:
| Option | What it means | Example |
| Modify (Treat) | Implement controls to reduce the likelihood or impact of the risk to an acceptable level. | Deploy MFA, encrypt the database, implement access logging. |
| Retain (Accept) | Accept the risk because the cost of treatment exceeds the potential impact, or residual risk is within tolerance. | Low-severity risk to a non-critical internal wiki — accepted with documented rationale. |
| Avoid | Eliminate the risk entirely by stopping the activity that creates it. | Decide not to store certain categories of sensitive data rather than secure them. |
| Share (Transfer) | Transfer the financial impact of the risk to a third party through insurance or contractual liability. | Cyber insurance policy covering breach notification costs and regulatory fines. |
| Risk Treatment Plan · ISO 27001:2022, Clause 6.1.3 |
A documented plan describing the controls to be implemented, the timeline for implementation, the resources required, and the responsible owners — for each risk selected for treatment. The risk treatment plan is a required output of the risk assessment process and is reviewed by auditors as evidence that the ISMS is operationally driven by risk. Example: A documented plan stating: 'Implement MFA on all database admin accounts by Q2 2026. Responsible: Head of Engineering. Budget: approved. Status: in progress.' Each treated risk has an entry like this. |
Controls: The Mechanisms of Protection
| Control · ISO 27000:2018, Clause 3.14 |
A measure that modifies risk. Controls can be preventive (reducing likelihood), detective (identifying when a risk event has occurred), or corrective (reducing impact after an event). Controls exist at the organizational level (policies, procedures), the people level (training, background checks), the physical level (locks, CCTV), and the technological level (encryption, firewalls, logging). Example: Encrypting data at rest is a preventive control that reduces the likelihood of unauthorized access being useful even if a breach occurs. An intrusion detection system is a detective control that alerts when unauthorized access is occurring. |
ISO 27001:2022 Annex A lists 93 reference controls across four domains. These are not all mandatory — your organization selects applicable controls based on the risk assessment, and documents exclusions with justifications in the Statement of Applicability.
| Statement of Applicability (SoA) · ISO 27001:2022, Clause 6.1.3(d) |
A document that lists all 93 Annex A controls, states whether each is applicable or excluded, provides the justification for each decision, and records the implementation status of applicable controls. The SoA is one of the most scrutinized documents in a certification audit — it is the bridge between the risk assessment and the control set. Example: Control A.8.3 (Information access restriction) is listed as applicable because the risk assessment identified unauthorized access to customer data as a high risk. Control A.7.4 (Physical security monitoring) is excluded because the organization operates fully remotely with no physical office. |
| Bitlion Insight: The SoA is often treated as an administrative checkbox. In practice, it is the most powerful accountability document in your ISMS. A well-maintained SoA tells the story of every security decision your organization has made — and gives auditors, regulators, and clients confidence that your control selection was deliberate and risk-driven, not arbitrary. |
People and Roles: Who Is Responsible
| Interested Parties (Stakeholders) · ISO 27001:2022, Clause 4.2 |
Any person or organization that can affect, be affected by, or perceive itself to be affected by the organization's information security decisions. Identifying interested parties and understanding their requirements is a mandatory first step in defining the ISMS scope. Interested parties typically include customers, regulators, employees, suppliers, shareholders, and in some cases the public. Example: For an Indonesian fintech company: Bank Indonesia (regulator), OJK (financial services regulator), customers whose data is processed, cloud infrastructure providers, and the company's own employees all qualify as interested parties with specific information security requirements. |
| Top Management · ISO 27001:2022, Clause 5 |
The person or group of people who directs and controls the organization at the highest level. In ISO 27001, top management has non-delegable responsibilities: establishing the information security policy, ensuring the ISMS is integrated into business processes, demonstrating leadership and commitment, and participating in management reviews. This cannot be delegated entirely to the CISO. Example: The CEO and board of directors are top management. Their responsibility is not to manage controls day-to-day — it is to set direction, provide resources, and be accountable for the ISMS outcomes at the organizational level. |
| Competence · ISO 27001:2022, Clause 7.2 |
The ability to apply knowledge and skills to achieve intended results in information security. ISO 27001 requires that anyone whose work affects information security performance has the necessary competence — and that evidence of that competence is retained (training records, qualifications, experience documentation). Example: A cloud infrastructure engineer responsible for implementing encryption controls must be demonstrably competent in encryption technologies. A training record, certification, or documented work experience constitutes evidence. |
Audit and Evaluation: How the ISMS Proves Itself
| Internal Audit · ISO 27001:2022, Clause 9.2 |
A systematic, independent, documented process for obtaining evidence and evaluating it objectively to determine the extent to which the ISMS meets the organization's own requirements and the requirements of ISO 27001. Internal audits are conducted by the organization itself (or by a third party on its behalf) and are a mandatory requirement — not a preparation activity for external certification. Example: A planned internal audit examines whether access review procedures are being followed. The auditor samples five systems, reviews access logs, interviews the IT manager, and produces a report finding one nonconformity: quarterly access reviews are documented for four systems but overdue for one. |
| Nonconformity · ISO 27001:2022, Clause 10.1 |
A failure to meet a requirement — either a requirement of ISO 27001 itself or a requirement the organization has set for itself in its own ISMS documentation. Nonconformities can be major (a systemic failure that casts doubt on whether the ISMS is functioning) or minor (an isolated lapse that does not indicate systemic breakdown). Both require documented corrective action. Example: Major nonconformity: No risk assessment has been conducted since the ISMS was implemented three years ago. Minor nonconformity: The asset register was last reviewed 14 months ago rather than the 12-month cycle documented in the policy. |
| Management Review · ISO 27001:2022, Clause 9.3 |
A formal, documented review of the ISMS by top management at planned intervals. The management review must cover defined inputs (audit results, risk treatment status, performance metrics, stakeholder feedback) and produce documented outputs (decisions on improvement opportunities, resource needs, and changes to the ISMS). It is not optional and not delegatable. Example: An annual management review meeting attended by the CEO, CFO, and CISO reviews the past year's audit findings, incident log, risk register updates, and control performance metrics. The minutes document decisions made — including a budget allocation for a new DLP tool — and are retained as evidence. |
| Documentation note: ISO 27001 requires you to retain documented information as evidence that the ISMS is operating. 'Documented information' means any information that is controlled and maintained — it can be digital or paper, formal or informal, as long as it is identifiable, versioned, and retrievable. Many organizations over-engineer their documentation; the standard simply requires that what you say you do, you can prove you do. |
Continual Improvement: The ISMS Never Stops
| Continual Improvement · ISO 27001:2022, Clause 10.2 |
The recurring activity of enhancing the ISMS to improve information security performance over time. Continual improvement is not a project — it is an ongoing organizational behavior. It is evidenced through corrective actions, changes to the ISMS driven by audit findings and management reviews, and the progressive maturation of controls and processes over successive certification cycles. Example: After a phishing simulation reveals that 22% of staff clicked a malicious link, the organization updates its awareness training program, implements email filtering improvements, and tracks improvement in the next simulation six months later. This cycle — find the gap, fix it, verify the fix — is continual improvement in practice. |
Quick Reference: Terms at a Glance
The following terms appear frequently in ISO 27001 documentation and auditor conversations. These brief definitions are intended as a quick reference once the concepts above are understood:
- ISMS — The overall management system for governing information security risk, built on policies, processes, and controls.
- Asset — Anything of value to the organization that contains or processes information.
- Threat — A potential cause of an unwanted incident that may result in harm to the organization or its information.
- Vulnerability — A weakness in an asset or control that could be exploited by a threat.
- Risk — The combination of threat likelihood and potential impact on organizational objectives.
- Control — A measure that modifies risk (preventive, detective, or corrective).
- Risk Owner — The person accountable for making and living with a risk treatment decision.
- Residual Risk — The risk remaining after controls are applied; must be formally accepted.
- Risk Appetite — The level of risk an organization is prepared to accept in pursuit of its objectives.
- SoA (Statement of Applicability) — The document that records which Annex A controls apply, why, and their implementation status.
- Interested Party — Any stakeholder with requirements that affect or are affected by the ISMS.
- Nonconformity — A failure to meet a stated requirement, requiring documented corrective action.
- Documented Information — Any information the ISMS is required to control and maintain as evidence.
- Continual Improvement — The ongoing cycle of identifying gaps and enhancing ISMS performance over time.
| Bitlion GRC Note: All of these concepts — asset registers, risk assessments, risk treatment plans, SoA, audit findings, and management review records — are managed natively within Bitlion's platform. Rather than maintaining separate spreadsheets and documents, the platform keeps these artefacts connected, versioned, and audit-ready at all times. |