If Clause 6 is where you plan your information security approach, Clause 8 is where you roll up your sleeves and actually do the work.
This is the “operation” stage of your ISMS — the bit that takes everything you mapped out earlier and turns it into real-world actions, records, and results. And while Clause 8 Operation looks short on paper, there’s a lot happening under the hood.
If Clause 6 is the recipe, Clause 8 is cooking the meal.
8.1 is about making your Clause 6 plans real. If you’ve properly done:
…then you’re most of the way there.
Here you’ll also see requirements to:
Why this matters: Making ad hoc, unplanned changes without risk checks is a quick way to create security gaps. Controlled change management ensures you spot new risks before they become incidents.
If Clause 6 was about designing your risk assessment process, Clause 8.2 is about actually doing it.
You’ll need to conduct assessments:
Hypothetical example: A major vulnerability hits the news, and your hosting provider uses the affected software. Even if you just did your quarterly review last week, you should revisit your risk register now.
Your documented output? A risk register — often an Excel sheet or system record — showing each risk, owner, rating, impact on confidentiality/integrity/availability, and its status.
This is where you apply the controls you identified in planning. Most will come from Annex A’s 93 controls, but the standard isn’t restrictive — you can add others if needed.
Each risk above your appetite should have a risk treatment plan showing:
Pro Tip: Controls don’t have to be perfect straight away — but they do need to be realistic, relevant, and clearly documented.
Third parties can be one of the hardest areas to get right. Why?
That’s why ISO 27001:2022 has stronger supplier-related requirements than the 2013 version — to keep pace with modern supply chain risks. Annex A sections 5.19 to 5.23 cover supplier agreements, services, and even cloud considerations.
If your scope includes third-party dependencies, make sure your risk assessment and treatment plans cover them in detail.
This is where your ISMS earns its keep. Without Clause 8, all your planning stays stuck on paper.
Done well, Clause 8 will:
✅ Make sure Clause 6 plans are complete and documented
✅ Set clear process criteria and control changes
✅ Keep your risk register alive and up-to-date
✅ Apply and track your treatment controls — don’t just “set and forget”
✅ Include third-party risks where relevant