Check out our FREE Resources page – Download complimentary business frameworks, PowerPoint templates, whitepapers, and more.







Flevy Management Insights Q&A
How to create an ISO 27001 Statement of Applicability?


This article provides a detailed response to: How to create an ISO 27001 Statement of Applicability? For a comprehensive understanding of ISO 27001, we also include relevant case studies for further reading and links to ISO 27001 best practice resources.

TLDR An effective ISO 27001 Statement of Applicability strategically aligns security controls with the organization's risk management framework and strategic objectives, requiring ongoing review and updates.

Reading time: 5 minutes

Before we begin, let's review some important management concepts, as they related to this question.

What does Risk Management Framework mean?
What does Cross-Functional Collaboration mean?
What does Dynamic Document Management mean?


Understanding how to write an ISO 27001 Statement of Applicability (SoA) is crucial for organizations aiming to bolster their information security management. This document is not just a requirement for ISO 27001 certification; it's a strategic tool that guides the organization in managing its security risks. The SoA outlines which of the ISO 27001 standard's controls are applicable to the organization and explains how they are implemented or why any may be excluded. Crafting a comprehensive SoA requires a deep dive into the organization's risk management processes, security needs, and operational context.

Initiating the process involves a thorough assessment of the organization's information security risks. This assessment should align with the overarching risk management framework, ensuring that the selected controls are relevant to the identified risks. Consulting firms often emphasize the importance of aligning the SoA with the organization's strategic objectives to ensure that information security is not just a compliance exercise but a strategic enabler. This alignment is critical for gaining buy-in from C-level executives, who must see the value in the resources allocated to information security initiatives.

The creation of an SoA is not a one-size-fits-all process. Each organization's SoA will look different, reflecting its unique operational environment, risk appetite, and strategic priorities. However, leveraging a standardized template can streamline the process, ensuring all necessary information is captured and presented in a clear, concise manner. This template should include sections for each control, its applicability, the justification for inclusion or exclusion, and details on how the control is implemented. This structured approach not only aids in clarity but also facilitates easier updates and reviews over time.

Key Components of an Effective SoA

An effective Statement of Applicability should include several key components. First and foremost, it must list all 114 controls from Annex A of the ISO 27001 standard, alongside a decision on their applicability to the organization. This decision-making process is not arbitrary; it must be rooted in the outcomes of the risk assessment and treatment process. Each control considered applicable must have a clear rationale for its inclusion, detailing how it mitigates specific risks identified during the risk assessment phase.

For controls that are deemed not applicable, a robust justification is required. This justification should explain why a particular control is not relevant to the organization's operational context or risk profile. It's essential to document these justifications carefully to satisfy auditors and stakeholders that the exclusion of controls does not leave the organization exposed to unmitigated risks.

Moreover, the SoA should outline the implementation status of each applicable control. This includes information on whether the control is fully implemented, partially implemented, or planned for future implementation. Providing this level of detail offers a transparent view of the organization's information security posture, enabling stakeholders to understand current capabilities and future plans.

Are you familiar with Flevy? We are you shortcut to immediate value.
Flevy provides business best practices—the same as those produced by top-tier consulting firms and used by Fortune 100 companies. Our best practice business frameworks, financial models, and templates are of the same caliber as those produced by top-tier management consulting firms, like McKinsey, BCG, Bain, Deloitte, and Accenture. Most were developed by seasoned executives and consultants with 20+ years of experience.

Trusted by over 10,000+ Client Organizations
Since 2012, we have provided best practices to over 10,000 businesses and organizations of all sizes, from startups and small businesses to the Fortune 100, in over 130 countries.
AT&T GE Cisco Intel IBM Coke Dell Toyota HP Nike Samsung Microsoft Astrazeneca JP Morgan KPMG Walgreens Walmart 3M Kaiser Oracle SAP Google E&Y Volvo Bosch Merck Fedex Shell Amgen Eli Lilly Roche AIG Abbott Amazon PwC T-Mobile Broadcom Bayer Pearson Titleist ConEd Pfizer NTT Data Schwab

Strategies for Writing a Comprehensive SoA

To write a comprehensive ISO 27001 Statement of Applicability, organizations must first ensure they have a solid understanding of the standard's requirements. This understanding forms the foundation for a strategic approach to selecting and justifying controls. Engaging with experienced consultants can provide valuable insights into the nuances of the standard and how best to tailor the SoA to the organization's specific needs.

Next, leveraging a cross-functional team is critical in ensuring that the SoA reflects a holistic view of the organization's information security risks and controls. This team should include representatives from IT, legal, operations, and other relevant departments. Their diverse perspectives will contribute to a more accurate and comprehensive document, ensuring that all relevant risks are addressed and that the selected controls are practical and effective.

Finally, maintaining the SoA as a living document is essential. The information security landscape is constantly evolving, as are the organization's operational context and risk profile. Regular reviews and updates to the SoA ensure that it remains relevant and effective in guiding the organization's information security efforts. This dynamic approach to the SoA not only supports ongoing compliance with ISO 27001 but also enhances the organization's overall security posture.

Real-World Examples and Consulting Insights

Consider the case of a multinational corporation that successfully leveraged its SoA as a strategic tool for global information security management. By aligning its SoA with corporate strategy and engaging a wide range of stakeholders in its development, the organization was able to not only achieve ISO 27001 certification but also significantly improve its information security practices. This example underscores the value of viewing the SoA not just as a compliance document but as a strategic framework for managing information security risks.

Consulting firms often share insights from their work with clients on ISO 27001 implementations. For example, a report by PwC highlighted how organizations that effectively integrate their SoA into their overall risk management framework tend to have a more mature security posture. These organizations view their SoA as a dynamic tool that evolves in response to changes in the threat landscape and business operations, rather than a static document created for certification purposes.

In conclusion, writing an ISO 27001 Statement of Applicability requires a strategic approach, deep understanding of the standard, and a commitment to ongoing management and review. By viewing the SoA as a cornerstone of the organization's information security management system, organizations can ensure that their information security practices are both compliant and strategically aligned with their broader business objectives.

Best Practices in ISO 27001

Here are best practices relevant to ISO 27001 from the Flevy Marketplace. View all our ISO 27001 materials here.

Did you know?
The average daily rate of a McKinsey consultant is $6,625 (not including expenses). The average price of a Flevy document is $65.

Explore all of our best practices in: ISO 27001

ISO 27001 Case Studies

For a practical understanding of ISO 27001, take a look at these case studies.

ISO 27001 Implementation for Global Software Services Firm

Scenario: A global software services firm has seen its Information Security Management System (ISMS) come under stress due to rapid scaling up of operations to cater to the expanding international clientele.

Read Full Case Study

IEC 27001 Compliance Initiative for Construction Firm in High-Risk Regions

Scenario: The organization, a major player in the construction industry within high-risk geopolitical areas, is facing significant challenges in maintaining and demonstrating compliance with the IEC 27001 standard.

Read Full Case Study

ISO 27001 Compliance Initiative for Automotive Supplier in European Market

Scenario: An automotive supplier in Europe is grappling with the challenge of aligning its information security management to the rigorous standards of ISO 27001.

Read Full Case Study

ISO 27001 Compliance Initiative for Education Sector in North America

Scenario: A prestigious university in North America is facing challenges in aligning its information security management system with the rigorous standards of ISO 27001.

Read Full Case Study

ISO 27001 Compliance Initiative for Oil & Gas Distributor

Scenario: An oil and gas distribution company in North America is grappling with the complexities of maintaining ISO 27001 compliance amidst escalating cybersecurity threats and regulatory pressures.

Read Full Case Study

IEC 27001 Compliance Strategy for Media Firm in Digital Broadcasting

Scenario: A media firm specializing in digital broadcasting is facing challenges aligning its information security management with the rigorous standards of IEC 27001.

Read Full Case Study

Explore all Flevy Management Case Studies

Related Questions

Here are our additional questions you may be interested in.

What strategies can organizations employ to ensure sustained compliance with ISO/IEC 27001 post-certification?
Organizations can ensure sustained ISO/IEC 27001 compliance by adopting a comprehensive approach that includes Continuous Improvement, Employee Engagement, regular Audits, Strategic Planning, and Risk Management, integrating these elements into their culture and operations. [Read full explanation]
What role does artificial intelligence play in enhancing the effectiveness of an ISMS under ISO/IEC 27001?
AI significantly strengthens ISMS under ISO/IEC 27001 by automating threat detection and response, enhancing risk assessment and management, and streamlining compliance and reporting. [Read full explanation]
What role does artificial intelligence (AI) play in enhancing the effectiveness of an ISMS under ISO 27001?
AI enhances ISMS under ISO 27001 by automating Threat Detection, enhancing Risk Management, and streamlining Compliance, significantly improving organizational security posture and efficiency. [Read full explanation]
What are the common challenges organizations face when integrating ISO 27001 standards with other management systems like ISO 9001?
Organizations face challenges in integrating ISO 27001 with ISO 9001 due to differences in scope, terminology, and objectives, requiring strategic planning, effective Change Management, and resource optimization to align cultures and streamline processes for enhanced efficiency and reduced duplication. [Read full explanation]
How can ISO/IEC 27001 certification impact an organization's ability to comply with global data protection regulations, such as GDPR?
ISO/IEC 27001 certification bolsters an organization's GDPR compliance by enhancing Information Security Management, building stakeholder trust, and streamlining compliance processes. [Read full explanation]
In what ways can ISO/IEC 27001 certification facilitate an organization's journey towards digital transformation?
ISO/IEC 27001 certification supports Digital Transformation by enhancing Data Security and Compliance, facilitating Operational Efficiency, and supporting Strategic Decision-Making, crucial for navigating digital complexities. [Read full explanation]

Source: Executive Q&A: ISO 27001 Questions, Flevy Management Insights, 2024


Flevy is the world's largest knowledge base of best practices.


Leverage the Experience of Experts.

Find documents of the same caliber as those used by top-tier consulting firms, like McKinsey, BCG, Bain, Deloitte, Accenture.

Download Immediately and Use.

Our PowerPoint presentations, Excel workbooks, and Word documents are completely customizable, including rebrandable.

Save Time, Effort, and Money.

Save yourself and your employees countless hours. Use that time to work on more value-added and fulfilling activities.




Read Customer Testimonials



Download our FREE Strategy & Transformation Framework Templates

Download our free compilation of 50+ Strategy & Transformation slides and templates. Frameworks include McKinsey 7-S Strategy Model, Balanced Scorecard, Disruptive Innovation, BCG Experience Curve, and many more.