A Risk Register is a commonly used document in an ISO/IEC 27001:2022 implementation, especially useful for SMEs. It may serve as a reference for identifying threats, assessing likelihood and impact, supporting documentation of security control selection, and linking risks to a Statement of Applicability (SoA).
This guide describes each part of a practical ISO 27001 Risk Register and provides examples of how SMEs can structure risk entries, apply L / M / H scoring, assign ownership, and link risks to relevant Annex A controls – all aimed at illustrating how a lean and practical ISMS may be documented. This overview highlights considerations that SMEs may take into account for risk assessment, treatment, and traceability in small and medium-sized organisations.
Why the ISO 27001 Risk Register Matters for SMEs
In an ISO 27001-aligned ISMS, a Risk Register is commonly used by SMEs to support structured identification, assessment, and documentation of information security risks. A well-structured Risk Register may:
- Identify potential threats and vulnerabilities in processes, systems, and assets
- Apply consistent L / M / H scoring to assess likelihood and impact
- Link risks to relevant Annex A controls and document the rationale
- Provide a framework for recording evidence of implemented controls
- Capture management-approved Risk Acceptance decisions
- Support documentation that could be referenced for internal or external review
- Enable consistent risk management while minimising unnecessary complexity
These functions describe a practical, repeatable approach commonly referenced in ISO 27001-aligned risk documentation.
ISO 27001 Risk Register Structure for SMEs
A practical ISO 27001 Risk Register for SMEs may include, at minimum, the following fields to support consistent risk tracking, control mapping, and alignment with a Statement of Applicability (SoA):
- Risk ID – Unique identifier for traceability
- Risk Description – Clear explanation of the threat and potential impact
- Assets / Processes Affected – Systems or operations exposed to risk
- Threat and Vulnerability – Specific risk scenario
- Likelihood (L / M / H) – Probability of occurrence
- Impact (L / M / H) – Consequence severity
- Inherent Risk Rating – Pre-treatment risk level
- Treatment Option (Avoid / Mitigate / Transfer / Accept) – Risk management decision
- Annex A Control Mapping – Links risks to relevant ISO 27001 controls
- Treatment Actions – Steps taken to reduce risk
- Residual Likelihood and Impact – Post-treatment assessment
- Residual Risk Rating – Remaining exposure
- Risk Owner – Responsible role for mitigation
- Residual Risk Acceptance Approval (where required) – Formal sign-off for accepted risks
This structure reflects practical ISO 27001 risk management practices for SMEs and may support traceable risk assessment, control mapping, and alignment with the ISMS.
Step-by-Step Walkthrough: Building an ISO 27001 Risk Register for SMEs
This structured walkthrough can assist SMEs in populating a practical, well-documented Risk Register. Each step includes examples, L / M / H scoring guidance, control mapping tips, and considerations for maintaining traceability and alignment with ISO/IEC 27001:2022 practices.
Step 1 – Identify the Risk Clearly (Cause → Effect Format)
In this context, a risk generally refers to an event or scenario that could negatively affect business objectives. Describe each risk using a precise cause-to-effect statement.
Illustrative Example: “Phishing attack leads to unauthorised access to customer data.”
Key Insight: Vague entries like “cybersecurity breach” may reduce clarity. Clear, actionable descriptions can support traceable risk documentation and alignment with Annex A controls.
Step 2 – Identify Affected Assets and Processes (Scope for Control Mapping)
List assets, processes, or systems impacted by the risk. This defines the scope for treatment, control selection, and SoA mapping.
Illustrative Examples:
- CRM database
- Cloud infrastructure
- HR onboarding process
- Production environment
Tip: Using precise, unambiguous names may help maintain traceability in the Risk Register.
Step 3 – Identify Threats and Vulnerabilities (Supporting Evidence for Controls)
Specify the threat and associated vulnerability to guide control selection. This demonstrates a logical connection between risks and Annex A controls.
Illustrative Examples:
- Threat: phishing email → Vulnerability: lack of employee training
- Threat: misconfiguration → Vulnerability: no change control process
Tip: Documenting threats and vulnerabilities thoroughly may support ISO 27001 documentation and SoA mapping.
Step 4 – Choose the Likelihood and Impact Scales
SMEs can consider a simple 3×3 scale (Low / Medium / High) for rating likelihood and impact. This approach may help reduce confusion and support consistent scoring.
Key Insight: Clearly defining what L, M, and H mean in your Risk Assessment Methodology may improve scoring consistency and traceability.
Step 5 – Score Likelihood and Impact (Using Defined Scales)
SMEs may apply the L / M / H definitions consistently across risks, where appropriate to their context. Consistent scoring may assist in prioritising risks and supporting SoA alignment.
See the next section for suggested L / M / H definitions.
Defining L / M / H Scales for Consistent ISO 27001 Risk Scoring
To support consistency in an ISO/IEC 27001:2022 Risk Register, SMEs may find it helpful to clearly define what Low, Medium, and High mean for both likelihood and impact. Clear definitions can reduce scoring ambiguity, support Annex A control selection, and support traceable risk documentation.
Likelihood Scale (Probability of Occurrence)
|
Score |
Description |
Expected Frequency |
|
Low |
Very unlikely to occur; existing controls are present |
Less than once every 3 years |
|
Medium |
Occasional occurrence; has happened internally or in industry |
Once every 1 – 3 years |
|
High |
Likely to occur; controls may be weak or risk arises from common human error |
At least once per year |
Tip: Documenting how these likelihood scores are defined in your Risk Assessment Methodology may support consistent risk assessment and traceability.
Impact Scale (Consequence to the Business)
|
Score |
Description |
Example |
|
Low |
Minimal impact; manageable internally |
Minor service delays; no regulatory implications |
|
Medium |
Noticeable disruption or loss |
Downtime under 24 hours; minor regulatory fine (depending on jurisdiction); loss of non-sensitive PII; public explanation may be needed |
|
High |
Severe or potentially significant harm |
Downtime over 24 hours; major regulatory fines (depending on jurisdiction); loss of sensitive PII; long-lasting reputational impact |
These scales are example definitions suitable for many SMEs. It may be helpful to define and document the scales that best reflect your organisation’s risk tolerance in your Risk Assessment Methodology.
Key Insight: Using consistent scales can support structured risk scoring. Each scored risk may then be mapped to relevant Annex A controls and referenced in the Statement of Applicability (SoA).
Step 6 – Estimate the Inherent Risk Rating (ISO 27001 Risk Matrix)
To estimate the inherent risk of each identified threat before any treatment, a commonly used approach is a simple 3×3 risk matrix based on Likelihood and Impact scores. This approach may help prioritise risks and support structured documentation.
A common SME approach is:
- High: Either Impact or Likelihood is High
- Medium: Both Impact and Likelihood are Medium, or one is Medium and one is Low
- Low: Both Impact and Likelihood are Low
Tip: Keeping the matrix simple can support clear, consistent scoring. Estimated inherent risk ratings can guide the choice of risk treatment and support Annex A control mapping.
Step 7 – Select the Risk Treatment Option (Avoid, Mitigate, Transfer, Accept)
ISO 27001 commonly references four risk treatment options:
- Avoid – Stop the activity causing the risk. Example: discontinue a high-risk legacy system.
- Mitigate – Apply controls to reduce the likelihood or impact. Example: deploy MFA or endpoint protection (many SME risks fall under this category).
- Transfer – Shift the risk to a third party, e.g. via insurance or outsourcing.
- Accept – Acknowledge the risk and document it as part of a Risk Acceptance process.
Tip: Documenting the rationale for each treatment option may help support traceable risk records and SoA mapping.
Step 8 – Link Each Risk to Relevant ISO/IEC 27001:2022 Annex A Controls
For risks selected for treatment (Mitigate or Transfer), mapping to one or more Annex A controls may help maintain traceable documentation and support alignment with ISO 27001 practices.
For Accepted risks, no new controls may be required, but documenting the rationale and noting any management approval can support risk records.
Illustrative Examples:
- Risk: Phishing attack → Example relevant controls: A.6.3 (Information security awareness), A.5.23 (Cloud service)
- Risk: Device loss → Example relevant controls: A.5.9 (Inventory of Assets), A.5.15 (Access control)
Step 9 – Specify Risk Treatment Actions (Specific and Testable)
For each risk, document practical, testable actions that may be used to reduce, mitigate, transfer, or avoid the risk. Documenting these actions may assist in maintaining traceable records for risk management and SoA mapping.
Illustrative Examples:
- Enable multi-factor authentication (MFA) for user accounts
- Deploy endpoint protection and antivirus software
- Introduce formal change approval workflow
- Provide phishing awareness training for staff
Step 10 – Assign Risk Owners (Roles for Traceable Registers)
Assign each risk to a role rather than an individual to maintain continuity. This approach may help preserve accountability even if personnel change and supports traceable risk records.
Illustrative Examples:
- Head of Engineering
- Operations Manager
- Product Lead
Key Insight: Using roles can help maintain a stable, traceable Risk Register and clarify ownership responsibilities.
Step 11 – Reassess Residual Risk (Review)
After applying treatment actions, re-score each risk using the defined L / M / H scales. Residual risk may decrease, though some high-impact risks could remain Medium — this is typical.
Example Evidence: Management meeting notes, a documented Residual Risk Acceptance Form, or recorded decisions in a governance system.
Note: Residual risks rated Medium or High may be documented and acknowledged by management as part of a Risk Acceptance process. Proper documentation can support traceable risk management and align with ISO 27001 practices.
Why It Matters: Clear residual risk documentation may help maintain an organised Risk Register, support traceability, and provide a reference for internal or external reviews.
ISO 27001 Traceability: Linking the Risk Register Across the ISMS
A well-structured SME Risk Register can help create a clear, traceable ISO 27001 documentation chain:
Risk → Annex A Controls → Statement of Applicability (SoA) → Policies and Procedures → Evidence
Why It Matters: Mapping risks in this way may support organised documentation, provide clarity for internal or external reviews, and illustrate connections across your ISMS.
Tip: Consider displaying this chain in a flow diagram or inline graphic. Visual representations can make the documentation highly scannable and easier for your team to understand.
When to Use an ISO 27001 Risk Register Template
SMEs may find advantages in using a pre-built ISO 27001 supporting Risk Register template:
- Supports consistency: Standard scoring and risk definitions can help reduce errors.
- Simplifies control mapping: Can assist in linking risks to Annex A controls and the SoA.
- Can save time: Templates may reduce setup effort and help populate the register more efficiently.
- Supports clear documentation: Recording essential fields, treatment options, and approvals can help maintain organised records for internal or external review.
-
Helps align with the Statement of Applicability (SoA): Can assist SMEs in taking a more structured approach to managing ISMS activities.
Tip: SMEs may consider starting with a purpose-built template as one approach to begin ISO 27001 risk management process.
Wrapping Up: Building Your SME Risk Register
A well-structured ISO 27001 Risk Register is commonly used by SMEs to document identification, assessment, and treatment of information security risks. Applying consistent L / M / H scoring, mapping to relevant Annex A controls, and documenting risk treatment may help maintain clarity and traceability in processes and practical ISMS management.
Using a ready-to-use template may assist with setup, consistency, and creating a referenceable record for your team.
Next Steps: Looking to streamline your risk documentation? Explore the ISO 27001 Risk Register Template.
Next Article: In Illustrative Guide to Common ISO 27001 Risks for SMEs, learn how to identify, assess, and prioritise the information security threats and vulnerabilities most relevant to small and medium enterprises.
Related Guides
Explore these ISO 27001 resources to help your SME build a practical, lean ISMS:
Start Here: Complete Guide
-
ISO 27001 for SMEs and Startups: The Chill Implementation Guide (2026 Edition) – Full roadmap covering all clauses and Annex A controls, with practical steps, examples, and guidance.
C. Risk, Statement of Applicability, and Annex A Controls – Detailed Guides by Topic
- A Practical Guide to the ISO 27001 Risk Assessment (SME Focus) – Step-by-step guidance to identify, assess, and prioritise risks, linking them to your Statement of Applicability and controls.
- ISO/IEC 27001:2022 Annex A Controls Explained for SMEs – Practical Overview – A practical overview to understand and prioritise Annex A controls, and linking control choices to a risk-based Statement of Applicability (SoA).
- How to Write a Well-Structured Statement of Applicability for ISO 27001 – Learn how to write a clear Statement of Applicability (SoA) for ISO 27001. A guide for SMEs to justify control choices and document exclusions.
- Illustrative Guide to Common ISO 27001 Risks for SMEs – Clear examples of frequently observed SME risks, with likelihood / impact scoring, mitigation suggestions, and aligned Annex A control references.
Please Note: This article provides general information only and does not constitute legal, regulatory, or compliance advice. Using our products or following this guidance cannot guarantee certification, improved business outcomes, or regulatory compliance. Organisations remain responsible for ensuring all actions meet certification and compliance requirements.