ISO 27001 Clause 6.1: Actions to address risks and opportunities
- Understand how ISO 27001 addresses risks and opportunities
- Learn how to turn risk assessment into structured action
- See how proactive planning strengthens your ISMS


ISO 27001 is an international standard that specifies requirements for an information security management system (ISMS). An ISMS is a set of policies and procedures that are designed to protect an organisation's information assets.
Clause 6.1 of ISO 27001 is titled "Actions to address risks and opportunities". This clause requires organisations to plan how they will identify, assess, and treat risks and opportunities to their information security.
When planning for the information security management system, the organisation shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to:
The organisation shall plan:
The 6.1 clause of ISO 27001 is one of the most important clauses in the standard. It requires organisations to:
Read Conducting ISO 27001 risk assessment in 7 steps for more information.
ISO 27001 requirement 6.1 covers the following topics:

Although not necessarily common practice — scenario-based risk identification and assessment is one of the most effective and well-established ways to manage risks. Not only does it consider past occurrences, but it also takes a preventive approach to risk management. This is a more holistic approach that covers all potential scenarios.
Step 1: Identify and assess risks
Step 2: Create a treatment plan
Step 3: Review residual risks
By following the steps outlined above, organisations can effectively identify, assess, and treat information security risks. This will help to protect their information assets and ensure the confidentiality, integrity, and availability of their information.
The likelihood of a risk is the chance that it will occur. The impact of a risk is the consequence of it occurring. To assess the likelihood and impact of a risk, you can use a risk assessment matrix.
What are the different ways to treat information security risks?
There are a number of ways to treat information security risks, such as:
Organisations need to monitor and review their risk management processes on a regular basis to ensure that they are effective in managing the risks to their information security. This includes:
There are many benefits to implementing an effective risk management process, such as:
TISAX® is a registered trademark of the ENX Association. DataGuard is not affiliated with the ENX Association. We provide Software-as-a-Service and support for the assessment on TISAX® only. The ENX Association does not take any responsibility for any content shown on DataGuard's website.
All data provided is for information only, based on internal estimates. This information is not indicative of KPIs, and is not given with any warranties or guarantees, expressly stated or implied in relation to accuracy and reliability.
{
"@context": "https://schema.org",
"@graph": [
{
"@type": "Organization",
"@id": "www.dataguard.com#organization",
"name": "DataGuard",
"legalName": "DataCo GmbH",
"description": "DataGuard, the European leader in security and compliance software, is trusted by more than 4,000 organizations across 50+ countries. We help you identify and manage your security and compliance risks and fast-track your certifications and compliance by combining expert consultancy with AI-powered automation. Our purpose-built, all-in-one platform is developed with the experience of over 1.5 million total hours by a team of certified security and compliance experts.",
"foundingDate": "2018",
"taxID": "DE315880213",
"logo": "https://7759810.fs1.hubspotusercontent-na1.net/hubfs/7759810/DataGuardLogo.svg",
"url": "www.dataguard.com",
"email": "info@dataguard.de",
"telephone": "+49 89 452459 900",
"address": {
"@type": "PostalAddress",
"streetAddress": "Sandstrasse 33",
"addressLocality": "Munich",
"addressRegion": "Bavaria",
"postalCode": "80335",
"addressCountry": "Germany"
},
"sameAs": [
"https://www.linkedin.com/company/dataguard1/",
"https://www.youtube.com/channel/UCEQzPZ6sCBCj9cAoBvaLL6w",
"https://x.com/i/flow/login?redirect_after_login=%2FDataGuard_dg"
]
}
]
}✅ Organization schema markup for "DataGuard" has been injected into the document head.