ISMS Statement of Applicability Template
What Is ISMS Statement of Applicability?
An ISO 27001 ISMS Statement of Applicability (SOA) is a document that describes the current security posture of an organization's information security management system (ISMS). The SOA is used to communicate the status of the ISMS to interested parties, such as senior management, clients, and auditors. It is important to note that the SOA is not a static document; it should be updated as the ISMS evolves.

An ISMS SOA typically contains the following information:
- A description of the organization's security posture
- The scope of the ISMS
- The current state of the ISMS
- The ISMS objectives
- Key security controls in place
- gaps in the ISMS
- Plans for remediation of identified gaps.
Importance of ISO 27001 Statement of Applicability
The ISO 27001 statement of applicability is a document that specifies which security controls from the ISO 27001 standard are relevant and applicable to an organization's specific circumstances. This document is important because it helps organizations to prioritize their security efforts and choose the most appropriate security controls for their needs. Additionally, the statement of applicability can be used to demonstrate to auditors and other interested parties that an organization is actively managing its security risks. The ISO 27001 standard contains a list of 114 security controls, which are divided into 14 categories.
These categories cover different aspects of information security, including access control, asset management, business continuity, and more. The statement of applicability should identify which of these controls are relevant to the organization and explain why they have been selected. Additionally, the statement should detail how the controls will be implemented and monitored.
When creating a statement of applicability, organizations should first perform a risk assessment to identify which security risks are most relevant to their operations. Once the risks have been identified, the organization can then determine which security controls are best suited to mitigating those risks. The statement of applicability should be reviewed and updated on a regular basis as new risks are identified and new security controls are implemented.
The ISO 27001 Statement of Applicability mandates several specific actions to be undertaken in order to establish, document and maintain an ISMS. The actions required are as follows:
- Define the scope of ISMS
- Select the appropriate controls from Annex A
- Build, document and implement the ISMS
- Operational ISMS
- Monitor, review and continually improve the ISMS.

What Information Needs To Be Included in The Statement of Applicability?
The Statement of Applicability (SoA) is a key document in an information security management system (ISMS), as it provides evidence that the ISMS is appropriate for the organization's needs and objectives. The SoA should therefore be comprehensive and well-thought-out, covering all aspects of the ISMS.
In general, the SoA should include the following information:
- The scope of the ISMS, including a description of the system boundaries
- The organization's information security risks and how they have been assessed
- The security controls that have been selected to mitigate the risks, and how they are implemented
- The extent to which the selected controls meet the organization's security requirements
- The monitoring and review arrangements for the ISMS
- The SoA should be reviewed and updated on a regular basis, in line with changes to the organization's information security risks, requirements, and controls.
How Do You Create Statement of Applicability?
The Statement of Applicability (SOA) is a document that is required for all organizations who are aiming to achieve ISO 27001 certification. The SOA is a living document that should be reviewed and updated on a regular basis. It should be created by the organization's lead implementer and approved by the management team.
The SOA should include the following sections:
- Introduction
- Scope
- Context
- Risk Assessment
- Control Selection
- Implementation and Effectiveness
- Management Review
Each section will be explained in more detail below.
1. Introduction: The introduction should provide an overview of the organization and the purpose of the SOA. It should also identify the lead implementer and the date that the SOA was created.
2. Scope: The scope should identify the bounds of the ISO 27001 implementation project. This could include a list of locations, systems, or processes that are in scope for the project. The scope should be reviewed and updated as necessary throughout the duration of the project.
3. Context: The context section should describe the organization's environment and how it relates to ISO 27001. This could include a description of the organization's business processes, information security controls, and risk management framework.
4. Risk Assessment: The risk assessment should document the organizational risks that have been identified during the ISO 27001 implementation project. These risks should be prioritized based on their likelihood and impact if they were to materialize. The risk assessment should be reviewed and updated on a regular basis.
5. Control Selection: Control selection is an important part of designing a Security Operations and Administration (SOA) in an Information Security Management System (ISMS). The objective of control selection is to identify the security controls that are appropriate for the organization and that will effectively mitigate the risks to the information assets. There are several factors that need to be considered when selecting security controls, including the organizational context, the security objectives, and the risks.
6. Implementation and Effectiveness: In order to ensure the confidentiality, integrity and availability of information, ISO/IEC 27001:2013 introduced the concepts of implementation and effectiveness. Implementation is the process of putting the ISMS into operation. Effectiveness is the extent to which the ISMS controls are operating as intended and are suitable for the purposes for which they were designed
7. Management Review: The Management Review is a key component of an organization's ISMS, as it provides a systematic review of the suitability, adequacy, and effectiveness of the ISMS. The review should be conducted at least annually, and more frequently if significant changes have occurred within the organization. The review should ensure that the ISMS is appropriate for the organization's current and future risk environment, and that it is continually improving.
Conclusion
The Statement of Applicability (SoA) is a critical component of an ISO 27001-compliant Information Security Management System (ISMS). It helps organizations document and justify their selected security controls, ensuring that they align with identified risks and business objectives. By clearly defining the scope, risk assessment, control selection, and implementation effectiveness, the SoA provides transparency to stakeholders, auditors, and regulatory bodies.