ISO 27001 Clause 4.3
An effective Information Security Management System (ISMS) begins with a clearly defined scope. Clause 4.3 of ISO 27001:2022 focuses on establishing the boundaries and applicability of your ISMS, a step that ensures your security controls are relevant, efficient, and aligned with your organisation’s objectives.
To get customised support specific to your organisation, please get in touch with us.
What is ISO 27001 Clause 4.3?
Clause 4.3 requires organisations to determine the scope of the ISMS by identifying:
- The boundaries of where the ISMS applies.
- The information assets, processes, and locations it covers.
- The interested parties and requirements (from Clause 4.2) that influence scope decisions.
The scope statement should reflect the realities of the organisation’s operations and clearly state what is included and excluded. It forms the foundation for the ISMS and appears in your ISO 27001 documentation and Statement of Applicability.
Why Scope Definition Matters
Defining scope is critical because it ensures your ISMS is:
- Focused and manageable – avoiding unnecessary complexity.
- Transparent – helping auditors and stakeholders understand the system’s boundaries.
- Aligned with the organisation’s strategic direction and risk priorities.
- Compliant – demonstrating that all relevant activities are covered.
A poorly defined scope can lead to confusion, missed risks, or gaps in security coverage.
How to Address Clause 4.3
To comply with Clause 4.3, organisations should:
- Identify business processes, functions, and physical locations that handle or influence information security.
- Consider interfaces and dependencies with external organisations (e.g. outsourced IT or cloud providers).
- Include all relevant people, assets, and technologies within the defined boundaries.
- Document the ISMS scope in a clear, concise statement—typically included in the ISMS manual or certification documentation.
- Review the scope periodically to ensure it remains accurate as the organisation evolves.
Example
A marketing agency that stores and processes client data on internal servers might define its ISMS scope as:
“The management of information assets related to client data processing and storage within our King’s Lynn office and associated cloud-based systems.”
This statement clearly identifies the assets and locations included, avoiding ambiguity during audits.
Final Thoughts
Clause 4.3 ensures that your ISMS has well-defined boundaries, allowing your organisation to focus on protecting what truly matters. A precise scope not only strengthens your certification efforts but also provides clarity for employees, auditors, and clients alike.
Need help defining the right ISMS scope for your organisation? Candy Management Consultants can guide you through the process, ensuring your system is structured effectively and certification-ready.
Get your free quote today!
