<br />
<b>Deprecated</b>:  Non-canonical cast (double) is deprecated, use the (float) cast instead in <b>/var/www/aec.llc/html/blog/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/xmlrpc.php</b> on line <b>216</b><br />
<br />
<b>Deprecated</b>:  Non-canonical cast (boolean) is deprecated, use the (bool) cast instead in <b>/var/www/aec.llc/html/blog/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/xmlrpc.php</b> on line <b>235</b><br />
<br />
<b>Deprecated</b>:  Non-canonical cast (double) is deprecated, use the (float) cast instead in <b>/var/www/aec.llc/html/blog/wp-content/plugins/wordfence/lib/wfConfig.php</b> on line <b>2096</b><br />
<br />
<b>Deprecated</b>:  Non-canonical cast (binary) is deprecated, use the (string) cast instead in <b>/var/www/aec.llc/html/blog/wp-content/plugins/wordfence/lib/wfMD5BloomFilter.php</b> on line <b>79</b><br />
{"id":127,"date":"2026-04-22T14:15:54","date_gmt":"2026-04-22T14:15:54","guid":{"rendered":"https:\/\/aec.llc\/blog\/?p=127"},"modified":"2026-04-22T14:15:56","modified_gmt":"2026-04-22T14:15:56","slug":"iso-27001-risk-assessment-methodology","status":"publish","type":"post","link":"https:\/\/aec.llc\/blog\/iso-27001-risk-assessment-methodology\/","title":{"rendered":"ISO 27001:2022 Clause 6.1.2: Why Your Carried-Forward Risk Assessment Methodology Is an Audit Liability"},"content":{"rendered":"\n<p>Your ISMS risk assessment still works. It identifies assets, maps threats, scores vulnerabilities, and produces a risk register that feeds your Statement of Applicability. The process runs. The outputs exist. None of that matters if your ISO 27001 risk assessment methodology documentation does not confirm \u2014 in 2022-conformant terms \u2014 that asset\/threat\/vulnerability is your chosen approach and why it satisfies Clause 6.1.2&#8217;s methodology-neutral test.<\/p>\n\n\n\n<p>ISO\/IEC 27001:2022 removed the A\/T\/V identification chain as a normative prerequisite for risk identification. Organisations that transitioned from the 2013 edition and carried their methodology forward without documenting that choice now sit on an auditable gap between their risk assessment output and their SoA justification rationale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Clause 6.1.2 Actually Requires Under the 2022 Edition<\/h2>\n\n\n\n<p>ISO\/IEC 27001:2013 Clause 6.1.2 structured risk identification around asset identification, threat mapping, and vulnerability assessment. The clause inherited this architecture from the 2005 edition \u2014 [EXT-LINK: BSI&#8217;s 2013 Transition Guide \u2192 BSI published guidance] confirms that the 2005-to-2013 revision removed the identification of assets, threats, and vulnerabilities as a prerequisite to risk identification. In practice, A\/T\/V remained the dominant implementation pathway throughout the entire 2013 certification cycle. Organisations built their risk registers around it. Certification bodies audited against it. Nobody documented why.<\/p>\n\n\n\n<p><a href=\"https:\/\/aec.llc\/certifications\/information-security-privacy-it\/iso-iec-27001.html\">ISO\/IEC 27001:2022<\/a> Clause 6.1.2 completes the structural shift. The clause requires that the organisation define and apply an information security risk assessment process producing &#8220;consistent, valid and comparable results.&#8221; No methodology is prescribed. A\/T\/V is absent from the normative text. The organisation selects its own approach and documents why that approach satisfies a three-part test: consistency, validity, and comparability.<\/p>\n\n\n\n<p>This is not cosmetic rewording. Under 2013, an organisation using A\/T\/V followed the standard&#8217;s operative structure. Under 2022, an organisation using A\/T\/V is making a methodology choice \u2014 one that must be explicitly documented and justified against 6.1.2&#8217;s criteria. The difference is between inherited default and deliberate selection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_23-AM-1024x683.png\" alt=\"Risk register entries unanchored without documented methodology rationale under Clause 6.1.2\" class=\"wp-image-130\" srcset=\"https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_23-AM-1024x683.png 1024w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_23-AM-300x200.png 300w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_23-AM-768x512.png 768w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_23-AM-600x400.png 600w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_23-AM.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Where Organisations Fail<\/h2>\n\n\n\n<p>The failure pattern repeats across transition audits. Organisations updated their Annex A mapping to the 2022 control structure \u2014 the visible change \u2014 and left their risk assessment methodology documentation untouched. A\/T\/V continued operating as it had under 2013. No one wrote a methodology rationale statement confirming A\/T\/V as the organisation&#8217;s chosen approach under the 2022 framework. No one explained how it meets the consistency, validity, and comparability test.<\/p>\n\n\n\n<p>Operationally present. Documentarily absent under 2022.<\/p>\n\n\n\n<p>Transition auditors catch this by requesting the documented methodology rationale under Clause 6.1.2. When the methodology document reproduces inherited A\/T\/V steps with no 2022-conformant rationale, the auditor&#8217;s question is direct: where does this document confirm this is your chosen methodology, and why does it satisfy the 6.1.2 test? Absence of that statement is the nonconformity trigger.<\/p>\n\n\n\n<p>The downstream consequence is worse. Clause 6.1.3(d) requires the Statement of Applicability to include justification for every Annex A control inclusion and exclusion \u2014 traceable to risk assessment results. The causal chain runs: risk assessment methodology at 6.1.2, then risk identification output, then control selection at 6.1.3(a), then Annex A comparison at 6.1.3(c), then SoA justification at 6.1.3(d). If the methodology producing the risk identification output is undocumented under 2022, every SoA justification row rests on a process with no documented anchor.<\/p>\n\n\n\n<p>Auditors raise this as a Major nonconformity against Clause 6.1.3(d) with root cause observed at Clause 6.1.2. The SoA content is not wrong. It is unanchored in process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Audit-Defensible Methodology Documentation Looks Like<\/h2>\n\n\n\n<p>An audit-defensible ISMS under 2022 contains a methodology rationale document \u2014 standalone or as a defined section within the risk assessment procedure \u2014 that does three things.<\/p>\n\n\n\n<p>It names the chosen methodology. A\/T\/V, scenario-based, CIA-impact-based, or a hybrid \u2014 the document states what the organisation uses and confirms this is a deliberate choice under ISO\/IEC 27001:2022 Clause 6.1.2. Not a default. Not inherited. Chosen.<\/p>\n\n\n\n<p>It explains how the methodology satisfies the three-part test. Consistency: repeated assessments produce comparable outputs. Validity: the methodology addresses information security risks relevant to the <a href=\"https:\/\/aec.llc\/blog\/isms-scope-iso-27001-audit-findings\/\">ISMS scope<\/a>. Comparability: results across assessment cycles support trend analysis and feed management review with meaningful period-on-period data.<\/p>\n\n\n\n<p>It connects methodology output to SoA justification. Each risk register entry traces to the documented methodology. Each SoA control inclusion or exclusion cites a risk register entry. The chain is explicit: methodology to risk to control decision to SoA justification. An auditor traces any SoA row back to its process root without hitting an undocumented step.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_25-AM-1024x683.png\" alt=\"SoA justification traceability chain from methodology to risk register to control selection\" class=\"wp-image-129\" srcset=\"https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_25-AM-1024x683.png 1024w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_25-AM-300x200.png 300w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_25-AM-768x512.png 768w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_25-AM-600x400.png 600w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_25-AM.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Practical Steps<\/h2>\n\n\n\n<p>First, draft the methodology rationale statement. Name the chosen approach. Confirm it is the organisation&#8217;s documented choice under ISO\/IEC 27001:2022 Clause 6.1.2. Explain how it produces consistent, valid, and comparable results. If A\/T\/V is retained, state that explicitly \u2014 the standard permits it; it does not require it.<\/p>\n\n\n\n<p>Second, audit the risk register against the documented methodology. Review every risk register entry to confirm it traces to the methodology described above. Flag entries carried forward from the 2013 process that were never re-validated under the 2022 methodology rationale. Re-validate or re-generate as needed.<\/p>\n\n\n\n<p>Third, revalidate SoA justifications. For each Annex A control row, verify that the inclusion or exclusion justification links to a risk register entry that is output from the documented methodology. Update justification language to make the methodology-to-risk-to-control chain explicit and auditable under Clause 6.1.3(d).<\/p>\n\n\n\n<p>Fourth, prepare for the auditor&#8217;s methodology question. It will come at Stage 2 or surveillance: show me the document that confirms your risk assessment methodology choice and how it satisfies 6.1.2. Have the rationale statement ready. Have traceability from SoA to risk register to methodology documented and retrievable. A <a href=\"https:\/\/aec.llc\/consulting-pages\/gap-assessment.html\">gap assessment<\/a> against the 2022 requirements can identify whether your current documentation meets this threshold before the auditor does.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Note on Guidance Gaps<\/h2>\n\n\n\n<p>No [EXT-LINK: IAF \u2192 IAF mandatory document], UKAS, or published certification body document specifies what risk assessment methodology documentation is sufficient to demonstrate Clause 6.1.2 conformance under 2022. [EXT-LINK: IAF MD 26 \u2192 IAF mandatory document] \u2014 the mandatory transition requirements document \u2014 addresses SoA currency and control effectiveness as transition audit objectives but says nothing about methodology documentation depth. UKAS transition bulletins address certification body process timelines only.<\/p>\n\n\n\n<p>This is not a gap in your preparation. It is a gap in the guidance infrastructure \u2014 and it means auditor expectations for methodology documentation are discretionary by certification body. You cannot point to an authoritative T1 document and confirm your documentation is sufficient. The practical consequence: document more than you think you need. A methodology rationale statement that is too thorough has no downside. One that is missing has a Major nonconformity attached to it.<\/p>\n\n\n\n<p>Clause reference for BSI Transition Guide reflects mapped standard requirement from the 2005-to-2013 transition. The directional principle \u2014 A\/T\/V permissible but not required \u2014 is applied by inference to the 2013-to-2022 context. No equivalent BSI guide for the 2013-to-2022 transition has been identified. Verify against current edition before audit use.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_28-AM-1024x683.png\" alt=\"ISO 27001 risk assessment\" class=\"wp-image-128\" srcset=\"https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_28-AM-1024x683.png 1024w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_28-AM-300x200.png 300w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_28-AM-768x512.png 768w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_28-AM-600x400.png 600w, https:\/\/aec.llc\/blog\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-Apr-22-2026-07_13_28-AM.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaway<\/h2>\n\n\n\n<p>The 2022 transition was never about remapping Annex A to 93 controls. The structural change at Clause 6.1.2 \u2014 from an A\/T\/V-anchored risk identification pathway to a methodology-neutral framework \u2014 requires every transitioned ISMS to contain a documented methodology rationale that did not exist under 2013. Without it, the SoA justification chain under Clause 6.1.3(d) has no process root. The audit exposure is a Major nonconformity waiting for an auditor who asks the right question.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About AEC International<\/h2>\n\n\n\n<p>AEC International provides ISO certification, training, and consultancy services at the intersection of information security, risk management, and management system governance. We support organisations across industries in achieving and maintaining <a href=\"https:\/\/aec.llc\/certifications-family-pages\/certifications\/index.html\">ISO certification<\/a> \u2014 from <a href=\"https:\/\/aec.llc\/consulting-pages\/gap-assessment.html\">gap analysis<\/a> and implementation through audit preparation and continual improvement.<\/p>\n\n\n\n<p>Learn more: <a href=\"http:\/\/www.aec.llc\">www.aec.llc<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>**Excerpt:** ISO 27001:2022 removed asset\/threat\/vulnerability as a normative prerequisite for risk identification. Organisations that carried their methodology forward without documenting the choice under Clause 6.1.2 now face a Major nonconformity risk at their next audit. (42 words)<\/p>\n","protected":false},"author":1,"featured_media":131,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[26,39,16,19,12],"class_list":["post-127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-audit-preparation","tag-certification-process","tag-document-control","tag-gap-analysis","tag-iso-27001","tag-risk-management"],"reading_time":"6 min read","_links":{"self":[{"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/posts\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":1,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"predecessor-version":[{"id":132,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/posts\/127\/revisions\/132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/media\/131"}],"wp:attachment":[{"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aec.llc\/blog\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}