July 21, 2023

ISO 27001:2022 Requirements: Clause 4.3 Determining the Scope of the ISMS

Read the requirements of ISO 27001 Clause 4.3: Determining The Scope Of The Information Security Management System, requiring the organisation to establish the scope of its ISMS.

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

“The organisation shall determine the boundaries and applicability of the information security management system to establish its scope.

When determining this scope, the organisation shall consider:

  • The external and internal issues referred to in clause 4.1;
  • The requirements referred to in clause 4.2;
  • Interfaces and dependency between activities performed by the organisation, and those that are performed by the other organisation.

The scope shall be available as documented information.”

The Scope Of The Information Security Management System

Setting up a scope is the most crucial part of the ISMS, as it is a mandatory document that should be available as recorded information, along with a Statement of Applicability. The main purpose of defining the scope is to understand which information the organisation intends to protect. It will tell your stakeholders (employees, management, directors, partners, customers, suppliers, and more), as defined by clause 4.2, what parts of the business are covered by your ISMS.

According to the standard, an organisation must consider these factors while setting up the scope of its ISMS:

  • Internal and external issues, which are defined within the context of the organisation (clause 4.1);
  • The requirements of the interested parties (clause 4.2);
  • Interfaces: Interfaces are like the boundary wall of your ISMS scope; they define what processes and elements are within the scope of ISMS or out of it. It’s also important to understand the inputs and outputs using these interfaces;
  • Dependencies: Dependencies are the processes or elements which are outside the scope of your ISMS. For example, if the organisation is outsourcing legal-services from a law firm.

Defining your internal and external issues in the previous two clauses is an intrinsic part of this process, and defining the scope of your ISMS will naturally rely upon you having an understanding of both of these considerations.

Once you have defined the internal and external issues, as well as identified the interested parties and their respective requirements, you should have a strong starting point for deciding what the scope of your ISMS should cover, as well as what is out of the scope of your ISMS, which you should also mention.

In summary, you are required to protect the intended information no matter where, how and by whom this information is accessed.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Getting Started
IT and Services
Legal Services
Professional Services
Growth