Resources
Everything you need to know
Company
Security and customers first
Close

Request a demo

Find out today the difference that Hicomply’s unique solution can make to your business.

Close

Thank you for your request

Success

In the meantime, connect with Hicomply for insights on authentication and fraud prevention

Close

ROI Calculator

See how much you could save with Hicomply

Hicomply feature Yearly saving
Automated scoping Easily scope your ISMS with the Hicomply platform
Asset register autogeneration A shorter learning curve for organisations and a simplified process
Risk assessment Autogenerate your risk register and risk treatment plan
Extended policy templates 90% of the essential are already written out of the box
Controls framework All controls are pre-loaded and already linked to the risks they mitigate
Task management Automate all actions, administration and setup time of your ISMS
Real time monitoring Understand status and progress across your ISMS with the Hicomply dashboard
Compliance & Training Your whole team, on the same page
Audit readiness Hicomply makes sure you have everything in place for your audit
Auditor access Give auditors a dedicated login to access and audit your ISM
Back to Resource Hub

ISO 27001 Clause 4.3: Determining The Scope Of The Information Security Management System

“The organisation shall determine the boundaries and applicability of the information security management system to establish its scope.

When determining this scope, the organisation shall consider:

  • The external and internal issues referred to in clause 4.1.
  • The requirements referred to in clause 4.2; and
  • Interfaces and dependency between activities performed by the organisation, and those that are performed by the other organisation.

The scope shall be available as documented information.”

Setting up a scope is the most crucial part of the ISMS, as it is a mandatory document that shall be available as documented information. The main purpose of defining the scope is to understand which information the organisation intends to protect.

According to the standard an organisation while setting up of scope must consider these factors:

  • Internal and external issues are defined within the context of the organisation,
  • The requirements of the interested parties, and
  • Dependencies: Dependencies are the processes or elements which are outside the scope of ISMS. For example if the organisation is outsourcing legal services from a law firm.
  • Interfaces: Interfaces are the like boundary wall of you ISMS scope, it defines what processes and elements are within the scope of ISMS or out of it. It’s also important to understand the inputs and outputs using these interfaces.

The point is you must protect the intended information no matter where, how and by whom this information is accessed.

More Resource Hub

ISO27001
SOC 2 Policies and Procedures
ISO27001
What Is The NHS Data Security and Protection…
ISO27001
Whitepaper | How To Choose The Best Information…