ISO 27001 Clause 4.4: Establishing Your ISMS
Clause 4.4 is the single sentence that mandates your entire information security management system. It requires you to establish, implement, maintain, and continually improve an ISMS - including the processes needed and their interactions. Every other clause in the standard exists to fulfill this one requirement. Getting the structure right here determines whether your ISMS actually works or just generates paperwork.
What the clause requires
ISO 27001:2022 Clause 4.4 is remarkably brief. The full requirement is one sentence:
“The organization shall establish, implement, maintain and continually improve an information security management system, including the processes needed and their interactions, in accordance with the requirements of this document.”
Four verbs, four obligations:
- Establish - create the framework: scope, policy, objectives, risk assessment methodology, organizational structure
- Implement - put the controls, processes, and procedures into operation
- Maintain - keep the system running through monitoring, auditing, and management review
- Continually improve - use the PDCA cycle to make the ISMS better over time
The clause also explicitly requires you to define “the processes needed and their interactions.” This is not optional language - auditors expect to see how your ISMS processes connect to each other.
How to establish your ISMS
Clause 4.4 does not tell you how to build your ISMS - it tells you that you must. The “how” comes from Clauses 4 through 10. But in practice, establishing an ISMS follows a predictable sequence:
Phase 1: Foundation (Clauses 4-5)
Define your organizational context, interested parties, and scope. Get leadership commitment and establish your information security policy. These decisions shape everything that follows.
Phase 2: Planning (Clause 6)
Assess risks, determine objectives, and plan how to achieve them. This is where your ISMS starts to take concrete shape - risks are identified, controls are selected, and the Statement of Applicability documents your control decisions.
Phase 3: Support (Clause 7)
Ensure you have the resources, competence, awareness, communication channels, and documented information to run the ISMS.
Phase 4: Operation (Clause 8)
Execute your risk assessment, implement your risk treatment plan, and deploy the controls from your SoA.
Phase 5: Evaluation (Clause 9)
Monitor, measure, audit, and review. This is where you find out whether your ISMS is actually working.
Phase 6: Improvement (Clause 10)
Address nonconformities and drive continual improvement through the PDCA cycle.
For a 20-person SaaS company, establishing an ISMS typically takes 4-6 months. A 200-person organization with complex regulatory requirements might need 9-12 months. The key is not speed - it is building something that can be maintained.
Process interactions
The “processes needed and their interactions” part of Clause 4.4 means you need to understand how your ISMS processes connect. At minimum, you should be able to explain:
- Context analysis and interested parties feed into scope definition
- Scope feeds into risk assessment
- Risk assessment results drive your SoA and control selection
- Controls require resources, training, and documented procedures
- Monitoring and internal audits check whether controls are effective
- Management review evaluates the whole system and directs improvements
You do not need a complex process map. A one-page diagram showing these connections is usually sufficient. But you should be able to explain how a change in one area affects others - if a new customer requirement changes your risk profile, that change should flow through your risk assessment, potentially update your SoA, and trigger control adjustments.
Connecting 4.4 to the rest of your ISMS
Clause 4.4 is the umbrella clause. It connects to every other clause in the standard, but the most important relationships are:
Clauses 4.1-4.3. Your context analysis, interested parties, and scope define what the ISMS covers. These are the direct inputs to Clause 4.4.
Clause 5 - Leadership. Leadership commitment is what gives the ISMS authority and resources. Without leadership behind it, the ISMS is just documentation that nobody follows.
Clause 9 - Performance evaluation. Monitoring, internal audits, and management reviews tell you whether the ISMS is achieving its objectives. This is where “maintain” becomes tangible.
Clause 10 - Improvement. The PDCA cycle closes the loop, addressing what is not working and making the ISMS better over time. This is where “continually improve” becomes tangible.
What auditors check
For Clause 4.4, auditors look at the overall system rather than specific documents:
Evidence of all four verbs. Has the ISMS been established (documented framework exists)? Implemented (controls are operating)? Maintained (ongoing monitoring and review happening)? Improved (evidence of changes based on findings)?
Process documentation. Auditors expect to see how ISMS processes are defined and how they interact. A process overview document or a simple diagram showing how risk assessment feeds into control selection feeds into monitoring is often sufficient.
Lifecycle evidence. The ISMS needs to show it has been through at least one full cycle. For initial certification, auditors check that you have planned and begun all phases. For surveillance audits, they look for evidence that the cycle has completed - management reviews have happened, improvements have been made, risks have been reassessed.
Consistency across clauses. Clause 4.4 ties everything together, so auditors check that the individual elements - scope, policy, risk assessment, controls, monitoring, review - form a coherent system rather than isolated documents that do not reference each other.
Common mistakes to avoid
Building documentation, not a system. The most common mistake is treating the ISMS as a set of documents rather than a management system. If your policies exist but nobody follows them, your risk register has not been updated since initial certification, and your management reviews are perfunctory, auditors will see through it. An ISMS that works is better than one that looks good on paper.
No clear process interactions. Many organizations build their ISMS in silos - risk assessment done by one team, policy by another, monitoring by a third. Clause 4.4 specifically requires you to define how processes interact. If a risk assessment finding does not flow through to control updates, you have a gap.
Skipping the improvement cycle. Establishing and implementing an ISMS is hard work, and many organizations stall once certification is achieved. Auditors at surveillance visits look specifically for evidence of the PDCA cycle in action - nonconformities addressed, lessons learned applied, the system maturing over time.
Not scaling to your organization. A 15-person startup does not need the same ISMS structure as a 500-person enterprise. The standard is deliberately flexible about implementation. Use simple tools, lean documentation, and processes that fit your team’s capacity. You can always mature the system as you grow.
How 27kay can help
We help organizations establish their ISMS from the ground up - from context analysis and scoping through to certification readiness. Whether you are a startup building your first ISMS or an established company transitioning to ISO 27001:2022, we structure the implementation so it works for your team, not just for the auditor. For the full picture, see our ISO 27001 knowledge hub.
Ready to build an ISMS that works? Get in touch - we will walk through your situation and give you an honest timeline for getting certified.