Back to blog
SMB team planning ISO 27001 risk assessment around a desk
riskienhallinta

How to Start ISO 27001 Risk Assessment in an SMB

Ilkka Sillanpää

Ilkka Sillanpää

CEO

Published March 24, 2026

How to Start ISO 27001 Risk Assessment in an SMB

In many small and medium-sized businesses, it’s understood that information security risks should be assessed, but getting started can feel daunting. Where to begin, how extensive will the work be, and does everything need to be documented immediately? If the start drags on, often the risks are identified only after a customer requirement, audit, or incident.

This article walks you through how to practically start an ISO 27001 risk assessment in an SMB. You’ll get a clear step-by-step model, concrete initial decisions, a simple scoring example, and guidance on keeping the work manageable within the first 2–4 weeks.

Edellytykset

  • Appoint one responsible person, for example an IT manager, quality manager, or security officer
  • Define the first scope of application for the assessment: for instance the whole company, or one service, business process, or customer environment
  • Reserve at least 2 x 2-hour workshops plus 1–2 hours weekly for follow-up in the first month
  • Gather basic information in advance: system list, key suppliers, personnel roles, and past incidents

What Does ISO 27001 Risk Assessment Mean in Practice?

Risk assessment practically means identifying your company’s most significant threats to information, systems, and processes, evaluating their impact, and deciding on actions. ISO 27001 doesn’t require complicated theory but a repeatable method to assess risks consistently every time.

The key insight for SMBs is this: you don’t have to assess everything perfectly at once. On the first round, it’s enough to identify 3–5 key risks per critical business area and assign owners, actions, and schedules to them.

Common first scopes include:

  • customer data and personal information
  • Microsoft 365 or Google Workspace environments
  • endpoints like laptops
  • access rights management
  • subcontractors and cloud services
  • backups and recovery

Note

ISO 27001 does not mandate a single compulsory risk calculation model. The most important thing is that you use a coherent model suitable for your operations and can justify your decisions during audits.

Define Clearly: What to Include and What Not?

The most common startup mistake is trying to assess all risks of the entire company at once. This easily results in an overly broad list that no one has time to maintain. Therefore, the first practical decision is the scope of application, i.e., the part of the operations the assessment covers.

A good scope in an SMB is something you can realistically cover in 1–3 workshops. If the company has one main product or a clear service environment, start there. If customer requirements cover the entire organization, limit the first assessment round at least to the key processes.

Make sure the scope covers at least these:

  • the most important information and data repositories
  • critical systems
  • key personnel roles
  • external suppliers on which you depend
  • legal or customer requirements

The following table helps you choose a suitable starting scope:

OptionWhen SuitableInitial EffortSMB Recommendation
Whole company at onceOperations are simple and few systemsMediumGood if under 20 employees and few services
One service or productCustomer requirements target a specific serviceSmallOften the best initial scope
One process, e.g., access rights managementNeed a quick startVery smallGood pilot, but not sufficient alone long-term
One customer environmentSecurity requirements come from a single customerSmall–mediumWorks well if customer-specific requirements drive work

Choose a Simple Scoring Model from the Start

Once risks are identified, you need to compare them against each other. Otherwise, everything seems equally urgent. Practically, you need at least two metrics: impact and likelihood.

For SMBs, a scale of 1–3 or 1–5 often suffices. The most important thing is not mathematical precision but that the team understands what the numbers mean. If the model is too complicated, assessment slows down and results vary between assessors.

Here is a practical example of a 1–3 scale:

ScoreImpactLikelihood
1Minor disruption, impact less than 4 hours or low costUnlikely, occurs less than once every 3 years
2Disruption affects customers or internal work 1–2 daysPossible, might happen once every 1–2 years
3Serious disruption, customer impact, data leak, or business interruption over 2 daysLikely, can happen multiple times per year

Risk score can be calculated as:

  • risk = impact x likelihood

This gives a clear prioritization:

Risk ScoreInterpretationAction
1–2LowMonitor as part of normal operations
3–4MediumPlan controls and assign owners within 30 days
6–9HighInitiate actions immediately and monitor progress at least monthly

Tip

If you can’t agree on scores within 5 minutes, first document the reasons verbally. Often disagreements arise because impacts on customers and internal operations get confused.

Which Risks Should an SMB Identify First?

The first assessment should not become a brainstorming session listing hundreds of possible threats. A better approach is reviewing a few standard topics where SMBs typically find their most relevant risks.

Start with these risk categories, for example:

  • access rights not revoked when employment ends
  • missing multifactor authentication on critical services
  • backups not tested regularly
  • devices not encrypted or updated on time
  • strong supplier dependence without alternative solutions
  • staff poor at recognizing phishing messages
  • information scattered without clear owners

A concrete example of a single risk:

RiskImpactLikelihoodScoreControl MeasureResponsibilityDeadline
Ex-employee account remains active in SaaS service326Offboarding process, checklist, and account removal within 24 hoursIT Manager14 days

Ask yourself and your team directly:

  • In what situation would a customer first notice that information security failed?
  • Which single mistake would stop work tomorrow?
  • Where are we reliant on a single person or supplier?

These questions often reveal more relevant risks than general brainstorming lists.

Appoint the assessment team and decide initial scope

Include at least a business owner, an IT-savvy person, and, if needed, quality or data protection officer. Keep the group small, usually 3–5 people suffice. Document if the assessment covers the whole company or, for example, one service or customer environment.

List key information, systems, and dependencies

Create an initial map on one page or table. Record at least key information, the systems processing it, owners, and external suppliers. If this listing takes more than 90 minutes, the scope is probably too broad.

Identify 10–15 initial risks using standard categories

Review access rights, devices, cloud services, backups, staff, suppliers, and incidents. The goal is not a complete list but a manageable initial set. For most SMBs, 10–15 risks is enough for the first round.

Score risks using the same model and select 3–5 most important

Use one agreed scale, for example impact 1–3 and likelihood 1–3. Calculate scores, rank risks, and together select the top 3–5 for follow-up. If all risks seem high, your evaluation criteria are too vague.

Decide controls, owners, and review cadence

Every high risk needs a concrete action, responsible owner, and deadline. For example, enabling MFA within 30 days or weekly checks on revoked access rights. Agree to review the risk list at least quarterly and after any major change.

Common Mistakes at the Start

The first mistake is documenting too much before the shared approach is clear. If you spend weeks polishing templates but make no risk decisions, the work won’t improve security yet.

Another common mistake is leaving business out of the assessment. IT alone does not always know what is most critical to the customer. That’s why at least one business representative must participate in scoring.

Avoid especially these:

  • overly broad scope in the first round
  • unclear scoring that different people interpret differently
  • listing risks without owners and deadlines
  • copying control measures directly from templates without own justification
  • conducting assessment only once a year without follow-up between

Warning

A frequent pitfall is recording controls as just “improve guidance.” Without an owner, deadline, and measurable results, this often gets left undone. Instead, specify something like: “MFA enabled for all admin accounts within 30 days.”

How to Make Risk Assessment Part of Everyday Work?

A good ISO 27001 risk assessment is not a one-off Excel file but part of management. Practically, this means linking risks to changes, incidents, and management reviews. When a new system is deployed or supplier changes, update the risk list accordingly.

In SMBs, a light but regular rhythm works well. You don’t need a heavy governance model as long as responsibilities, schedules, and monitoring are clear.

An effective monthly or quarterly rhythm might look like this:

ActivityFrequencyDurationResponsibility
High risk status reviewMonthly15–30 minRisk owners
Full risk list reviewQuarterly60 minResponsible person + key staff
Update after changesAs needed30–60 minChange owner
Management summary2–4 times per year15 minSecurity officer

If you use Tietoturvapankki, recording risks, ownership, and monitoring happen all in one place. This particularly helps avoid the assessment depending on one person’s memory or scattered files.

Yhteenveto

  • Start small: limit your first scope so you can cover it within 2–4 weeks.
  • Use a simple and consistent scoring system, for example impact 1–3 and likelihood 1–3.
  • Identify 10–15 risks first, and prioritize the 3–5 most critical into concrete actions.
  • Each significant risk must have an owner, deadline, and measurable control.
  • Update the risk assessment regularly and whenever systems, suppliers, or operations change.

Need help with information security management?

Our experts will help you move forward.

Contact us