PlaybookGLOBAL

ISO 27035 Compliance

A practical operating model for incident management based on the ISO/IEC 27035 series.

Built for security leaders, incident managers, SOC teams, CSIRTs, and ISMS owners who need a usable and auditable response capability.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
8

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ISO/IEC 27035 is not a one page incident response policy. It is a full capability model. Part 1 defines the process and required documentation. Part 2 defines the planning and preparation work that makes response repeatable. Part 3 provides ICT response operations for detection, notification, triage, analysis, containment, eradication, and recovery. A compliant operating model proves that those pieces work together.

Section 1

Series baseline and what changed in the 2023 revisions

The grounded series here is ISO/IEC 27035-1:2023 second edition, ISO/IEC 27035-2:2023 second edition, and ISO/IEC 27035-3:2020 first edition. The 2023 revisions matter because they formalize the incident management team and incident coordinator roles and strengthen the planning and lessons learned structure.

If your program still reflects only the older 2016 framing, your team structure and documentation model are probably too thin.

  • Part 1: process and documentation baseline
  • Part 2: policy, plan, teams, external relationships, awareness, testing, metrics, and lessons learned
  • Part 3: ICT response operations with operational detail for triage, analysis, and response phases
Section 2

Step 1: build the policy and plan, not just a runbook

Part 2 expects an information security incident management policy and an incident management plan that cover the process flow, classification and severity documents, post-resolution activities, external support, and information sharing rules.

The plan should be a document set, not a single PDF. It should include forms, procedures, organizational elements, and the support tools needed for all phases.

  • Maintain a high level process flow that covers detect and report, assess and decide, respond, and learn lessons
  • Reference the classification scale, severity ratings, forms, and communications rules from the plan
  • Define rules and circumstances for information sharing with internal and external parties, including any TLP style handling model you adopt
Section 3

Step 2: define the team model and capability register

Part 2 expects formal establishment of the incident management team, the incident response team, and the incident coordinator role. It also recognizes that the response capability often depends on specialists outside the core team, such as legal, forensics, facilities, cloud providers, or media relations.

That means you need a living capability register, not just an org chart.

  • Document the terms of reference and responsibilities for IMT, IRT, incident coordinator, and point of contact
  • Track internal and external specialist capabilities in a register and keep escalation contacts current
  • Define when vulnerabilities are routed to vulnerability management rather than treated as active incidents
Section 4

Step 3: make event reporting and acceptance criteria explicit

The standard does not treat event reporting as a vague mailbox function. It expects event reports to be completed immediately when a suspected incident may cause substantial loss or damage, and it expects defined criteria for accepting an event report based on its completeness.

Poor intake quality is a root cause of poor triage.

  • Use a generic event report form that still captures enough detail for categorization and prioritization
  • Define minimum required fields and a process for requesting missing information
  • Keep event reporting channels and form handling aligned with your incident management plan
Section 5

Step 4: classify, evaluate, prioritize, and escalate consistently

Annex C in Part 2 focuses on categorization, evaluation, and prioritization. It expects organizations to document incidents consistently so evaluation, reporting, and severity handling are comparable across cases.

The scoring model should align with your information classification policy and should support decisions on priority and escalation level.

  • Classify event or incident type and affected asset or service consistently
  • Evaluate impacts and consequences, then set a priority to respond
  • Record severity rationale and the escalation level in the incident management log
Section 6

Step 5: run ICT response operations with evidence discipline

Part 3 goes beyond generic incident response advice. It covers detection operations, notification operations, triage, analysis, evidence handling, and response operations for containment, eradication, and recovery.

That means response should not only be fast. It should preserve analysis quality and evidence quality.

  • Use a defined point of contact model for incident notifications, whether single or multiple PoCs exist
  • Preserve evidence and analysis results consistently, especially where forensics or legal review can follow
  • Document containment, eradication, and recovery actions separately so post-incident review can evaluate each phase
Section 7

Step 6: learn lessons, evaluate the IMT, and update risk assumptions

Part 2 makes lessons learned a structured phase, not an optional meeting. It expects improvement of the plan, evaluation of the IMT, improvement of control implementation, and review of risk assessment and management review results when incidents show reality differs from assumptions.

This is where many programs fail. They close tickets but never update policy, plan, control design, or risk ratings.

  • Run a post-incident review after closure and record concrete improvement actions
  • Evaluate the IMT periodically, not only after severe incidents
  • Update risk assessments where real consequences differ materially from the prior scoring model
Section 8

Evidence pack: what auditors and regulators actually ask for

A defensible ISO 27035 capability produces a repeatable evidence set. That evidence should prove process design, team readiness, incident execution, and improvement follow-through.

If your evidence stops at an incident policy and a few tickets, the program is not mature.

  • Policy, plan, forms, classification scales, and communications rules
  • Event reports, incident management logs, severity rationale, and notification records
  • Exercise records, capability register reviews, IMT evaluations, and corrective action tracking
Recommended next step

Turn ISO 27035 Compliance into an operational assessment

Assessment Autopilot can take ISO 27035 Compliance from operationalizing the guidance into a tracked program to a reusable workflow inside Sorena. Teams working on ISO 27035 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

Related guides

Explore more topics