The Definitive Governance Requirement.
Clause 4.3 mandates that you define the exact physical, organizational, and technological perimeter of your certification. This is the single most critical strategic decision in your implementation. Define it too loosely, and you invite unnecessary liability. Define it too narrowly, and your certificate becomes commercially worthless.
Table of contents
- The Definitive Governance Requirement.
- The Mandate
- ISO 27001 Clause 4.3 Blueprint
- ISO 27001 Clause 4.3 Executive Briefing [Video]
- The Implementation Strategy
- The Auditor’s Trap
- Required Evidence
- Strategic Acceleration
- ISO 27001 Clause 4.3 Mind Map
- The ISO 27001 Clause 4.3 Board Pack
- Strategic Briefings & Citations
The Mandate
You cannot secure what you have not defined. The standard requires you to establish the boundaries and applicability of the Information Security Management System (ISMS).
To do this correctly, you must triangulate three inputs:
- The Issues: The external and internal context (Clause 4.1).
- The Requirements: The needs of interested parties (Clause 4.2).
- The Interfaces: The dependencies between your organization and other organizations (e.g., Cloud Providers, Logistics, Payroll).
The output is a documented Scope Statement. This is not a suggestion; it is documented information required by the standard.
ISO 27001 Clause 4.3 Blueprint
This strategic ISO 27001:2022 Clause 4.3: Determining the Scope of the ISMS Infographic is the blueprint for the clause depicting the role of scope and the core requirements of the standard.

ISO 27001 Clause 4.3 Executive Briefing [Video]
You can learn more about Determining the Scope of the ISMS and ISO 27001 by watching this video:
The Implementation Strategy
Do not write a vague sentence claiming “The whole company is in scope.” That is lazy and legally dangerous. You must architect the scope across three dimensions:
- Organizational Scope: Which legal entities and business units are included? (e.g., Hightable Global Ltd – UK Operations only).
- Physical Scope: Where does the data live? List every office, data center, and remote working location.
- Technological Scope: Which assets process the information? List the networks, the cloud environments (AWS/Azure), and the critical applications.
The Golden Rule of Interfaces: You must identify where your responsibility ends and the third party’s begins. You cannot exclude the cloud, but you can define the interface (e.g., “The scope includes the configuration of the AWS environment, but excludes the physical security of the AWS data center”).
The Auditor’s Trap
[The Auditor’s View] The most common Major Non-Conformance here is “Cherry Picking.” Organizations frequently try to exclude the Product Development team because “they are too hard to manage.” If the Development team has access to production data, they are in scope. Period. You cannot gerrymander your way to compliance.
Required Evidence
An auditor will demand to see the “Scope Document.” This is often a standalone PDF or a specific section in your Information Security Manual.
- The Scope Statement: A precise description of the boundaries.
- Network Network Diagrams: Visual evidence of the technological perimeter.
- List of Exclusions: If you are claiming any exclusions (only applicable to Annex A controls), they must be justified here. Note: You cannot exclude Clauses 4-10.
Strategic Acceleration
Defining the scope is high-stakes. If you get it wrong, you either fail the audit or over-spend on compliance for assets that don’t matter.
Use the Scope Definition Template within the Toolkit. It forces you to define the interfaces and boundaries correctly the first time, protecting you from scope creep.
The Next Move: Download the Scope Template
ISO 27001 Clause 4.3 Mind Map
The following infographic breaks down ISO 27001-2022 Clause 4.3 Determining the Scope of the ISMS into the core components for easy understanding.

The ISO 27001 Clause 4.3 Board Pack












Strategic Briefings & Citations
1. ISO/IEC 27001:2022 – The Official Standard | https://www.iso.org/standard/27001
The Strategy: You must purchase a licensed copy of the standard. It is a mandatory audit artefact; you cannot certify against a standard you do not legally own or have access to.
2. ISO 27001:2022 Clause 4.3: Determining The Scope Of The Information Security Management System (ISMS) – The Strategic Execution Guide | https://iso27001.com/iso-27001-clause-4-3-determining-the-scope-of-the-isms/
The Strategy: The step-by-step workshop guide to defining scope.
3. ISO 31000: Risk Management Guidelines | https://www.iso.org/standard/65694.html
The Strategy: The parent standard for global risk management. Review this to understand how the “Scope” defined here directly feeds the Risk
