The same phishing variant succeeds three times in six months. Each time the incident team responds, resolves and closes the ticket. Nobody analyses the pattern, nobody updates the training, nobody adjusts the email filter rules. A.5.27 closes this feedback loop by requiring organisations to systematically learn from incidents and feed improvements back into the ISMS.
Responding to incidents (A.5.26) handles the immediate damage. Learning from them ensures that the same type of incident becomes progressively less likely or less impactful over time. This is where the ISMS improvement cycle meets operational reality.
What does the standard require?
- Analyse incidents systematically. Every confirmed incident undergoes a structured review to identify root causes, contributing factors and control gaps.
- Document lessons learned. Findings are recorded in a form that enables trend analysis and feeds into risk assessment updates.
- Track incident types and costs. The organisation maintains statistics on incident frequency, categories and financial or operational impact to identify patterns.
- Update controls and procedures. Lessons learned translate into concrete corrective actions — updated playbooks, adjusted configurations, additional training, new or modified controls.
- Share knowledge appropriately. Relevant lessons are communicated to those who can benefit, including awareness training for the broader workforce where applicable.
In practice
Conduct blameless post-incident reviews. The goal is to understand what happened and why — the focus lies on systemic causes (missing controls, unclear procedures, insufficient tooling) rather than individual mistakes. A blame culture discourages reporting and hides the very information the organisation needs to improve.
Maintain an incident database with categorisation. Tag incidents by type (phishing, malware, misconfiguration, insider, physical), affected assets and root cause. Over time this database reveals which categories are growing and where investment has the greatest effect.
Feed findings into the risk assessment. If an incident reveals a threat or vulnerability that was not previously considered, update the risk register. If it demonstrates that a risk was underestimated, adjust the likelihood or impact rating. This keeps the risk assessment grounded in operational experience.
Close the loop with measurable actions. Every corrective action from a post-incident review gets an owner, a deadline and a verification step. Track completion in the same system you use for other ISMS improvement actions.
Typical audit evidence
Auditors typically expect the following evidence for A.5.27:
- Post-incident review reports — structured analyses of root causes and lessons learned
- Incident statistics — aggregated data on incident types, frequency and trends over time
- Corrective action tracker — evidence that lessons learned translated into concrete actions with owners and deadlines
- Updated procedures or controls — before/after comparison showing changes triggered by incident reviews
- Awareness materials — training content or communications derived from lessons learned
KPI
% of IS incidents with completed post-incident review and documented lessons learned
This KPI measures whether the organisation consistently closes the learning loop. Target: 100% for incidents classified as high or critical severity, at least 80% for medium severity. Track also the average time from incident closure to completed review.
Supplementary KPIs:
- Number of corrective actions implemented as a result of post-incident reviews
- Reduction in recurrence rate for previously observed incident types
- Average time from incident closure to completed post-incident review
BSI IT-Grundschutz
A.5.27 maps to the BSI requirements for incident evaluation and improvement:
- DER.2.1.A17 (Handling of security incidents) — includes the requirement for post-incident analysis.
- DER.2.1.A18 (Post-processing of security incidents) — explicitly requires documentation of lessons learned and derivation of improvement measures.
- DER.2.1.A22 (Advanced post-processing) — recommends trend analysis across multiple incidents and integration with the overall ISMS improvement process.
Related controls
A.5.27 is the improvement step in the incident management chain:
- A.5.25 — Assessment of IS events: Classification data feeds into incident statistics.
- A.5.26 — Response to incidents: Provides the raw material (incident reports, timelines) for the review process.
- A.5.28 — Collection of evidence: Forensic evidence supports root-cause analysis.
- A.5.29 — IS during disruption: Lessons from disruption incidents feed into continuity planning.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.5.27 — Learning from information security incidents
- ISO/IEC 27002:2022 Section 5.27 — Implementation guidance
- BSI IT-Grundschutz, DER.2.1 — Incident handling