Compliance Insights

How to formulate convincing exclusion arguments in the Statement of Applicability (SOA)

Jessica Doering
November 17, 2025

In the intricate process of developing an Information Security Management System (ISMS), organizations face the challenge of tailoring controls to their specific needs. The Statement of Applicability (SOA) serves as a roadmap for selecting and implementing controls, but not every control is universally applicable. 

This blog delves into the art of crafting compelling exclusion arguments in your SOA, allowing organizations to justify the omission of certain controls and streamline their security efforts effectively.

Understanding the Purpose of Exclusion

The exclusion of specific controls from the SOA is not a loophole but a strategic decision based on the organization's unique context, risk landscape, and business processes.

Exclusion does not mean neglect, rather, it signifies a thoughtful and justified customization of the ISMS to enhance its relevance and efficiency.

Key Steps in Writing Exclusion Arguments:

  • Thorough Risk Assessment:

Begin by conducting a comprehensive risk assessment. Clearly identify and evaluate risks specific to your organization. This forms the foundation for justifying exclusions based on risk relevance.

  • Aligning with Business Objectives:

Ensure that the exclusion aligns with the organization's business objectives. Controls that do not contribute directly to achieving these objectives may be candidates for exclusion.

  • Regulatory Compliance Analysis:

Scrutinize the regulatory landscape applicable to your industry. If a control is mandated by a regulation that does not pertain to your organization, it becomes a strong argument for exclusion.

  • Resource Constraints:

Highlight resource constraints when justifying exclusions. If a control requires an allocation of resources beyond what your organization can reasonably afford, this becomes a valid reason for exclusion.

  • Documentation and Transparency:

The key to a persuasive exclusion argument lies in meticulous documentation. Clearly articulate the reasons for exclusion and tie them back to specific elements of your risk assessment, business objectives, or resource limitations.

Components of a Persuasive Exclusion Argument

  • Risk Mitigation Alternatives:

Provide alternative strategies for mitigating the identified risks associated with the excluded controls. This demonstrates a proactive approach to security, even in the absence of specific controls.

  • Evidence of Ineffectiveness:

If applicable, present evidence supporting the assertion that the excluded control would be ineffective in addressing the organization's specific risks. This substantiates the decision with empirical data.

  • Legal and Regulatory Justifications:

Emphasize any legal or regulatory justifications for exclusion. Clearly state the regulations that do not apply to your organization, making it evident why certain controls are unnecessary in your context.

  • Continuous Improvement Commitment:

Express the organization's commitment to continuous improvement. Highlight that the exclusion decisions are not final and will be revisited during subsequent risk assessments or changes in the organizational environment.

In conclusion, writing persuasive exclusion arguments in your SOA is an essential skill in the development and maintenance of an effective ISMS. By aligning exclusions with risk assessments, business objectives, and resource constraints, organizations can tailor their security measures without compromising the integrity of their information security management system. 

Transparent documentation and a commitment to ongoing evaluation ensure that exclusion decisions remain valid and defensible over time. Crafting exclusion arguments is not just about omitting controls; it's about strategically customizing your security framework for optimal efficiency and relevance.

– 24/7 Support for all our customer

Achieve ISO 27001 in weeks, with real experts by your side.

Latest blog posts

Discover stories, tips, and resources to inspire your next big idea.

Framework Guide
ISO 27001

How to approach risk management in ISO 27001

Jessica Doering

Strategically navigating and mitigating risks is a crucial aspect of effective management

Compliance Insights
No items found.

The Human Factor: Risks to Cybersecurity

Jessica Doering

Protect Your Organization from Human Error in Cybersecurity

Framework Guide
ISO 27001

ISO 27001 Requirement 5.2: Information Security Policy

Jessica Doering

ISO 27001 5.2: Develop a strong Information Security Policy to guide data protection efforts and control implementations.

No items found.
Hey, don't miss our upcoming webinar

Free SaaS webinar now open for all our visitors

days
00
hours
00
min
00
sec
00