A. Risk Assessment and Treatment
Identify security risks and decide how to handle them (mitigate, transfer, accept, or avoid).
B. Annex A Controls (114 controls in 14 categories)
Examples: Access control, cryptography, physical security, supplier relationships, and incident management.
C. Continual Improvement (PDCA Cycle)
Plan-Do-Check-Act model for maintaining and improving the ISMS