Home / Blog / Information Security

ISO/IEC 27001 is the international standard for information security management systems (ISMS). Certification demonstrates to customers, partners and regulators that your organisation takes a systematic approach to managing sensitive information. While the journey to certification requires significant effort, a structured approach makes it achievable for organisations of all sizes.

Understanding ISO 27001:2022

The latest version, ISO 27001:2022, maintains the core management system requirements while updating the Annex A controls to reflect the modern threat landscape. The standard follows the Annex SL high-level structure shared with other ISO management system standards, making integration with ISO 9001, ISO 22301 and others straightforward.

The standard comprises two main parts: the management system requirements (Clauses 4-10) and the reference control set (Annex A), which now contains 93 controls organised into four themes: organisational, people, physical and technological.

Phase 1: Preparation and Scoping

Before diving into implementation, establish the foundations:

  • Secure management commitment: ISO 27001 requires visible leadership support and adequate resource allocation
  • Define the scope: Determine which parts of your organisation, locations, systems and processes will be covered by the ISMS
  • Identify interested parties: Document stakeholders and their information security requirements
  • Understand the context: Analyse internal and external factors that affect your information security objectives

Our ISMS Manager module provides structured workflows to guide you through each phase of the implementation process.

Phase 2: Gap Analysis

Conduct a thorough gap analysis comparing your current security practices against ISO 27001 requirements. This reveals what you already have in place and what needs to be developed. A gap analysis should cover the management system clauses, all 93 Annex A controls and your existing documentation. The results form the basis of your implementation project plan.

Consider engaging ISMS implementation workshops to accelerate this phase and benefit from expert guidance on interpreting the standard's requirements.

Phase 3: Risk Assessment and Treatment

Risk assessment is the cornerstone of ISO 27001. The standard requires a defined risk assessment methodology that identifies information security risks, analyses their likelihood and impact, and evaluates them against your risk acceptance criteria.

For each identified risk, you must determine the treatment approach: mitigate (apply controls), accept (within risk appetite), transfer (insurance or outsourcing) or avoid (cease the activity). The risk treatment plan documents the controls selected for each risk and links them to the Annex A reference controls.

Phase 4: Statement of Applicability

The Statement of Applicability (SoA) is a mandatory document that lists all 93 Annex A controls, states whether each is applicable and provides justification for inclusion or exclusion. The SoA serves as a comprehensive overview of your security control environment and is a key document reviewed during certification audits.

Phase 5: Policy and Documentation

ISO 27001 requires documented information including an information security policy, risk assessment methodology, risk treatment plan, SoA and various operational procedures. Using a managed policy framework ensures consistency and makes maintaining documentation manageable.

Key policies typically include: information security policy, acceptable use policy, access control policy, data classification policy, incident management policy, business continuity policy, supplier security policy and cryptographic controls policy.

Phase 6: Control Implementation

Implement the controls identified in your risk treatment plan and SoA. This spans technical measures (firewalls, encryption, access controls, monitoring), organisational measures (policies, procedures, roles), people controls (security awareness training, background checks) and physical controls (access control systems, CCTV, clean desk practices).

Prioritise controls based on risk levels and quick wins. Some controls may already be partially in place and need only formalisation and documentation.

Phase 7: Internal Audit

Before the certification audit, conduct a comprehensive internal audit to verify that your ISMS conforms to ISO 27001 requirements and your own policies. Internal auditors should be independent of the areas they audit. The audit should cover all clauses and a representative sample of Annex A controls.

Address any nonconformities identified during the internal audit promptly. Document corrective actions and verify their effectiveness.

Phase 8: Management Review

Top management must review the ISMS at planned intervals to ensure its continuing suitability, adequacy and effectiveness. The management review should consider audit results, feedback from interested parties, risk assessment updates, the status of corrective actions and opportunities for improvement.

Phase 9: Certification Audit

The certification audit is conducted by an accredited certification body in two stages:

  1. Stage 1 (Documentation review): The auditor reviews your ISMS documentation, scope, risk assessment and SoA to confirm readiness for the Stage 2 audit
  2. Stage 2 (Implementation audit): The auditor conducts on-site (or remote) interviews, observations and evidence sampling to verify that your ISMS is effectively implemented and maintained

Any major nonconformities must be addressed before certification can be granted. Minor nonconformities require a corrective action plan.

Maintaining Certification

ISO 27001 certification is valid for three years, with annual surveillance audits to verify ongoing compliance. Continuous improvement is a core requirement — your ISMS should evolve as threats, technologies and business requirements change. A dedicated CISO or CISO support service ensures your ISMS receives the ongoing attention it needs.

Common Pitfalls to Avoid

  • Treating certification as a checkbox exercise rather than embedding security into the culture
  • Over-scoping the ISMS initially — start focused and expand
  • Creating excessive documentation that nobody reads or maintains
  • Neglecting risk assessment as the driver for control selection
  • Insufficient management commitment and resource allocation

Conclusion

ISO 27001 certification is a journey that requires commitment, planning and sustained effort. However, the benefits — reduced risk, improved customer confidence, competitive advantage and regulatory compliance — far outweigh the investment. By following a structured approach and leveraging the right tools and expertise, organisations of all sizes can achieve and maintain certification successfully.

Continue Reading

Related Articles

Stay Informed

Explore Our Compliance Solutions

Browse all our cyber compliance resources or learn how our platform and expert services can help your organisation achieve and maintain compliance.

All Articles Contact Us
Contact Form