ISO 27001

ISO 27001 Compliance Checklist:
How to Get Certified (2026)

Every phase from gap assessment to certification audit — what you need to build, document, and prove to get your ISO 27001 certificate.

⏱ 12 min read · ISO 27001 · 2022 Edition

What ISO 27001 actually requires

ISO 27001 is the international standard for Information Security Management Systems (ISMS). Unlike SOC 2, which is an audit attestation, ISO 27001 is a certification — a formal, accredited certificate issued by a third-party certification body that your ISMS meets the standard.

The standard has two parts. Clauses 4–10 define the management system requirements — how you govern, plan, operate, and improve your ISMS. Annex A provides 93 reference controls organized across 4 themes that you select based on your risk assessment. You don't implement all 93 — you implement the ones your risks require, and justify any exclusions.

The most important thing to understand about ISO 27001: it's a management system standard, not a technical controls checklist. Auditors are verifying that you have a systematic, documented approach to identifying and managing information security risks — not just that you have MFA enabled. The process matters as much as the controls.

This guide covers the 2022 revision of ISO 27001 (ISO/IEC 27001:2022), which restructured Annex A from 114 controls across 14 domains to 93 controls across 4 themes. If you're currently certified under the 2013 version, your next surveillance or recertification audit will transition to the 2022 edition.

If you're deciding between ISO 27001 and SOC 2, see our ISO 27001 vs SOC 2 comparison first — the choice matters before you invest in either.

Phase 1: Scope definition and gap assessment

Phase 1

Scope & Gap Assessment

Define your ISMS scope

Document which parts of your organization, systems, locations, and services are in scope. Scope can be the entire company or a defined subset — but it must honestly reflect where sensitive information lives. Auditors will verify your scope boundary is real.

Identify interested parties and their requirements

Document who has a stake in your information security — customers, regulators, employees, suppliers — and what they require. This satisfies Clause 4.2 and shapes your ISMS objectives.

Run a gap assessment against clauses 4–10 and Annex A

Assess your current state against every ISO 27001 requirement. Document what's in place, what's partial, and what's missing entirely. This gap list becomes your implementation roadmap and helps you estimate effort and timeline accurately.

Build your asset inventory

Create an inventory of information assets within your scope — data, systems, people, processes, and physical assets. Asset ownership must be assigned. This is required by Annex A Control 5.9 and underpins your risk assessment.

Select a certification body

Choose an accredited certification body (CB) early — their specific requirements and preferences vary. Confirming your scope and approach with the CB before you've built your ISMS avoids surprises at audit time. Get quotes from at least two CBs.

Phase 2: Risk assessment and treatment

Phase 2

Risk Assessment & Treatment

Define your risk assessment methodology

Document how you identify, analyze, and evaluate risks. ISO 27001 doesn't mandate a specific methodology — but you must have one, apply it consistently, and document it. Most organizations use a likelihood × impact matrix. Auditors will verify consistency of application.

Identify information security risks

For each asset, identify threats and vulnerabilities that could compromise confidentiality, integrity, or availability. Document the risk owner for each identified risk. This is the core of your ISO 27001 program — everything else flows from it.

Evaluate and prioritize risks

Apply your methodology to score each risk. Determine your risk acceptance criteria — what level of residual risk is acceptable without further treatment. Document risks above your acceptance threshold for treatment.

Produce a Risk Treatment Plan

For each unacceptable risk, document how you'll treat it: mitigate (implement a control), transfer (insurance, contract), avoid (stop the activity), or accept. Map each treatment to the relevant Annex A control. This document links your risks directly to your control selection.

Produce the Statement of Applicability (SoA)

The SoA lists all 93 Annex A controls and states whether each is applicable, why, and its implementation status. Controls you exclude must be justified. The SoA is one of the first documents auditors examine — it must align precisely with your risk assessment.

Obtain risk owner sign-off

Risk owners must formally accept their residual risks. This demonstrates management engagement and satisfies Clause 6.1.3(e). Document the approval with names, dates, and the specific risks accepted.

Phase 3: ISMS documentation

Phase 3

ISMS Documentation

Information Security Policy

A top-level policy signed by senior management stating the organization's commitment to information security, the ISMS objectives, and the framework for setting security objectives. Must be communicated to all staff and available to interested parties.

Supporting policies and procedures

Detailed policies covering the controls in your SoA — access control, acceptable use, cryptography, supplier security, incident management, business continuity, and others as applicable. These must reflect your actual practices, not aspirational ones.

ISMS scope document

A formal document defining the boundaries and applicability of your ISMS — which locations, departments, systems, and services are included and excluded, and why.

Roles and responsibilities

Document information security roles — ISMS owner, risk owners, asset owners, and the information security function. Clause 5.3 requires these to be assigned and communicated. An org chart alone isn't sufficient.

Document control procedure

A procedure describing how ISMS documents are created, reviewed, approved, version-controlled, distributed, and retired. Clause 7.5 requires documented information to be controlled — auditors check that your documents have version numbers, review dates, and approval records.

Internal audit procedure

A documented procedure for planning and conducting internal audits of the ISMS. Must specify audit criteria, scope, frequency, methods, and how findings are reported. Internal audit results are required evidence for Stage 2.

Corrective action procedure

A documented process for identifying nonconformities, determining root causes, implementing corrections, and verifying effectiveness. Required by Clause 10.1 and directly tested during audit when nonconformities are found.

Phase 4: Control implementation

Phase 4

Control Implementation

Implement all controls listed as applicable in your SoA

Deploy and configure the technical and organizational controls you've committed to in your Statement of Applicability. Each control needs documented evidence of implementation — not just a policy saying you do it.

Security awareness training for all staff

Clause 6.3 and Annex A 6.3 require staff to be aware of the information security policy, their contribution to ISMS effectiveness, and the consequences of non-conformance. Document training completion with dates and names.

Supplier/vendor security controls

Annex A Theme 5 includes controls for supplier relationships. Document your supplier inventory, security requirements in contracts, and a process for monitoring supplier compliance. All critical suppliers should have security clauses in their agreements.

Incident management process

Implement and document an information security incident management process covering detection, reporting, assessment, response, recovery, and lessons learned. Annex A 5.26–5.28. Evidence of at least one incident management exercise or real incident handled through the process is expected.

Business continuity and availability controls

If availability is a concern for your scope, implement business continuity planning, backup procedures, and recovery testing. Document recovery time objectives and evidence of backup testing. Annex A 5.29–5.30.

Generate operating evidence

Run your controls for a minimum of three months before your Stage 2 audit. Auditors will pull samples of access reviews, log monitoring, vulnerability scans, patch records, backup tests, and other control evidence. Evidence must be dated and attributable.

ISO 27001:2022 Annex A — the 4 themes and 93 controls

The 2022 revision reorganized Annex A from 14 domains to 4 themes. Here's the structure — every applicable control needs to be addressed in your Statement of Applicability.

Theme Title Controls Key areas
5 Organizational Controls 37 controls Policies, roles, supplier management, incident management, business continuity, compliance
6 People Controls 8 controls Screening, employment terms, awareness, training, disciplinary process, offboarding
7 Physical Controls 14 controls Physical security perimeters, entry controls, clean desk, equipment disposal, cabling
8 Technological Controls 34 controls Access control, authentication, encryption, logging, vulnerability management, secure development, data masking, DLP, monitoring

New in the 2022 revision: 11 new controls were added, including threat intelligence (5.7), information security for cloud services (5.23), ICT readiness for business continuity (5.30), data masking (8.11), data leakage prevention (8.12), web filtering (8.23), and secure coding (8.28). If you're transitioning from the 2013 version, these are the gaps most likely to require new work.

Free Resource
ISO 27001 Interactive Checklist — All 93 Annex A Controls
The fastest implementation path for every control, effort ratings, progress tracking, and a printable PDF — free.
Open the Checklist →

Phase 5: Internal audit and management review

Phase 5

Internal Audit & Management Review

Conduct a full internal audit of the ISMS

Perform at least one complete internal audit covering all clauses and in-scope Annex A controls before your Stage 2 audit. The auditor must be independent of the area being audited. Document the audit plan, findings, and any nonconformities raised.

Close all internal audit nonconformities

Address every finding from the internal audit through your corrective action process — root cause analysis, corrective action, and effectiveness verification. Auditors will check that internal nonconformities were properly resolved, not just noted.

Hold a formal management review

Clause 9.3 requires top management to review the ISMS at planned intervals. The review must cover audit results, risk assessment status, nonconformities, opportunities for improvement, and ISMS objectives. Minutes must be documented and retained.

Update risk assessment if significant changes occurred

If your scope, systems, or threat landscape changed materially during implementation, update your risk assessment to reflect the current state. Auditors compare your risk register to your actual environment — stale risk assessments are a common finding.

Phase 6: Certification audit

Phase 6

Certification Audit

Stage 1 — documentation review

Typically remote, 1–2 days. The certification body auditor reviews your ISMS documentation — scope, risk assessment, SoA, policies, internal audit results, and management review minutes. The goal is to confirm your ISMS is designed correctly and Stage 2 can proceed. Minor issues at Stage 1 can be addressed before Stage 2.

Address Stage 1 findings

Resolve any gaps or observations identified in Stage 1 before Stage 2. Common Stage 1 findings: SoA doesn't align with risk assessment, documented procedures don't match actual practice, management review minutes are too thin.

Stage 2 — full certification audit

On-site (or remote for some CBs), 2–5 days depending on organization size. Auditors interview staff, observe processes, test controls, and pull evidence samples. They're verifying that your ISMS operates as documented. Prepare your team for interviews — everyone from developers to HR may be spoken to.

Address nonconformities

Major nonconformities must be resolved before certification is issued. Minor nonconformities and observations are typically addressed within an agreed timeframe post-certification. Have a clear corrective action process ready to respond quickly.

Certificate issuance

Once the CB is satisfied with your corrective actions, they issue your ISO 27001 certificate. It's valid for 3 years with annual surveillance audits. Add surveillance audit dates to your calendar immediately — missing a surveillance window can result in certificate suspension.

Realistic timeline

Month 1–2

Scoping, gap assessment, CB selection

Define your ISMS scope, run a gap assessment against all clauses and Annex A, build your asset inventory, and get quotes from certification bodies. Select your CB and confirm scope with them before starting full implementation.

4–8 weeks
Month 2–4

Risk assessment and documentation

Complete your risk assessment methodology, identify and evaluate risks, produce your Risk Treatment Plan and Statement of Applicability. Write the mandatory documented procedures and policies. This phase produces the paperwork auditors review first.

6–10 weeks
Month 4–8

Control implementation and ISMS operation

Implement your selected Annex A controls, run security awareness training, establish operating procedures, and generate evidence. The ISMS must operate for at least 3 months before Stage 2 — this is often the longest phase for organizations with significant technical gaps.

3–6 months minimum
Month 8–10

Internal audit and management review

Complete a full internal audit of the ISMS, close all findings through your corrective action process, and hold a management review. These are prerequisites for Stage 2 — auditors will ask for the records.

3–5 weeks
Month 10–12

Stage 1 and Stage 2 certification audit

Stage 1 documentation review, address any findings, then Stage 2 full certification audit. Address any nonconformities raised. Certificate issued once CB is satisfied. Total audit process typically 4–8 weeks from Stage 1 to certificate.

4–8 weeks

Cost breakdown

ISO 27001 costs vary significantly based on organization size, current security maturity, and whether you use consultants. Here are realistic ranges for most mid-sized organizations:

Cost CategoryTypical Range
Gap assessment Internal or consultant-led; produces your implementation roadmap $3,000–$15,000
ISMS consulting Implementation support, documentation, risk assessment methodology $10,000–$60,000
Internal staff time Security, IT, compliance, legal — across 6–12 months $10,000–$40,000
Technology and tooling GRC platform, vulnerability scanning, access management tools $5,000–$25,000/yr
Staff training Security awareness platform, ISO 27001 lead implementer training $2,000–$10,000
Certification body audit fee (Stage 1 + Stage 2) Varies by CB and organization size — get multiple quotes $15,000–$50,000
Annual surveillance audits (Years 1 & 2) Smaller scope than initial audit — budget separately $8,000–$20,000/yr
Total — first year to certification $30,000–$150,000

ISO 27001 vs SOC 2 cost comparison: ISO 27001 is generally less expensive than SOC 2 Type II for the initial certification, mainly because there's no observation period requirement — you can certify as soon as your ISMS is operating and audited. However, the annual surveillance audit cost is ongoing. For a detailed comparison of which is right for your organization, see our ISO 27001 vs SOC 2 guide.

Find out where your gaps are before you start

Run a free gap assessment to see which ISO 27001 controls you're missing and get a realistic picture of what implementation will take.

Start Free Assessment →

Frequently asked questions

ISO 27001 certification typically takes 6–12 months from starting your gap assessment to receiving your certificate. The breakdown: 1–2 months for gap assessment and scoping, 3–6 months for ISMS implementation and control deployment, at least 3 months running the ISMS before the Stage 2 audit, and 4–8 weeks for the audit process itself. Organizations with mature existing security programs can move faster; those building from scratch take longer.

ISO 27001 total costs typically range from $30,000 to $150,000 for most organizations. The certification body audit fee runs $15,000–$50,000 depending on organization size. Implementation costs — gap assessment, consulting, tooling, and documentation — add $15,000–$100,000 depending on how much work is needed. Annual surveillance audits cost $8,000–$20,000. The 3-year recertification audit is similar to the initial certification cost.

The Statement of Applicability is a required ISO 27001 document that lists all 93 Annex A controls and states for each one whether it is applicable to your organization and, if so, whether it is implemented. For controls you've excluded, you must justify why. The SoA is one of the first documents auditors review and must align precisely with your risk assessment and risk treatment plan. It's the central document connecting your risks to your controls.

ISO 27001 requires several mandatory documents: an Information Security Policy, a Risk Assessment methodology and results, a Risk Treatment Plan, a Statement of Applicability, an Internal Audit Program and results, a Management Review record, and documented evidence of control operation. Clause 7.5 specifies that documented information must be controlled — meaning you need version control and access management for your ISMS documents.

Annex A is a reference set of 93 information security controls organized into 4 themes: Organizational controls (37), People controls (8), Physical controls (14), and Technological controls (34). These controls were updated in the 2022 revision. You don't have to implement all 93 — your risk assessment determines which are applicable. But you must justify any exclusions in your Statement of Applicability.

Stage 1 is a documentation review — typically done remotely — where the auditor assesses whether your ISMS is designed correctly and you're ready for the full audit. It usually takes 1–2 days. Stage 2 is the full certification audit where auditors visit your sites, interview staff, test controls, and verify operating evidence. It typically takes 2–5 days depending on organization size. Nonconformities found in Stage 2 must be addressed before your certificate is issued.

ISO 27001 certification is valid for 3 years, with annual surveillance audits in years 1 and 2, and a full recertification audit in year 3. Surveillance audits are smaller in scope than the initial certification — they verify your ISMS is still operating and that you're addressing nonconformities and continual improvement. Budget for annual surveillance costs of $8,000–$20,000 in addition to your initial certification investment.

Not strictly required, but most organizations benefit significantly from consulting help for their first ISO 27001 certification. The standard's language is abstract — translating clause requirements into practical controls takes experience. A consultant helps with ISMS design, risk assessment methodology, documentation structure, and audit preparation. Expect to pay $150–$300/hour for experienced ISO 27001 consultants. For organizations with strong internal security expertise, self-implementation is feasible but slower.