What ISO 27001 actually requires
ISO 27001 is the international standard for Information Security Management Systems (ISMS). Unlike SOC 2, which is an audit attestation, ISO 27001 is a certification — a formal, accredited certificate issued by a third-party certification body that your ISMS meets the standard.
The standard has two parts. Clauses 4–10 define the management system requirements — how you govern, plan, operate, and improve your ISMS. Annex A provides 93 reference controls organized across 4 themes that you select based on your risk assessment. You don't implement all 93 — you implement the ones your risks require, and justify any exclusions.
The most important thing to understand about ISO 27001: it's a management system standard, not a technical controls checklist. Auditors are verifying that you have a systematic, documented approach to identifying and managing information security risks — not just that you have MFA enabled. The process matters as much as the controls.
This guide covers the 2022 revision of ISO 27001 (ISO/IEC 27001:2022), which restructured Annex A from 114 controls across 14 domains to 93 controls across 4 themes. If you're currently certified under the 2013 version, your next surveillance or recertification audit will transition to the 2022 edition.
If you're deciding between ISO 27001 and SOC 2, see our ISO 27001 vs SOC 2 comparison first — the choice matters before you invest in either.
Phase 1: Scope definition and gap assessment
Scope & Gap Assessment
Document which parts of your organization, systems, locations, and services are in scope. Scope can be the entire company or a defined subset — but it must honestly reflect where sensitive information lives. Auditors will verify your scope boundary is real.
Document who has a stake in your information security — customers, regulators, employees, suppliers — and what they require. This satisfies Clause 4.2 and shapes your ISMS objectives.
Assess your current state against every ISO 27001 requirement. Document what's in place, what's partial, and what's missing entirely. This gap list becomes your implementation roadmap and helps you estimate effort and timeline accurately.
Create an inventory of information assets within your scope — data, systems, people, processes, and physical assets. Asset ownership must be assigned. This is required by Annex A Control 5.9 and underpins your risk assessment.
Choose an accredited certification body (CB) early — their specific requirements and preferences vary. Confirming your scope and approach with the CB before you've built your ISMS avoids surprises at audit time. Get quotes from at least two CBs.
Phase 2: Risk assessment and treatment
Risk Assessment & Treatment
Document how you identify, analyze, and evaluate risks. ISO 27001 doesn't mandate a specific methodology — but you must have one, apply it consistently, and document it. Most organizations use a likelihood × impact matrix. Auditors will verify consistency of application.
For each asset, identify threats and vulnerabilities that could compromise confidentiality, integrity, or availability. Document the risk owner for each identified risk. This is the core of your ISO 27001 program — everything else flows from it.
Apply your methodology to score each risk. Determine your risk acceptance criteria — what level of residual risk is acceptable without further treatment. Document risks above your acceptance threshold for treatment.
For each unacceptable risk, document how you'll treat it: mitigate (implement a control), transfer (insurance, contract), avoid (stop the activity), or accept. Map each treatment to the relevant Annex A control. This document links your risks directly to your control selection.
The SoA lists all 93 Annex A controls and states whether each is applicable, why, and its implementation status. Controls you exclude must be justified. The SoA is one of the first documents auditors examine — it must align precisely with your risk assessment.
Risk owners must formally accept their residual risks. This demonstrates management engagement and satisfies Clause 6.1.3(e). Document the approval with names, dates, and the specific risks accepted.
Phase 3: ISMS documentation
ISMS Documentation
A top-level policy signed by senior management stating the organization's commitment to information security, the ISMS objectives, and the framework for setting security objectives. Must be communicated to all staff and available to interested parties.
Detailed policies covering the controls in your SoA — access control, acceptable use, cryptography, supplier security, incident management, business continuity, and others as applicable. These must reflect your actual practices, not aspirational ones.
A formal document defining the boundaries and applicability of your ISMS — which locations, departments, systems, and services are included and excluded, and why.
Document information security roles — ISMS owner, risk owners, asset owners, and the information security function. Clause 5.3 requires these to be assigned and communicated. An org chart alone isn't sufficient.
A procedure describing how ISMS documents are created, reviewed, approved, version-controlled, distributed, and retired. Clause 7.5 requires documented information to be controlled — auditors check that your documents have version numbers, review dates, and approval records.
A documented procedure for planning and conducting internal audits of the ISMS. Must specify audit criteria, scope, frequency, methods, and how findings are reported. Internal audit results are required evidence for Stage 2.
A documented process for identifying nonconformities, determining root causes, implementing corrections, and verifying effectiveness. Required by Clause 10.1 and directly tested during audit when nonconformities are found.
Phase 4: Control implementation
Control Implementation
Deploy and configure the technical and organizational controls you've committed to in your Statement of Applicability. Each control needs documented evidence of implementation — not just a policy saying you do it.
Clause 6.3 and Annex A 6.3 require staff to be aware of the information security policy, their contribution to ISMS effectiveness, and the consequences of non-conformance. Document training completion with dates and names.
Annex A Theme 5 includes controls for supplier relationships. Document your supplier inventory, security requirements in contracts, and a process for monitoring supplier compliance. All critical suppliers should have security clauses in their agreements.
Implement and document an information security incident management process covering detection, reporting, assessment, response, recovery, and lessons learned. Annex A 5.26–5.28. Evidence of at least one incident management exercise or real incident handled through the process is expected.
If availability is a concern for your scope, implement business continuity planning, backup procedures, and recovery testing. Document recovery time objectives and evidence of backup testing. Annex A 5.29–5.30.
Run your controls for a minimum of three months before your Stage 2 audit. Auditors will pull samples of access reviews, log monitoring, vulnerability scans, patch records, backup tests, and other control evidence. Evidence must be dated and attributable.
ISO 27001:2022 Annex A — the 4 themes and 93 controls
The 2022 revision reorganized Annex A from 14 domains to 4 themes. Here's the structure — every applicable control needs to be addressed in your Statement of Applicability.
| Theme | Title | Controls | Key areas |
|---|---|---|---|
| 5 | Organizational Controls | 37 controls | Policies, roles, supplier management, incident management, business continuity, compliance |
| 6 | People Controls | 8 controls | Screening, employment terms, awareness, training, disciplinary process, offboarding |
| 7 | Physical Controls | 14 controls | Physical security perimeters, entry controls, clean desk, equipment disposal, cabling |
| 8 | Technological Controls | 34 controls | Access control, authentication, encryption, logging, vulnerability management, secure development, data masking, DLP, monitoring |
New in the 2022 revision: 11 new controls were added, including threat intelligence (5.7), information security for cloud services (5.23), ICT readiness for business continuity (5.30), data masking (8.11), data leakage prevention (8.12), web filtering (8.23), and secure coding (8.28). If you're transitioning from the 2013 version, these are the gaps most likely to require new work.
Phase 5: Internal audit and management review
Internal Audit & Management Review
Perform at least one complete internal audit covering all clauses and in-scope Annex A controls before your Stage 2 audit. The auditor must be independent of the area being audited. Document the audit plan, findings, and any nonconformities raised.
Address every finding from the internal audit through your corrective action process — root cause analysis, corrective action, and effectiveness verification. Auditors will check that internal nonconformities were properly resolved, not just noted.
Clause 9.3 requires top management to review the ISMS at planned intervals. The review must cover audit results, risk assessment status, nonconformities, opportunities for improvement, and ISMS objectives. Minutes must be documented and retained.
If your scope, systems, or threat landscape changed materially during implementation, update your risk assessment to reflect the current state. Auditors compare your risk register to your actual environment — stale risk assessments are a common finding.
Phase 6: Certification audit
Certification Audit
Typically remote, 1–2 days. The certification body auditor reviews your ISMS documentation — scope, risk assessment, SoA, policies, internal audit results, and management review minutes. The goal is to confirm your ISMS is designed correctly and Stage 2 can proceed. Minor issues at Stage 1 can be addressed before Stage 2.
Resolve any gaps or observations identified in Stage 1 before Stage 2. Common Stage 1 findings: SoA doesn't align with risk assessment, documented procedures don't match actual practice, management review minutes are too thin.
On-site (or remote for some CBs), 2–5 days depending on organization size. Auditors interview staff, observe processes, test controls, and pull evidence samples. They're verifying that your ISMS operates as documented. Prepare your team for interviews — everyone from developers to HR may be spoken to.
Major nonconformities must be resolved before certification is issued. Minor nonconformities and observations are typically addressed within an agreed timeframe post-certification. Have a clear corrective action process ready to respond quickly.
Once the CB is satisfied with your corrective actions, they issue your ISO 27001 certificate. It's valid for 3 years with annual surveillance audits. Add surveillance audit dates to your calendar immediately — missing a surveillance window can result in certificate suspension.
Realistic timeline
Scoping, gap assessment, CB selection
Define your ISMS scope, run a gap assessment against all clauses and Annex A, build your asset inventory, and get quotes from certification bodies. Select your CB and confirm scope with them before starting full implementation.
4–8 weeksRisk assessment and documentation
Complete your risk assessment methodology, identify and evaluate risks, produce your Risk Treatment Plan and Statement of Applicability. Write the mandatory documented procedures and policies. This phase produces the paperwork auditors review first.
6–10 weeksControl implementation and ISMS operation
Implement your selected Annex A controls, run security awareness training, establish operating procedures, and generate evidence. The ISMS must operate for at least 3 months before Stage 2 — this is often the longest phase for organizations with significant technical gaps.
3–6 months minimumInternal audit and management review
Complete a full internal audit of the ISMS, close all findings through your corrective action process, and hold a management review. These are prerequisites for Stage 2 — auditors will ask for the records.
3–5 weeksStage 1 and Stage 2 certification audit
Stage 1 documentation review, address any findings, then Stage 2 full certification audit. Address any nonconformities raised. Certificate issued once CB is satisfied. Total audit process typically 4–8 weeks from Stage 1 to certificate.
4–8 weeksCost breakdown
ISO 27001 costs vary significantly based on organization size, current security maturity, and whether you use consultants. Here are realistic ranges for most mid-sized organizations:
| Cost Category | Typical Range |
|---|---|
| Gap assessment Internal or consultant-led; produces your implementation roadmap | $3,000–$15,000 |
| ISMS consulting Implementation support, documentation, risk assessment methodology | $10,000–$60,000 |
| Internal staff time Security, IT, compliance, legal — across 6–12 months | $10,000–$40,000 |
| Technology and tooling GRC platform, vulnerability scanning, access management tools | $5,000–$25,000/yr |
| Staff training Security awareness platform, ISO 27001 lead implementer training | $2,000–$10,000 |
| Certification body audit fee (Stage 1 + Stage 2) Varies by CB and organization size — get multiple quotes | $15,000–$50,000 |
| Annual surveillance audits (Years 1 & 2) Smaller scope than initial audit — budget separately | $8,000–$20,000/yr |
| Total — first year to certification | $30,000–$150,000 |
ISO 27001 vs SOC 2 cost comparison: ISO 27001 is generally less expensive than SOC 2 Type II for the initial certification, mainly because there's no observation period requirement — you can certify as soon as your ISMS is operating and audited. However, the annual surveillance audit cost is ongoing. For a detailed comparison of which is right for your organization, see our ISO 27001 vs SOC 2 guide.
Find out where your gaps are before you start
Run a free gap assessment to see which ISO 27001 controls you're missing and get a realistic picture of what implementation will take.
Start Free Assessment →Frequently asked questions
ISO 27001 certification typically takes 6–12 months from starting your gap assessment to receiving your certificate. The breakdown: 1–2 months for gap assessment and scoping, 3–6 months for ISMS implementation and control deployment, at least 3 months running the ISMS before the Stage 2 audit, and 4–8 weeks for the audit process itself. Organizations with mature existing security programs can move faster; those building from scratch take longer.
ISO 27001 total costs typically range from $30,000 to $150,000 for most organizations. The certification body audit fee runs $15,000–$50,000 depending on organization size. Implementation costs — gap assessment, consulting, tooling, and documentation — add $15,000–$100,000 depending on how much work is needed. Annual surveillance audits cost $8,000–$20,000. The 3-year recertification audit is similar to the initial certification cost.
The Statement of Applicability is a required ISO 27001 document that lists all 93 Annex A controls and states for each one whether it is applicable to your organization and, if so, whether it is implemented. For controls you've excluded, you must justify why. The SoA is one of the first documents auditors review and must align precisely with your risk assessment and risk treatment plan. It's the central document connecting your risks to your controls.
ISO 27001 requires several mandatory documents: an Information Security Policy, a Risk Assessment methodology and results, a Risk Treatment Plan, a Statement of Applicability, an Internal Audit Program and results, a Management Review record, and documented evidence of control operation. Clause 7.5 specifies that documented information must be controlled — meaning you need version control and access management for your ISMS documents.
Annex A is a reference set of 93 information security controls organized into 4 themes: Organizational controls (37), People controls (8), Physical controls (14), and Technological controls (34). These controls were updated in the 2022 revision. You don't have to implement all 93 — your risk assessment determines which are applicable. But you must justify any exclusions in your Statement of Applicability.
Stage 1 is a documentation review — typically done remotely — where the auditor assesses whether your ISMS is designed correctly and you're ready for the full audit. It usually takes 1–2 days. Stage 2 is the full certification audit where auditors visit your sites, interview staff, test controls, and verify operating evidence. It typically takes 2–5 days depending on organization size. Nonconformities found in Stage 2 must be addressed before your certificate is issued.
ISO 27001 certification is valid for 3 years, with annual surveillance audits in years 1 and 2, and a full recertification audit in year 3. Surveillance audits are smaller in scope than the initial certification — they verify your ISMS is still operating and that you're addressing nonconformities and continual improvement. Budget for annual surveillance costs of $8,000–$20,000 in addition to your initial certification investment.
Not strictly required, but most organizations benefit significantly from consulting help for their first ISO 27001 certification. The standard's language is abstract — translating clause requirements into practical controls takes experience. A consultant helps with ISMS design, risk assessment methodology, documentation structure, and audit preparation. Expect to pay $150–$300/hour for experienced ISO 27001 consultants. For organizations with strong internal security expertise, self-implementation is feasible but slower.