ISO 27001 certification

  • An ISO 27001 certification can speed up your sales cycle and boost customer trust
  • The larger your company, the more complex it gets to become certified
  • In this guide we go over every detail you should know before you start
framework_ISO27001_pillar-2

Join 4,000+ companies who are driving their security and compliance objectives with DataGuard

Emitec LogoLifeLink LogoVolki LogoMask groupFreenow LogoAuto-Kabel-LogoHeyjobs LogoLebara Logo

Why ISO 27001 matters

Getting an ISO 27001 certification is the best indicator to suppliers, customers, and stakeholders that you take information security seriously. It’s also a great starting point to set up a robust cybersecurity strategy.

No matter if you’re an SMB or a large-scale corporate, this guide pulls together the most relevant information in one place.

Start your certification journey

What is ISO 27001?

ISO 27001 sets the global standard for an information security management system (ISMS) that helps you establish a framework for keeping information secure. In 2022, the ISO 27001:2013 version was updated to its latest version, ISO 27001:2022.

An ISMS creates a set of rules and processes that help mitigate the damage of a cyber or ransomware attack as well as a security breach, which, nowadays, needs to be on every company's agenda.

The stats speak for themselves: During the third quarter of 2022, a staggering 108.9 million accounts fell victim to breaches, marking a substantial 70% surge compared to the preceding quarter.

Using an ISO 27001-compliant ISMS lets you easily and affordably manage the security of your organization's data. Plus, it makes your customers, investors, and other important stakeholders feel confident that you're following the best global practices for keeping information safe.

ISO 27001 Certification

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis.

You can find more information about the handling of your personal data in our privacy policy.

What is the ISO 27001 certification?

The ISO 27001 certification is granted when you meet the requirements of the ISO 27001 standard. Once you've established your ISMS, an independent accredited certification body conducts an audit and issues a certificate upon successful completion. A certification body is basically an independent institution that can certify companies with the ISO 27001 certificate after successfully passing an external audit.

The certification essentially proves you have taken the appropriate steps to protect your most valuable information. This includes intellectual property, trade secrets, proprietary data, and other valuable assets. While the specific term "intellectual property" may not be used, the principles of information security within the ISO 27000 series standards are designed to encompass various forms of valuable and sensitive information, including intellectual property.

ISO 27001 Certification

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis.

You can find more information about the handling of your personal data in our privacy policy.

How to establish and implement an ISMS?

Establishing and implementing an ISMS, in its simplest form, can be broken down into 4 phases, also known as the PDCA cycle:

  1. Plan: This is the phase in which you establish the ISMS, i.e. get your documentation in check.
  2. Do: The processes and procedures you sketch out in the Plan phase also need to be implemented and tested—this is what happens during the Do phase of the PDCA cycle.
  3. Check: Then you check whether your ISMS aligns with the ISO 27001 standard and identify any gaps. This happens during internal and external audits.
  4. Act: During this phase, you improve the ISMS and close any information security gaps to ensure you can obtain and keep your ISO 27001 certification.
InfosecPathway

Achieve your first ISO 27001 certification in as little as 3 months.


Your ISO 27001 certification process made simple.

Why get an ISO 27001 certification?

The certification is beneficial for a number of reasons. These are the most important ones:

Establishes stakeholder trust

Having an ISO 27001 certificate demonstrates your dedication to safeguarding information and underscores your business's credibility in partners' eyes. This can give you a competitive edge and enhance your brand reputation.

Assists legal compliance

ISO 27001 certification aids in meeting your various business, legal, financial, and regulatory commitments. You can mitigate the likelihood of costly breaches, subsequently reducing the risk of expensive legal consequences and fines.

Secures personal data and intellectual property

The ISO 27001 certification process offers an impartial evaluation of your information security strategy. It could also assist in managing your intellectual property and data sources while creating tangible proof of implementation.

Mitigates costly cyber-related data breaches

Data breaches come with a hefty price tag. In 2023, the average cost of a data breachwas estimated at around $4.45 million (IBM, 2023). The ISO 27001 certification safeguards your information through established procedures and processes, helping you avoid such financial burdens.

Sets the foundation for reducing risk

Risk management is important to keep your business operations running and should be carried out continuously. Yet, setting up a risk management structure from scratch can be immensely time-consuming. ISO 27001 gives you a framework to define the criteria of risk management in your company.

Who needs ISO 27001 certification?

The ISO 27001 certification is relevant for pretty much any business dealing with information and data. It’s not mandatory, yet it’s common practice and often a prerequisite for many business stakeholders. This is because doing business with you without relevant policies and procedures to manage risks could put their information and data at risk.

Industries particularly affected by ransomware and cyberattacks and where ISO 27001 certification is becoming the norm include:

Yet, with the current upward trend of cyber criminality, all businesses—from SMBs to large-scale corporates—need to consider information security. And getting ISO 27001 certified is a clear roadmap to making it a priority.

How hard is it to get ISO 27001 certified?

Getting ISO 27001 isn't easy by default. It does come with its complexities, especially when plenty of stakeholders and complicated processes become involved.

Furthermore, ISO 27001 certification is usually a top-down decision, which means that top management must be involved sooner or later. As a business, you should ensure that you have the right experience within the team to convince decision-makers about the certification and to navigate the whole process.

Here are four tips for a successful ISO 27001 certification:

ISO 27001 Certification

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis.

You can find more information about the handling of your personal data in our privacy policy.

Common pitfalls to avoid when getting an ISO 27001 certification

Since the ISO 27001 standard is designed to be customizable to your organization, there are several instances where businesses could go wrong in their implementation process.

Based on our extensive experience of working with varied clients, we’ve pulled together a list of the most common pitfalls businesses face when implementing the standard, along with advice on what you can do to avoid them.

Not defining the right scope

Finding the right scope for implementing your organization’s ISMS can be tricky. Organizations often set overambitious implementation goals, leading to the adoption of several redundant and unneeded controls and processes.

This can lead to resource wastage, increased cost of information security, and demotivated employees chasing unachievable targets.

On the other hand, an organization may define their scope too narrowly, ignoring controls that are absolutely necessary. This could lead to noncompliance with the ISO 27001 standard and can make it appear that your organization is not in control of its ISMS during the certification audit.

Lack of management

Implementing ISO 27001 controls is often considered to be an IT exercise and the responsibility of the IT department. In reality, it is a management standard for information security. The upper management in an organization may not see the value the implementation of ISO 27001 adds to the business, and they may be hesitant to fully commit.

Too few resources

Often, ISO 27001 implementation falls to a particular individual or team within the organization. This type of approach can create information security silos where only very few individuals are aware of the controls and procedures around the ISMS and other aspects of the standard. The loss of such individuals could cause the collapse of the entire ISMS.

Find out which two other mistakes are common for all businesses and how you can prevent them from happening in our free guide about the most common pitfalls during ISO 27001 certification.

How long does it take to get ISO 27001 certified?

Usually, the process can take 6 to 12 months, depending on business size and complexity. The use of designated solutions like the DataGuard platform can speed up the process to as little as 3 months (also depending on a business’ unique circumstances).

First steps are called the ramp-up phase, where the main chunk of work is done. You carry out a gap analysis that aims to close up to 50% of your company's most significant risks in as little as 8 weeks.

Getting through the process involves:

  • Defining your scope
  • Building your Information Security Management System (ISMS)
  • Identifying and managing risks
  • Protecting your information assets
  • Passing your ISO 27001 audit
  • Maintaining your ISMS, keeping your certificate

Get ISO 27001 certified in as little as 3 months.


Reduce manual work by up to 75%

Does the ISO 27001 certification expire?

The ISO 27001 certification needs to be renewed every 3 years. We recommend remaining compliant to protect your company’s assets and ensure your information remains safe. Furthermore, companies must pass the annual surveillance audit to verify compliance and to avoid expiry of the certification before the three-year cycle.

“If an organization does not pass the surveillance audit conducted by the external auditor, their ISO 27001 certification could potentially expire before the full 3-year term is completed. The surveillance audits are typically conducted annually to ensure ongoing compliance with the ISO 27001 standard. If compliance is not maintained, the certification might not be renewed for the full 3-year period.”

Larissa Bruns

Associate Consultant Tech Practice Professional Services

How do I transition to ISO 27001:2022?

If you already comply with the ISO 27001:2013 certification, you don’t necessarily need a separate audit to transition to the new revision. You can either undergo a standalone transition audit or you can opt for a transition audit at the time of annual surveillance or re-certification. This depends on where you are in the certification lifecycle.

Here is an overview of a typical transition roadmap:

ISO 27001 2022 Transition Roadmap

Complying with the new 2022 standard is bound to save your organization resources and frustrations. This is why we recommend transitioning sooner rather than later. You can gain detailed insights here: DataGuard's expert insights on the ISO 27001:2022 update.

What are the benefits of getting ISO 27001 certified?

The benefits of implementing ISO 27001 are plenty—both for your business and external parties and stakeholders. Here's an overview of the most important ones:

  • Your company or organization can avoid significant financial losses caused by ransomware attacks.
  • Win more deals; having a certified information security system can set you apart from the competition and win trust among prospective buyers.
  • You may be able to secure investment more easily. Investors are becoming more and more aware of the threats ransomware attacks have.
  • Reduced risk of data breaches: By having the proper measures in place, you can avoid the risk of a breach before it even happens.
  • Setting up processes and procedures when it comes to how you handle data can also mean increased operational efficiency. Because now you have a standard process instead of different methods.
  • Customers want to know how you handle their information, and getting ISO 27001 certified is the ultimate promise that you take information security seriously.

Is ISO 27001 compliance sufficient?

If you’re looking to establish an information security management system, ISO 27001 is the ultimate baseline that will cover most businesses' compliance and information security needs. However, you may find yourself in scope of the EU's new NIS2 regulations, which have additional requirements.

What your customers and suppliers require will depend on where your business operates. ISO 27001 is an internationally recognised standard known as the gold standard, regardless of geographic location or industry. If you are unsure, why not have an initial consultation with an information security expert?

ISO 27001 Certification

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis.

You can find more information about the handling of your personal data in our privacy policy.

“DataGuard helped us get ISO 27001 certified 50% faster.”

Reece Couchman

CEO & founder @ The SaaSy People

Getting ISO 27001 certified

Accredited vs. non-accredited certification

As we have learned so far, ISO 27001 certification is not mandatory for businesses. However, it’s recommended to be compliant with the standard. But what’s the difference between being certified and being compliant? In general, you must understand the three ways of communicating the implementation of ISO 27001:

  • ISO 27001 compliant
  • ISO 27001 certified
  • ISO 27001 certified by an officially accredited certification body

The difference is that an independent third certification body validates an accredited certification. A non-accredited certification means you have implemented the ISO standards but have not undergone an external audit, nor have you been issued a certificate for an external certified body.

Often, certain contractual agreements require an official accredited certification. Apart from this, achieving an accredited certification is highly recommended. You can use it in your communications towards customers and have an external assess your information security to ensure your ISMS is in check.

We strongly recommend seeking certification exclusively through accredited bodies. Business partners often do not acknowledge certifications lacking confirmation from an international accreditation body. Read more about accredited bodies here.

What are the certification steps?
What exactly do I need to do
to get ISO 27001 certified?

Conducting a risk assessment

Conducting a risk assessment is not as straightforward as one might think. First of all, there are many different approaches to risk assessments. It’s not necessarily common practice, but scenario-based is the most effective way to access risk. This means considering past occurrences and analyzing risky scenarios that may cause an issue.

The risk assessment consists of the following:

  1. Identify & assess risk
  2. Treat risks—you decide here how you want to address the risks. For example: accept, remediate, transfer, or mitigate.
  3. Review residual risks

A platform like DataGuard can help move you through risk assessments in an efficient way with a tested and proven process. Check out the full article on conducting ISO 27001 risk assessment in 7 steps.

Implementing controls and a risk treatment plan to manage risks

An integral part of your information security program is the risk treatment plan. This plan is all-encompassing and is meant to execute measures to either accept, avoid, transfer, or mitigate the possibility or consequences of risks.

Of utmost importance within a risk treatment plan is the aspect of implementation. Its significance lies in guaranteeing the actual execution of risk treatment procedures.

You can read ISO 27001 risk treatment plan: How to develop the right one here.

Complete your ISMS documentation

Documentation is the basis of your ISMS and the most important part of getting and maintaining your certification. If it's not documented, it's not relevant.

You need to keep track of many things when it comes to documentation. To give you a complete overview of the documentation required for ISO 27001 certification, along with information on preparing said documentation, we have created a detailed list:

Definition of the scope of application of the ISMS (Information Security Management System)

The scope of application of the ISMS is defined in the so-called “Scope Document.” This determines which divisions of your company are subject to the ISMS. Your ISMS doesn’t necessarily need to be rolled out across the entire company—only the relevant departments and divisions. That said, in the case of smaller companies, it will usually cover all departments.

Definition of the scope of application of the ISMS (Information Security Management System)

Coordination and documentation of the guideline on information security

The objectives which your company seeks to achieve with your ISMS should be clearly defined in the guideline on information security. This document should also demonstrate why information security is a top priority in your organization and that management is responsible for the guideline.

This does not have to be formulated by management themselves but must always be approved by the necessary stakeholders. The ISO standard already specifies the following information security objectives:

  • Data confidentiality
  • Data availability
  • Data integrity

Coordination and documentation of the guideline on information security

Definition of risk assessment and risk management methods

You will need to identify your company’s risks, assess them individually, and define an appropriate methodology for risk management. The assessment should always be carried out by the respective risk owner and should ultimately be approved by management.

In addition, this area should be coordinated within the company, ideally with your ISO, CISO, or risk management department. Given that this process must be repeated on a regular basis, it can result in a lot of effort, especially for small and medium-sized enterprises that lack in-house security and risk experts. Repetitions happen when there are new assets in the company that require a risk assessment.

Definition of risk assessment and risk management methods

Preparing a declaration of applicability

As part of this step the ISO/CISO shall agree, with the respective specialist departments, which of the 93 controls stated in Appendix A of ISO 27001:2022 must be carried out or which are relevant for the company.

ISO 27001 has specified various areas such as cryptography, HR security, or operational security. Companies may exclude some of these areas by providing appropriate justification. For example, if a business does not have a loading zone, it is simply not necessary to draw up rules for loading zones.

Preparing a declaration of applicability

If you choose to work with experts such as DataGuard or an external consultant, you may receive documentation templates that will cut down your manual work significantly compared to creating them from scratch.

What is an audit, and why is it important?

An audit is basically the process of checking that your ISMS meets the requirements and criteria of a standard. If you are certifying against ISO 27001, it will be the requirements of the ISO 27001 standard.

Audits ensure the success of your ISMS by identifying information security non-conformities and can be either internal or external. Internal audits can be carried out using the organizations’ own resources—whether that’s internal company employees or contracted independent consultants.

External audits are carried out by a certification body, external partners, or customers who want to assess the ISMS on their own terms. The latter is the exception than the rule—when referring to an external audit, a certification body is meant in most cases.

Audits are incredibly important because they are:

  • A concrete requirement of the ISO 27001 standard
  • The only way of verifying whether you comply with the standard
  • Necessary to obtain your ISO 27001 certification
fränkische-testimonial

External Content: YouTube Video 

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis. 

You can find more information about the handling of your personal data in our privacy policy. 

Conducting internal audits: How to go about it

Internal audits are vital for long-term success in earning and keeping your ISO 27001 certification. They should be carried out on a regular basis by employees within the company, as opposed to external auditors coming into your company to assess your ISMS.

However, independence and qualification are a must for being an internal auditor. Another option is to perform internal audits with external consultants, like the experts at DataGuard, who also offer regular audits. Internal audits are your best bet for catching gaps in your documentation and improving it.

When you are getting certified for the first time, the internal audit ensures you have everything you need in place to pass your certification on the first try.

An internal audit checklist will help you keep an overview of the necessary steps. Here is an overview:

  1. Documentation Review
    • All documentation from the management and control system should be reviewed to ensure that it is complete, accurate, and up-to-date.
    • A team should be assigned to perform this task.
    • The team should be given a clear set of instructions to follow while they are performing the review.
    • The documentation should be examined for completeness, accuracy, consistency, and suitability for its intended purpose.
    • The auditor will then check to see if you have the required documents and that it complies with the standards.
  2. Management Review
    • The management review team should go through the documentation again to make sure that all relevant information has been recorded and that there are no omissions or missing information.
    • Finally, management needs to look over the report and take the audit results into account. Make sure that any essential changes and corrective measures are put into place.

Get a full breakdown of how to conduct an internal audit.

Undergoing external audits: What to expect

You will be in touch with your auditor before the external audit takes place to agree on resources and timelines.

In general, there are four types of external audits:

  • Stage 1 Audit: This is the documentation-review audit, where the external auditor checks if your organization has all the necessary documentation in place for a fully functioning ISMS. Your documents need to cover the documentation required in the ISO/IEC 27001 standard. The certification body will take the time to gain a sufficient understanding of the ISMS design in the context of your organization, risk assessment and treatment (including the controls determined), information security policy and objectives. A large emphasis will also be put on your company's preparedness for the audit. This allows planning for stage 2.
  • Stage 2 Audit: Based on documented findings in Stage 1's audit report, the certification body will develop an audit plan to conduct Stage 2. In addition to evaluating the effective implementation of the ISMS, the aim of Stage 2 is to confirm that your company adheres to its own policies, objectives, and procedures.

To do this, the audit will focus on:

  • Top management leadership and commitment to information security policies and the information security objectives
  • Documentation requirements listed in ISO/IEC 27001
  • Assessment of information security-related risks and that the assessments produce consistent, valid and comparable results if repeated
  • Determination of control objectives and controls based on the information security risk assessment and treatment processes
  • Information security performance and the effectiveness of the ISMS, evaluating against the information security objectives
  • Correspondence between the determined controls, the Statement of Applicability and the results of the information security risk assessment and risk treatment process and the information security policy and objectives
  • Implementation of controls (referring to ISO 27001 Annex A), taking into account the external and internal context
  • And related risks, the organization’s monitoring, measurement, and analysis of information security
  • Processes to determine whether controls are implemented and effective and meet their stated information security objectives
  • Programmes, processes, procedures, records, internal audits, and reviews of the ISMS' effectiveness to ensure that these are traceable to top management decisions and the information security policy and objectives

Once you have completed Stage 2 and passed the audit, you will receive your official certification.

  • Surveillance/periodic Audits: happen between certification and recertification audits, focusing on specific areas of the ISMS. This is done every year.
  • Recertification Audit: This is necessary to keep your certification, covers all aspects of the standard, and must be carried out every 3 years.

How long does it take to get ready for an ISO 27001 external audit?

Depending on the size of your company, you can be audit-ready in about 8 weeks. If you decide to go the manual route of building your documentation from scratch, it can take at least 4 months.

  • 1 to 20 employees: Up to 3 months
  • 20 to 50 employees: 3 to 5 months
  • 50 to 200 employees: 5 to 8 months
  • More than 200 employees: 8 to 20 months

It is also important to take into account several other variables that may affect the time it takes for you to obtain the certification.

  • The number of individuals on the ISMS implementation project (relative to the size of the business)
  • The amount of time individuals are willing to spend on the project
  • Engagement and support from leadership
  • The size of the company and complexity
  • Auditor availability to conduct the external audit

When implementing your ISMS, you may experience unforeseen challenges which may delay certification as well.

2023042_CPM Webinar_The Road to customers hearts and minds_Video Placeholder

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis.

You can find more information about the handling of your personal data in our privacy policy.

What happens if you fail the external audit?

The external auditor will usually give you an indication during your audit whether you are likely to pass or fail. Major nonconformities may lead to a failed external audit. Although this might seem like a major setback, it needs to be seen as an opportunity to improve.

When it comes to the 2022 version of ISO 27001, there are 93 Annex A controls that cover various areas of an organization. These controls are segmented into 4 different categories (domains). Depending on which are relevant for your operations, risks, industry, and customers, you will fulfil the requirements in specific annexes.

You will receive an audit report; this will be your go-to to identify what you need to change in order to pass your next external audit. It is also recommended to speak with the auditors for further clarification on what precisely needs to be improved.

In general, non-conformities are classed as:

  • Major non-conformities
  • Minor non-conformities
  • Opportunities for improvement

There is no direct penalty for not passing an external audit, but not achieving certification may result in improper risk management, reputational damages, and additional financial costs. Preparing thoroughly and undergoing internal audits significantly reduces the risk of failing. If you happen to have failed an audit in the past, we recommend the following:

  • Assessing your audit report
  • Discussing the outcome with the external auditor
  • Communicating the outcomes and reasoning to all relevant stakeholders and ensuring internal alignment
  • Establishing an action plan with prioritized tasks, also sorted by due date and responsible persons
  • Initiating the entire process of setting and improving your ISMS again, ensuring enough relevant resources are available, especially for internal auditing
  • Once the scope of improving your ISMS is clear, set a date for your next external audit

Get ISO 27001 certified in as little as 3 months.


Reduce manual work by up to 75%

What are the ISO 27001 certification requirements?

The main requirements when it comes to the ISO 27001 certification are: documentation, undergoing audits and ensuring your employees adopt the processes.

Documentation includes the creation and maintenance of necessary documentation for your Information Security Management System (ISMS), such as policies, procedures, risk assessments, and controls.

Undergoing audits includes both the Stage 1 Audit, which reviews documentation and readiness, and the Stage 2 Audit, which assesses the practical implementation of your ISMS. Successful completion of these audits is necessary to achieve ISO 27001 certification. You will also be required to undergo internal audits and management reviews.

It's also crucial to communicate the processes effectively This is to ensure that your organization's information security practices align with the ISO 27001 standards. You will need to have the documentation in place but also put the processes into action by ensuring employees are aware of and follow them.

ISO 27001 Certification

In order to be able to play the desired video, you agree that a connection to the servers of YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA is established. This transmits personal data (device and browser information (in particular the IP address and operating system) to the operator of the portal for usage analysis.

You can find more information about the handling of your personal data in our privacy policy.

The mandatory documents required for the ISO 27001 standard are listed below. All criteria must be followed and documented accordingly for an organization to present during external audits. The standard requires you to undergo an internal audit before an external one. This will expose any gaps in your ISMS.

Once you have prepared the documentation and undergone an internal audit as well as a management review, you need to undergo an external audit by a certified body such as the UKAS.

The mandatory documents required for ISO 27001 are:

The costs of ISO 27001 certification

The price or costs for getting ISO 27001 certified depends on many things. These are the most relevant influences on what you will need to invest in your ISO 27001 certification:

  • The level of maturity reflected in the ISMS
  • The range of activities conducted within the defined boundaries of the ISMS
  • The extent of technology utilization across the various parts of the ISMS
  • The degree of external sourcing and engagements with third-party entities covered by the ISMS
  • The difference between the current state and the intended state of the control environment
  • The internal capacity of the organization to enhance the ISMS and address identified deficiencies
  • The requested timeline for getting certified.

This is why we cannot provide a one-size-fits-all answer, but we can give indications that will help establish a budget.

What influences costs when getting ISO 27001 certified?

The cost of getting certified can be broken down into three phases: implementation (of your ISMS), internal auditing, and certification.

Internal costs

These costs can include:

  • Internal staff costs
  • Consultation costs
  • Management resources for reviews and communication
  • Project management and awareness-building resources among staff
  • Software tools to support the establishment of an ISMS

External costs

This generally refers to the auditor's cost; on average, the cost of auditing per day is £1000 — the number of days and whether you will have a remote or on-site audit will impact external costs.

Is the investment worth it?

According to Statista, the global average cost per data breach is USD 4.35 million as of 2022. From a purely financial perspective, if that's a hit your company or organization can easily take, getting ISO certified might not be worth it. But you are likely to incur additional costs later on in lost business and difficulties getting new customers.

Information security is bound to become more and more important and simply shouldn't be ignored. As ransomware and cyberattacks rise year after year, companies realise that a preventive approach might be better than cleaning up the reputational and financial mess once something does happen.

Of course, you will need to take your unique ROI of getting ISO 27001 certified into account. Speaking with an information security expert can give you an idea of what you can expect cost-wise and whether it's worth investing in.

At the same time, how you go about getting certified—e.g., using a process-driven platform backed by experts or hiring a compliance manager in-house—will have a significant impact on just how much you need to invest and whether it will be worth it in the long run.

How to get started with ISO 27001 certification

As you can see, there are plenty of aspects you need to think about when it comes to achieving ISO 27001 certification. But the best time to get started is now. Let your ISMS grow and scale with you.

The recommended and common practice to start your ISO 27001 journey is to:

  • Find a qualified consultant and/or platform to get an initial consultation so you can get clear on the scope, costs and timeline you can expect for your company.
  • Develop a project plan and timeline where all the relevant stakeholders are named.
  • Ensure buy-in from management. Information security needs to be approached holistically to protect the entire company's assets, so have a game plan to get the whole team's green light.
  • Start defining your scope and work your way through the certification steps.

Frequently asked questions

What is the ISO 27001:2022 standard?

What is an ISMS?

What are ISO 27001 controls, and how to go about implementation?

What should I expect from an external audit?