Cet article est actuellement disponible en anglais uniquement. Traduction à venir.
Fait partie de notre série Compliance & Regulation
Lire le guide completISO 27001 for Tech Companies: Information Security Management
ISO 27001 certification has become the global language of trust for information security. In 2025, the number of ISO 27001 certified organizations worldwide exceeded 70,000 --- a 25% increase from 2023. For technology companies selling into enterprise markets, particularly in Europe, Asia, and government sectors, ISO 27001 is often a non-negotiable requirement.
Unlike SOC2 (which is predominantly a North American standard), ISO 27001 is recognized in virtually every country. It provides a systematic framework for managing information security risks through an Information Security Management System (ISMS) that covers people, processes, and technology.
Key Takeaways
- ISO 27001 requires a formal ISMS with defined scope, risk assessment methodology, and continuous improvement cycle
- The 2022 revision reduced Annex A controls from 114 to 93 and organized them into four themes: organizational, people, physical, and technological
- Certification requires an accredited audit body and involves two stages: documentation review and operational assessment
- ISO 27001 shares 60-70% control overlap with SOC2, making dual certification highly efficient
Understanding the ISMS Framework
An Information Security Management System is not a product or a tool --- it is a management framework that governs how your organization identifies, assesses, and treats information security risks.
ISMS Core Components
The ISMS follows the Plan-Do-Check-Act (PDCA) cycle:
Plan. Define the ISMS scope, establish the security policy, conduct risk assessment, select controls, and produce the Statement of Applicability (SoA).
Do. Implement the controls, execute the risk treatment plan, conduct training, and manage operations.
Check. Monitor and measure controls, conduct internal audits, perform management reviews, and track incidents.
Act. Take corrective actions, implement improvements, update risk assessments, and refine the ISMS based on lessons learned.
ISO 27001 Clauses (Mandatory Requirements)
| Clause | Title | What It Requires | |--------|-------|-----------------| | 4 | Context of the organization | Define scope, interested parties, and internal/external issues | | 5 | Leadership | Management commitment, security policy, organizational roles | | 6 | Planning | Risk assessment methodology, risk treatment plan, security objectives | | 7 | Support | Resources, competence, awareness, communication, documented information | | 8 | Operation | Operational planning, risk assessment execution, risk treatment | | 9 | Performance evaluation | Monitoring, internal audit, management review | | 10 | Improvement | Nonconformity handling, corrective action, continual improvement |
These clauses are mandatory --- you cannot exclude any of them. They define the management system itself, while Annex A provides the control catalog you select from.
Annex A Controls: The 2022 Revision
The 2022 revision of ISO 27001 (ISO 27001:2022) reorganized the control catalog from 14 domains with 114 controls to 4 themes with 93 controls. The controls were consolidated, updated for modern threats, and 11 new controls were added.
ISO 27001 Domains with Key Controls
| Theme | # Controls | Key Controls | |-------|-----------|-------------| | Organizational (37) | 37 | Information security policies, roles and responsibilities, threat intelligence, asset management, access control policy, supplier relationships, incident management, business continuity, legal compliance | | People (8) | 8 | Screening, terms of employment, security awareness/training, disciplinary process, responsibilities after termination, confidentiality agreements, remote working, information security event reporting | | Physical (14) | 14 | Physical security perimeter, physical entry controls, securing offices/facilities, monitoring, equipment protection, secure disposal, clear desk/screen, cabling security, equipment maintenance | | Technological (34) | 34 | Endpoint devices, privileged access, access restriction, secure authentication, capacity management, malware protection, vulnerability management, configuration management, data deletion, data masking, DLP, monitoring, network security, web filtering, cryptography, secure development, testing security, change management, separation of environments |
New Controls in 2022
| New Control | Description | Why It Was Added | |------------|-------------|-----------------| | A.5.7 | Threat intelligence | Proactive threat identification | | A.5.23 | Cloud services security | Cloud adoption prevalence | | A.5.30 | ICT readiness for business continuity | IT-specific BC planning | | A.7.4 | Physical security monitoring | CCTV and physical monitoring | | A.8.9 | Configuration management | Baseline configurations | | A.8.10 | Information deletion | Data lifecycle management | | A.8.11 | Data masking | Privacy protection | | A.8.12 | Data leakage prevention | DLP tools and processes | | A.8.16 | Monitoring activities | Security monitoring and SIEM | | A.8.23 | Web filtering | URL and content filtering | | A.8.28 | Secure coding | Secure development practices |
Risk Assessment Methodology
Risk assessment is the heart of ISO 27001. Unlike prescriptive frameworks like PCI-DSS, ISO 27001 lets you define your own risk assessment methodology and select controls based on your specific risk profile.
Building Your Risk Assessment Process
Step 1: Asset identification. Inventory all information assets: data, systems, applications, people, infrastructure, and third-party services.
Step 2: Threat identification. For each asset, identify potential threats: cyberattacks, insider threats, natural disasters, system failures, human error, vendor failures.
Step 3: Vulnerability assessment. Identify weaknesses that threats could exploit: unpatched software, weak authentication, lack of encryption, insufficient training.
Step 4: Risk evaluation. Calculate risk using your defined methodology. A common approach:
| Likelihood | Impact: Low (1) | Impact: Medium (2) | Impact: High (3) | Impact: Critical (4) | |-----------|-----------------|-------------------|-------------------|---------------------| | Rare (1) | 1 - Accept | 2 - Accept | 3 - Monitor | 4 - Monitor | | Unlikely (2) | 2 - Accept | 4 - Monitor | 6 - Treat | 8 - Treat | | Possible (3) | 3 - Monitor | 6 - Treat | 9 - Treat | 12 - Treat urgently | | Likely (4) | 4 - Monitor | 8 - Treat | 12 - Treat urgently | 16 - Treat urgently |
Step 5: Risk treatment. For each risk above your acceptable threshold, choose a treatment: mitigate (implement controls), transfer (insurance, outsourcing), avoid (stop the activity), or accept (with documented justification).
Step 6: Document everything. Your risk register, risk assessment methodology, risk treatment plan, and residual risk acceptance must all be documented and reviewed regularly.
Statement of Applicability (SoA)
The Statement of Applicability is one of the most important ISO 27001 documents. It lists all 93 Annex A controls, indicates whether each is applicable or excluded, and provides justification for exclusions.
Creating an Effective SoA
For each Annex A control, document:
- Control reference and title (e.g., A.8.5 Secure authentication)
- Applicable or excluded with justification for exclusion
- Implementation status (implemented, partially implemented, planned)
- Implementation description (how the control is implemented in your organization)
- Reference to supporting documentation (policies, procedures, technical configurations)
Common Exclusions for Tech Companies
- Physical security perimeter (A.7.1-7.2): If you are fully remote/cloud-based with no physical office, some physical controls may not apply. However, you must still address endpoint security and remote working controls.
- Equipment maintenance (A.7.13): If all infrastructure is cloud-based (AWS, GCP, Azure), physical equipment maintenance is the cloud provider's responsibility. Document this as an inherited control.
- Cabling security (A.7.12): Similarly, cloud-only companies may exclude physical cabling controls, but network security controls remain applicable.
Auditors will scrutinize exclusions carefully. Only exclude controls that genuinely do not apply to your context, and always document clear justifications.
The Certification Process
ISO 27001 certification requires an audit by an accredited certification body. The process involves two stages.
Stage 1 Audit: Documentation Review
The Stage 1 audit is a desk-based review of your ISMS documentation:
- ISMS scope definition
- Information security policy
- Risk assessment methodology and results
- Risk treatment plan
- Statement of Applicability
- Internal audit reports
- Management review minutes
The auditor assesses whether your documentation is complete and your ISMS is designed appropriately. They will identify any major gaps that must be addressed before Stage 2.
Timeline: Typically 1-2 days on-site or remote. Results provided within 1-2 weeks.
Stage 2 Audit: Operational Assessment
The Stage 2 audit evaluates whether your ISMS is operating effectively:
- Interviews with process owners and staff to verify awareness and implementation
- Evidence sampling to verify controls are operating as documented
- Technical verification of security configurations, access controls, and monitoring
- Observation of operational processes (incident handling, change management)
- Nonconformity identification where controls are missing, ineffective, or undocumented
Timeline: 3-10 days depending on organization size. Nonconformities must be resolved within 90 days.
After Certification
ISO 27001 certification is valid for three years, with surveillance audits in years 1 and 2:
| Year | Audit Type | Scope | Duration | |------|-----------|-------|----------| | Year 0 | Certification (Stage 1 + 2) | Full ISMS | 4-12 days | | Year 1 | Surveillance | Selected controls + major changes | 2-4 days | | Year 2 | Surveillance | Selected controls + remaining areas | 2-4 days | | Year 3 | Recertification | Full ISMS (mini Stage 1 + 2) | 3-8 days |
ISO 27001 and SOC2: Building Synergy
For companies that need both certifications, the control overlap is substantial. Implementing ISO 27001 first gives you a 60-70% head start on SOC2, and vice versa.
Overlap Areas
| ISO 27001 Control | SOC2 Criteria | Shared Requirement | |-------------------|--------------|-------------------| | A.5.1 Policies for information security | CC1.1 COSO Principle 1 | Security policy documentation | | A.5.15-5.18 Access control | CC6.1-CC6.3 | Access management, MFA, least privilege | | A.5.24-5.28 Incident management | CC7.3-CC7.5 | Incident detection, response, communication | | A.6.1-6.5 People controls | CC1.4 | Background checks, training, offboarding | | A.8.8 Vulnerability management | CC7.1 | Vulnerability scanning, patching | | A.8.25-8.27 Secure development | CC8.1 | Change management, code review, testing | | A.5.29-5.30 Business continuity | A1.1-A1.3 | DR planning, backup, recovery testing |
For detailed SOC2 guidance, see our SOC2 Type II readiness guide. For the broader compliance landscape, refer to our enterprise compliance handbook.
Frequently Asked Questions
How long does ISO 27001 certification take?
From decision to certification, expect 12-18 months for a first-time implementation. This includes 3-4 months for gap analysis and planning, 4-6 months for control implementation and documentation, 2-3 months for the ISMS to operate (generating evidence), and 2-3 months for internal audit, management review, and external certification audit.
What does ISO 27001 certification cost?
Total first-year costs typically range from $40,000 to $400,000 depending on company size, complexity, and whether you use consultants. Key cost components include consulting ($15,000-$100,000), audit fees ($8,000-$50,000), tooling ($5,000-$30,000/year), and internal labor (the largest variable). Annual maintenance costs (surveillance audits, tool licenses, training) are typically 30-40% of the first-year investment.
Is ISO 27001 required by law?
ISO 27001 is not legally mandated in most jurisdictions. However, it is effectively mandatory in several contexts: many government procurement processes require it, enterprise customers include it in vendor requirements, and some industry regulations (NIS2 in the EU, APRA CPS 234 in Australia) reference ISO 27001 as a recognized framework. In practice, market pressure often makes it a business necessity.
Can a small startup get ISO 27001 certified?
Yes. ISO 27001 scales to any organization size. The ISMS scope can be tailored to your operations, and the risk-based approach means controls are proportionate to your risk profile. Small companies with simple infrastructure may complete certification in 9-12 months. The key advantage for startups is that building an ISMS early creates security culture before technical debt accumulates.
What is the difference between ISO 27001 and ISO 27002?
ISO 27001 is the certification standard --- it defines the requirements for an ISMS. ISO 27002 is the guidance standard --- it provides detailed implementation guidance for each Annex A control. You certify against ISO 27001, and you use ISO 27002 as a reference when implementing controls. Think of ISO 27001 as the "what" and ISO 27002 as the "how."
What Is Next
ISO 27001 is more than a certificate on your wall --- it is a management system that drives continuous security improvement. The structured approach to risk management, combined with regular audits and management reviews, creates a security-mature organization that can adapt to evolving threats and regulatory requirements.
ECOSIRE helps technology companies design and implement ISO 27001-compliant information security management systems. Our Odoo ERP implementations include built-in access controls, audit trails, and change management workflows that align with Annex A requirements. For AI-powered security monitoring and risk assessment, explore our OpenClaw AI platform. Contact us to start your ISO 27001 journey.
Published by ECOSIRE — helping businesses scale with AI-powered solutions across Odoo ERP, Shopify eCommerce, and OpenClaw AI.
Rédigé par
ECOSIRE Research and Development Team
Création de produits numériques de niveau entreprise chez ECOSIRE. Partage d'analyses sur les intégrations Odoo, l'automatisation e-commerce et les solutions d'entreprise propulsées par l'IA.
Articles connexes
API Security Best Practices: Authentication, Authorization & Rate Limiting
Master API security with OAuth2, JWT best practices, RBAC vs ABAC, input validation, rate limiting, and OWASP API Top 10 defenses for business applications.
Audit Trail Requirements: Building Compliance-Ready ERP Systems
Complete guide to audit trail requirements for ERP systems covering what to log, immutable storage, retention by regulation, and Odoo implementation patterns.
Breach Notification & Incident Response: A Step-by-Step Playbook
Complete incident response playbook with breach notification timelines by regulation, communication templates, forensics fundamentals, and post-incident review.
Plus de Compliance & Regulation
Audit Trail Requirements: Building Compliance-Ready ERP Systems
Complete guide to audit trail requirements for ERP systems covering what to log, immutable storage, retention by regulation, and Odoo implementation patterns.
Breach Notification & Incident Response: A Step-by-Step Playbook
Complete incident response playbook with breach notification timelines by regulation, communication templates, forensics fundamentals, and post-incident review.
Carbon Footprint Tracking for Manufacturers: Scope 1, 2 & 3 Emissions
How manufacturers can measure and reduce carbon emissions across Scope 1, 2, and 3 with practical tracking methods, emission factors, and reporting frameworks.
Contract Lifecycle Management: Renewals, Amendments & Compliance
Master contract lifecycle management with automated renewals, amendment tracking, compliance monitoring, and Odoo CLM integration for B2B operations.
Data Privacy Across Regions: CCPA, PDPA, LGPD & PIPEDA Compared
Side-by-side comparison of five major global privacy laws including GDPR, CCPA, PDPA, LGPD, and PIPEDA covering scope, consent, rights, and penalties.
Data Residency & Localization: Where Your Data Lives Matters
Complete guide to data residency and localization requirements covering country-specific rules, cloud region selection, data sovereignty, and transfer mechanisms.