Evergreeniso 27001

What Is ISO 27001? The Global Standard for Information Security Explained

ISO 27001 is the internationally recognized standard for establishing and maintaining an Information Security Management System (ISMS). Learn what ISO 27001 certification requires, how it differs from ISO 27002, and how to achieve it.

By QuickTrust EditorialUpdated 2026-02-28

What Is ISO 27001? The Global Standard for Information Security Explained

ISO 27001 is an internationally recognized information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) that defines the requirements for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS). Unlike SOC 2 — which is primarily recognized in the United States — ISO 27001 is the globally accepted proof of information security maturity, recognized by enterprise customers, government bodies, and procurement teams across Europe, the Middle East, Asia-Pacific, and beyond.


TL;DR — Key Takeaways

  • ISO 27001 is the global gold standard for information security; recognized in over 150 countries
  • It requires building and operating a formal ISMS (Information Security Management System) — a systematic approach to managing sensitive information
  • Annex A contains 93 controls across 4 themes (organizational, people, physical, technological) that you select from based on a risk assessment
  • ISO 27001 certification requires a third-party audit by an accredited certification body (a two-stage process)
  • ISO 27001 is distinct from ISO 27002 — which is guidance on how to implement controls, not a certifiable standard
  • The current version is ISO/IEC 27001:2022, which introduced significant changes from the 2013 version
  • Audit-readiness typically takes 3–12 months; QuickTrust delivers it in 6–10 weeks

Why ISO 27001 Matters

Global Market Access

SOC 2 satisfies US enterprise buyers. But if you sell to customers in the EU, the UK, the Middle East, Australia, or Japan — or if you're dealing with large multinationals with global procurement teams — ISO 27001 certification is often the required proof of security maturity. Many government contracts in the EU require it outright.

A Framework That Forces Real Security

ISO 27001's ISMS framework is risk-driven — it requires you to systematically identify threats, assess risks, select appropriate controls, and continuously monitor and improve. Companies that complete ISO 27001 have demonstrably better security postures, not just better documentation.

Competitive Differentiation at the Enterprise Tier

Among mid-market buyers, ISO 27001 certification signals a level of security commitment that many competitors lack. It is a meaningful differentiator in RFP responses and vendor risk evaluations.


ISO 27001 vs. ISO 27002: What Is the Difference?

This is one of the most common points of confusion in information security compliance.

ISO 27001ISO 27002
PurposeSpecifies ISMS requirementsProvides implementation guidance for controls
Certifiable?Yes — organizations can be ISO 27001 certifiedNo — ISO 27002 is a reference guide, not a certifiable standard
RelationshipReferences Annex A control categoriesElaborates on each Annex A control with detailed implementation guidance
How to useThe requirement your ISMS must meetThe guidance to help you meet Annex A requirements
AudienceSecurity managers, compliance teams, auditorsSecurity practitioners implementing specific controls

In practice: you use ISO 27001 to define your ISMS framework and achieve certification. You use ISO 27002 to understand how to implement the specific Annex A controls well.


What Is an ISMS?

An Information Security Management System (ISMS) is the systematic framework that an organization uses to manage and protect sensitive information. It is not a software product — it is a combination of policies, procedures, controls, people, and processes.

An ISMS covers:

  • The scope of information assets being protected
  • The risk assessment methodology the organization uses
  • The risk treatment plan (which controls are applied and why)
  • A Statement of Applicability (SoA) — a documented record of which Annex A controls apply to your organization and why others are excluded
  • Documented policies, procedures, and work instructions
  • Evidence of control operation (audit logs, training records, review outputs)
  • Management review processes and corrective action mechanisms

The ISO 27001:2022 Annex A Controls

Annex A is the catalogue of security controls from which organizations select their applicable controls based on their risk assessment. ISO 27001:2022 restructured Annex A from 14 domains and 114 controls (2013 version) to 4 themes and 93 controls — including 11 new controls:

ThemeControlsExamples
Organizational (37 controls)Policies, governance, supplier relationships, incidentsInformation security policy, asset management, incident management
People (8 controls)HR security, awareness, trainingBackground verification, security awareness training, disciplinary process
Physical (14 controls)Physical security, equipment, mediaPhysical access controls, clear desk/screen policy, media disposal
Technological (34 controls)Access control, cryptography, logging, developmentAccess management, malware protection, logging and monitoring, SDLC security

The 11 new controls in ISO 27001:2022 include:

  • Threat intelligence
  • Information security for use of cloud services
  • ICT readiness for business continuity
  • Physical security monitoring
  • Configuration management
  • Information deletion
  • Data masking
  • Data leakage prevention
  • Web filtering
  • Secure coding
  • Monitoring activities

Organizations must document a Statement of Applicability (SoA) that lists every Annex A control, explains whether it is applicable to the organization, and if excluded, justifies the exclusion.


The ISO 27001 Certification Process

ISO 27001 certification requires a two-stage audit by an accredited certification body (not just any third party):

Stage 1: Documentation Review

The auditor reviews your ISMS documentation:

  • Scope definition
  • Information security policy
  • Risk assessment and risk treatment plan
  • Statement of Applicability
  • Key procedures and policies

Stage 1 identifies any major non-conformities that must be resolved before Stage 2 and typically takes 1–2 days on-site or remote.

Stage 2: Certification Audit

The auditor assesses whether your ISMS is operating effectively in practice — not just on paper. This involves:

  • Interviewing key personnel
  • Testing samples of control evidence
  • Walking through your risk assessment process
  • Reviewing incident records, audit logs, training completion data, supplier assessments

Upon successful completion, the certification body issues an ISO 27001 certificate valid for 3 years, subject to annual surveillance audits.

Surveillance Audits (Years 1 and 2)

Annual surveillance audits verify that your ISMS continues to operate and improve. These are typically shorter than the full certification audit (approximately 1/3 of the original audit duration).

Recertification Audit (Year 3)

A full recertification audit repeats the Stage 2 process.


Key ISMS Documentation Requirements

DocumentPurpose
Information Security PolicyHigh-level commitment statement; sets the ISMS direction
Risk Assessment ReportDocuments identified risks, their likelihood and impact, and risk owners
Risk Treatment PlanDescribes how each risk is treated (mitigate, accept, transfer, avoid) and which controls apply
Statement of Applicability (SoA)Maps each Annex A control to your organization; justifies inclusions and exclusions
Internal Audit Procedure and RecordsEvidence that you regularly audit your own ISMS
Management Review RecordsEvidence that leadership reviews the ISMS at planned intervals
Corrective Action RecordsEvidence that non-conformities are identified and resolved
Asset InventoryRegister of information assets within scope
Supplier/Third-Party Security PolicyHow you manage security risks in your supply chain

ISO 27001 Timeline: Realistic Expectations

PhaseActivitiesTypical Duration
Gap AssessmentCompare current state vs. ISO 27001 requirements1–2 weeks
Scope DefinitionDefine ISMS scope, asset inventory1–2 weeks
Risk AssessmentIdentify threats, vulnerabilities, risks; assess likelihood and impact2–4 weeks
Control Selection and SoASelect applicable Annex A controls; draft Statement of Applicability2–4 weeks
Policy and Procedure DevelopmentWrite all required ISMS documentation4–8 weeks
Control ImplementationImplement technical and procedural controls4–12 weeks
Internal AuditConduct first internal audit of the ISMS1–2 weeks
Management ReviewLeadership review of ISMS effectiveness1 week
Stage 1 AuditCertification body reviews documentation1–2 weeks
RemediationAddress Stage 1 findings1–4 weeks
Stage 2 AuditCertification body tests operational controls1–2 weeks

Standard timeline: 6–12 months. QuickTrust's engineering-included model compresses the implementation and documentation phases significantly.


Common Misconceptions About ISO 27001

Misconception 1: "ISO 27001 requires implementing all 93 Annex A controls." Not true. You select controls based on your risk assessment. If a control is not relevant to your environment (for example, physical security controls for a fully remote company with no office), you can exclude it — but you must justify the exclusion in your SoA.

Misconception 2: "ISO 27001 and SOC 2 are interchangeable." They overlap significantly but serve different markets. SOC 2 is recognized primarily in the US and produces an attestation report. ISO 27001 is globally recognized and produces a certification from an accredited body. Many companies pursue both.

Misconception 3: "We can self-certify for ISO 27001." Unlike some HIPAA assessments or PCI SAQs, ISO 27001 certification requires a third-party audit by an accredited certification body. A consultant can help you prepare, but they cannot certify you.

Misconception 4: "ISO 27001 is only for large enterprises." Companies of all sizes can achieve ISO 27001 certification. The ISMS scope can be tailored to fit a 10-person SaaS startup just as it can fit a 10,000-person enterprise.


How QuickTrust Helps With ISO 27001 Certification

ISO 27001 requires building a real ISMS — not just checking boxes. QuickTrust's security engineers and Big 4-experienced compliance specialists handle both the strategic framework and the technical implementation:

What QuickTrust delivers for ISO 27001:

  • Gap score in the first week — Map your current controls against all 93 Annex A controls and produce a scored gap report
  • Scope definition and asset inventory — Define a defensible ISMS scope; build your asset register
  • Risk assessment facilitation — Structured risk assessment workshops resulting in a documented risk register and risk treatment plan
  • Statement of Applicability — Complete, justified SoA covering all 93 Annex A controls
  • Policy and procedure library — Full suite of ISO 27001-compliant policies tailored to your organization
  • Technical control implementation — Engineers configure access controls, logging, encryption, vulnerability management, and secure SDLC controls in your actual environment
  • Internal audit — Conduct your required internal audit; produce findings and corrective action records
  • Management review facilitation — Run your first management review meeting; produce required records
  • Certification body coordination — Manage Stage 1 and Stage 2 audit engagements; respond to auditor requests

Result: 100% audit pass rate. Audit-ready in 6–10 weeks. 90% reduction in internal engineering time.


ISO 27001 FAQ

How much does ISO 27001 certification cost?

Certification body audit fees typically range from $10,000–$40,000 depending on organization size and scope. Add consulting and implementation costs (often $40,000–$150,000 for traditional approaches). QuickTrust's bundled engineering model significantly reduces total cost compared to hiring separately for consulting, engineering, and audit coordination.

What is the difference between ISO 27001:2013 and ISO 27001:2022?

ISO 27001:2022 introduced structural changes to Annex A (from 114 controls in 14 domains to 93 controls in 4 themes), added 11 new controls addressing modern threats (threat intelligence, cloud security, data masking), and updated several existing controls. Organizations certified under the 2013 version had until October 2025 to transition to the 2022 version.

Can ISO 27001 help with GDPR compliance?

Yes. ISO 27001:2022 has significant control overlap with GDPR's technical and organizational measures requirements. Achieving ISO 27001 does not make you GDPR compliant (GDPR has additional legal obligations around consent, data subject rights, and breach notification), but it substantially covers GDPR's security and data protection control requirements.

Do we need to recertify every year?

ISO 27001 certificates are valid for 3 years. Annual surveillance audits (Years 1 and 2) verify that your ISMS continues to operate effectively. A full recertification audit occurs in Year 3. This ongoing audit cycle is why continuous control operation is essential — not just pre-audit preparation.

What happens if we fail the ISO 27001 audit?

Auditors issue non-conformities — either major (which must be resolved before certification is issued) or minor (which must be addressed within a defined timeframe after certification). Major non-conformities typically relate to missing required documentation, absent risk assessment processes, or controls that are not operating at all. With proper preparation, major non-conformities are avoidable.


Ready to Get Your ISO 27001 Gap Score?

Stop preparing for ISO 27001 without knowing where you actually stand. QuickTrust assesses your current ISMS maturity against all 93 Annex A controls, identifies every gap, and deploys engineers to close them — so your Stage 2 audit is a formality, not a surprise.

Get your ISO 27001 gap score at trust.quickintell.com

Engineering-included. Audit-ready in 6–10 weeks. 100% audit pass rate.

Ready for ISO 27001 certification?

Our engineers implement Annex A controls, prepare evidence, and coordinate your audit.

Start ISO 27001

Related Articles