Everything You Need to Know About ISO 27001 Certification

Latest update:
23 Jan

What is ISO 27001 Certification?

ISO 27001 is the International Standard for Information Security Management.  As with all ISO standards, it has been developed by a panel of experts from across the globe and provides a specification for the development of a ‘best practice’ information security management system (ISMS).

ISO 27001 certification involves an independent and accredited certification body (CB) assessing an organisation’s ISMS for compliance with the requirements of the Standard initially and on an annual basis.

By certifying to ISO 27001, organisations can demonstrate that they have a structured approach to the planning, implementation, and maintenance of an ISMS, capable of addressing both their current and ongoing information security and business needs.

How Long Does ISO 27001 Certification Last?

Where an ISO 27001 certificate is issued by an accredited CB (in the UK, the accreditation body is UKAS), it lasts three years, after which it will need to be renewed.  Certification, however, is conditional on the effective ongoing operation of the in-scope ISMS.

The chosen CB will conduct annual continuous assessment visits (CAVs) and, if the ISMS is not operating effectively and timely action is not taken to address this, then a certification may be withdrawn.

What are the Advantages and Benefits of ISO 27001 Certification?

Certifying to ISO 27001 formalises an organisation’s approach to information security management and will provide stakeholder assurance that a best practice approach is in place to safeguard all critical business information.  

Certification to ISO 27001 secures client confidence and is often a prerequisite to winning or retaining a client’s business.

An effective ISMS will also reduce the possibility of a security breach and the associated negative impacts, such as remediation costs and reputational damage.  

Equally, an effective ISMS will identify priorities so resources can be effectively allocated to ongoing security improvements.

The periodic external assessments involved in maintaining certification will also help an organisation ensure that it keeps focusing on continuous improvement.

How to I Achieve ISO 27001 Certification

Once you have conducted your information security risk assessment and remediation activities and have fully implemented your ISMS, you can then engage a CB.  

You will need to be able to demonstrate that your ISMS is mature and fully operational and has been subject to a management review and internal audits (part of the continuous improvement cycle).

The Actual Certification Process Involves 2 Stages

Stage 1 is a documentation review where your assessor will review your processes and policies to establish whether they are in line with the requirements of ISO 27001 and whether you are ready for a stage 2 audit.

Stage 2 audit (often referred to as the certification audit) is typically carried out 6-8 weeks later and involves a thorough on-site assessment to establish whether your ISMS fully conforms with ISO 27001 and your identified requirements.

The assessor will also be seeking evidence that your organisation is following its documented practices.  If everything is in order, the assessor will recommend you for ISO 27001 certification.

How Much Does ISO 27001 Certification Cost?

This is dependent on a number of factors such as the size and complexity of the organisation or certification scope, the level of compliance already achieved and the internal resources available to support the project.

Organisations may look to secure certification using internal resources (with appropriate training, where required) or to engage expert consultancy support, such as URM which has supported over 350 successful certification projects.

Thumbnail of the Blog Illustration
Information Security
How Should You Onboard New IT Systems and Software?

This blog takes a look at onboarding information systems. When onboarding is mentioned in terms of information security, typically, most will conclude it’s referring to people...

Read more
Thumbnail of the Blog Illustration
Information Security
How do I Approach Asset Identification Within My Information Security Risk Assessment?

This is a question which comes up time and time again. Typically, this question is twofold; which assets to include and the depth or granularity. In this blog, we will look at granularity.

Read more
Thumbnail of the Blog Illustration
Information Security
How Secure is Zoom?

Many organisations have had to adapt very quickly to the rapidly changing restrictions brought in across the globe to help combat the spread of COVID-19 and, in a lot of cases, this has meant that...

Read more
Great presentation - looking forward to your future events.
Webinar 'ISO 27001 Internal Auditing, the 6 Pillars of Success'
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.