Back to Blog
Compliance14 min read

ISO 27001 Requirements: Every Clause, Control, and Document You Actually Need

A

Alexander Sverdlov

Security Analyst

3/25/2026
ISO 27001 Requirements: Every Clause, Control, and Document You Actually Need

Compliance · March 2026

ISO 27001 Requirements: Every Clause, Control, and Document You Actually Need

A practitioner’s breakdown of every mandatory ISO 27001 requirement—clauses 4 through 10, Annex A control categories, documentation you must produce, the Statement of Applicability, and how the risk assessment methodology ties it all together.

💫 Key Takeaways

  • ISO 27001 has 7 mandatory clauses (4–10) that every organization must satisfy—no exceptions, no tailoring
  • Annex A contains 93 controls across 4 categories (Organizational, People, Physical, Technological) in the 2022 revision
  • The Statement of Applicability (SoA) is the single most important document in your ISMS—it links risk treatment to specific controls
  • You need roughly 20–25 documented policies and procedures to pass a Stage 2 certification audit
  • Risk assessment methodology must be defined before you assess anything—and it must be repeatable and consistent

I still remember sitting in a cramped meeting room in 2019 with a client’s IT director, both of us staring at a printed copy of ISO/IEC 27001:2013. He had highlighter marks on nearly every page and a legal pad full of questions. “So which parts of this are actually mandatory?” he asked, flipping back and forth between Clause 6 and Annex A. “Because our consultant just told us to implement everything, and we have four people on the security team.”

That conversation stuck with me because it captures the central confusion around ISO 27001 requirements. The standard is simultaneously precise and open to interpretation. It tells you what you must do but rarely tells you how. It mandates a risk assessment but lets you choose the methodology. It requires “documented information” but never hands you a template.

Over the past seven years, I’ve helped organizations ranging from 15-person SaaS startups to 2,000-employee financial institutions get through ISO 27001 certification. Some sailed through. Others burned months on documentation that auditors never asked for while missing controls that caused nonconformities.

This guide is what I wish someone had handed that IT director back in 2019. Every mandatory clause explained in plain language. Every Annex A category mapped out. The exact documents you need to produce. And a clear explanation of how the risk assessment methodology and Statement of Applicability connect the whole system together.

🔐

Foundation

What Is ISO 27001 and Why Do the Requirements Matter?

ISO/IEC 27001 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). Published by the International Organization for Standardization and the International Electrotechnical Commission, the current version is ISO/IEC 27001:2022.

Unlike frameworks that provide recommended practices (NIST CSF, CIS Controls), ISO 27001 is a certifiable standard. An accredited certification body audits your ISMS against the standard’s requirements. If you pass, you receive a certificate valid for three years, with annual surveillance audits in between.

The requirements matter because they are non-negotiable. Clauses 4 through 10 use the word “shall”—which in standards language means mandatory. You cannot claim conformity while skipping any of them. The Annex A controls, on the other hand, are a reference set: you choose which ones apply based on your risk assessment, but you must justify every exclusion in your Statement of Applicability.

ISO 27001 at a Glance

  • Current version: ISO/IEC 27001:2022
  • Mandatory clauses: 4 through 10 (context, leadership, planning, support, operation, performance evaluation, improvement)
  • Annex A controls: 93 controls in 4 categories (down from 114 controls in 14 categories in 2013 version)
  • Certification cycle: Stage 1 (documentation review) → Stage 2 (implementation audit) → 3-year certificate → annual surveillance audits
  • Who uses it: SaaS companies, financial institutions, healthcare providers, government contractors, any organization handling sensitive data
📜

The Core

Mandatory Clauses 4–10: What Each One Actually Requires

These seven clauses form the backbone of every ISO 27001 implementation. Each one builds on the previous. Skip or half-do any of them, and your certification auditor will issue a nonconformity. Here is exactly what each clause demands.

Clause 4: Context of the Organization

Before you build anything, the standard requires you to understand your operating environment. This is not a philosophical exercise. It has four specific sub-requirements:

  • 4.1 – Understanding the organization and its context. Identify external and internal issues relevant to your ISMS. External issues include regulatory requirements, market conditions, and threat landscape. Internal issues include organizational structure, culture, existing policies, and technical capabilities.
  • 4.2 – Understanding the needs and expectations of interested parties. List your stakeholders (customers, regulators, employees, partners, shareholders) and document what each one expects from your information security program. A SaaS company’s customers might require SOC 2 reports; a bank’s regulator might mandate specific data residency rules.
  • 4.3 – Determining the scope of the ISMS. Define exactly what your ISMS covers—which business units, locations, systems, and information assets are in scope. This is critical. Scope it too broadly and you’ll drown in controls. Scope it too narrowly and customers won’t trust the certificate.
  • 4.4 – Information security management system. Establish, implement, maintain, and continually improve the ISMS. This is the overarching “you must actually build and run this thing” requirement.

Clause 5: Leadership

ISO 27001 makes it explicit: leadership cannot delegate security and walk away. The standard requires top management to be actively involved.

  • 5.1 – Leadership and commitment. Top management must demonstrate commitment by ensuring the information security policy and objectives are established, integrating ISMS requirements into business processes, ensuring resources are available, and communicating the importance of information security.
  • 5.2 – Policy. Establish an information security policy that is appropriate to your organization’s purpose, includes commitments to satisfy applicable requirements, and includes a commitment to continual improvement. The policy must be documented, communicated, and available to interested parties.
  • 5.3 – Organizational roles, responsibilities and authorities. Assign and communicate responsibilities for ensuring the ISMS conforms to the standard and for reporting on ISMS performance to top management. In practice, this means naming who owns the ISMS—often the CISO or a virtual CISO.

Clause 6: Planning

This is where the standard introduces risk management as the engine that drives everything else. Clause 6 is dense, and auditors spend significant time here.

  • 6.1.1 – General. When planning for the ISMS, consider the issues from Clause 4.1 and the requirements from Clause 4.2 to determine risks and opportunities that need to be addressed.
  • 6.1.2 – Information security risk assessment. Define and apply a risk assessment process. You must establish risk criteria (acceptance criteria, criteria for performing assessments), identify information security risks (applying the process to identify risks associated with the loss of confidentiality, integrity, and availability), analyze those risks (assess consequences and likelihood, determine risk levels), and evaluate them against your criteria.
  • 6.1.3 – Information security risk treatment. Define the risk treatment process. Select appropriate treatment options (mitigate, accept, avoid, transfer). Determine all controls necessary to implement the chosen options. Compare your selected controls against the Annex A list to verify nothing has been overlooked. Produce the Statement of Applicability.
  • 6.2 – Information security objectives and planning to achieve them. Set measurable security objectives at relevant functions and levels. For each objective, document what will be done, what resources are required, who is responsible, when it will be completed, and how results will be evaluated.
  • 6.3 – Planning of changes. When you determine the need for changes to the ISMS, the changes must be carried out in a planned manner. This was added in the 2022 revision.

Clause 7: Support

The ISMS needs resources, competent people, awareness, communication, and documented information to function. Clause 7 covers all of that.

  • 7.1 – Resources. Determine and provide the resources needed for the ISMS. Budget, tools, headcount—if you starve the program, you fail this clause.
  • 7.2 – Competence. Ensure that people doing work under the ISMS are competent on the basis of appropriate education, training, or experience. Retain documented evidence of competence (training records, certifications, performance reviews).
  • 7.3 – Awareness. People performing work under the organization’s control must be aware of the information security policy, their contribution to ISMS effectiveness, and the implications of not conforming.
  • 7.4 – Communication. Determine what needs to be communicated about the ISMS, when, with whom, and who shall communicate it. In practice: you need a communication plan.
  • 7.5 – Documented information. Create, update, and control all documented information required by the standard and by your own ISMS. This is the documentation requirement that catches most organizations off guard.

Clause 8: Operation

Clause 8 is where planning meets execution. Everything you designed in Clauses 6 and 7 must be implemented and controlled here.

  • 8.1 – Operational planning and control. Plan, implement, and control the processes needed to meet ISMS requirements and implement the actions identified in Clause 6. Control planned changes and review unintended changes. Ensure outsourced processes are controlled.
  • 8.2 – Information security risk assessment. Perform risk assessments at planned intervals or when significant changes occur. Retain documented results. In practice, most organizations do a full assessment annually and trigger ad-hoc assessments when there are major infrastructure changes, new products, or incidents.
  • 8.3 – Information security risk treatment. Implement the risk treatment plan. Retain documented results. Auditors will compare your risk treatment plan to actual evidence of implementation—if you said you would deploy endpoint detection and response, they will verify it is deployed.

Clause 9: Performance Evaluation

The standard requires you to measure whether your ISMS is working. This is where many first-time implementations stumble—they build the system but forget to instrument it.

  • 9.1 – Monitoring, measurement, analysis and evaluation. Determine what needs to be monitored and measured, the methods, when monitoring and measuring shall be performed, who shall do it, and when results shall be analyzed and evaluated. You need actual security metrics—not just “we feel good about our posture.”
  • 9.2 – Internal audit. Conduct internal audits at planned intervals. The audit program must consider the importance of the processes concerned and the results of previous audits. Auditors must be objective and impartial—you cannot audit your own work. Many smaller organizations use an external firm for this, tying it into their broader IT security audit program.
  • 9.3 – Management review. Top management must review the ISMS at planned intervals. The review must consider status of actions from previous reviews, changes in external and internal issues, nonconformities and corrective actions, monitoring and measurement results, audit results, and opportunities for improvement. Minutes must be retained as documented information.

Clause 10: Improvement

The final mandatory clause addresses what happens when things go wrong and how the ISMS evolves.

  • 10.1 – Continual improvement. Continually improve the suitability, adequacy, and effectiveness of the ISMS. This is not a platitude—auditors expect evidence of improvement actions taken between audits.
  • 10.2 – Nonconformity and corrective action. When a nonconformity occurs, react to it, evaluate the need for corrective action to eliminate the root cause, implement the action, and review its effectiveness. Retain documented information as evidence.

“The single most common reason organizations fail their Stage 2 audit is not missing controls—it’s missing evidence. They implemented the control but never documented the process, the review, or the results.”

📊

Quick Reference

ISO 27001 Mandatory Clauses at a Glance

ClauseTitleCore RequirementKey Output
4Context of the OrganizationUnderstand internal/external issues, stakeholder needs, define scopeISMS scope document, interested parties register
5LeadershipTop management commitment, policy, roles & responsibilitiesInformation security policy, RACI matrix
6PlanningRisk assessment, risk treatment, security objectives, change planningRisk assessment report, SoA, risk treatment plan
7SupportResources, competence, awareness, communication, documentationTraining records, communication plan, document control
8OperationExecute plans, perform risk assessments, implement risk treatmentRisk assessment results, treatment evidence
9Performance EvaluationMonitoring, internal audit, management reviewAudit reports, management review minutes, KPIs
10ImprovementContinual improvement, nonconformity & corrective actionCorrective action log, improvement evidence
🛡

Controls

Annex A Control Categories: The 2022 Reorganization

The 2022 revision reorganized the Annex A controls from 14 categories down to 4 thematic groups. This was partly cosmetic—many controls carried over from the 2013 version—but 11 entirely new controls were introduced, and several were merged. The total went from 114 controls to 93.

Here is what each category covers and why it matters for your implementation.

A.5 – Organizational Controls (37 controls)

This is the largest category and covers governance, policy, risk, compliance, asset management, access control, supplier relationships, incident management, business continuity, and more. Think of it as everything that requires process and policy rather than physical or technical implementation.

Notable Organizational Controls

  • A.5.1 Policies for information security – Overarching policy approved by management
  • A.5.7 Threat intelligence – New in 2022. Collect and analyze information about threats
  • A.5.15 Access control – Rules for physical and logical access based on business and security requirements
  • A.5.23 Information security for use of cloud services – New in 2022. Manage security of cloud service acquisition, use, and exit
  • A.5.29 Information security during disruption – Maintain security during adverse conditions

A.6 – People Controls (8 controls)

These controls cover the human element of information security: screening, terms and conditions of employment, awareness training, the disciplinary process, responsibilities at termination, confidentiality agreements, remote working, and information security event reporting.

People controls are straightforward to document but require operational discipline. Your auditor will ask for evidence that screening was performed for recent hires, that training was completed and acknowledged, and that terminated employees had their access revoked promptly. This last point—access revocation—is one of the most common nonconformities we see during security audits.

A.7 – Physical Controls (14 controls)

Physical security perimeters, entry controls, securing offices and facilities, physical security monitoring, protecting against environmental threats, working in secure areas, clear desk and clear screen, equipment siting and protection, security of assets off-premises, storage media management, supporting utilities, cabling security, and equipment maintenance.

For fully remote or cloud-native organizations, many physical controls can be addressed through your cloud provider’s certifications and your remote working policy. But you cannot simply declare them “not applicable” without justification in the SoA. Even a fully remote company has laptops, and laptops are physical assets that require protection.

A.8 – Technological Controls (34 controls)

This is where the technical rubber meets the road: endpoint security, privileged access management, information access restriction, secure authentication, malware protection, vulnerability management, configuration management, data masking, data leakage prevention, monitoring, web filtering, secure coding, and more.

New Technological Controls in 2022

  • A.8.9 Configuration management – Configurations of hardware, software, services, and networks shall be established, documented, implemented, monitored, and reviewed
  • A.8.10 Information deletion – Information stored in systems and devices shall be deleted when no longer required
  • A.8.11 Data masking – Use data masking in accordance with your access control policy and business requirements
  • A.8.12 Data leakage prevention – Apply DLP measures to systems, networks, and endpoints that process sensitive information
  • A.8.16 Monitoring activities – Networks, systems, and applications shall be monitored for anomalous behavior
  • A.8.23 Web filtering – Access to external websites shall be managed to reduce exposure to malicious content
  • A.8.28 Secure coding – Secure coding principles shall be applied to software development
CategorySectionControlsCovers
OrganizationalA.537Policies, risk, access, suppliers, incidents, continuity, compliance
PeopleA.68Screening, training, awareness, termination, remote work
PhysicalA.714Perimeters, entry controls, equipment, environmental threats, clear desk
TechnologicalA.834Endpoints, access, malware, vulnerabilities, encryption, monitoring, secure coding
📄

Documentation

What Policies and Documents You Actually Need

The standard uses the phrase “documented information” rather than “document” or “record,” which is deliberately vague. But through years of audits and working with certification bodies, there is a practical consensus on what you need. I split these into two tiers: documents the standard explicitly requires you to retain, and documents that auditors practically always expect to see.

Tier 1: Explicitly Required by the Standard

DocumentClausePurpose
ISMS Scope4.3Defines boundaries of the ISMS
Information Security Policy5.2Top-level policy approved by management
Risk Assessment Methodology6.1.2Describes how risks are identified, analyzed, and evaluated
Risk Assessment Report8.2Results of each risk assessment performed
Risk Treatment Plan6.1.3, 8.3How each identified risk will be addressed
Statement of Applicability (SoA)6.1.3 d)Lists all Annex A controls with justification for inclusion/exclusion
Information Security Objectives6.2Measurable objectives at relevant levels
Evidence of Competence7.2Training records, certifications, qualifications
Internal Audit Results9.2Findings, nonconformities, and evidence of audit execution
Management Review Minutes9.3Evidence that top management reviewed ISMS performance
Corrective Action Records10.2Root cause analysis and corrective actions taken

Tier 2: Practically Required (Auditors Expect These)

  • Access Control Policy – Who can access what, under what conditions, and how access is granted and revoked
  • Asset Inventory – All information assets (hardware, software, data, people, facilities) with assigned owners
  • Acceptable Use Policy – Rules for acceptable use of information and assets
  • Incident Response Procedure – How security events are reported, assessed, responded to, and learned from
  • Business Continuity Plan – How you maintain operations during disruptions, including IT disaster recovery
  • Supplier Security Policy – Requirements for third-party vendors who handle your information
  • Change Management Procedure – How changes to systems, infrastructure, and processes are controlled
  • Data Classification Scheme – Categories for information sensitivity and handling rules for each level
  • Cryptography / Encryption Policy – When and how encryption is applied to protect information
  • Secure Development Policy – Secure coding standards, code review, and testing requirements (if you develop software)
  • Internal Audit Program – Schedule, scope, and methodology for internal audits
  • Communication Plan – Who communicates what about the ISMS, when, and to whom

Pro tip: Don’t create separate documents for everything. A single “ISMS Manual” can contain your scope, policy, roles, objectives, and communication plan. Auditors care about content, not the number of PDFs.

📋

Critical Document

The Statement of Applicability (SoA) Explained

If there is one document that auditors study more than any other, it is the Statement of Applicability. The SoA is the bridge between your risk assessment and your actual controls. It is required by Clause 6.1.3 d) and must contain:

  • Every control you have determined as necessary (whether from Annex A or other sources)
  • A justification for including each control
  • Whether each control is implemented or not
  • A justification for excluding any Annex A control

In practice, most organizations create a spreadsheet or table with all 93 Annex A controls as rows, and columns for: control reference, control title, applicable (yes/no), justification, implementation status, responsible owner, and a link to supporting evidence.

SoA Column Structure Example

RefControlApplicable?JustificationStatusOwner
A.5.1Policies for information securityYesRequired for ISMS governanceImplementedCISO
A.7.3Securing offices, rooms, and facilitiesNoFully remote organization, no offices. Cloud provider SOC 2 covers DCs.N/A
A.8.28Secure codingYesSaaS product with custom code, risk-treated via secure SDLCPartialVP Engineering

Common mistakes with the SoA:

  • Excluding controls without justification. If your SoA says “Not applicable” for A.8.12 (Data leakage prevention) but you process customer PII in a SaaS product, the auditor will issue a nonconformity.
  • Treating the SoA as static. The SoA must be updated whenever your risk assessment changes, new controls are introduced, or controls are decommissioned. It is a living document.
  • Disconnecting the SoA from the risk assessment. The auditor will trace specific risks from your risk register to treatments in your risk treatment plan to controls in the SoA. If those threads break, that is a nonconformity.
⚖️

Risk Engine

Risk Assessment Methodology Requirements

The risk assessment is the engine that drives your entire ISMS. Clause 6.1.2 requires you to define a methodology before you start assessing risks. The methodology must ensure that repeated assessments produce “consistent, valid and comparable results.” That is the bar. Here is what that means in practice.

What the Methodology Must Define

  • Risk acceptance criteria. What level of risk does your organization accept without treatment? This is usually expressed as a threshold on your risk matrix (e.g., “risks rated Medium or below are accepted; High and Critical must be treated”).
  • Criteria for performing assessments. When do you perform them? Annually? After significant changes? After incidents? All three are typical.
  • Risk identification approach. How do you identify risks? Asset-based (identify assets, threats, and vulnerabilities for each), scenario-based (identify threat scenarios and assess impact), or a combination. ISO 27005 provides guidance but is not mandatory.
  • Risk analysis method. Qualitative (High/Medium/Low), quantitative (dollar-value estimates), or semi-quantitative (numerical scales mapped to qualitative labels). Most organizations use semi-quantitative with a 5x5 likelihood-impact matrix.
  • Risk evaluation process. How do you compare analyzed risks against acceptance criteria? Typically, you plot each risk on the matrix, and anything above the acceptance line goes into the risk treatment plan.

Typical 5x5 Risk Matrix Scoring

Likelihood →Rare (1)Unlikely (2)Possible (3)Likely (4)Almost Certain (5)
Catastrophic (5)510152025
Major (4)48121620
Moderate (3)3691215
Minor (2)246810
Insignificant (1)12345

Color key: Green = Low (accept) · Amber = Medium (monitor/treat) · Red = High (must treat) · Dark red = Critical (immediate action)

Risk Treatment Options

For every risk above your acceptance threshold, you must choose one of four treatment options:

Mitigate

Implement controls to reduce likelihood or impact. Most common option. Maps directly to Annex A controls.

Transfer

Shift risk to a third party. Cyber insurance, outsourcing to managed providers with their own certifications.

Avoid

Eliminate the activity causing the risk entirely. Discontinue a service, stop processing certain data types.

Accept

Acknowledge the risk and take no further action. Only valid for risks already below your acceptance criteria. Must be approved by a risk owner.

The risk treatment plan must document which option was chosen for each risk, what specific controls implement that option, who owns the treatment, and the timeline for implementation. This plan is what your auditor will verify against operational evidence during the Stage 2 audit.

🔗

Tying It Together

How Every ISO 27001 Requirement Connects

Understanding the individual clauses and controls is important, but the real insight is seeing how everything flows together. ISO 27001 is not a checklist—it is a system. Here is how the pieces connect:

The ISO 27001 Logic Chain

  1. Context (Clause 4) defines what you are protecting and why →
  2. Leadership (Clause 5) provides the mandate and resources →
  3. Planning (Clause 6) identifies risks and determines how to treat them →
  4. Support (Clause 7) ensures you have the people, skills, and documents →
  5. Operation (Clause 8) executes the risk treatment plan →
  6. Performance Evaluation (Clause 9) measures whether it is working →
  7. Improvement (Clause 10) feeds findings back into the cycle → back to Clause 4

This is the Plan-Do-Check-Act (PDCA) cycle that ISO management system standards are built on. Auditors are trained to follow these threads. They will pick a risk from your register, trace it to a treatment decision, find the corresponding control in your SoA, verify the control is implemented in operation, check that it is being monitored and measured, and confirm that any issues were corrected through the improvement process.

If any link in that chain is broken—a risk with no treatment, a treatment with no control, a control with no evidence, evidence with no monitoring—you get a nonconformity. The organizations that achieve certification smoothly are the ones that build these connections from day one rather than trying to retrofit them before the audit.

This is also why working with experienced practitioners matters. A virtual CISO who has taken organizations through the certification process understands how auditors trace these threads and can help you build an ISMS where every element reinforces the others. Similarly, aligning your ISO 27001 effort with a SOC 2 readiness program can create significant efficiency—many controls satisfy both frameworks simultaneously.

⚠️

Watch Out

Common Mistakes That Cause Audit Failures

After participating in dozens of ISO 27001 certification audits—some successful, some not—patterns emerge. Here are the mistakes I see most frequently:

  • Risk assessment is a one-time event. The standard requires assessments “at planned intervals or when significant changes are proposed or occur.” An assessment from 18 months ago with no updates is a nonconformity.
  • Management review is a formality. If your management review minutes are one paragraph that says “everything is fine,” the auditor will dig. The standard specifies inputs that must be considered. Document them.
  • Internal audit is skipped or self-audited. Internal audits must be performed by people who are objective and impartial. The person who built the ISMS cannot audit it. Many companies benefit from outsourcing this to an independent audit firm.
  • Policies exist but nobody follows them. Having a beautiful access control policy means nothing if the auditor finds 30 active accounts for terminated employees. Implementation evidence is everything.
  • The SoA does not match reality. If your SoA says A.8.8 (vulnerability management) is implemented, but you have no vulnerability scanning tool and no evidence of remediation, that is a major nonconformity.
  • No continual improvement evidence. Between your Stage 2 audit and your first surveillance audit, the auditor expects to see improvement actions. If everything is exactly the same, you are not meeting Clause 10.

Frequently Asked Questions

FAQ: ISO 27001 Requirements

How long does ISO 27001 certification take?

For a mid-sized organization starting from scratch, plan for 6–12 months. The timeline depends on your current security maturity, scope complexity, resource availability, and how quickly you can implement and evidence the required controls. Organizations with an existing security program (e.g., SOC 2 or NIST CSF alignment) can often achieve certification in 4–6 months because many controls are already in place.

What is the difference between ISO 27001 and ISO 27002?

ISO 27001 is the certifiable standard that defines the ISMS requirements (clauses 4–10) and lists the Annex A controls. ISO 27002 is the companion guidance document that provides implementation advice for each control. You are certified against 27001, not 27002. Think of 27001 as “what you must do” and 27002 as “how you might do it.”

Can I exclude Annex A controls?

Yes, but every exclusion must be justified in your Statement of Applicability. The justification must demonstrate that the exclusion does not affect your ability to maintain information security. Common valid exclusions include physical security controls for fully remote companies (as long as endpoint and data controls compensate) and secure coding controls for organizations that do not develop software.

Do I need to implement all 93 Annex A controls?

No. You implement the controls that your risk assessment determines are necessary, plus any required by legal, regulatory, or contractual obligations. In practice, most organizations implement 70–85 of the 93 controls. The remainder are excluded with documented justification in the SoA. However, you must consider every control—you cannot simply ignore ones that seem irrelevant without the formal exclusion process.

What is the cost of ISO 27001 certification?

Costs vary widely based on scope and organization size. Certification body audit fees typically range from $10,000–$40,000. Consultant/implementation support ranges from $20,000–$80,000. Internal time (your team’s labor) is often the largest cost and hardest to quantify. Total first-year investment for a 50–500 person organization is usually $40,000–$150,000 all-in, including tools, consultant fees, and audit costs.

How does ISO 27001 relate to SOC 2?

ISO 27001 and SOC 2 share significant control overlap—roughly 60–70% of the underlying controls address the same security domains. The key differences are structural: ISO 27001 is a certifiable management system standard with prescriptive clause requirements, while SOC 2 is an attestation framework based on Trust Services Criteria. Many organizations pursue both, and building them in parallel saves substantial effort. Our SOC 2 readiness services are designed to dovetail with ISO 27001 implementations.

Ready to Start Your ISO 27001 Journey?

Whether you are starting from zero or transitioning from the 2013 version, we can help you build an ISMS that passes the audit and actually protects your organization.

Our free initial consultation includes: scoping discussion, gap assessment overview, timeline and cost estimate, and framework overlap analysis if you also need SOC 2 or other certifications.

Published: March 2026 · Author: Alexander Sverdlov

This article is for informational purposes only and does not constitute legal or professional advice. ISO 27001 requirements are based on the ISO/IEC 27001:2022 standard. Organizations should work with accredited certification bodies and qualified consultants for formal implementation and certification.

Alexander Sverdlov

Alexander Sverdlov

Founder of Atlant Security. Author of 2 information security books, cybersecurity speaker at the largest cybersecurity conferences in Asia and a United Nations conference panelist. Former Microsoft security consulting team member, external cybersecurity consultant at the Emirates Nuclear Energy Corporation.