Compliance

ISO 27001 Implementation: Step-by-Step Guide for SMBs

A practical ISO 27001 implementation guide for small and mid-size businesses covering gap analysis, risk treatment, ISMS documentation, and the certification audit.

March 9, 20267 min readShipSafer Team

ISO 27001 Implementation: Step-by-Step Guide for SMBs

ISO 27001 is the international standard for information security management systems (ISMS). Certification demonstrates to customers, partners, and regulators that your organization systematically manages information security risk. For SMBs selling to enterprise customers in Europe, financial services, or government sectors, it is often a contract requirement.

The standard is not prescriptive about which specific controls you must implement — it requires you to assess your own risks and implement controls appropriate to your context. This makes it flexible but also means there is no simple checklist. Here is a practical path through implementation.

Step 1: Define the Scope

Before anything else, define the scope of your ISMS. The scope statement describes which parts of the organization, which locations, which business processes, and which information assets fall under the ISMS. Certification only covers what is in scope.

SMBs typically scope the ISMS to cover the core product and the systems that support it. A SaaS company might scope to its production environment, the team that builds and operates it, and the customer data it processes. Sales, marketing, and HR systems may be explicitly excluded if they do not handle the sensitive data the ISMS is designed to protect.

Define the scope early and document it clearly. Your certification body will audit exactly what is in scope — nothing more, nothing less.

Step 2: Gap Analysis

A gap analysis compares your current security practices against the requirements of ISO 27001:2022 and its Annex A controls. ISO 27001:2022 (the current version, which replaced 2013) has 93 Annex A controls organized into four themes: Organizational, People, Physical, and Technological.

Run the gap analysis by reviewing each clause of the standard (Clauses 4–10 are the mandatory requirements) and each Annex A control you have selected as applicable. For each, assess:

  • Whether a control or process exists
  • Whether it is documented
  • Whether it is consistently operating
  • What evidence exists of its operation

The output is a gap report that becomes your implementation roadmap. Budget 4–8 weeks for this phase if done rigorously.

Step 3: Risk Assessment and Treatment

ISO 27001 is risk-based. The core methodology is:

  1. Identify information assets in scope
  2. Identify threats and vulnerabilities relevant to each asset
  3. Assess the likelihood and impact of each risk scenario
  4. Determine your risk appetite and risk acceptance criteria
  5. For risks above your acceptance threshold, select treatment options: mitigate, transfer, avoid, or accept
  6. Map selected controls from Annex A to each risk being mitigated

This sounds complex but is manageable with a structured risk register in a spreadsheet. A typical SMB risk register has 50–150 rows. The key is consistency — use the same scoring criteria throughout so that a "high likelihood" risk in one row means the same thing as a "high likelihood" risk in another.

Document your risk assessment methodology before you begin. The auditor will review your methodology and will want to understand why you scored risks as you did.

Statement of Applicability (SoA)

The Statement of Applicability is a required document that lists every Annex A control, states whether it is applicable or not applicable to your ISMS, and provides justification for exclusions. If you exclude a control, you must explain why — typically because the risk it addresses does not apply to your context.

The SoA is a living document. Update it when you add new controls or formally exclude previously considered controls.

Step 4: Implement Controls and Document the ISMS

With your risk treatment plan and SoA in hand, implement the controls you have committed to. For many SMBs, this means:

  • Writing or formalizing policies (information security policy, acceptable use, access control policy, incident management, business continuity)
  • Implementing technical controls (MFA, encryption at rest and in transit, vulnerability scanning, log management)
  • Establishing operational procedures (user onboarding/offboarding, backup verification, patch management)
  • Setting up governance processes (management review, internal audit, risk review)

ISO 27001 requires a specific set of documented information (formally called "documented information" in the standard, not just "documentation"). Mandatory documents include:

  • ISMS scope statement
  • Information security policy
  • Risk assessment and risk treatment methodology
  • Risk register and risk treatment plan
  • Statement of Applicability
  • Objectives for information security
  • Evidence of competence for ISMS personnel
  • Results of monitoring, measurement, and audit activities
  • Evidence of management reviews

Annex A controls also generate required records — for example, access control lists, asset inventories, supplier agreements with security clauses, and incident records.

Step 5: Internal Audit

Before certification, ISO 27001 requires at least one internal audit of the ISMS. The internal audit must be conducted by someone who is not responsible for the areas being audited — this can be another employee trained in auditing or an external consultant.

The internal audit checks whether the ISMS conforms to the standard's requirements and whether it is effectively implemented and maintained. It produces a report with any nonconformities found. Nonconformities must be addressed through corrective action before the certification audit.

Allow 6–8 weeks between your internal audit and scheduling your Stage 2 certification audit. This gives you time to implement corrective actions and produce evidence of their effectiveness.

Step 6: Management Review

ISO 27001 requires top management to review the ISMS at planned intervals. This is not a formality — the management review must cover specific inputs including:

  • Status of actions from previous reviews
  • Changes in external and internal context relevant to the ISMS
  • Feedback from interested parties
  • Results of risk assessments and status of the risk treatment plan
  • Performance of information security (including audit results, nonconformities)

Document the outputs of the management review, including any decisions and resource allocations. This record is reviewed by the certification body auditor.

Step 7: The Certification Audit

Certification audits are conducted in two stages:

Stage 1 (Documentation Review): The auditor reviews your ISMS documentation — policies, risk register, SoA, internal audit report, management review records. The goal is to confirm you are ready for Stage 2. The auditor identifies any major issues that would prevent certification. Stage 1 is typically conducted remotely and takes 1–2 days.

Stage 2 (Implementation Audit): The auditor tests whether your controls are actually implemented and operating as documented. This involves interviews with staff, observation of processes, and review of evidence. For an SMB, Stage 2 typically takes 2–4 days on-site or remote.

If the auditor finds minor nonconformities, you can typically address them within 90 days while the certification decision is pending. Major nonconformities require a re-audit.

Maintaining Certification

ISO 27001 certificates are valid for three years with annual surveillance audits and a full recertification audit in year three. Surveillance audits are lighter-weight (typically 1–2 days) and focus on whether the ISMS continues to operate.

The most common reason organizations fail surveillance audits is that they treat ISO 27001 as a one-time project rather than an ongoing program. The ISMS must continue to operate — risk reviews, internal audits, management reviews, training records, and evidence of control operation must be maintained year-round.

Timeline Expectations

For a focused SMB with 20–100 employees:

  • Gap analysis: 4–8 weeks
  • Remediation and implementation: 3–6 months
  • Internal audit and management review: 4–6 weeks
  • Certification audit: scheduled 4–8 weeks out

Total time from kickoff to certification: typically 9–15 months. Organizations that try to compress this timeline often do so at the cost of documentation quality or actual control effectiveness, which creates problems at the audit.

Check Your Security Score — Free

See exactly how your domain scores on DMARC, TLS, HTTP headers, and 25+ other automated security checks in under 60 seconds.