HomeAbout UsBlogPodcastEventsLive
EN|DE

Contents

What is an Information Security Management System?The Risk Assessment MatrixRisk Treatment StrategiesAnnex A and the Statement of ApplicabilityYour 12-Week Certification TimelineContinuous Compliance Activities
Back to Blog
Compliance
December 15, 2024
Updated April 19, 2026
4 min read

ISO 27001 Certification Roadmap: From Zero to Certified in 12 Weeks

Mateo Sosa
Mateo Sosa
Founder & Security Consultant
ISO 27001 Certification Roadmap: From Zero to Certified in 12 Weeks

This roadmap guides you through achieving ISO 27001 certification in 12 weeks. We cover the fundamentals of information security management, explain how risk assessment drives your security decisions, and provide a week-by-week timeline showing exactly what happens at each stage.

What is an Information Security Management System?

ISO 27001 is the international standard for information security. But it's not just a checklist of security controls. It's a framework for building an Information Security Management System, a documented system of policies, procedures, and controls that protect your organization's information assets.

Think of it as a management system that happens to focus on security. Just like ISO 9001 helps organizations consistently deliver quality products, ISO 27001 helps organizations consistently protect information. The certification proves to customers, partners, and regulators that you take security seriously and have the systems to back it up.

Implementing an Information Security Management System follows a structured approach:

Risk Assessment
Risk Treatment
Documentation
Operationalization
Audit

The Risk Assessment Matrix

Every identified risk is evaluated on two dimensions: how likely it is to occur, and how severe the impact would be if it did. This produces a risk rating that guides treatment priorities.

IMPACT
InsignificantMinorModerateMajorSevere
LIKELIHOODAlmost CertainMediumHighHighExtremeExtreme
LikelyMediumMediumHighHighExtreme
PossibleLowMediumMediumHighHigh
UnlikelyLowLowMediumMediumHigh
RareLowLowLowMediumMedium

The matrix plots Likelihood (from Rare to Almost Certain) against Impact (from Insignificant to Severe). Where these intersect determines your risk level:

  • Extreme Risk: Almost Certain + Major/Severe impact - requires immediate action
  • High Risk: Likely + Moderate impact or higher - treatment required within weeks
  • Medium Risk: Possible + Minor impact or higher - address within the quarter
  • Low Risk: Unlikely/Rare + Minor impact - monitor but may not require treatment

Example: Ransomware Attack on Customer Database

A ransomware attack encrypting customer data could halt operations and trigger regulatory penalties.

Likelihood (Possible: 3) x Impact (Major: 4) = Risk Score 12 = HIGH

This HIGH rating means immediate treatment is required. We would recommend mitigation controls: endpoint detection and response, immutable backups, network segmentation, and staff awareness training.

Risk Treatment Strategies

Once risks are identified and rated, we choose from four fundamental treatment strategies. The right choice depends on the risk's severity, cost of treatment, and your organization's risk appetite.

Avoid
Eliminate the activity

Stop doing the activity that creates the risk entirely. If storing customer credit cards creates unacceptable risk, use a payment processor instead.

Mitigate
Reduce impact or likelihood

Implement controls that make the risk less likely or less damaging. Add multi-factor authentication to reduce unauthorized access.

Transfer
Insure or outsource

Shift the risk to a third party. Purchase cyber insurance to transfer financial impact. Outsource to providers who assume operational risk.

Accept
Monitor but take no action

Acknowledge the risk exists but choose not to treat it because the cost exceeds the expected loss. Document the decision and monitor.

The Risk Calculation Formula

Annual Loss Expectancy = Single Loss Expectancy x Annual Rate of Occurrence

In plain terms: multiply what a single incident would cost you by how often you expect it to happen per year. If a data breach would cost 50,000 euros and you estimate a 10% chance of one occurring annually, your expected annual loss is 5,000 euros. Any control costing less than 5,000 euros per year is likely worth implementing.

Annex A and the Statement of Applicability

One of the most important—and often confusing—parts of ISO 27001 is Annex A. Think of it as a comprehensive menu of 93 security controls, organized into four categories. Your job isn't to implement all of them blindly, but to evaluate each one against your specific risks and business context.

The Statement of Applicability is the formal document where you record your decisions. For each of the 93 controls, you state whether it applies to your organization and explain why or why not. Auditors examine this document closely—it demonstrates that you've thoughtfully considered every control rather than applying a one-size-fits-all approach.

The four control categories are:

  • Organisational Controls (37 controls): Policies, roles, responsibilities, asset management, access control policies
  • People Controls (8 controls): Screening, awareness, training, disciplinary processes
  • Physical Controls (14 controls): Secure areas, equipment protection, clear desk policies
  • Technological Controls (34 controls): Authentication, cryptography, network security, secure development

Most controls will apply to your organization, but some may not be relevant to your specific context. For example, a fully cloud-based company may mark certain physical security controls as not applicable.

Annex A Control Categories

Each square represents one control. Coloured squares are typically applicable; grey squares may not apply depending on your context. Hover over a square to see the control.

Organisational37 controls
People8 controls
Physical14 controls
Technological34 controls
Applicable control
Not applicable (example)

Your 12-Week Certification Timeline

Here's exactly what happens each week, who does what, and what you'll receive at each stage.

1
Risk Assessment
Weeks 1-3

Understand your organization's context, map information assets, and identify what matters most to protect.

Asset InventoryNetwork DiagramsRisk RegisterCloud Security Report
2
Risk Treatment
Weeks 3-6

Define treatment actions, implement controls, and establish security tools and processes required for certification.

Treatment PlanTraining ProgramAccess MatrixCompliance Register
3
Documentation
Weeks 5-8

Create all required policies, procedures, and statements that form the backbone of your management system.

Scope DefinitionStatement of ApplicabilitySecurity PoliciesOperating Procedures
4
Audit Preparation
Weeks 8-12

Establish ongoing security operations, complete internal audit, and prepare for certification assessment.

Internal Audit ReportCompliance DashboardTrust CenterISO 27001 Certificate

Continuous Compliance Activities

Achieving ISO 27001 certification is a milestone, not a destination. Your Information Security Management System requires ongoing care to remain effective and audit-ready. These recurring activities form the operational rhythm of mature security programs.

Weekly Activities

  • Endpoint security review and threat monitoring
  • Security log analysis and anomaly detection
  • Internal vulnerability management updates
  • Threat intelligence review
  • Security touchpoints with stakeholders

Monthly Activities

  • Backup and restore testing
  • Software development lifecycle artifacts review
  • External vulnerability scans
  • Endpoint vulnerability management
  • Capacity management review
  • Phishing simulation testing
  • Security performance indicator reporting

Quarterly Activities

  • Risk register review and updates
  • Third-party security assessments
  • Business continuity plan testing
  • Security policy reviews
  • Access rights recertification

Annual Activities

  • Full internal audit
  • Management review meeting
  • Penetration testing
  • Business impact analysis update
  • Security awareness training refresh
  • Surveillance audit by certification body

Ready to Get Started?

Contact us for a free consultation and learn how we can improve your security program.

Related Articles

ISO 27001 Fast-Track: From Zero to Certified in 6 Months
Compliance

ISO 27001 Fast-Track: From Zero to Certified in 6 Months

11 min read
Your SIEM isn't Expensive. Your Data Strategy is.
Security Operations

Your SIEM isn't Expensive. Your Data Strategy is.

3 min read
XDR Optimization: How We Reduced False Positives by 85%
Security Operations

XDR Optimization: How We Reduced False Positives by 85%

7 min read

We Guard, You Grow.
Premier cybersecurity consulting for critical infrastructure and high-growth startups.

Services
  • vCISO Services
  • SOC Implementation
  • ISO 27001
  • GDPR
  • DORA
  • GRC

Company

  • About Us
  • Careers
  • Imprint
  • Privacy

Tools

  • Splunk Sizing Calculator

Content

  • Blog
  • Podcast
  • Events

© 2025 datadefend GmbH. All rights reserved.