ISO 27001

ISO 27001 Certification Process

A complete walkthrough of the ISO 27001 certification journey, from selecting a certification body through Stage 1 and Stage 2 audits to achieving certified status.
Browse ISO 27001 topics

ISO 27001 Certification Process

Achieving ISO 27001 certification demonstrates to customers, partners, and regulators that your organization manages information security through a systematic, risk-based approach. The certification process can feel opaque if you have never been through it, but it follows a well-defined sequence of stages that are consistent worldwide.

This guide breaks down each phase so you know exactly what to expect, how long it takes, and where organizations commonly stumble.

Why Pursue Certification?

Many organizations operate an Information Security Management System (ISMS) without seeking formal certification. Certification adds external validation: an accredited certification body independently verifies that your ISMS meets the requirements of ISO/IEC 27001. This is increasingly important when enterprise customers require proof of security maturity during procurement, when regulators accept ISO 27001 as evidence of due diligence, or when your organization wants a structured improvement cycle rather than ad-hoc security efforts.

Choosing a Certification Body

A certification body (CB), sometimes called a registrar, is the organization that conducts your audit and issues your certificate. Only accredited CBs can issue recognized ISO 27001 certificates. Accreditation is granted by national bodies such as UKAS in the United Kingdom, ANAB in the United States, or JAS-ANZ in Australia and New Zealand.

When selecting a CB, consider:

  • Accreditation status. Confirm the CB is accredited for ISO/IEC 27001 by a member of the International Accreditation Forum (IAF).
  • Industry experience. Some CBs have deeper expertise in specific sectors like financial services, healthcare, or cloud technology.
  • Auditor availability. Lead times can vary from weeks to months depending on the CB's schedule.
  • Geographic coverage. If you have offices in multiple countries, choose a CB that can coordinate auditors across regions.
  • Cost and transparency. Fees vary. Request a detailed proposal that includes audit days, travel costs, and the surveillance audit schedule.

It is perfectly acceptable to get quotes from several CBs before committing. The CB should be independent and have no consulting relationship with your organization to avoid conflicts of interest.

Pre-Certification Preparation

Before engaging a certification body, most organizations go through a preparation phase that takes anywhere from three to twelve months depending on the maturity of existing security practices. Key activities during this phase include:

  1. Scoping the ISMS. Define the boundaries of your ISMS including locations, business processes, technologies, and organizational units. The scope statement is foundational and will be scrutinized during the audit.
  2. Conducting a gap analysis. Compare your current practices against the requirements in clauses 4 through 10 of ISO 27001 and the controls listed in Annex A. This reveals what needs to be built, documented, or improved.
  3. Implementing the ISMS. Build or refine your risk assessment process, create your Statement of Applicability, deploy controls, and establish the documentation required by the standard.
  4. Running an internal audit. ISO 27001 requires that you perform at least one internal audit before the certification audit. This is your chance to catch nonconformities while there is still time to fix them.
  5. Conducting a management review. Top management must review the ISMS to confirm it remains suitable, adequate, and effective. Document the inputs, decisions, and actions from this review.

Many organizations also run a pre-assessment or readiness review with their chosen CB. This optional step gives auditors a preliminary look at your documentation and controls without the formality of the certification audit.

Stage 1 Audit — Documentation Review

The Stage 1 audit is the first formal interaction with your certification body. Its primary purpose is to evaluate whether your ISMS documentation is in place and whether your organization is ready for the more detailed Stage 2 audit.

During Stage 1 the auditor will typically:

  • Review your ISMS scope, information security policy, risk assessment methodology, Statement of Applicability, and risk treatment plan.
  • Assess whether internal audits and management reviews have been completed.
  • Confirm that mandatory documented information exists for all required clauses.
  • Identify any areas of concern that could become nonconformities in Stage 2.
  • Visit your primary site (though some CBs conduct Stage 1 remotely for smaller scopes).

The Stage 1 audit usually lasts one to two days for small to mid-sized organizations. At the end the auditor issues a report highlighting any gaps that need to be resolved before Stage 2. There is typically a window of two to six months between Stage 1 and Stage 2 to address findings.

Stage 2 Audit — Implementation Verification

Stage 2 is the main certification audit. Auditors verify that your ISMS is not just documented but actually implemented, effective, and operating as described.

Stage 2 activities include:

  • Interviews with staff across departments to confirm that policies are understood and followed.
  • Evidence sampling. Auditors select samples of records, logs, change tickets, access reviews, incident reports, and other artifacts to confirm controls are working.
  • Process observation. Auditors may observe processes like onboarding, change management, or incident handling in real time.
  • Technical verification. Depending on scope, auditors may review firewall configurations, access control lists, backup procedures, or vulnerability scan results.
  • Evaluation of all Annex A controls declared applicable in your SoA.

Stage 2 typically takes three to ten audit days on-site depending on the size and complexity of the scope. At the conclusion the audit team classifies findings into three categories:

  • Major nonconformities. Significant failures that prevent certification until resolved.
  • Minor nonconformities. Isolated issues that must be corrected, usually within 90 days, but do not block certification.
  • Opportunities for improvement. Suggestions that are not mandatory but are noted for consideration.

If there are no major nonconformities, the auditor recommends certification. The CB's internal review panel then confirms the recommendation and issues the certificate.

Realistic Timelines

A realistic timeline from project kickoff to certificate in hand looks roughly like this:

PhaseDuration
Gap analysis and planning1–2 months
ISMS implementation3–9 months
Internal audit and management review1 month
Stage 1 audit1–2 days
Gap remediation between Stage 1 and Stage 21–3 months
Stage 2 audit3–10 days
Certificate issuance2–6 weeks after Stage 2

For a mid-sized technology company starting from moderate maturity, a nine to twelve month timeline is typical. Organizations with very little existing security structure should plan for twelve to eighteen months.

Common Pitfalls

  • Underestimating documentation requirements. ISO 27001 is specific about what must be documented. Missing a mandatory record can result in a nonconformity.
  • Treating it as a one-time project. Certification is the starting point, not the finish line. You will face surveillance audits annually and full recertification every three years.
  • Scope creep or scope too narrow. A scope that is too broad inflates cost and effort; a scope that is too narrow may not satisfy customer expectations.
  • Lack of management commitment. The standard explicitly requires top management involvement. Auditors look for evidence of leadership engagement, not just a signed policy.

After Certification

Receiving your certificate is a milestone, but the certification cycle continues with annual surveillance audits and a full recertification audit in year three. Maintaining a living ISMS with current risk assessments, up-to-date controls, and regular internal audits is essential to keeping your certification active.

Tools like episki help organizations stay audit-ready year-round by linking controls to evidence, automating review schedules, and surfacing gaps before external auditors arrive.

Related terms

Continue exploring

See how episki handles this

Start a free trial and explore controls, evidence, and automation firsthand.