
ISO 27001 for SaaS Companies (2026)
SaaS companies selling internationally hit the ISO 27001 question within their first three enterprise deals. European buyers ask for it. Japanese buyers ask for it. Middle Eastern buyers ask for it. And once you're past a certain revenue line, even American enterprise buyers will accept ISO 27001 in lieu of SOC 2.
The mistake most SaaS teams make is treating ISO 27001 as "SOC 2 for Europe." It isn't. ISO 27001 is a management system standard — the control requirements (Annex A) are only half the story. The real weight is in Clauses 4–10, which describe how you run an Information Security Management System. SOC 2 companies that skip this part fail certification audits.
This guide is for SaaS founders, CISOs, and compliance leaders deciding whether to pursue ISO 27001, or already working through certification. It assumes some familiarity with SOC 2 and focuses on what's different about ISO.
Why ISO 27001 Matters for SaaS
The business case:
- International deal enablement. ISO 27001 is the global standard. SOC 2 is primarily North American. If you sell outside the US, ISO opens doors.
- Partner and platform requirements. Cloud providers, marketplaces, and major partners increasingly list ISO 27001 as a preferred or required certification for publishing and co-selling.
- Government and enterprise RFPs. Outside the US, ISO 27001 is often the default ask. A SOC 2 report gets marked as "nonstandard" and creates friction.
- Risk management discipline. The ISO 27001 ISMS forces structural rigor (risk register, management review, continual improvement) that SOC 2 doesn't mandate. That rigor is valuable on its own.
For the foundational material, start with the ISO 27001 framework hub, the ISMS implementation page, the certification process page, and our ISO 27001 certification guide.
The ISO 27001 Structure
ISO 27001:2022 has two main parts:
- Clauses 4–10 (the management system) — describe the ISMS: context, leadership, planning, support, operation, performance evaluation, improvement
- Annex A (the controls) — 93 controls in four themes: Organizational, People, Physical, Technological
SOC 2 is heavy on controls. ISO 27001 is heavy on management system. This is the single most important distinction, and the one that most catches SOC 2-trained teams off guard.
| Area | What Clauses 4–10 Require |
|---|---|
| Context | Define scope, interested parties, internal/external issues |
| Leadership | Documented policy, roles and responsibilities, management commitment |
| Planning | Risk assessment, risk treatment, SoA, objectives |
| Support | Resources, competence, awareness, communications, documented information |
| Operation | Operational planning, risk reassessment, risk treatment |
| Performance evaluation | Monitoring, measurement, internal audit, management review |
| Improvement | Nonconformity handling, corrective action, continual improvement |
A SOC 2 program that happens to implement Annex A controls is not ISO 27001. The management system is where certification is earned.
Scoping the ISMS
Scope is your first and most consequential ISMS decision. It defines:
- Which systems, people, processes, and locations are included
- Which legal and regulatory requirements apply
- What gets audited and certified
The SaaS scoping choices:
| Approach | Pros | Cons |
|---|---|---|
| Whole company | Simplest narrative, most credible | Most expensive, most evidence |
| Production platform only | Lower cost, focused scope | Credibility questions from buyers |
| Specific product line | Clear boundary | Creates confusion for multi-product buyers |
| Specific geography | Regulatory alignment | Limited marketability |
For most SaaS companies, whole company with clear production platform emphasis is the right choice. Your buyers want to know your company is serious about security, not just one product team.
Publish the scope in your Statement of Applicability. Buyers will read it.
The Risk-Based Approach
ISO 27001 is fundamentally risk-based. You don't implement controls because the standard says so; you implement controls because your risk assessment says you need them. Then you document everything in the Statement of Applicability (SoA).
A defensible risk-based approach:
- Identify information assets — what you're protecting
- Identify threats and vulnerabilities — what could happen
- Assess likelihood and impact — how bad would it be
- Choose risk treatments — accept, mitigate, transfer, avoid
- Select Annex A controls to support treatments
- Document in SoA — which controls apply, which don't, and why
For each Annex A control you exclude, you must justify why. "Not applicable" with a one-sentence rationale is fine when it's genuinely not applicable (e.g., physical controls for a fully remote company with all assets at cloud providers). "Not implemented" requires more rigor.
Our statement of applicability glossary entry and the risk assessment framework page go deeper.
Annex A Controls Most SaaS Teams Underestimate
The 2022 version of Annex A reorganized into 93 controls across four themes. The ones that most often create gaps for SaaS:
- A.5.7 Threat intelligence — Requires documented threat intelligence collection and use, not just reading security news
- A.5.23 Information security for cloud services — Explicit cloud security program, not "we use AWS so we're fine"
- A.5.30 ICT readiness for business continuity — BCP/DR with actual tests, not just documents
- A.7.4 Physical security monitoring — Still applies even if you're cloud-native; your office or workforce locations need it
- A.8.9 Configuration management — Baseline configurations documented and enforced
- A.8.16 Monitoring activities — Security monitoring program with documented use cases, not just log aggregation
- A.8.23 Web filtering — Yes, still a control
- A.8.28 Secure coding — Documented secure development lifecycle with measurable practices
The auditor will ask to see evidence for each control you've marked applicable. "Evidence" means artifacts, records, documentation — not just a claim that you do it.
Our Annex A controls page has the full list with SaaS-relevant context.
The ISMS Components You Cannot Skip
Four management system components differentiate ISO 27001 from SOC 2:
1. Risk Assessment Methodology
Documented, repeatable, and applied consistently. Every asset (or asset group) assessed against threats with scored likelihood and impact. Updated on change and at least annually. The methodology itself is a document your auditor will review.
2. Internal Audit Program
An independent internal audit of your ISMS, conducted annually (or per your documented plan). "Independent" means not the team being audited. At small SaaS companies, you outsource this to a consultant; at larger ones, your internal audit function handles it. Not to be confused with your external certification audit.
3. Management Review
Top management reviews ISMS performance on a defined cadence (at least annually). Documented agenda items include:
- Status of previous management review actions
- Changes in external and internal issues
- Feedback on information security performance
- Audit results (internal and external)
- Nonconformities and corrective actions
- Opportunities for improvement
Output: decisions and actions. Minutes retained.
4. Continual Improvement
Documented process for identifying and acting on improvement opportunities. Nonconformities trigger corrective actions; corrective actions are tracked to closure; results feed into management review.
Certification Process
ISO 27001 certification is a two-stage external audit by an accredited certification body:
- Stage 1 — Documentation review, scope review, readiness assessment. Findings identified as areas to address before Stage 2.
- Stage 2 — On-site (or remote) operational audit. Auditors interview staff, review evidence, test controls. Findings classified as minor or major nonconformities.
- Certification decision — The certification body issues the certificate (valid 3 years).
- Surveillance audits — Years 1 and 2, lighter scope than recertification
- Recertification — Year 3, full scope again
A typical SaaS ISO 27001 certification timeline:
| Phase | Duration |
|---|---|
| ISMS design and documentation | 2–4 months |
| Implementation and evidence generation | 3–6 months |
| Internal audit and management review | 1 month |
| Stage 1 audit | Few days, with remediation time after |
| Stage 2 audit | 3–10 days on-site depending on scope |
| Certification issuance | 4–8 weeks after Stage 2 |
Total: 8–14 months for a company starting from a mature SOC 2 baseline. 12–18 months from scratch.
For more detail, see our surveillance audits page and ISO 27001 implementation guide.
Running ISO 27001 Alongside SOC 2
About 60–70% of SOC 2 controls map to Annex A controls. The efficient pattern:
- Map once — every SOC 2 control points to the relevant Annex A controls
- Evidence once — your access review satisfies both
- Audit twice — your SOC 2 auditor and ISO 27001 certification body both accept shared evidence
What ISO 27001 adds on top of SOC 2:
- ISMS management system (Clauses 4–10)
- Risk assessment methodology (formalized)
- Statement of Applicability
- Internal audit program
- Management review
- Continual improvement
These are not minor additions, but they're not duplicative of SOC 2 work either. Teams running both frameworks well report 20–30% incremental cost of adding ISO 27001 on top of a mature SOC 2 program — far less than running it standalone.
Our compliance framework comparison has the full side-by-side.
Scaling the ISMS with International Customers
As your customer base goes global, the ISMS has to flex:
- Data residency requirements. Customers in EU, UK, Australia, Japan may require regional data storage. Your ISMS should document how you handle data residency commitments.
- Sub-processor obligations. GDPR-style DPA requirements layer on top of ISO 27001. Many customers will sign one DPA after reviewing your certification.
- Supply chain risk (A.5.19–A.5.23). Your vendor program scales to match customer expectations for fourth-party visibility.
- Cryptographic controls (A.8.24). Key management expectations vary by region. Document your approach.
- Legal and contractual requirements. Your context analysis (Clause 4.2) should reflect jurisdictions you operate in.
The strongest global SaaS programs run a single ISMS with documented variation by region rather than a separate ISMS per geography.
Cost and Timeline Expectations
| Line Item | Typical Cost |
|---|---|
| Certification body Stage 1 + Stage 2 audit | $25K–$80K |
| Surveillance audits (annual) | $10K–$30K |
| Recertification (year 3) | $25K–$70K |
| GRC platform | $15K–$75K annual |
| Internal audit (outsourced) | $10K–$25K annual |
| Penetration testing | $20K–$60K annual |
| Consulting (optional, readiness support) | $25K–$100K |
| Internal staffing (fractional to 1 FTE) | $100K–$250K annual |
Choosing a certification body: stay with a UKAS, ANAB, or similarly credible accreditation body. Non-accredited "certificates" are worth nothing to sophisticated buyers.
Common Pitfalls for SaaS
- Skipping the ISMS and running it as a controls checklist. The management system is the point. Audits fail without it.
- Weak risk assessment methodology. Too qualitative, too inconsistent, not applied to actual asset inventory.
- Documentation sprawl. 200-page ISMS manuals nobody reads. Keep documentation lean and usable.
- No internal audit program. Required. Skipping it fails the audit.
- Management review as a formality. Your auditor will ask for agendas and minutes with evidence of actual discussion and decisions.
- Scope creep or scope cheating. Excluding critical systems to reduce audit cost. Auditors notice.
- SoA that isn't current. Every change to your control environment should update the SoA.
- Weak change control for the ISMS itself. Your ISMS documentation needs version control and approval history.
How to Get Started
If you have SOC 2:
- Map your existing SOC 2 controls to Annex A
- Identify gaps (almost always in ISMS management system components)
- Build the four missing pieces: risk assessment methodology, internal audit, management review, continual improvement
- Finalize SoA
- Run internal audit and management review
- Engage certification body for Stage 1
If you don't have SOC 2 and are choosing between them:
- International customer base → ISO 27001 first
- US enterprise focus → SOC 2 first
- Mix of both → Start with SOC 2, add ISO 27001 in 12 months (or run them in parallel)
FAQ
Q: Is ISO 27001 harder than SOC 2? A: Structurally more demanding because of the management system, but not necessarily harder. The controls are roughly equivalent in effort. The ISMS discipline is what takes teams off guard.
Q: Can a US SaaS company skip ISO 27001 and just do SOC 2? A: If you never sell internationally, yes. Once you start selling to European, Japanese, Australian, or Middle Eastern buyers, ISO 27001 becomes expected. Waiting to add it delays deals.
Q: What's the difference between ISO 27001 and ISO 27002? A: ISO 27001 is the certifiable standard with requirements. ISO 27002 is the accompanying guidance document with detailed implementation advice for Annex A controls. You're certified against ISO 27001 and use ISO 27002 for implementation help.
Q: Do we need to re-certify every year? A: No. Certification is valid 3 years with lighter-touch surveillance audits in years 1 and 2. Year 3 is full recertification.
Q: Can we use the same auditor for SOC 2 and ISO 27001? A: Sometimes. Some firms do both, some don't. Separate auditors is common and not a problem; shared auditor saves coordination overhead.
ISO 27001 is the global information security standard. For SaaS companies selling internationally, it's the trust artifact that unlocks deals SOC 2 can't. Run it as a management system, not a checklist, and the certification is earned — not bought.
Explore the ISO 27001 hub, ISMS implementation guide, and our SaaS industry page for more. Ready to manage multi-framework compliance on one platform? Start with episki.
ISO 27001 Certification for Insurance Companies (2026)
A practical ISO 27001 guide for insurance carriers, reinsurers, and insurtech in 2026 — global operations, ISMS scoping, regulatory overlap, and certification economics for insurance.
ISO 27001 Certification: A Step-by-Step Implementation Guide
A practical, step-by-step guide to ISO 27001 certification — from gap analysis and ISMS setup through Stage 1 and Stage 2 audits.