ISO 27001 for SaaS Companies (2026)
practices·

ISO 27001 for SaaS Companies (2026)

A practical ISO 27001 guide for SaaS companies in 2026 — scoping, ISMS building, scaling with international customers, and running alongside SOC 2.

SaaS companies selling internationally hit the ISO 27001 question within their first three enterprise deals. European buyers ask for it. Japanese buyers ask for it. Middle Eastern buyers ask for it. And once you're past a certain revenue line, even American enterprise buyers will accept ISO 27001 in lieu of SOC 2.

The mistake most SaaS teams make is treating ISO 27001 as "SOC 2 for Europe." It isn't. ISO 27001 is a management system standard — the control requirements (Annex A) are only half the story. The real weight is in Clauses 4–10, which describe how you run an Information Security Management System. SOC 2 companies that skip this part fail certification audits.

This guide is for SaaS founders, CISOs, and compliance leaders deciding whether to pursue ISO 27001, or already working through certification. It assumes some familiarity with SOC 2 and focuses on what's different about ISO.

Why ISO 27001 Matters for SaaS

The business case:

  • International deal enablement. ISO 27001 is the global standard. SOC 2 is primarily North American. If you sell outside the US, ISO opens doors.
  • Partner and platform requirements. Cloud providers, marketplaces, and major partners increasingly list ISO 27001 as a preferred or required certification for publishing and co-selling.
  • Government and enterprise RFPs. Outside the US, ISO 27001 is often the default ask. A SOC 2 report gets marked as "nonstandard" and creates friction.
  • Risk management discipline. The ISO 27001 ISMS forces structural rigor (risk register, management review, continual improvement) that SOC 2 doesn't mandate. That rigor is valuable on its own.

For the foundational material, start with the ISO 27001 framework hub, the ISMS implementation page, the certification process page, and our ISO 27001 certification guide.

The ISO 27001 Structure

ISO 27001:2022 has two main parts:

  • Clauses 4–10 (the management system) — describe the ISMS: context, leadership, planning, support, operation, performance evaluation, improvement
  • Annex A (the controls) — 93 controls in four themes: Organizational, People, Physical, Technological

SOC 2 is heavy on controls. ISO 27001 is heavy on management system. This is the single most important distinction, and the one that most catches SOC 2-trained teams off guard.

AreaWhat Clauses 4–10 Require
ContextDefine scope, interested parties, internal/external issues
LeadershipDocumented policy, roles and responsibilities, management commitment
PlanningRisk assessment, risk treatment, SoA, objectives
SupportResources, competence, awareness, communications, documented information
OperationOperational planning, risk reassessment, risk treatment
Performance evaluationMonitoring, measurement, internal audit, management review
ImprovementNonconformity handling, corrective action, continual improvement

A SOC 2 program that happens to implement Annex A controls is not ISO 27001. The management system is where certification is earned.

Scoping the ISMS

Scope is your first and most consequential ISMS decision. It defines:

  • Which systems, people, processes, and locations are included
  • Which legal and regulatory requirements apply
  • What gets audited and certified

The SaaS scoping choices:

ApproachProsCons
Whole companySimplest narrative, most credibleMost expensive, most evidence
Production platform onlyLower cost, focused scopeCredibility questions from buyers
Specific product lineClear boundaryCreates confusion for multi-product buyers
Specific geographyRegulatory alignmentLimited marketability

For most SaaS companies, whole company with clear production platform emphasis is the right choice. Your buyers want to know your company is serious about security, not just one product team.

Publish the scope in your Statement of Applicability. Buyers will read it.

The Risk-Based Approach

ISO 27001 is fundamentally risk-based. You don't implement controls because the standard says so; you implement controls because your risk assessment says you need them. Then you document everything in the Statement of Applicability (SoA).

A defensible risk-based approach:

  1. Identify information assets — what you're protecting
  2. Identify threats and vulnerabilities — what could happen
  3. Assess likelihood and impact — how bad would it be
  4. Choose risk treatments — accept, mitigate, transfer, avoid
  5. Select Annex A controls to support treatments
  6. Document in SoA — which controls apply, which don't, and why

For each Annex A control you exclude, you must justify why. "Not applicable" with a one-sentence rationale is fine when it's genuinely not applicable (e.g., physical controls for a fully remote company with all assets at cloud providers). "Not implemented" requires more rigor.

Our statement of applicability glossary entry and the risk assessment framework page go deeper.

Annex A Controls Most SaaS Teams Underestimate

The 2022 version of Annex A reorganized into 93 controls across four themes. The ones that most often create gaps for SaaS:

  • A.5.7 Threat intelligence — Requires documented threat intelligence collection and use, not just reading security news
  • A.5.23 Information security for cloud services — Explicit cloud security program, not "we use AWS so we're fine"
  • A.5.30 ICT readiness for business continuity — BCP/DR with actual tests, not just documents
  • A.7.4 Physical security monitoring — Still applies even if you're cloud-native; your office or workforce locations need it
  • A.8.9 Configuration management — Baseline configurations documented and enforced
  • A.8.16 Monitoring activities — Security monitoring program with documented use cases, not just log aggregation
  • A.8.23 Web filtering — Yes, still a control
  • A.8.28 Secure coding — Documented secure development lifecycle with measurable practices

The auditor will ask to see evidence for each control you've marked applicable. "Evidence" means artifacts, records, documentation — not just a claim that you do it.

Our Annex A controls page has the full list with SaaS-relevant context.

The ISMS Components You Cannot Skip

Four management system components differentiate ISO 27001 from SOC 2:

1. Risk Assessment Methodology

Documented, repeatable, and applied consistently. Every asset (or asset group) assessed against threats with scored likelihood and impact. Updated on change and at least annually. The methodology itself is a document your auditor will review.

2. Internal Audit Program

An independent internal audit of your ISMS, conducted annually (or per your documented plan). "Independent" means not the team being audited. At small SaaS companies, you outsource this to a consultant; at larger ones, your internal audit function handles it. Not to be confused with your external certification audit.

3. Management Review

Top management reviews ISMS performance on a defined cadence (at least annually). Documented agenda items include:

  • Status of previous management review actions
  • Changes in external and internal issues
  • Feedback on information security performance
  • Audit results (internal and external)
  • Nonconformities and corrective actions
  • Opportunities for improvement

Output: decisions and actions. Minutes retained.

4. Continual Improvement

Documented process for identifying and acting on improvement opportunities. Nonconformities trigger corrective actions; corrective actions are tracked to closure; results feed into management review.

Certification Process

ISO 27001 certification is a two-stage external audit by an accredited certification body:

  • Stage 1 — Documentation review, scope review, readiness assessment. Findings identified as areas to address before Stage 2.
  • Stage 2 — On-site (or remote) operational audit. Auditors interview staff, review evidence, test controls. Findings classified as minor or major nonconformities.
  • Certification decision — The certification body issues the certificate (valid 3 years).
  • Surveillance audits — Years 1 and 2, lighter scope than recertification
  • Recertification — Year 3, full scope again

A typical SaaS ISO 27001 certification timeline:

PhaseDuration
ISMS design and documentation2–4 months
Implementation and evidence generation3–6 months
Internal audit and management review1 month
Stage 1 auditFew days, with remediation time after
Stage 2 audit3–10 days on-site depending on scope
Certification issuance4–8 weeks after Stage 2

Total: 8–14 months for a company starting from a mature SOC 2 baseline. 12–18 months from scratch.

For more detail, see our surveillance audits page and ISO 27001 implementation guide.

Running ISO 27001 Alongside SOC 2

About 60–70% of SOC 2 controls map to Annex A controls. The efficient pattern:

  • Map once — every SOC 2 control points to the relevant Annex A controls
  • Evidence once — your access review satisfies both
  • Audit twice — your SOC 2 auditor and ISO 27001 certification body both accept shared evidence

What ISO 27001 adds on top of SOC 2:

  • ISMS management system (Clauses 4–10)
  • Risk assessment methodology (formalized)
  • Statement of Applicability
  • Internal audit program
  • Management review
  • Continual improvement

These are not minor additions, but they're not duplicative of SOC 2 work either. Teams running both frameworks well report 20–30% incremental cost of adding ISO 27001 on top of a mature SOC 2 program — far less than running it standalone.

Our compliance framework comparison has the full side-by-side.

Scaling the ISMS with International Customers

As your customer base goes global, the ISMS has to flex:

  • Data residency requirements. Customers in EU, UK, Australia, Japan may require regional data storage. Your ISMS should document how you handle data residency commitments.
  • Sub-processor obligations. GDPR-style DPA requirements layer on top of ISO 27001. Many customers will sign one DPA after reviewing your certification.
  • Supply chain risk (A.5.19–A.5.23). Your vendor program scales to match customer expectations for fourth-party visibility.
  • Cryptographic controls (A.8.24). Key management expectations vary by region. Document your approach.
  • Legal and contractual requirements. Your context analysis (Clause 4.2) should reflect jurisdictions you operate in.

The strongest global SaaS programs run a single ISMS with documented variation by region rather than a separate ISMS per geography.

Cost and Timeline Expectations

Line ItemTypical Cost
Certification body Stage 1 + Stage 2 audit$25K–$80K
Surveillance audits (annual)$10K–$30K
Recertification (year 3)$25K–$70K
GRC platform$15K–$75K annual
Internal audit (outsourced)$10K–$25K annual
Penetration testing$20K–$60K annual
Consulting (optional, readiness support)$25K–$100K
Internal staffing (fractional to 1 FTE)$100K–$250K annual

Choosing a certification body: stay with a UKAS, ANAB, or similarly credible accreditation body. Non-accredited "certificates" are worth nothing to sophisticated buyers.

Common Pitfalls for SaaS

  • Skipping the ISMS and running it as a controls checklist. The management system is the point. Audits fail without it.
  • Weak risk assessment methodology. Too qualitative, too inconsistent, not applied to actual asset inventory.
  • Documentation sprawl. 200-page ISMS manuals nobody reads. Keep documentation lean and usable.
  • No internal audit program. Required. Skipping it fails the audit.
  • Management review as a formality. Your auditor will ask for agendas and minutes with evidence of actual discussion and decisions.
  • Scope creep or scope cheating. Excluding critical systems to reduce audit cost. Auditors notice.
  • SoA that isn't current. Every change to your control environment should update the SoA.
  • Weak change control for the ISMS itself. Your ISMS documentation needs version control and approval history.

How to Get Started

If you have SOC 2:

  1. Map your existing SOC 2 controls to Annex A
  2. Identify gaps (almost always in ISMS management system components)
  3. Build the four missing pieces: risk assessment methodology, internal audit, management review, continual improvement
  4. Finalize SoA
  5. Run internal audit and management review
  6. Engage certification body for Stage 1

If you don't have SOC 2 and are choosing between them:

  • International customer base → ISO 27001 first
  • US enterprise focus → SOC 2 first
  • Mix of both → Start with SOC 2, add ISO 27001 in 12 months (or run them in parallel)

FAQ

Q: Is ISO 27001 harder than SOC 2? A: Structurally more demanding because of the management system, but not necessarily harder. The controls are roughly equivalent in effort. The ISMS discipline is what takes teams off guard.

Q: Can a US SaaS company skip ISO 27001 and just do SOC 2? A: If you never sell internationally, yes. Once you start selling to European, Japanese, Australian, or Middle Eastern buyers, ISO 27001 becomes expected. Waiting to add it delays deals.

Q: What's the difference between ISO 27001 and ISO 27002? A: ISO 27001 is the certifiable standard with requirements. ISO 27002 is the accompanying guidance document with detailed implementation advice for Annex A controls. You're certified against ISO 27001 and use ISO 27002 for implementation help.

Q: Do we need to re-certify every year? A: No. Certification is valid 3 years with lighter-touch surveillance audits in years 1 and 2. Year 3 is full recertification.

Q: Can we use the same auditor for SOC 2 and ISO 27001? A: Sometimes. Some firms do both, some don't. Separate auditors is common and not a problem; shared auditor saves coordination overhead.


ISO 27001 is the global information security standard. For SaaS companies selling internationally, it's the trust artifact that unlocks deals SOC 2 can't. Run it as a management system, not a checklist, and the certification is earned — not bought.

Explore the ISO 27001 hub, ISMS implementation guide, and our SaaS industry page for more. Ready to manage multi-framework compliance on one platform? Start with episki.