The ISO 27001 Certification Process: From Gap Analysis to Stage 2 Audit
What actually happens during ISO 27001 certification — the phases, timelines, costs, and what auditors check at each stage. A process guide for organizations pursuing certification for the first time.
The Certification Timeline
ISO 27001 certification is not a single event — it’s a multi-phase project that typically takes 6-18 months depending on your starting point.
Fast track (3-6 months): Organizations with existing security programs — SOC 2, ISO 9001, or mature internal controls. Narrow ISMS scope, dedicated project lead, management buy-in already secured. This timeline is aggressive and requires near-full-time ISMS work from at least one person.
Typical (6-12 months): Organizations starting from scratch with 50-500 employees. Requires a dedicated ISMS lead (at least 50% time allocation), external consultant for guidance, and active management participation. This is the most common timeline for first-time certifications.
Complex (12-18 months): Multi-site organizations, regulated industries (healthcare, financial services), complex supply chains, or resource-constrained teams that can only dedicate part-time effort. The delay is usually in the implementation phase — building controls across many departments takes time.
The phases below describe the typical 6-12 month path.
Phase 1: Gap Analysis (Weeks 1-4)
Before building anything, assess where you are. A gap analysis evaluates your current security posture against ISO 27001 requirements — both the management system clauses (4-10) and the Annex A controls.
What it covers:
- Do you have a documented risk assessment process?
- Are security policies in place and communicated?
- Which of the 93 Annex A controls are already partially or fully implemented?
- Does management actively participate in security governance?
- Do you have existing compliance work (SOC 2, PCI DSS, HIPAA) that transfers?
Output: A gap report listing what exists, what’s missing, and what needs improvement. This report drives the project plan — without it, you’re guessing at priorities.
The gap analysis is the phase where organizations discover whether certification is a 6-month project or a 12-month project. An organization with SOC 2 and a security team might find 60% of controls are already addressed. An organization without formal security practices might find gaps in nearly every clause.
The ISO 27001 Readiness Assessment provides a self-service gap analysis — it evaluates your organization against all 93 Annex A controls and 7 mandatory clauses, estimates your readiness score, and identifies specific documentation gaps.
Phase 2: ISMS Design and Documentation (Weeks 4-16)
This is the heaviest phase — building the management system and its documentation. The output is the complete set of policies, procedures, and plans that constitute your ISMS.
Key deliverables:
ISMS Scope (Clause 4.3): Define exactly what’s covered. For a SaaS company, this might be "the development, hosting, and support of [Product Name], including all cloud infrastructure and corporate IT systems used by [Company Name] employees." The scope determines audit complexity and cost — narrower is cheaper.
Risk Assessment (Clause 6): Run your documented methodology against the scoped assets and processes. Identify risks, evaluate likelihood and impact, determine which risks require treatment. Output: the risk register and risk treatment plan.
Statement of Applicability (Clause 6.1.3d): Map each of the 93 Annex A controls against your risk assessment results. Mark each as applicable or not applicable with justification. For applicable controls, document implementation status and references to implementing documents.
Policies and Procedures: Write the core documents — Information Security Policy, Access Control Policy, Incident Response Procedure, Business Continuity Plan, Supplier Security Policy, and others identified in the gap analysis. Every policy must be specific to your organization, not generic templates with your logo.
Records Templates: Create the templates you’ll use to generate ongoing evidence — management review minutes, internal audit checklists, training records, incident logs, access review records.
Phase 3: Implementation and Evidence Collection (Weeks 12-28)
Documentation describes intent. Implementation creates evidence. This phase overlaps with Phase 2 — you start implementing controls as policies are finalized.
What implementation means:
- Technical controls deployed (endpoint protection, logging, access controls, encryption, backup)
- Processes operating (incident response procedure tested, access reviews conducted, training delivered)
- Records being generated (training completion logs, access review outputs, incident reports, change management records)
The critical gap: Many organizations produce excellent documentation in Phase 2 but don’t generate implementation evidence. At Stage 2, the auditor asks: "Your Access Control Policy says privileged access is reviewed quarterly. Show me the last two reviews." If no reviews were conducted, the policy is empty.
Allow at least 8-12 weeks of active implementation before the Stage 2 audit. This gives you enough time to generate evidence of operating controls — completed access reviews, resolved incidents (or documented absence of incidents), management review minutes, internal audit findings addressed.
Evidence collection is continuous. From the moment you implement a control, start collecting evidence. Security awareness training? Log who attended and when. Access reviews? Document the review, findings, and actions taken. Incident response? Even a "no incidents this month" report counts as evidence that the process is monitored.
Phase 4: Internal Audit and Management Review (Weeks 24-32)
Before the certification body arrives, you must conduct your own internal audit and management review. Both are mandatory — skipping either is a major nonconformity.
Internal Audit (Clause 9.2)
The internal audit must cover all ISMS clauses and a representative sample of Annex A controls. It produces an audit report documenting findings, including nonconformities and observations.
Critical requirement: auditor independence. The person who implemented a control cannot audit it. For small organizations, practical options include:
- Train a non-IT employee to audit IT controls
- Hire an external consultant for the internal audit
- Cross-audit: IT audits HR controls; HR audits IT controls
Don’t aim for a clean internal audit. Finding nonconformities in your internal audit is expected and healthy — it demonstrates the ISMS is working. What matters is that you document the findings and address them through corrective actions before the certification audit.
Management Review (Clause 9.3)
A formal meeting where senior management reviews ISMS performance. Required inputs include: internal audit results, security objective performance, nonconformity and corrective action status, changes in external/internal context, and opportunities for improvement.
The meeting must produce documented outputs (minutes). Informal discussions without recorded decisions don’t satisfy the requirement. Schedule this meeting at least 4 weeks before Stage 1 to ensure the outputs are available for the auditor.
Phase 5: Stage 1 Audit (Documentation Review)
The certification body conducts the Stage 1 audit — typically 1-2 days, either on-site or remote.
What the auditor checks:
- ISMS scope statement (Clause 4.3)
- Information Security Policy (Clause 5.2)
- Risk assessment methodology and results (Clause 6.1.2, 8.2)
- Statement of Applicability (Clause 6.1.3d)
- Risk treatment plan (Clause 6.1.3e)
- Internal audit program and reports (Clause 9.2)
- Management review outputs (Clause 9.3)
- Document control evidence (Clause 7.5)
What the auditor is looking for: Evidence that the ISMS is designed to meet the standard. They’re not verifying implementation yet — that’s Stage 2. They’re checking that the documentation framework exists and makes sense.
Possible outcomes:
- Proceed to Stage 2 — documentation is satisfactory. The auditor may note observations (improvement suggestions) but no blocking issues.
- Minor nonconformities — specific documentation gaps that must be addressed before Stage 2. Common examples: missing SoA management approval, incomplete risk assessment, no internal audit report.
- Major nonconformities — fundamental gaps that require significant rework. Rare if you’ve followed the process above, but possible if core documents are missing or the ISMS design doesn’t meet the standard.
Stage 1 to Stage 2 gap is typically 4-12 weeks — enough time to address any Stage 1 findings.
Phase 6: Stage 2 Audit and Beyond
The Stage 2 audit verifies that controls are actually operating — not just documented. Typically 2-5 days depending on organization size and ISMS scope.
How auditors work: The auditor selects controls from the SoA and traces the evidence chain: risk register to risk treatment plan to SoA to implementing document to evidence of operation. They interview staff ("walk me through your incident response process"), request records ("show me the last access review"), and observe processes.
Common Stage 2 findings:
- Policies exist but no implementation evidence (the "documented vs. implemented" gap)
- Access reviews documented in policy but never actually conducted
- Internal audit conducted by control owners (independence violation)
- Risk assessment that doesn’t connect to control selection
- Management review without the required inputs from Clause 9.3.2
Possible outcomes:
- Certification recommended — the ISMS conforms to ISO 27001:2022. Minor observations may be noted for improvement.
- Minor nonconformities — specific gaps that must be corrected within an agreed timeframe (typically 90 days). You can still receive certification once corrections are verified. Minor NCs are normal and expected.
- Major nonconformities — fundamental conformance failures. Certification is withheld until resolved.
After certification: The certificate is valid for 3 years. Annual surveillance audits (years 1 and 2) verify ongoing maintenance — typically 1-2 days covering a sample of clauses and controls. The full recertification audit occurs in year 3. Failure to maintain the ISMS (no internal audits, no management reviews, no corrective actions) can result in certificate suspension.
Choosing a Certification Body
The certification body (CB) conducts your Stage 1 and Stage 2 audits. Choosing the right CB affects cost, timeline, and audit quality.
Accreditation matters. Ensure the CB is accredited by a recognized national accreditation body — UKAS (UK), ANAB (US), DAkkS (Germany), or another IAF member. Certificates from unaccredited bodies may not be recognized by customers or procurement teams.
Selection criteria:
- Accreditation body recognition: UKAS-accredited certificates are the most widely recognized internationally. ANAB is the US equivalent.
- Industry experience: A CB with technology sector experience will understand SaaS-specific controls better than one focused on manufacturing.
- Lead auditor background: Ask for auditor CVs. An auditor with hands-on security experience asks better questions and provides more useful observations.
- Timeline: Stage 1 to Stage 2 scheduling varies by CB — some can schedule within 4 weeks, others require 12+ weeks.
- Cost: CBs compete on price. Get 2-3 quotes. Stage 1 + Stage 2 fees for a small organization range from $5,000 to $20,000.
Practical tip: Don’t use the same firm for both consulting and certification. While not explicitly prohibited, it creates an independence concern that sophisticated customers may question. Use a consultant to help build the ISMS; use an independent CB to certify it.
Find your compliance gaps
ISO 27001 consultants charge $15,000-$50,000 for gap analysis and implementation support
Start your assessmentRelated tools
CMMC Level 2 Readiness
Free CMMC Level 2 readiness quiz. Estimate your SPRS score across all 14 NIST 800-171 control domains, identify your top gaps, and understand what it takes to pass a C3PAO assessment.
Cybersecurity ComplianceSOC 2 Gap Assessment
Free SOC 2 readiness assessment. Evaluate your posture against AICPA Trust Service Criteria at the control level, identify gap areas, and estimate cost and timeline to audit readiness.