ISO 27001 Compliance Services

Get guidance to ISO 27001 certification.

Whether you’re looking to implement a full ISO 27001 Information Security Management System for certification or just looking to benchmark your security program against ISO 27001, we can help.

ISO 27001 Assessment Services

We perform all assessments against the ISO 27001 framework. While most organizations use ISO as a security measuring stick, the true intent of the framework is intended to be a purposeful selection and customized listing of security controls for your company.

Our assessments include an evaluation of ISO 27001 Annex A controls. 

A.5: Information security policies (2 controls)

A.6: Organization of information security (7 controls)

A.7: Human resource security – 6 controls that are applied before, during, or after employment

A.8: Asset management (10 controls)

A.9: Access control (14 controls

A.10: Cryptography (2 controls)

A.11: Physical and environmental security (15 controls)

A.12: Operations security (14 controls)

A.13: Communications security (7 controls)

A.14: System acquisition, development and maintenance (13 controls)

A.15: Supplier relationships (5 controls)

A.16: Information security incident management (7 controls)

A.17: Information security aspects of business continuity management (4 controls)

A.18: Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls)

ISO 27001 Implementation Services

We’ve helped many organizations align with and certify to the ISO 27001 Information Security Management Standard. There are many benefits to aligning with or certifying to ISO 27001, some benefits are listed in our blog post.

We’ve helped many clients implement or maintain their ISO 27001 Information Security Management System. Our flexibility and ability to work with many different parts of an organization make us a Trusted Partner of many Fortune 500 Companies. Our methodology is as follows:

Phase 1: Preparation and Pre-work

Your company your goals and objectives of the ISO 27001 Implementation (i.e. Certification, Reductions in Cost, or other) will drive the amount of pre-work to complete. Preparation for an audit will require a much higher degree of rigor than an organization self-selecting alignment with the Information Security Management Standard. As needed, we’ll partner with your team and your company to identify and prioritize the objectives, seem stakeholder commitment, develop asset inventories, and assist in scoping your environment.

Phase 2: Gap Assessment

After gathering asset lists, seeking management support, and defining scope we can begin our assessment your environment against the ISO 27001 controls. During this phase we’ll gather the list of gaps which will be the foundation for the risk assessment.

l

Phase 3: Risk Assessment

In this phase we’ll focus our conversations and assessment to gaps identified and begin assessing their context to your business, how the gaps impact critical assets, how the gaps might impact strategic goals and objectives. This allows us to begin prioritizing the risks that most relevant to your business.

Phase 4: Risk Treatment Plan

Here we can begin measuring risk impacts, which risks to accept, avoid, transfer, or mitigate to an acceptable level using Information Security controls.

Phase 5: Information Security Risk Management

Based on the outputs from Phase 4 we can begin to manage any risks identified. Whether you transfer the risk via insurance policies, or implement Security Controls we can assist helping to ensure the controls are implemented correctly and risk has been remediated.

Phase 6 & 7: Audit Preparation & Certification

For clients seeking to obtain certification, Phase 6 is prepare for the Audit via a readiness review and double-checking all documentation is complete and in place. Phase 7 is the actual audit by a certified external audit firm.

Splunk

Recent Blog Posts

Building an Information Security Management System with ISO 27001

Who Needs ISO 27001? Every day we hear from organizations being asked if they are 27001 compliant and what they need to do to become compliant. The ISO 27001 standard provides a very well-rounded assessment to prove you have an effective information security...

What is an ISO 27001 Information Security Management System (ISMS)?

By: Justin Fimlaid What does it mean when ISO 27001 references an ISMS? An ISMS stand for Information Security Management System. This essentially means that it is a programmatic structure that allows you to build a security framework and controls specific to and...

4 Things To Know About The Ohio Data Protection Act

By: Justin Fimlaid The Ohio Data Protection Act was passed in August of 2018 and went into effect as of November 2018. What's unique about this data protection law is that it's unlike recently passed privacy legislation recently seen in California and Colorado. 1....

Tenable IO Sensor Deployment Best Practices

By: Justin Fimlaid Every organization has different needs related to their vulnerability management program. This varies from the scanner used (cloud or on premise), the places where sensors are deployed, the technology environment, and the needs of your vulnerability...