Preparing for an ISO 27001 audit: your ultimate roadmap to the ISO 27001 certification process
Photo: Unsplash
ISO/IEC 27001 is a globally recognized information security standard used by organizations across industries to build and maintain an Information Security Management System (ISMS). If you sell B2B, ISO 27001 can reduce security review friction, accelerate larger deals, and make your security program easier to explain.
But ISO 27001 is also rigorous: you must define scope, run risk assessment and treatment, implement controls, and prove they’re operating effectively—then pass a third-party certification audit.
This guide covers:
- What timelines look like (and what actually drives them)
- The three phases of the ISO 27001 certification process
- A practical 10-step roadmap—from scoping to Stage 1 and Stage 2
- Common pitfalls that slow audits (and how to prevent them)

GIF via GIPHY
Key takeaways
- ISO 27001 certification is a multi-phase journey: plan the ISMS, complete Stage 1 and Stage 2 audits, then keep controls effective for surveillance and recertification.
- Most teams take ~3–10 months to reach certification, depending on scope, maturity, and how disciplined your evidence workflow is.
- The audit is rarely the slowest part—the long pole is usually control implementation + evidence collection across systems and teams.
- Risk and scope decisions drive everything: tight scope + credible risk treatment plans reduce rework and audit churn.
- Continuous compliance matters: after certification you’ll face annual surveillance audits, so build a maintenance rhythm from day one.
How long does the ISO 27001 certification process take?
The ISO 27001 certification process typically takes three to ten months end-to-end.
That range is wide because it depends on:
- Organization size and complexity (people, systems, locations, vendors)
- Current security maturity (how much you need to implement vs formalize)
- Available bandwidth (whether this is a real project or “when we have time”)
- Evidence readiness (whether proof is centralized or scattered)
If you’re planning around a customer deadline, treat ISO 27001 like a product launch: define scope, assign owners, and run weekly checkpoints.
Related guides:
- How long does it take to get ISO 27001 certified?
- Step-by-step guide to the ISO 27001 certification process
- ISO 27001 risk assessment guide (audit-ready evidence)
- How much does ISO 27001 certification cost in 2026?
- Who needs ISO 27001 certification?
The 3 phases of the ISO 27001 certification process
It helps to think in three phases: build, audit, and maintain.
| Phase | What you’re doing | Typical time frame |
|---|---|---|
| Phase 1: Planning + preparation | Leadership buy-in, scope, ISMS foundations, risk assessment, initial policies and controls | 1–4+ months |
| Phase 2: Audit activities | Pick a certification body, internal audit, Stage 1 audit, Stage 2 audit, close findings | 2–6 months |
| Phase 3: Maintenance | Keep controls effective, refresh evidence, surveillance audits, recertification prep | Ongoing |
Important detail: ISO 27001 certificates are typically valid for three years, but you maintain them through surveillance audits (commonly annually in years 1 and 2) and a recertification audit in year 3.
ISO 27001 certification path: a 10-step roadmap
Below is a practical roadmap you can use to plan your ISO 27001 program and stay audit-ready.
1. Plan your ISO 27001 project (owners + timeline)
ISO 27001 is cross-functional. Even if Security drives it, you’ll need consistent involvement from IT, Engineering, HR, and leadership.
Start with a simple project map:
- Milestones (scope final, risk assessment done, control implementation complete, internal audit complete, Stage 1, Stage 2)
- Owners for each area (ISMS owner, risk owner(s), control owners, evidence owners)
- Evidence sources (IdP, HRIS, cloud, ticketing, MDM, code hosting, monitoring)
Practical tip: keep the plan visible (a single tracker) and run a short weekly ISO check-in to prevent “slow drift.”
2. Define your ISMS scope (tight, defensible, valuable)
Scope is the biggest lever on timeline and effort. Your ISMS scope defines what the auditor will evaluate, including:
- Products/services included
- Systems and information assets
- People/teams
- Locations (including remote work considerations)
- Third parties that affect in-scope services
Most teams go faster with a scope that’s:
- Customer-relevant (covers what buyers care about)
- Operationally controllable (you can enforce controls consistently)
- Not accidentally “everything” (avoid pulling in non-critical systems)
You’ll typically document this in an ISMS scope statement.
3. Run risk assessment + gap analysis (and decide what “good” looks like)
ISO 27001 requires a formal risk process (Clause 6), which means you must be able to show:
- Risk criteria (likelihood/impact definitions)
- A repeatable assessment method
- Risk treatment decisions and approvals
- Traceability from risks → controls → evidence → Statement of Applicability (SoA)
At the same time, run a gap analysis against ISO 27001 requirements and Annex A controls to identify what’s missing.
If you want the detailed workflow, see: Preparing for an ISO 27001 audit: risk assessment guide.
4. Implement missing controls (and build evidence as you go)
This is where most of the time goes. Your gaps will usually fall into three buckets:
- Technical controls (access control, logging, vulnerability management, backups, encryption, endpoint security)
- Process controls (change management, incident response testing, vendor lifecycle, access reviews)
- Administrative controls (policies, training, roles and responsibilities)
The fastest teams don’t “finish controls and then hunt for evidence.” Instead, they:
- Assign a control owner
- Define what evidence proves it
- Capture evidence continuously (not as a one-week scramble)
5. Train people (so controls are actually operational)
ISO 27001 expects organization-wide security awareness and role-appropriate training (for example, Annex A topics like awareness, acceptable use, access management, incident reporting).
Auditors commonly look for:
- Proof training was delivered (rosters, completion reports)
- Training content alignment to your policies
- A repeatable cadence (onboarding + periodic refresh)
6. Prepare for the certification audit (auditor, schedule, evidence plan)
ISO 27001 certification is performed by an accredited third-party certification body. Once you shortlist options:
- Confirm audit model (remote vs onsite) and logistics
- Plan Stage 1 and Stage 2 timing (and any expected lead time)
- Align stakeholders on availability for interviews
Before you lock dates, do an evidence inventory so you know what you can produce quickly.
7. Do a readiness assessment (pre-audit, not post-mortem)
Before Stage 1, run a readiness pass to reduce audit churn:
- Validate scope statement and SoA are consistent with reality
- Check evidence completeness for high-risk controls (access, change, incident, vendors)
- Make sure internal audit and management review requirements are met
If possible, have someone independent sanity-check your ISMS (internal auditor independent of the audited activities, or an external resource).
8. Pass Stage 1 (documentation + ISMS design review)
Stage 1 is primarily a documentation and readiness review. Auditors often request:
- ISMS scope statement
- Statement of Applicability (SoA)
- Information security policy + objectives
- Risk assessment methodology + risk treatment plan
- Internal audit results and management review evidence
If issues are found, they’ll be documented as nonconformities or areas requiring remediation before Stage 2.
9. Pass Stage 2 (control effectiveness + interviews)
Stage 2 is where the auditor validates the ISMS is operating in practice. Expect a mix of:
- Interviews (control owners, leadership, IT, Engineering)
- Evidence sampling (tickets, logs, access reviews, vendor reviews, training completions)
- Process walk-throughs (incident response, change management, joiner/mover/leaver)
Stage 2 goes smoother when evidence is organized by control and time-bounded (what period you’re claiming to operate the control for).
10. Maintain certification (surveillance + continuous improvement)
After certification, you’ll typically have:
- Surveillance audits in years 1 and 2
- Recertification audit before the end of year 3
Build a maintenance rhythm:
- Recurring access reviews and vendor reviews
- Periodic internal audits
- Management reviews
- Evidence freshness checks (so it doesn’t rot between audits)
ISO 27001 certification procedure: common challenges (and how to avoid them)
Most ISO 27001 programs struggle in predictable places.
| Challenge | What it looks like in real life | How to avoid it |
|---|---|---|
| Weak risk treatment plans | Risks exist, but treatments are vague or not approved | Tie every high risk to a specific treatment + owner + due date, and record approval |
| Incomplete evidence | “We do it” but can’t prove it consistently | Define evidence per control early and collect continuously |
| Competing priorities | ISO work stalls for weeks, then becomes an emergency | Weekly checkpoints, clear owners, and scope discipline |
| Third-party risk drift | Initial vendor review done, then never repeated | Set a trigger-based + annual reassessment cadence for critical vendors |
If you want a focused playbook on the evidence-heavy parts (risk and traceability), see: Preparing for an ISO 27001 audit: risk assessment guide.
Start your ISO 27001 certification process with SecureSlate
SecureSlate is an end-to-end compliance and trust management platform designed to reduce manual ISO 27001 work by keeping your program organized, evidence-driven, and continuously audit-ready.
Teams typically use SecureSlate to:
-
Map controls → owners → evidence (so requirements don’t live in spreadsheets)
-
Centralize policies, tasks, and audit artifacts (so audits don’t become scavenger hunts)
-
Run repeatable risk workflows (register, scoring, treatment plans, approvals)
-
Stay ready for surveillance audits with evidence freshness and review cadence
-
Request a demo: Talk to SecureSlate
-
Get started for free: Create your SecureSlate account
FAQ
Is ISO 27001 certification the same as implementing ISO 27001?
Not necessarily. You can implement ISO 27001 without pursuing certification. Certification means an accredited third party audited your ISMS and issued a certificate.
What’s the fastest realistic path to ISO 27001 certification?
Typically: tight scope, dedicated ownership, a clear evidence plan, and a steady cadence (not bursts). Many small, focused teams can reach audit readiness in a few months; complex environments often take longer.
What do auditors care about most in Stage 2?
Whether controls are operating effectively—not just written down. Expect questions about access control, change management, incident response, vendor oversight, and how you maintain evidence over time.
Disclaimer (legal note)
SecureSlate is not a law firm, and this article is for informational purposes only. It does not constitute legal, audit, or certification advice. For guidance specific to your organization, consult qualified legal and compliance professionals and your chosen certification body.
Need compliance without the complexity?
SecureSlate automates ISO 27001, SOC 2, GDPR, HIPAA, and more. Built for growing teams. See it in action.
No credit card required
May 4, 2026 · ISO 27001Comparisons and reviews
The best ISO 27001 compliance software for 2026
SecureSlate Team
May 4, 2026 · ISO 27001SOC 2
How CrowdComms and Henchman use ISO 27001 and SOC 2 together
SecureSlate Team
May 4, 2026 · GDPRISO 27001
GDPR vs ISO 27001: how they align, how they differ, and why you need both
SecureSlate Team