All of your ISO 27001 Compliance and Audit questions, answered!

Planning an audit? These will help.
For anything else, just ask.

What does having ISO 27001 certification mean?

ISO 27001 certification means an organisation operates a fully functioning Information Security Management System (ISMS) that identifies risks, applies appropriate controls, and maintains security through continuous monitoring and improvement. It signals to customers and partners that the organisation follows internationally recognised best practices for protecting information.

Is ISO/IEC 27001 mandatory?

ISO 27001 is not legally mandatory in most countries, but it is strongly expected in industries handling sensitive, regulated, or large-scale data. Many enterprise clients, government frameworks, and supply chains require suppliers to be ISO 27001-certified as part of due diligence or procurement processes.

What are the three principles of ISO 27001?

ISO 27001 is built on the CIA triad: Confidentiality, Integrity, and Availability. These three principles guide every risk assessment and control decision within the ISMS, ensuring information is protected from unauthorised access, alteration, and disruption.

What are the 4 domains of ISO 27001?

ISO 27001 groups its Annex A controls into four domains: Organisational controls, People controls, Physical controls, and Technological controls. Together, they provide a comprehensive structure for protecting information across governance, human behaviour, facilities, and technical systems.

How much does ISO 27001 certification cost?

ISO 27001 certification costs vary widely based on organisation size and scope. Smaller companies may spend £4,000–£12,000 on external audits, while medium and larger organisations typically spend £12,000–£20,000+. Additional costs include internal resources, tooling, training, and ongoing ISMS maintenance.

What are the 10 clauses of ISO 27001?

The 10 clauses of ISO 27001 form the structure of the Information Security Management System (ISMS). Clauses 1–3 cover scope, references, and definitions. Clauses 4–10 contain the mandatory requirements: understanding organisational context, leadership responsibilities, planning and risk treatment, supporting processes, operational controls, performance evaluation, and continual improvement. Together, these clauses define how an ISMS must be built, documented, monitored, and enhanced over time.

What are 1st, 2nd, and 3rd party audits in ISO 27001?

A 1st-party audit is an internal audit carried out by your organisation to check whether the ISMS is working correctly.A 2nd-party audit is performed by customers or partners who want assurance that your controls meet their requirements.A 3rd-party audit is conducted by an accredited certification body and determines whether you achieve ISO 27001 certification.All three audit types play different roles in maintaining trust, compliance, and ongoing ISMS maturity.

What are the 5 pillars of ISO 27001?

The 5 pillars often used to describe ISO 27001 are: leadership commitment, risk-based thinking, documented processes, control implementation, and continual improvement. These pillars reflect how an organisation must approach security holistically — involving governance, operational discipline, risk management, and long-term refinement of the ISMS.

Is ISO 27001 a legal requirement?

ISO 27001 itself is not a law, but it directly supports compliance with major regulations such as GDPR, NIS2, HIPAA, and PCI DSS. Many industries require ISO 27001 as part of supplier assurance, government procurement, and large-scale data handling. While not legally mandated, it is increasingly treated as the expected baseline for demonstrating robust, auditable information security.

What does the ISO 27001 risk-based approach mean?

ISO 27001 requires organisations to identify information security risks, assess their impact and likelihood, and select appropriate controls to treat them. This risk-based approach ensures security investments are proportional to the threats the organisation actually faces. Instead of applying controls blindly, ISO 27001 ensures every control decision is justified, documented, and aligned with real business risks.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Feel in Total Control of Compliance?

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.