ISO/IEC 27001 · Information Security

ISO/IEC 27001 Compliance Services
Design, Implement & Certify Your ISMS

ISO/IEC 27001 is the international standard for Information Security Management Systems (ISMS) — providing a systematic, risk-based framework for managing information security across people, processes, and technology. SIRI Law LLP guides organisations from initial gap assessment through certification, with ongoing support for continual improvement and surveillance audits.

What It Is & Why It Matters

ISO/IEC 27001 Compliance Services: The Essentials

ISO/IEC 27001:2022 defines requirements for establishing, implementing, maintaining, and continually improving an ISMS. Certification requires an accredited third-party audit — validating that your information security controls are appropriately designed and operated. It is the world’s most widely recognised information security standard, with over 70,000 organisations certified globally.

The 2022 version introduced significant updates — including 11 new controls covering areas like threat intelligence, cloud security, data masking, and secure coding — and a restructured Annex A with 93 controls across 4 themes (Organisational, People, Physical, Technological).

SIRI Law LLP provides end-to-end ISO 27001 implementation support — from initial gap assessment and risk methodology through documentation, internal audit, management review, and certification audit support. Our legal team ensures the ISMS integrates seamlessly with DPDPA/GDPR obligations and sector-specific regulatory requirements.

Certification demonstrates a mature, systematic approach to information security — providing competitive differentiation, satisfying enterprise procurement requirements, and demonstrating regulatory accountability.

ISO 27001 certification is increasingly required by: enterprise customers before onboarding suppliers; regulated sectors (BFSI, healthcare, government) as a baseline security requirement; government and defence contracts; and cyber insurance underwriters for favourable terms.

Beyond certification, the ISMS provides lasting operational value — a documented risk register, clear security policies, defined incident response procedures, and a continual improvement cycle that keeps your security posture current as threats evolve.

Scope of Services

What Our Engagement Covers

Our Engagement Process

How We Work — Step by Step

1

Initial Scoping & Assessment

We conduct a gap assessment against the applicable framework, define the engagement scope, and produce a prioritised remediation roadmap with timeline and effort estimates.

2

Programme Design

We design the compliance programme — control framework, documentation structure, evidence requirements, and governance processes — tailored to your organisation.

3

Implementation Advisory

We advise on implementing each required control — working alongside your technical and operational teams to build controls that are practical and auditable.

4

Internal Audit & Validation

We conduct an internal audit or readiness assessment — identifying any remaining gaps before the formal certification or attestation process begins.

5

Certification / Attestation Support

We support the formal audit or assessment — managing auditor queries, providing evidence, and resolving findings on the day.

6

Post-Certification Advisory

After certification, we provide ongoing support — surveillance audit preparation, change management, and regulatory update advisory.

Typical engagement timeline varies by organisation size and existing control maturity.

Certified Engineers

Our Team Holds

CCSPCISMCIPPECEHOSCPCISSPCPENTISO 27001 LA

Integration Advantage

Our compliance engagements are backed by qualified legal counsel — ensuring your programme satisfies both technical certification requirements and legal obligations under DPDPA, IT Act, and sector-specific regulation.

Benefits & Deliverables

What You Get from This Engagement

Gap Assessment

We conduct a comprehensive gap assessment against ISO 27001:2022 Annex A — producing a prioritised remediation roadmap with effort estimates and a realistic certification timeline.

Risk Methodology Design

We design your risk assessment methodology — aligned with ISO 27005 and your organisational context — ensuring it is practical, auditable, and proportionate to your risk appetite.

Documentation Development

We develop the full ISMS documentation set — policies, procedures, records, and the Statement of Applicability — tailored to your organisation, not generic templates.

Control Implementation

We advise on implementing each required control — providing practical, technically sound guidance that satisfies the auditor without creating unnecessary operational burden.

Internal Audit

We conduct a rigorous pre-certification internal audit — identifying any remaining gaps and preparing your team for the Stage 2 certification audit.

Certification Audit Support

We are present during the certification audit — managing auditor queries, providing evidence, and resolving non-conformities on the day.

Post-Certification

After certification, we support ongoing compliance — surveillance audit preparation, continual improvement advisory, and change management as your environment evolves.

📄

Gap Assessment Report

Detailed gap analysis against all 93 Annex A controls — with RAG status, remediation recommendations, effort estimates, and certification timeline.

📄

ISMS Documentation Set

Complete documentation library — ISMS scope, information security policy, risk assessment methodology, risk register, SoA, and all required procedures and records.

📄

Internal Audit Report

Pre-certification internal audit findings with non-conformity management and evidence of corrective action.

📄

Certification Readiness Declaration

Formal confirmation that your ISMS is ready for Stage 2 certification audit — with outstanding items and risk acceptance documented.

📄

Post-Certification Advisory Retainer

Ongoing advisory for surveillance audits, change management, and continual improvement — keeping your certification current.

Frequently Asked Questions

How long does ISO 27001 certification take?

From gap assessment to certification, most organisations take 9–18 months. Smaller organisations with a limited ISMS scope and good existing controls can achieve certification in 6–9 months. Larger, complex organisations may take 18–24 months. We provide a realistic timeline after the gap assessment, based on your specific context.

What is the difference between ISO 27001 and SOC 2?

ISO 27001 is an international standard with mandatory certification by an accredited body — applicable to any organisation globally. SOC 2 is a U.S.-origin attestation framework specifically for service organisations (SaaS, cloud) — attested by a CPA firm against Trust Services Criteria. ISO 27001 is more globally recognised; SOC 2 is the de facto standard for U.S. enterprise SaaS procurement. Many organisations pursue both.

Do we need to certify the entire organisation?

No — ISO 27001 allows you to define a scope that covers specific services, systems, or locations. A focused scope can accelerate certification and reduce cost while still satisfying the requirements of most enterprise customers. We advise on scope definition as part of the gap assessment — balancing commercial value with implementation effort.

What does the annual surveillance audit involve?

After initial certification (which is valid for 3 years), accredited certification bodies conduct annual surveillance audits to verify your ISMS remains compliant and operational. Surveillance audits are less intensive than the initial certification audit — typically focusing on a subset of controls, ISMS objectives, and any identified non-conformities. We support all surveillance audits and the 3-year recertification.

Ready to Start Your ISO/IEC Journey?

All engagements begin with a complimentary scoping call. Let us understand your environment and propose the right approach.

Disclaimer: The information on this page is for general informational purposes only. Compliance requirements vary by organisation, sector, and jurisdiction. Engagement with SIRI Law LLP requires a formal retainer.
Note: Regulatory requirements are actively evolving. Advice reflects current standards; clients should seek updated guidance as frameworks develop.
Scroll to Top