0121 222 5630

Email Aristi Ltd Follow Aristi Ltd on Facebook Follow Aristi Ltd on Twitter Follow Aristi Ltd on LinkedIn Follow Aristi Ltd on Google Plus


You are here:

ISO/IEC 27001 Compliance.

What is ISO/IEC 27001?

Information is a critical asset for every organisation whether they operate in the public or private sector. It is therefore vital to appropriately protect that information and the systems it resides on. Security breaches cost UK companies millions of £’s every year, and it is not only financial cost that impacts – damage to reputation and client confidence can have as detrimental an affect as loss of availability.

Recent high profile data breaches and the subsequent fines show that businesses still haven’t got this right, even though may of the breached organisations have ISO 27001 certification.

For ISO 27001 to make a real difference, it has to be embedded into the business so that it drives behavior and is part of the DNA of the organsation. Anything less is just a certificate on the wall.

Information comes in many forms including personnel data, financial records, customer information and business strategy. And if you store, manage or process information for your customers you also have responsibility for the security of their data as well as your own! It is therefore vital to implement appropriate security controls to protect not only the assets but your brand reputation, and potentially that of your customer, and if you think IT alone is the answer you couldn’t be further from the truth. Over 80% of security breaches come from within the organisation as a result of poor policy, procedures and staff awareness training.

That’s why organisations are exploring the benefits of complying or certifying to ISO/IEC 27001:2013. This standard provides a baseline minimum set of controls which cover the people, places and process requirements you need in order to provide staff, suppliers and customers with confidence in your data security. Certifying to the standard can give a real competitive edge in today’s technology led environment and we have a proven track record in taking companies through the process to successful certification.

What are the benefits of compliance?

ISO/IEC 27001:2013 is the only auditable standard that provides a framework for establishing an Information Security Management System (ISMS). Certifying your ISMS against ISO/IEC 27001:2013 can bring the following benefits to your organization:

  • Demonstrates the independent assurance of your internal controls and meets corporate governance and business continuity requirements
  • Independently demonstrates that applicable laws and regulations are observed
  • Provides a competitive edge by meeting contractual requirements and demonstrating to your customers that the security of their information is paramount
  • Independently verifies that your organizational risks are properly identified, assessed and managed, while formalizing information security processes, procedures and documentation
  • Proves your senior management’s commitment to the security of information held by the organisation
  • The regular assessment process helps you to continually monitor your performance and improve
What can we do to help?

We look at your entire organisation and mould ISO 27001 around it ensuring that security and the associated process are proportionate to your risks, pragmatic and business enabling (rather than hindering). We embed the standard into your business so that it becomes part of ‘business as usual’ by developing processes that support the business objectives, in essence aligning the ISMS to the business vision.

Our aim is to reuse as much of your existing investment in security policies and procedures as possible. In order to achieve this, our approach is based on working with you to understand what has been achieved to date, update and implement policies and procedures as required to meet the standard, develop an Information Security Management System (ISMS) and implement a security awareness program to enforce compliance.

Our approach is based on the following activity:

  • Understand the your business, processes and procedures
  • Work with you to define a scope for the ISMS in relation to key assets and business processes.
  • This will form the basis for the subsequent compliance implementation activities
  • Review the existing asset list and risk assessment methodology and use this or suggest an alternative as required to conduct a risk assessment against the ISMS scope. Determine appropriate management action and priorities for managing information security risks
  • Review the existing security policy documents, update them as required to meet ISO/IEC 27001:2013 requirements and work with you to implement the policies
  • Develop a Statement of Applicability and provide advice and guidance on the selection and implementation of adequate and proportionate security controls such as policies, procedures and technical functions
  • Develop and deliver a security awareness program to your staff
  • Provide advice and guidance on the creation of a ‘security culture’ within your business
  • Once all the requirements of ISO/IEC 27001:2013 have been met, conduct an independent audit against the standard and document the findings in a formal report. Provide a certificate of compliance

ISO/IEC 27001:2013 consultancy services include:

  • Gap Analysis
  • Risk Assessment Risk Remediation/Treatment Plans
  • Statement of Applicability (SOA)
  • Policy Development
  • Awareness Training
  • Management Presentations
  • Pre-certification Audits to ISO/IEC 27001:2013.

Our consultants are qualified ISO/IEC 27001:2013 Lead Auditors with many years experience of delivering information security services. We can help your organisation to comply with the requirements of ISO/IEC 27001:2013 or achieve formal certification against the standard.


Please contact Aristi to discuss your requirements. Filling in the form below is the quickest way to get in touch with the relevant person at Aristi.


Keep up-to-date with insights and info on all areas of Information Assurance, Information Security, Penetration Testing & Data Sharing from the award-winning consultants Aristi.

Latest Tweets

If Marriott Hotels couldn’t protect their data when they were subject to data breaches, how can your business?:… https://t.co/2DKYoum6zP
17 sleeps till #Christmas !
Getting into the #Halloween spirit! https://t.co/57jpAuer3m

Subscribe to our Newsletter

Latest Blog Posts

  • 500 million customers can’t sleep easy with Marriott data breach

    The world’s largest hotel chain, Marriott Hotels, announced on Friday (November 30, 2018) that half a billion of its customers’ data had been breached dating as far back as 2014. Marriott owns more than 5,800 properties around the world with 1.1 million rooms spread across more than 110 countries[.  That makes this incident is a […]

    Written on Wednesday, 12 December 2018
  • Virtual Data Protection Officer

    The GDPR introduces a duty for you to appoint a data protection officer (DPO) if you are a public authority, or if you carry out certain types of processing activities. To support your on going GDPR compliance and management requirements, we can provide a Virtual Data Protection Officer (vDPO) service giving you access to independent […]

    Written on Thursday, 10 May 2018
  • Protecting Businesses with Cyber Essentials

    The lack of basic cyber security controls remains a significant factor in the vast majority of cyber attacks in the UK today. Businesses are left worried about hackers, data loss and security, and are not sure where to turn. The scale of the threat is nothing new.  The media now regularly covering stories of data […]

    Written on Monday, 05 March 2018