Back to HomeISO 27001

ISO 27001 ISMS Implementation Guide: Building an Information Security Management System from Scratch

11 min min read
#ISO 27001#ISMS#Information Security Management System#Internal Audit#Management Review#PDCA#Continual Improvement#Risk Assessment

ISO 27001 ISMS Implementation Guide: Building an Information Security Management System from Scratch

ISO 27001 ISMS Implementation Guide: Building an Information Security Management System from Scratch

You've been assigned the task of "implementing ISO 27001."

Now what?

This article will tell you what ISMS is, how to build it from scratch, and how to conduct internal audits. Practical-oriented, no empty talk.

For a complete introduction to ISO 27001, see ISO 27001 Complete Guide.


What is ISMS?

ISMS Definition

ISMS stands for Information Security Management System.

In plain language: A system for managing your company's information security.

Note that it's a "management system," not a piece of software or tool.

ISMS includes:

ComponentDescription
PoliciesCompany's commitment and direction for security
ProceduresProcesses and steps for doing things
PeopleWho is responsible for what
TechnologyFirewalls, encryption, access control, etc.
RecordsEvidence that you've done things

Relationship with ISO 27001

ISO 27001 is the standard for building ISMS.

ConceptDescription
ISO 27001Tells you "what ISMS should look like"
ISMSThe "actual system" built according to ISO 27001

So when we say "implement ISO 27001," we actually mean "build an ISMS that conforms to ISO 27001."

PDCA Continual Improvement Cycle

The core spirit of ISMS is the PDCA cycle.

PhaseFull NameWhat to Do
PPlanAssess risks, develop plans
DDoImplement controls
CCheckMonitor effectiveness, internal audit
AActImprove issues, continuously optimize

Key point: This is a "cycle," not a one-time thing.

Every year (or even every quarter) you need to go through this cycle again.

Want to implement ISMS but don't know where to start? Book a free consultation and let us help you plan.


8 Steps to ISMS Implementation

Step 1: Obtain Management Commitment

Why is this important?

Without management support, nothing can be done.

ISMS requires:

  • Manpower (who will do it)
  • Budget (consultant fees, certification fees, tools)
  • Time (employees need to cooperate)
  • Authority (can require departments to change)

All of these need management approval.

How to do it?

Prepare a presentation for management explaining:

ItemContent
Why do thisCustomer requirements, tender needs, risk management
How much it costsEstimate of consulting + certification fees
How much manpowerWhich people need to be involved
Expected benefitsWhich tenders and customers you can win
TimelineHow long until you can get the certificate

Output: Management commitment letter (can be meeting minutes or formal document)

Step 2: Define ISMS Scope

Why is this important?

Not the entire company needs to be included in ISMS.

Scope too large: High cost, high complexity Scope too small: Limited certificate value

How to define it?

Consider these factors:

FactorDescription
Customer requirementsWhich service does customer require to be certified
Business coreWhat is the most important business
Risk levelWhich area has the highest risk
Budget constraintsHow large a scope can you afford

Common approaches:

  • Only include a certain department (e.g., R&D)
  • Only include a certain service (e.g., SaaS product)
  • Only include a certain location (e.g., headquarters)

Output: ISMS scope document

Step 3: Risk Assessment

This is the core of ISMS.

Risk assessment determines which controls you need to implement.

Steps:

StepDescriptionExample
1. Asset inventoryList information assets within scopeServers, databases, documents
2. Threat identificationEvents that could harm assetsHacker attacks, employee negligence
3. Vulnerability identificationWeaknesses that could be exploitedNo encryption, weak passwords
4. Impact assessmentHow serious the consequencesScore 1-5
5. Likelihood assessmentHow likely to occurScore 1-5
6. Risk value calculationImpact × LikelihoodScore 1-25
7. Risk prioritizationDetermine priority orderHigh risk first

Output: Risk register

Step 4: Establish Controls

Based on risk assessment results, decide which controls to implement.

Steps:

  1. For each risk, choose treatment approach (mitigate, transfer, avoid, accept)
  2. If choosing "mitigate," select appropriate controls
  3. Reference ISO 27001 Annex A's 93 controls
  4. Can also use controls outside Annex A

Output:

  • Risk treatment plan
  • Statement of Applicability (SoA)

For detailed control explanations, see ISO 27001 Clause Guide.

Step 5: Documentation

ISMS needs documents for support.

Four-tier documentation system:

TierTypeExample
Tier 1PolicyInformation Security Policy
Tier 2ProcedureRisk Assessment Procedure, Incident Management Procedure
Tier 3Work InstructionBackup SOP, Account Request SOP
Tier 4RecordsRisk Register, Audit Records

Document writing principles:

  • What's written should match what's done
  • Don't write just for the sake of writing
  • Concise and clear is better than lengthy and detailed
  • Maintain version control

Output: Policies, procedures, SOPs, forms

Step 6: Training

Employees won't do what they don't know.

Training targets and content:

TargetTraining Content
All employeesSecurity awareness, policy understanding
IT staffTechnical control operations
ManagementISMS concepts, management responsibilities
Internal auditorsAudit techniques and methods

Training methods:

  • In-person courses
  • Online learning
  • Awareness emails
  • Posted announcements

Output: Training records, sign-in sheets

Step 7: Implementation and Operation

Put plans into action.

WorkDescription
Implement controlsInstall firewalls, set permissions, establish processes
Execute proceduresOperate according to written procedures
Record activitiesKeep evidence of execution
Handle incidentsHandle according to incident management procedure

Key point: Keep records; auditors will review them.

Output: Operational records

Need professional help with implementation? Let us help, accompanying you from planning to execution.

Step 8: Monitoring and Measurement

After doing, confirm if it's effective.

Monitoring ItemDescription
Security objective achievementAre objectives being met
Control effectivenessAre controls working
Security incident countAre incidents increasing or decreasing
Training completion rateHave employees completed training

Output: Monitoring reports, KPI records


Internal Audit Practices

Internal Auditor Role and Qualifications

What do internal auditors do?

  • Check if ISMS complies with standard requirements
  • Check if actual operations match documented procedures
  • Find issues, propose improvement suggestions

Qualification requirements:

RequirementDescription
IndependenceCannot audit your own work
CompetenceUnderstand ISO 27001 standard
TrainingRecommend taking internal auditor course

Common approaches:

  • Small companies: Cross-department mutual audits
  • Large companies: Dedicated audit team
  • Or: Outsource audits

Audit Plan Development

An audit plan must be developed annually.

Plan content:

ItemDescription
Audit scopeWhich departments/processes to audit
Audit scheduleWhen to audit
Auditor assignmentWho audits which area
Audit criteriaWhat standard to audit against

Principles:

  • Audit all scope at least once a year
  • High-risk areas can increase frequency
  • Usually do internal audit before certification audit

Audit Execution Techniques

Three audit steps:

StepWhat to Do
1. PrepareRead documents, prepare checklists
2. ExecuteInterview, review records, observe operations
3. ReportOrganize findings, write report

Interview techniques:

  • Ask open-ended questions ("How do you do...")
  • Ask them to demonstrate actual operations
  • Request to see records and evidence
  • Stay objective, non-judgmental

Audit focus:

  • Are they following procedures
  • Are they keeping records
  • Are records complete and accurate
  • Do people understand their responsibilities

Nonconformity Handling

When issues are found, classify them.

ClassificationDefinitionExample
Major nonconformitySystemic deficiency, serious impactNever did risk assessment
Minor nonconformitySingle deficiency, limited impactOne record not signed
ObservationImprovement suggestion, not a deficiencySuggest increasing backup frequency

Handling process:

  1. Record: Clearly describe the issue found
  2. Analyze: Find root cause
  3. Correct: Take improvement measures
  4. Verify: Confirm improvement is effective
  5. Close: Update records

Management Review

Review Input Items

Data management must review:

Input ItemContent
Previous review follow-upExecution status of previous decisions
Internal/external changesRegulatory changes, business changes
Security performance reportObjective achievement rate, incident statistics
Audit resultsInternal audit, external audit findings
Stakeholder feedbackCustomer, employee opinions
Risk assessment resultsRisk change status
Improvement opportunitiesAreas that can be done better

Review Output Items

Decisions management must make after review:

Output ItemDescription
Resource needsNeed to add manpower/budget
Improvement decisionsWhat to improve, how to improve
Objective adjustmentsDo security objectives need modification
ISMS changesDoes scope, policy need adjustment

Meeting Minutes Key Points

Management review records are documents auditors must review.

Records must include:

  • Meeting time, location
  • Attendees (including senior management)
  • Data reviewed
  • Discussion content
  • Decisions made
  • Responsible persons and deadlines

Common deficiencies:

  • Senior management didn't attend
  • Only sign-in sheet, no substantial discussion records
  • Decisions not followed up

Continual Improvement

Corrective Actions

Process when issues are found:

StepDescription
1. Immediate responseControl problem, reduce impact
2. Cause analysisFind root cause (not just surface cause)
3. Take corrective actionPrevent issue from recurring
4. Verify effectivenessConfirm corrective action worked
5. Update documentsUpdate procedures, risk assessment if needed

Cause analysis techniques:

  • 5 Why analysis: Keep asking "why" 5 times
  • Fishbone diagram: Analyze from people, machine, material, method, environment

Preventive Actions

Don't wait for problems to occur before addressing them.

Sources of preventive actions:

  • Potential risks found in risk assessment
  • Observations from audits
  • New threats shown in security intelligence
  • Employee improvement suggestions

Identifying Improvement Opportunities

ISMS isn't just "maintaining status quo"—it should "continuously improve."

Methods to identify improvement opportunities:

MethodDescription
BenchmarkingSee how others do it
Technology updatesIntroduce new security tools
Process optimizationSimplify cumbersome procedures
Feedback analysisCollect employee, customer opinions

FAQ: Common ISMS Questions

Q1: How long does ISMS implementation take?

By company size:

  • Small enterprise: 4-6 months
  • Medium enterprise: 6-12 months
  • Large enterprise: 12-18 months

This is time until "ready to apply for certification," not "finished." ISMS operates continuously.

Q2: Can we do it without dedicated security staff?

Yes, but recommended:

  • Assign one project lead
  • Get consultant assistance
  • Have each department provide support

It can't be done with absolutely no one invested.

Q3: Must internal audit be done internally?

Not necessarily. Options:

  • Train internal auditors yourself
  • Commission external consultants
  • Mix of both (do it yourself + external guidance)

Key point is independence—auditors cannot audit their own work.

Q4: Can ISMS documents use existing ones?

Yes. ISO 27001 doesn't require specific formats.

If existing documents already cover required content, use them directly or modify slightly.

Q5: How much effort does ISMS maintenance require?

Approximately per year:

  • Risk assessment update: 1-2 weeks
  • Internal audit: 1-2 weeks
  • Management review: 1-2 days
  • Daily maintenance: Ongoing
  • Surveillance audit cooperation: 2-3 days

Next Steps

Building ISMS from scratch isn't easy, but with professional consultant assistance, the entire process goes much smoother.

Book a free consultation, from planning to execution, CloudInsight accompanies you through the entire journey.

We provide:

  • Gap analysis
  • Document templates
  • Guidance services
  • Internal audit assistance
  • Certification support

Further Reading


References

Need Professional Cloud Advice?

Whether you're evaluating cloud platforms, optimizing existing architecture, or looking for cost-saving solutions, we can help

Book Free Consultation

Related Articles