Depending on company size, the ISO 27001 process can take multiple years and cost tens of thousands of dollars. Here's the breakdown.
September 21, 2022
Cybersecurity and regulatory compliance are the two biggest concerns of today’s corporate boards, according to Gartner. A growing number of companies are choosing to adopt a trusted security framework, and ISO 27001, as a globally recognized certification, is the framework of choice for many. In fact, ISO 27001 saw a 24.7% increase in worldwide certifications in 2020 alone.
Clearly, ISO 27001 is valuable. But it’s not cheap. In some cases, the hard costs of the full, three-year certification cycle can add up to $75,000—and that doesn’t include the cost of the time your employees will need to spend on the process.
Let’s take a look at how to calculate the costs involved in becoming certified and share some tried and true ways of minimizing those costs.
ISO 27001 is a multi-stage process, and each stage includes a different set of costs. We’ll break down each stage and look at the costs involved. Because certification costs depend heavily on company size, we’ll simplify things by taking a small start-up with 50 employees as our example.
During the readiness stage of the certification process, your company will need to do some of the heaviest lifting. This is the stage during which you need to define the scope of your information security management system (ISMS), identify where sensitive information is stored, conduct a risk assessment, and then implement the policies and controls that mitigate those risks.
You’ll prepare a Statement of Applicability (SoA), which summarizes the controls you implemented and provides a justification for those you chose not to implement, and a risk treatment plan, which outlines how your organization will respond to all risks that were identified in your risk assessment.
And finally, you’ll train your team to support the new ISMS and conduct an internal audit to make sure you’re ready for the external auditor to review your documentation.
The costs involved in this stage vary widely, from $10,000 to nearly $40,000, depending on the option you choose.
The most expensive way to complete the readiness stage can sometimes seem like the least expensive at first glance. After all, isn’t the DIY route usually the best way to save money?
But when you factor in the cost of your internal team’s time, the real cost of getting through the initial stage of ISO 27001 without any help becomes devastatingly clear. Let’s take the average salary of a senior analyst—the role with the skills to lead this stage of the process. At $118K per year, every day of this person’s time costs about $491. With the readiness stage requiring between two and four months to complete, the cost of having an employee complete the work unaided will be $24,583 to $39,333, making this the most expensive option.
While hiring a consultant may seem like an expensive way to get through the readiness stage, it’s likely to cost your organization less overall. Consultancy fees average $30,000, so they’re not negligible, but in return, you can leave most of the heavy lifting, including time-intensive documentation and the internal audit, in the hands of your consultant. In this scenario, your high-dollar engineering lead can go back to focusing on supporting product development and operations.
Investing in a compliance can further reduce costs. Compliance software delivers a clear value proposition, whether used in conjunction with a consultant or as part of a DIY approach. By automating evidence collection, streamlining workflows, and providing prebuilt templates for best-practice policies and procedures, a platform reduces workload significantly.
In fact, if your head of engineering is leading the readiness stage, it will cut the amount of time required by 88%. In other words, instead of spending four months at a cost of $39,333, your engineer can spend just four weeks at a cost of $4,720. Even factoring in the cost of the platform at $3,000, it’s still the least expensive option.
There are two main stages to the audit-certification process. Stage 1 is the documentation audit, and stage 2 is the certification audit. The cost of securing an auditor for these stages will run between $14,000 and $16,000 for a small start-up.
The difference in auditor costs is largely dependent on the prestige of the auditor you choose. Hiring a Big Four firm (PwC, Deloitte, Ernst & Young, and KPMG) comes at a premium, but in exchange, you’ll get certified by a high-profile, highly respected company. For some companies, the extra cost is worth it. For others, a reputable, accredited boutique auditing firm may be a better fit.
When deciding which type of auditor to choose, consider these two key questions:
If the answer to either question is a “yes,” the extra cost could be well worth it.
Once your company passes the certification audit, it is fully ISO 27001 certified. However, to maintain certification, you must undergo a surveillance audit annually in years one and two, plus a recertification audit in year three.
The surveillance audits are less intensive than the initial documentation and certification audits, so they are likely to cost less—usually between $6,000 and $7,500 each. The recertification audit is as detailed as the original certification audit, so you can expect it to cost as much.
As you can see, many variables can affect the cost of becoming ISO 27001 certified. In addition to the size of your company and the scope of your ISMS, the decision to move forward with a consultant, a compliance platform, or a pure DIY approach can have a big impact on the ultimate price tag. Here’s a chart that sums it all up.
Webinar
This DataGuidance webinar explores the latest and expected developments in the implementation of the NIS 2 Directive, focusing on practical compliance strategies to ensure your organization is prepared.
Webinar
Discover how to use OneTrust Compliance Automation to establish client baselines, improve efficiency, and drive scalability. Learn key strategies to enhance your compliance impact.
Webinar
Discover strategies to embed compliance and risk management into business processes with minimal disruption, using technology-driven solutions for efficiency, scalability, and improvement.
Webinar
Join our webinar to learn how to optimize security posture, streamline compliance, and leverage automation to manage IT risk in today's complex digital landscape. Register now!
Webinar
Join our upcoming product release webinar to explore how these new capabilities can help your organization navigate complex frameworks, streamline third-party management, and accelerate AI and data innovation.
Webinar
Join our live demonstration and see how Compliance Automaiton can help boost compliance efficiency with automated workflows, shared evidence, and 40+ frameworks.
Webinar
Master the fundamentals of constructing robust compliance frameworks that can seamlessly integrate with organizational operations while aligning with regulatory and strategic mandates to deliver measurable insights on your progress and gaps.
Webinar
Unlock tech risk management & compliance excellence. Master risk management, build robust frameworks, and foster cross-functional collaboration for long-term resilience.
Webinar
Join us as we explore OneTrust Compliance Automation, a holistic and fully integrated solution that streamlines and optimizes workflows, compliance, and attestation.
Webinar
Join us as Ryan Karlin, Senior Director of Product Marketing highlights important updates from TrustWeek including an inside look into OneTrust's new platform features that make it easier for customers to activate data responsibly, surface and mitigate risk, and navigate the complex regulatory environment.
Report
Download the full OCEG research report for a snapshot of what organizations are doing to govern their AI efforts, assess and manage risks, and ensure compliance with external and internal requirements.
Infographic
Download our infographic to learn about the new DORA regulation, who needs to comply, and how OneTrust can help streamline the process.
Webinar
Join us for a deep dive into embedding privacy by design into the fabric of your business to promote the responsible use of data.
Infographic
Download our infographic to learn the main challenges faced during risk assessments, proven frameworks for assessing risks, and how to translate guidance into action.
Webinar
Join our PCI DSS webinar where we discuss how Certification Automation can help free up valuable InfoSec resources, streamline audits, and stay continuously compliant.
eBook
How can your business use third-party messaging apps while staying compliant? Dive into key usage considerations based on the DOJ’s 2023 guidance.
Webinar
Join our webinar for insights on transforming InfoSec program management. Navigate the complexities of modern security with a flexible, scalable, and cost-effective approach.
Infographic
What key challenges do CISOs face going into the new year? Download this infographic to hear what experts from industries across the board have to say.
eBook
Get your free guide to the NIST Cybersecurity Framework 2.0 and learn how its proposed changes will impact your InfoSec programs.
Resource Kit
Download our NIST CSF Essentials resource kit and master cybersecurity compliance with expert insights, strategies, and real-world case studies.
Webinar
Join our webinar to learn more about the European Data Protection Seal and to find out what the key advantages of getting certified.
Checklist
This SOC 2 checklist provides clear action steps that enable you to mature your security program and fast-track your way to compliance.
Data Sheet
Explore how OneTrust integrations can help you automate compliance with today’s most popular InfoSec frameworks.
Webinar
Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.
Infographic
Learn the ins and outs of Europe’s top InfoSec and cybersec frameworks, including ISO 27001, UK Cyber Essentials, the NIS2 Directive, DORA, and more.
Infographic
Streamline and scale your organization’s InfoSec compliance program by focusing on these five key areas of automation.
eBook
In this free eBook, we explore the basics of three top InfoSec frameworks and how to decide which is the best fit for your organization.
Webinar
Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.
eBook
Download this eBook and get the insights you need to safeguard customer privacy and ensure responsible data use in the information lifecycle.
Webinar
Join our live webinar and hear from security professionals on how to get ISO 27001 certified, streamline audit preparation, and demonstrate security assurance across any regulatory jurisdiction.
eBook
Download our eBook to learn practical advice on how to approach third-party risk management like an InfoSec expert.
Webinar
In this webinar, you will hear first-hand from information security experts experts what are the key pain-points and their strategies to be audit ready.
Webinar
In this webinar, learn how to right-size your compliance scope for different frameworks across various business dimensions and enable an agile audit process.
Webinar
Learn how to enable an agile audit process by breaking down complex InfoSec requirements into actionable tasks to help automate your compliance program.
eBook
Learn how to respond to the security landscape and build a proactive InfoSec program to help your customers and business.
eBook
Ensure your enterprise IT risk assessment is a success with a top-down approach that gets executive buy-in from the start
eBook
As a unified business function, DevSecOps combines rapid software development with top-notch security at scale.
Webinar
Learn how scaling your approach to managing IT assets & risk assessments can deliver a complete picture to better measure and inform program investments.
Webinar
Avoid these 5 critical mistakes when answering security questionnaires and streamline responses with this webinar.
Webinar
Watch this webinar to learn what makes a successful risk management program and how effective security teams build trust.
Webinar
Prepare for privacy and security incidents by building an incident management playbook.