Skip to content.
Request a demo
Request a demo

This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply to the reCAPTCHA services. You can learn more about how NAVEX processes your personal data by reviewing the NAVEX privacy statement.

Demo successfully requested! A team member will reach out soon to schedule your demo session.

If you need help or want further info in the meantime, feel free to give us a call at 1-866-297-0224.

Have a nice day. :)

ISO 27001 Compliance & Certification

What is ISO 27001?

ISO 27001 specifies the requirements for the policies, procedures and processes that comprise a company’s information security management system (ISMS). This international standard was developed to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an ISMS.

Let's get started

Addressing ISO 27001 compliance and certification

ISO 27001 uses a top-down, risk-based approach. Earning certification in this standard is not based on adhering to a set of predetermined rules. Instead, an organization is certified based on a set of controls that are specific to its risks. These controls comprise the company’s Statement of Applicability, a document that ISO auditors use to certify against.

ISO 27001 certification is not a checkbox list of requirements. It’s an ongoing process of cataloging risks, assessing the severity of risks, applying controls, planning for remediation, and providing evidence that an organization is performing the tasks it identified as important to its risk management. The certification also requires organizations continually improve their operations from a risk-based perspective.

Download the Datasheet

What You Need

Risk-Based Approach

Link IT risks to business risks for an enterprise-wide view of risk.

Defensibility

Implement API integrations with technology providers.

Steps You Can Take for ISO 27001 Management

Step 1

Identify and document threats, vulnerabilities, and impacts

Step 2

Design and implement a comprehensive program of information security controls

Step 3

Develop a management process to ensure that the information security controls continually meet information security needs