Preparing for ISO 27001 Certification: An SME Roadmap

Summary: ISO 27001 preparation is a 6-12 month phased process: scope definition, risk assessment, SoA, implementing the 114 Annex A controls, and an internal audit. SMEs can start with 10-15 critical controls and mature toward certification step by step.
ISO 27001 is the international information-security management standard; it consolidates processes, policies, and controls into a systematic framework. It is often seen as the domain of large corporations, but SMEs can also obtain this certification with phased preparation. It starts with a customer or partner request, a tender requirement, or simply the desire for a mature security culture. This guide offers a practical roadmap at SME scale.
Why Does ISO 27001 Matter?
The standard offers 10 main clauses and 93 controls in Annex A to set up an information-security management system (ISMS). Certification is not just a document; it is a framework that matures the business's security processes. Benefits for SMEs:
- Meeting international customer/partner requirements
- Competitive advantage in tenders and bids
- Cyber-risk management becoming written
- Security culture reinforced through regular audits
- Improvements in insurance terms
- Natural overlap with KVKK compliance
Certification spans 8-12 months of preparation + audit.
Roadmap — 7 Phases
Phase 1: Scope and Top Management Support
The first step is defining the ISMS scope. The whole office, or a specific service? The process does not move without top-management approval; management's participation is captured as a written commitment.
Phase 2: Risk Assessment
Assets (servers, data, processes) are listed; for each, a threat, vulnerability, and impact map is drawn. A risk matrix (likelihood × impact) is built. High-risk areas are addressed first.
Phase 3: Control Selection and Application (Annex A)
From among the 93 controls, the ones suitable for the business are selected. For each control, application status: implemented, partial, not implemented, not applicable (with reason). An action plan is prepared for required controls.
Phase 4: Policy and Documentation
The ISMS policy, acceptable use, password, access, backup, incident response, and crisis management policies are written. Documents are version-controlled and approved.
Phase 5: Internal Audit
An independent internal auditor (external support is possible) audits the system. Non-conformities are reported, and corrective actions applied.
Phase 6: Management Review
Top management reviews the ISMS performance. Risk, incident, and internal audit results are evaluated; necessary resources and decisions are made.
Phase 7: External Audit (Certification)
An accredited certification body audits in two stages: documentation (Stage 1) and implementation (Stage 2). If the result is positive, the certificate is granted for 3 years; with surveillance audits annually.
Typical Timeline
| Phase | Duration |
|---|---|
| Scope + risk | 6-8 weeks |
| Control implementation | 3-4 months |
| Policy + training | 4-6 weeks |
| Internal audit | 2-3 weeks |
| Management review | 1 week |
| External audit | 2-4 weeks |
| Total | 8-12 months |
With phased planning, this process is predictable for SMEs.
Common Mistakes
- Starting without top-management support
- Leaving control selection vague ("all will be applied")
- Writing policies in copy-paste format (problems arise if they are not business-specific)
- Skipping the internal audit and going straight to external
- Not allocating enough time for employee training
- Underestimating annual surveillance audits
- Seeing the certificate as "one-time"; a living system is required
Real-World Examples
Example 1: Customer Demand at an Accounting Firm
An accounting firm started when an international customer required ISO 27001. After 10 months of preparation, the certification was obtained; the customer's audit cycle shortened, and additional business was won.
Example 2: Tender Requirement at a Manufacturing Site
A manufacturing site faced ISO 27001 as a prerequisite in public tenders. Supply-chain controls were strengthened; after certification, competitive standing improved.
Example 3: Corporate Maturation at a Consulting Firm
A consulting firm chose ISO 27001 preparation for internal discipline. At the end of the process, more than a certificate emerged — a security culture; employee satisfaction and customer trust grew.
How Does Yamanlar Bilişim Support This Process?
Yamanlar Bilişim manages the IT side of ISO 27001 preparation; policies, control implementations, and audit preparation are run tailored to your business. Coordination with the certification body is also provided.
Main areas where Yamanlar Bilişim can support:
- Scope definition and risk assessment
- Drawing the Annex A control map
- Adapting policy and procedure templates to the business
- Deployment of technical controls (MFA, logs, backup, encryption)
- Pre-internal-audit gap analysis
- Employee training program
- External-audit preparation and coordination with the auditor
- Post-certification annual surveillance support
FAQ
Frequently Asked Questions
How long is the certificate valid?
Valid for 3 years; surveillance audits are done annually.
What's the cost for an SME?
Including consulting, internal resources, and external audit, a preparation budget of USD 1-3K per month is typical; varies by business size.
Are KVKK and ISO 27001 the same?
No, but they overlap. KVKK is a legal requirement; ISO 27001 is a voluntary standard. The two support each other.
Can a small company really achieve it?
Yes. The scope can be kept small (a single product, single department). Scope is widened in later cycles.
Can policy templates be found free?
Templates are available online; using them without adapting to the business is risky. When auditors push for depth, copy-paste templates fall short.
Author
Serdar
Yamanlar Bilişim Expert
Writes content on IT infrastructure, cybersecurity, and digital transformation at Yamanlar Bilişim. Get in touch for any questions.
Professional Support
Get help on this topic
Let's design the Compliance and Data Protection solution you need together. Our experts get back to you within 1 business day.
support@yamanlarbilisim.com.tr · Response time: 1 business day
Keep Reading
Related Articles

IT Checklist for KVKK Compliance: 12 Concrete Items
The Personal Data Protection Law affects most IT processes. If technical and administrative measures are not translated into concrete controls, non-compliance risk persists. This article offers a practical 12-item IT checklist for SMEs.

Preventing Data Leakage with DLP: An Actionable Strategy for SMEs
Most data leaks happen not from outside but from inside, either deliberately or by accident. DLP (Data Loss Prevention) tools intelligently monitor and block the exit of sensitive data from the organization.