ISO/IEC 27001:2022 Implementation & Certification Readiness SOW
Statement of Work (SOW) Overview
Engagement Objective:
To support the client in achieving ISO/IEC 27001:2022 certification readiness through structured preparedness, documentation review, scope definition, and ISMS implementation advisory.
Scope Summary
Initial Certification Support:
Comprehensive readiness assessment and implementation support for ISO/IEC 27001:2022, including documentation, control reviews, and scope definition.Client Environment:
Users: Approximately 400
Primary Location: Head Office – Hyderabad
Branch Offices: Selected branch locations (remote audits)
Hosting Infrastructure: AWS, GCP, and On-Premise servers.
Departments Covered: IT, Admin, HR, Finance, Legal/Compliance, Operations
Surveillance Audit Support:
Surveillance Audit 1: Not Applicable (NA)
Surveillance Audit 2: Not Applicable (NA)
Recertification: Not Applicable (NA)
Engagement Duration and Audit Scope
Duration: The engagement will span 12 months from the date of commencement and will include:
On-site and virtual audits at the Head Office (HO) location
Remote assessments for branch offices and other applicable locations within the defined scope
Audit Planning & Kick-off
Define and document the audit objectives, scope, and criteria in alignment with ISO/IEC 27001:2022 requirements
Schedule and coordinate audits with key stakeholders across all relevant locations
Execution of Internal Audit
Conduct ISO/IEC 27001:2022 internal audits at identified locations
Assess the organization’s Information Security Management System (ISMS) including policies, processes, and controls
Evaluate compliance with ISO 27001:2022 clauses and Annex A controls
Coverage of Locations
Head Office at Madhapur Hyderabad Full on-site audit
Branch Offices: Remote assessments based on a random sampling methodology (virtual walkthroughs)
Information Security Services Scope
• Cover all applicable security domains including but not limited to:
• Asset Management
• Access Control
• Physical and Environmental Security
• Operations Security
• Communications Security
• Supplier Relationships
• Incident Management
• Business Continuity
• Compliance
Audit Reporting
• Provide a detailed Internal Audit Report identifying nonconformities, observations, and opportunities for improvement.
• Submit a Corrective Action Plan (CAP) with specific actions, timelines, and responsible stakeholders.
• Highlight potential vulnerabilities and provide recommendations for remediation.
Support for Initiral Certification Readiness
Guide and support
Client in addressing and closing non-conformities and improving ISMS maturity.
Conduct a pre-certification assessment to ensure readiness for the external certification audit.
Surveillance Audit Preparation (TBD)
Support Client with planning and documentation for Surveillance Audit I & II post-certification.
Compliance Mapping
Align internal processes with ISO 27001:2022 controls and provide mapping with existing policies.
Deliverables:
Gap Assessment Report
ISO/IEC 27001:2022 Policies and Procedures
Statement of Applicability (SoA)
Risk Register
Internal Audit Plan, Checklist, and Reports (location/department-wise)
Consolidated Audit Summary Report
Corrective and Preventive Action Plan (CAPA)
Pre-certification Readiness Report
Management Review Meeting (MRM) Support
Awareness Training Materials
Control Implementation Guidance
Ongoing Advisory Support
Support during Internal and External Certification Audits
Service Description Summary
You being a consultant for ISO/IEC 27001:2022 Implementation and Certification Readiness, your role involves conducting comprehensive information security assessments. These assessments evaluate the organization's technologies, processes, people, and controls. Using proprietary checklists and a hands-on approach, the goal is to identify and address security weaknesses across the enterprise.
Organizational Security Domains to be Covered
Security Governance and Policies
Access Control
Asset Deployment and Maintenance
Backup and Disaster Recovery
Network Security and Segmentation
Database and File Share Security
Logging, Data Correlation, and Monitoring
Endpoint Protection
Internet Access and Usage Policy
Encryption and Data Security
Mobile Devices and BYOD (if applicable)
Social Engineering Susceptibility
Remote Access and VPN
Wireless Networking
Email Use and Filtering
Vulnerability Assessment / Penetration Testing (VAPT)
Incident Handling and Attack Readiness
Physical and Environmental Security
Policy Review and Redrafting Support
As part of the ISO/IEC 27001:2022 implementation engagement, the following baseline policies must be reviewed and validated. If any of these policies are not currently available within the client’s documentation, they will be drafted and provided to ensure alignment with ISO 27001 requirements. These policies will serve as foundational documents for the client to adopt, publish, and maintain as part of their ISMS framework.
• Internet policy
• Acceptable use of assets policy
• Access control policy
• Data backup and restoration policy
• Incident management policy
• Information classification and handling policy
• Business continuity and recovery policy
• Network Security Policy / Configuration Management
• Password Policy
• Physical Security Policy.
• Capacity monitoring policy.
• Information retention and disposal policy.
• Supplier security policy.
• Use of personal device policy.
• Malware control & AV policy.
• Email security policy.
• Secure software development policy.
• Document Control Policy.
• Clear desk and clear screen policy.
• Mobile device and tele working policy.
• Change management policy.
• Communication Policy.
• Risk assessment and risk treatment policy.
• Asset Management Policy
• Internal Assessment policy
• Management review policy
• Corrective action & continuous improvement policy
• Cryptographic policy
• Software Licensing policy
• Patch Management Policy
• Log review & retention policy
• Technical Vulnerability Assessment Policy(VAPT)
• Social media policy
ISMS Scope
We deliver comprehensive support for the implementation of the ISO/IEC 27001:2022 framework, including certification readiness assistance. The scope of this engagement is defined as follows:
Alignment to ISO/IEC 27001:2022
Identification and establishment of context of the organization (Internal context, external context, and risk management context)
1. Identification all interested parties and their requirements (e.g., clients, partners, suppliers, regulators and shareholders, but also could be employees’ families, government agencies, local community, media, etc.)
2. Defining interfaces in the ISMS scope (identification and documentation of the interfaces between the activities made by the organization and the activities that are performed by third parties)
3. Aligning ISMS objectives with company strategy (Determining the information security objectives compatible with the strategic direction of the company).
4. Reviewing and changing the top-level Information security policy as per the standard requirement
5. Reviewing and updating the risk assessment process as per standard requirement.
6. Identify status of controls in the Statement of Applicability, Obtain approval from risk owners
7. Development of external & internal communication processes.
8. Reviewing and updating management procedures
9. Guide the respective process owner to write policies and procedures as per standard requirement
10. Measurement and reporting procedure (ISMS Objectives).
11. Implementation of ISO/IEC 27001:2022practices.
12. Conducting internal Assessment
13. Conducting management review meetin
14. A corrective action plan, continual improvement plan and Hand holding during the external audit
Approach & Implementation Stages
The implementation will follow a structured, phased approach to ensure effective planning, execution, and certification readiness. Below is a summary of the key stages, activities, timelines, and expected outputs:
Stage 1: Planning and Gap Assessment
1. ISMS Kick-Off Meeting - Duration: 1 day (Onsite)
- Form the Steering Committee and Review Committee to oversee ISMS implementation.
2. Context Register Development : Duration: 3 days (Onsite)
- Identify internal and external issues, interested parties, dependencies, and propose ISMS scope across functions and locations.
3. Gap Analysis and Review : Duration: 3 days (Onsite)
- Conduct a baseline review for Head Office, IT, Admin, HR, Operations, and Secondary DC (BCP/DRP).
4. Management Review Meeting #1: - Duration: 1 day (Offsite)
- Present and finalize the ISMS scope with top management.
5. Gap Identification and Discussion: Duration: 3 man-days (Offsite)
- Discuss department-wise gaps, root causes, and corrective actions with top management.
6. Resource Allocation: Duration: 1 day (Offsite)
- Assign key personnel for each department.
7. Defining Roles and Responsibilities: Duration: 1 day (Offsite)
- Document job descriptions (JD), key result areas (KRA), and key performance indicators (KPI).
8. Review of Implementation Plan: Duration: 1 day (Offsite)
- Present the final implementation plan with milestones and deadlines to top management.
9. Communication to Stakeholders: Duration: 1 day (Offsite)
- Distribute top management’s ISMS mandate across departments.
Stage 2: Policy Development and Risk Management
10. Authoring Policies and SOPs - Duration: 30 days (Offsite)
- Review and redraft all required policies and standard operating procedures.
11. Asset Management: Duration: 2 days (Offsite)
- Maintain an ISO-compliant inventory of assets.
12. Risk Assessment and Risk Treatment Process Drafting: Duration: 2 weeks (Offsite)
- Define and document the risk management methodology.
13.Departmental Risk Assessment and Treatment : Duration: 2 weeks (Offsite)
- Conduct risk identification, assessment, and treatment for each department.
14. Risk Treatment Plan with Deadlines: 7 days
- Develop and document a risk treatment plan.
15.Communication to Risk Owners - (Offsite) – 1 day
- Share risk responsibilities and treatment plans with designated owners.
16. Statement of Applicability (SoA): 2 days
- Prepare and present the SoA to top management.
17. Management Review Meeting #2: 1 day
- Review risk mitigation, acceptance, and treatment plans with top management.
18. Authoring SOPs for Process Security - 5 days.
- Draft SOPs for key security processes.
19. ISMS Awareness Training – 4 days.
- Develop a training calendar and conduct cybersecurity awareness sessions.
20. Post-Training Evaluation (Offsite)
- Evaluate the effectiveness of the training sessions.
21. Implementation of Controls (4 days)
- Implement policies and SOPs across the organization.
Stage 3: Internal Audit and Final Review
22. Communication to External Parties – 1 day (offsite)
- Engage vendors and suppliers to align their controls with ISMS requirements.
23. Internal Audit Execution (7 days onsite)
- Develop an audit plan and conduct internal audits.
24. Audit Reporting: Duration: 1 day (Onsite)
- Prepare and submit audit reports.
25. Corrective Action Plan (CAP) : 1 day, onsite.
- Document and assign corrective actions with deadlines.
- Duration: 1 man-day (Onsite)
26.Management Review Meeting #3: Duration: 1 day (Onsite)
- Present audit findings and CAP to top management for final review.
27. Performance Evaluation and Continuous Improvement - 5 days (remote)
- Evaluate ISMS performance and define a continuous improvement plan.
Stage 4: External Certification Support
28. External Audit Handholding 5 days (onsite)
- Provide support during the external certification audit conducted by the certification body.