Skip to main content
Common Mistakes 7 min read

10 ISO 27001 Myths That Are Costing You Time and Money

Most of what people believe about ISO 27001 certification is either incomplete or outright wrong. These myths keep organisations from starting — or send them down expensive paths that are not required by the standard.

Rounak Maheshwari

Founder, ISO READY 360 · ISO 27001:2022 Practitioner

After working with organisations through ISO 27001 implementation and certification, the same misconceptions surface repeatedly. Some come from vendor marketing. Some come from conversations with people who have done it wrong and generalised from their experience. Some are simply misreadings of the standard. All of them have real costs — either in time spent on unnecessary work, or in decisions not made because the certification seemed too hard or too expensive.

10 Myths — At a Glance

You need perfect security to get certified
It takes two or more years
Only large companies can afford it
You need a dedicated ISO 27001 team
Once certified, you're done
The auditor is trying to catch you out
You must implement every Annex A control
Certification means you won't get breached
Consultants always write your documentation
Scope doesn't really matter

Myth 1: You Need Perfect Security to Get Certified

ISO 27001 does not require zero vulnerabilities or perfect security. It requires a systematic approach to identifying, assessing, and managing information security risks. You will have risks that you accept rather than treat. You will have imperfections in your control implementation. The standard requires that these are managed consciously — documented, reviewed, and treated proportionately — not that they do not exist. Auditors look for process maturity and proportionate risk management, not a flawless security posture.

Myth 2: It Takes Two or More Years

Implementation timelines of 18 to 24 months are common for large, complex organisations where the ISMS spans multiple business units and geographies. For a focused 10-to-50-person organisation with a well-scoped ISMS, six to nine months from starting to Stage 1 audit is realistic. Some organisations with prior security maturity achieve it in four to five months. The timeline is driven by scope, internal resource availability, and how quickly you can accumulate evidence of controls in operation — not by any minimum waiting period in the standard.

Myth 3: Only Large Companies Can Afford It

This myth comes from conflating the cost of large-enterprise implementations with the standard itself. A focused ISO 27001 implementation for a 15-person SaaS company, using templates and lean external support, can cost €6,000 to €12,000 all-in for the first year including certification body fees. That is a meaningful investment for an early-stage business, but it is not out of reach for a company with ten or more paying customers. Annual ongoing costs are significantly lower than the initial investment.

Myth 4: You Need a Dedicated ISO 27001 Team

Small organisations certify successfully with a single ISMS owner who dedicates 20-30% of their time during implementation and 10-15% for ongoing maintenance. The ISMS owner coordinates the work, maintains the documentation, and manages the audit cycle. Specific tasks — risk assessment, policy development, training — are shared across relevant staff. What you need is clear ownership and committed time, not a dedicated team.

Myth 5: Once Certified, You're Done

Certification is the beginning of an ongoing maintenance commitment, not the end of a project. Surveillance audits are required annually in years one and two of the three-year certificate cycle. The risk register must be reviewed regularly. Internal audits must be conducted annually. Management reviews must happen. Policies must be updated when the business changes. Organisations that treat certification as a one-time project typically fail their first surveillance audit with basic findings — an outdated risk register, an overdue internal audit, closed corrective actions that were never actually resolved.

Myth 6: The Auditor Is Trying to Catch You Out

Certification body auditors are not adversaries. Their job is to assess whether your ISMS meets the requirements of the standard — and to issue a certificate if it does. They are trained to look for evidence of systematic implementation, not to find reasons to fail you. If your ISMS is genuinely operating, with documented controls and evidence, a well-prepared Stage 2 audit is a structured conversation about your security management programme, not an interrogation. The auditors at accredited certification bodies conduct dozens of these audits annually and are experienced at working with organisations at different stages of maturity.

Myth 7: You Must Implement Every Annex A Control

The standard explicitly allows for controls to be excluded where the associated risks do not apply to your organisation, or where the risk has been accepted or treated through an alternative means. A cloud-only company with no physical servers does not need to implement on-premises data centre controls. An organisation with no software development does not need to implement secure coding practices. Exclusions must be documented and justified in the Statement of Applicability — but they are a normal and expected part of an appropriately scoped ISMS.

Myth 8: Certification Means You Will Not Get Breached

ISO 27001 certification does not guarantee immunity from security incidents. No certification can. What it demonstrates is that your organisation has a systematic approach to identifying risks, implementing proportionate controls, and managing incidents when they occur. Certified organisations still experience breaches, phishing attacks, and system failures. The difference is that they typically detect and respond to them faster, contain the damage more effectively, and have documented processes for learning from incidents and preventing recurrence.

Myth 9: Consultants Always Write Your Documentation

Some consultancies do write all client documentation, and this is a problem — documentation written entirely by an external consultant often does not reflect how the organisation actually operates, and auditors notice when staff cannot explain their own policies. Effective implementation uses external expertise for methodology, guidance, and review, while the organisation itself owns the content. Templates accelerate this significantly — they provide the structure and compliance mapping while the organisation fills in the operational specifics. The result is documentation that is genuinely yours.

Myth 10: Scope Does Not Really Matter

Scope is one of the most consequential decisions in ISO 27001 implementation, and getting it wrong in either direction is costly. A scope that is too wide — covering business units and processes that do not need to be included — significantly increases implementation effort, audit cost, and ongoing maintenance burden. A scope that is artificially too narrow — excluding systems or processes where sensitive information genuinely resides — is a misrepresentation and will be challenged by auditors. Scope definition requires careful thought about where your information assets actually live and what a certificate covering those assets is worth commercially.

The best antidote to myths is working through the standard itself with a clear implementation framework. Our template library is built around what the standard actually requires, clause by clause — so you build the right ISMS, not the one the myths describe.

Build Your ISMS on What the Standard Actually Requires

Templates structured around ISO 27001's real requirements — not the myths that make it seem harder than it is.