ISO certifications, specifically ISO/IEC 27001:2013, will inform you on a vendor’s information security. They’re a great indicator of internal process maturity at an organization. The result of the organization’s audit is a certificate containing:
The certification is completely voluntary; therefore, you may only come across an ISO 27001 certification in due diligence if a vendor says they’re certified. If they indicate company certification, then you’ll want to request proof since they’re sharing that they’ve taken extra security precautions by implementing an Information Security Management System (ISMS). This can be a great addition to a company’s security posture and make them stand out, so you just want to verify.
Be sure to check for the following two things when receiving the certification document:
These two standards are often confused with each other. They both cover information security within an organization, but there are differences:
The downside with an ISO certification is that you’re unable to know whether controls are still in place and operating effectively during the three-year period that the certificate covers. However, this is sometimes reflected in updates to the Statement of Applicability (SoA); therefore, it’s recommended that the SoA be viewed as well.
The SoA contains confidential internal control design, so it’s unlikely a copy will be provided, but the company may share it during an online meeting such as WebEx, or if you’re physically on-site. The SoA contains the entire listing of controls, including what was determined to be out of scope. You’ll want to focus on these and ensure you agree or understand why they were scoped out.
In short, you’ll want to look for three things:
As no regulations require the successful passing of an ISO 27001 audit, fewer organizations will have taken the time to plan and implement a functional ISMS as required. Larger organizations are more likely to be certified and many organizations simply follow ISO 27001 as guidance while building their own ISMS.
Protect your organization against cyber risks. Learn how by and download this infographic.