InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Frankfurter Straße 233
63263 Neu-Isenburg
Germany
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
InfoGuard Deutschland GmbH
Am Gierath 20A
40885 Ratingen
Germany
InfoGuard GmbH
Kohlmarkt 8-10
1010 Vienna
Austria
An information security management system (ISMS) in accordance with ISO/IEC 27001:2022 is considered a central component of modern corporate management. It creates clear structures, reduces risks and makes compliance a lived practice. However, there is often a considerable amount of effort between aspiration and implementation. As is so often the case, the question therefore arises: is there a quicker way - or does this contradict the logic of effective information security?
A well-founded classification shows: A sustainable ISMS according to ISO/IEC 27001:2022 is not created in a fast-track process, but requires time, a structured approach and organizational anchoring.
A successfully implemented ISMS in accordance with ISO/IEC 27001:2022 is based on the right combination of organizational maturity, an active security culture and effective risk management in order to identify risks at an early stage and manage them sustainably.
Regardless of how "lean", "digital" or "prefabricated" an ISMS is advertised:
ISO/IEC 27001 certification always follows a clearly defined, two-stage audit process by an accredited certification body.
These two steps cannot be combined or shortened in any meaningful way:
This audit first assesses whether the basic documentation of the ISMS is available and whether the company is sufficiently ready for certification for the Stage 2 audit.
Among other things, the following are checked:
The decisive factor here is that the Stage 1 audit cannot be passed if the ISMS only exists "on paper" or was created shortly beforehand. If only because the implementation of the results of a Stage 1 audit typically takes time to further establish and stabilize the system.
Also good to know: There are usually several weeks to months between Stage 1 and Stage 2. Not arbitrarily, but because measures are implemented, processes have to prove themselves in everyday life and improvements have to be verifiable. An "ASAP ISMS" may deliver documents. However, a certifiable ISMS requires maturity.
The second step is to check whether the ISMS actually meets the requirements of ISO/IEC 27001 effectively. This is not about presenting perfect documents, but rather verifiable evidence from practice. This is done, among other things, through interviews with employees, spot checks on systems and reviews of existing evidence.
In particular, the following are assessed
The Stage 2 audit usually reveals the most critical and costly non-conformities that can delay or prevent certification. This is where an "ASAP ISMS" is often exposed as a mere paper ISMS - because effectiveness requires time.
Rely on sustainable information security instead of shortcuts. Our experts will guide you safely to ISO certification.
An ISMS is not just a set of documents, but a management system that connects people, processes and technologies. ISO/IEC 27001:2022 requires not only formally existing procedures, but also their effectiveness and practical implementation, and this is exactly what takes time. Three key aspects determine effort and effectiveness:
Typical pitfalls in this phase are
Templates are adopted without being adapted
Too many processes at the same time instead of step by step
Lack of management commitment, which leads to resource bottlenecks
Auditors not only check the formal establishment of an ISMS, but also its effectiveness. For this, the management system must have been actively operated over a certain period of time, usually at least three months. The key evidence for this is
This evidence requires maturity and operational experience; a new ISMS without having gone through a plan-do-check-act cycle is usually not enough.
Auditors quickly recognize when an ISMS only exists formally. In certification audits, such gaps often lead to nonconformities that jeopardize the success of an ISO/IEC 27001:2022 certification.
Typical audit cases:
Incomplete risk analysis
Example: A company submitted a risk overview that only contained generic risks. Critical SaaS services and outdated operating systems were missing.
The result: Major nonconformity, as the analysis did not reflect the actual situation.
Reference to standard: ISO/IEC 27001:2022, 6.1.2 and 6.1.3
Unclear roles in incident management
Example: Escalation levels were documented, but responsibilities were not. Different departments had conflicting ideas about who was responsible and who made decisions.
The result: Minor nonconformity due to a lack of process clarity. Standard reference: ISO/IEC 27001:2022, 5.3: "Roles, responsibilities and authorities in the organization"
Lack of implementation of internal audits
Example: Internal audits should take place annually, in fact the last audit was over 18 months ago. Reports were incomplete, open issues were not followed up.
The result: Major nonconformity due to non-compliance with the audit cycle. Reference to standard: ISO/IEC 27001:2022, 9.2
Deviations between guidelines and practice
Example: A policy required all mobile devices to be encrypted. However, spot checks revealed unencrypted laptops and a lack of technical controls.
Consequence: Minor nonconformity, as guidelines were not implemented effectively. Reference to standard: Annex A.5.1 "Guidelines for information security"
Low level of employee awareness
Example: Awareness campaign planned but never implemented. Employees were unaware of basic security requirements.
Result: Minor nonconformity due to insufficient training. Standard reference: Annex A.6.3: "Awareness, education and training"
Companies that want to implement their ISMS quickly or have it certified quickly often pay a high price: delays, increased effort to rectify nonconformities, additional audit costs and a strain on internal resources.
The supposedly fast management system usually causes more time and costs than a careful ISO 27001 implementation and certification according to ISO/IEC 27001:2022-compliant ISMS.
Receiving the ISO certificate does not mark the end of an ISMS - it enters the continuous improvement process. Information security must be continuously reviewed, adapted and further developed.
This includes in particular
An ISMS is not a project with an end date, but a permanent management system.
The desire for rapid certification is understandable - but sustainable information security cannot be accelerated.
Information security needs maturity rather than speed. Setting up a management system in accordance with ISO/IEC 27001:2022 is a strategic project that requires time, resources and management support. Shortcuts such as an "ASAP-ISMS" often lead to delays, additional costs and risks in the certification process.
Our recommendations for companies:
Plan realistic project durations of 6-12 months, depending on size and complexity
An "ASAP-ISMS" may sound tempting, but sustainable information security cannot be cut short.

Caption: Image generated with AI