Skip to content
Photo by Adi Goldstein / Unsplash

1. Understand what a “management system” actually is

Think of it like Git + CI/CD for your company decisions.

Not static rules, but a loop:

  • define what you want (objectives)
  • identify what can go wrong (risks)
  • implement controls (solutions)
  • check if it works (metrics, audits)
  • improve (fix, adjust, repeat)

This is literally the Plan–Do–Check–Act (PDCA) loop.

If you miss this concept, ISO becomes paperwork. If you get it — it becomes leverage.


2. Define scope like a system boundary

Engineers understand boundaries better than lawyers.

Your scope is:

  • which systems (cloud, apps, infra)
  • which data (PII, financial, AI models)
  • which processes (dev, HR, vendors, support)

Bad scope = either chaos or fake compliance.

Good scope = clear system architecture.

Tip: write it like a system diagram, not like a legal novel.


3. Identify assets (yes, not only servers)

This is where many IT teams fail — they think only in terms of hardware/software.

But ISO thinks in value units:

  • systems (servers, SaaS)
  • data (customer data, models, logs)
  • people (admins, contractors)
  • suppliers (cloud, vendors, partners)
  • processes (deployment, onboarding, incident response)

If it creates value or risk — it’s an asset.

For 27701 → emphasize personal data flowsFor 42001 → include AI models, training data, prompts, outputs


4. Do risk assessment like threat modeling (not paperwork)

This is your familiar territory.

Instead of “ISO risk table,” think:

  • what can break?
  • how likely?
  • what impact?

Map it like:

  • Security risks → 27001
  • Privacy risks → 27701
  • AI risks (bias, hallucination, misuse) → 42001

Use a simple scale (1–5 likelihood × 1–5 impact). Don’t overcomplicate.

The real mistake companies make:They write risks once and forget them — like committing code and never running it.


5. Select controls (this is your “architecture” layer)

Controls = how you mitigate risks.

Examples engineers respect:

  • IAM, MFA → access control
  • logging → traceability
  • CI/CD approvals → change control
  • encryption → data protection
  • vendor due diligence → supply chain security

For non-IT areas (this is where gaps usually are):

Suppliers & vendors

  • security requirements in contracts
  • onboarding checks (like API auth, but for companies)
  • periodic reviews (not “set and forget”)

HR / people

  • onboarding/offboarding access control
  • awareness training (yes, humans are the weakest API)

Management

  • defined objectives (not vague “be secure”)
  • accountability (who owns what)

6. Build policies — but think “interfaces,” not “documents”

Policies are not novels.

They are interfaces between teams.

Example:

  • security policy → how company handles security overall
  • access control policy → how access is granted/revoked
  • supplier policy → how vendors are evaluated

Good policy = readable in 5 minutesBad policy = nobody reads it except auditor (and even auditor suffers)


7. Define objectives (this is where most companies fake it)

Objectives are your KPIs for security/AI/privacy.

Bad:

  • “Improve security”

Good:

  • 100% MFA for privileged users
  • patch critical vulnerabilities within 7 days
  • 95% security training completion

For 42001:

  • % of AI systems assessed for risk
  • number of AI incidents identified and reviewed

This is where management system becomes real — otherwise it’s philosophy.


8. Implement processes (this is your “runtime system”)

Key processes:

  • incident management (what happens when things break)
  • change management (how changes are controlled)
  • access management (who gets access and why)
  • supplier management (vendor lifecycle)
  • risk management (continuous, not annual ritual)

Think of them like microservices — each with input, output, owner.


9. Performance evaluation (this is your monitoring dashboard)

If engineers love Grafana, they should love this.

You need:

  • metrics (KPIs)
  • internal audits (your internal pentest, but for processes)
  • management review (leadership checks if system works)

This is where ISO becomes powerful:You don’t assume things work — you prove it with evidence.


10. Internal audit (not police, but debugging)

Internal audit is not punishment.

It’s:

  • finding gaps
  • testing if system behaves as designed
  • identifying improvements

Good audit feels like code review.Bad audit feels like interrogation.


11. Management review (the “CEO layer”)

Leadership must:

  • review results
  • approve improvements
  • allocate resources

If leadership is not involved — system becomes theater.

This is where many companies fail certification in spirit (even if they pass on paper).


12. Continuous improvement (this is the real game)

This is the difference between:

  • “we passed audit”vs
  • “we actually became better”

Every issue → root cause → fix → update system

Like debugging production, not hiding errors.


How 27001, 27701, 42001 align (simple view)

Same system, different lenses:

  • 27001 → protect information
  • 27701 → protect personal data
  • 42001 → govern AI responsibly

You don’t build three systems.

You build one system with three perspectives.


The biggest hidden gap (and why projects fail)

Not technology.

But:

  • suppliers unmanaged
  • objectives unclear
  • risks formal but not used
  • management not engaged

In other words — perfect documents, broken reality.


Simple starting roadmap (if you want practical action)

Start like an engineer, not like a consultant:

  1. Define scope (1–2 pages max)
  2. List assets (systems + data + vendors)
  3. Identify top 10 risks
  4. Map existing controls (what you already do)
  5. Fix biggest gaps (MFA, logging, vendor checks, access control)
  6. Define 3–5 measurable objectives
  7. Create minimal policies (clear, short)
  8. Run one internal audit
  9. Review with management
  10. Improve and repeat

B. Hiring the right person


questions to validate real implementation experience

  1. What were the findings in your internal audits?(Not “in general” - give specific examples from your projects.)
  2. What were the findings in external (certification) audits after your implementation?(Stage 1 and Stage 2 - what exactly was raised?)
  3. Why did those findings occur?(Root cause - not description. What was missing or misunderstood?)
  4. How did you correct those findings?(What actions were taken, how long it took, what changed in the system?)
  5. Did any findings repeat later? Why?(This shows whether fixes were real or just cosmetic.)
  6. Who defined the certification scope?(You, the client, or the certification body - and how was it justified?)
  7. Have you ever had a scope challenged or reduced by auditors? Why?
  8. What findings were related to areas outside IT (suppliers, HR, objectives, management review)?
  9. Give one example where documentation existed, but the auditor still raised a finding. Why?
  10. What was the most difficult nonconformity you had to close?

what you are listening for (very simple)

You want to hear:

  • concrete examples (not theory)
  • specific findings (not “minor gaps”)
  • why he or she graded them minor or major
  • clear root causes (not vague excuses)
  • real corrective actions (not “we updated documents”)

If they can’t answer these calmly and specifically - they didn’t implement anything. They assembled paperwork.

And that’s the difference between someone who can pass an audit once… and someone who builds a system that actually survives the next one.

Consequences of hiring wrong person:

If the person doesn’t actually know what they are doing, the risk doesn’t stay with them. It moves directly to you. The consultant is not responsible for compliance, and the certification body is not responsible either. The full weight sits on the CEO, CISO, or whoever is accountable for the system. If something goes wrong — a failed certification, a serious nonconformity, or a ransomware incident — it is management who will have to explain why the system did not work.

What usually happens in these cases is very predictable. On paper everything looks fine: there are policies, a risk register, maybe even some procedures. But in reality, processes are not followed, suppliers are not properly controlled, objectives are unclear, and internal audits are just formal. It only becomes visible at the worst possible moment — during the certification audit or after an incident. And at that point, fixing it is slow, expensive, and very visible to leadership.

There is also a very specific risk with remote implementation. A person can appear busy, send documents, run meetings, and report progress, while nothing real is being built. You often cannot measure their work properly until a hard checkpoint — like an internal audit or certification. By then, it is too late to correct the foundation. In the worst case, that person leaves just before certification, and you are left with a half-built system, unclear ownership, and months of lost time.

That is why you need to demand two very simple things upfront. First, a clear implementation plan. Not a general description, but a step-by-step plan aligned with the standard: scope, assets, risk assessment, controls, policies, internal audit, management review. It should include timelines, deliverables, and who is responsible for each step. If they cannot show this, they are improvising.

Second, clear KPIs to track progress. You need to see measurable movement every few weeks: how many assets are identified, how many risks are assessed, how many controls are actually implemented, how many suppliers are reviewed, how close you are to audit readiness. If progress is described only in words like “we are working on it,” you are not managing the project — you are hoping.

The simple truth is that ISO implementation can easily create an illusion of control. Everything can look structured while nothing actually works. And if the person leading it does not understand the system deeply, you don’t just risk a failed audit — you risk being exposed at the exact moment when the system is supposed to protect you.


Comments

Latest