top of page
Search

Why Most ISO 27001 Projects Fail Before They Start

  • loscvetkovic
  • Mar 13
  • 2 min read

I've worked with a lot of organisations on ISO 27001. Some sail through to certification. Others spend months going around in circles, burning budget, and eventually either giving up or limping to an audit with a policy library nobody has read and controls nobody understands.

The difference between those two groups is almost never technical capability. It's almost always one of three things.

1. They treat it as a documentation project

The most common mistake is approaching ISO 27001 as a writing exercise. Someone gets assigned to produce an Information Security Policy, an Asset Management Policy, a Risk Treatment Plan, and forty other documents. These get written, reviewed, signed off, filed somewhere — and then completely ignored.

The auditor will ask whether the policies exist. They will also ask whether people know about them, whether controls are actually operating, and whether the management system is genuinely embedded in how the organisation works. Documentation is the output of a working ISMS — not the ISMS itself. Confusing the two wastes enormous amounts of time and produces nothing that reduces actual risk.

2. They skip the gap analysis

A proper gap analysis before you start implementation is not optional. It tells you where you actually are, what controls you already have (often more than you think), what's genuinely missing, and — critically — where the highest risks sit so you can sequence the work intelligently.

Without it, organisations either try to implement everything at once and run out of steam, or they implement the easy things and avoid the uncomfortable ones. Both lead to the same place: an audit where the examiner finds something significant you didn't address, and a remediation period you didn't budget for.

3. There is no one accountable

ISO 27001 requires top management commitment. That phrase gets used a lot and means very little in practice at many organisations. What it actually means is: someone senior needs to own this, make decisions, and be prepared to act on the findings. Not delegate it to a junior IT manager and check in occasionally.

When there is no clear accountable person — or when the person accountable has no authority to make changes — the project stalls at every decision point. Risk treatment decisions get escalated endlessly. Remediation work gets deprioritised. The audit arrives and nobody knows who owns what.

What actually works

Start with an honest gap analysis. Assign clear ownership at a senior level. Build the ISMS around how your organisation actually operates — not around what a template says. Write policies that your people will read and follow, not policies that will sit on a shared drive.

ISO 27001 done properly is genuinely valuable. It forces rigour around risk, builds accountability, and gives clients and partners a credible signal that security is taken seriously. Done badly, it is expensive, demoralising, and produces nothing that makes the organisation more secure.

If your ISO 27001 project has stalled — or you haven't started and want to do it right first time — SecCured's Compliance & Governance service starts with an honest assessment of where you are and a realistic, sequenced plan to get you to certification.

 
 
 

Recent Posts

See All

Comments


bottom of page