How to build an ISMS according to ISO 27001 — practical steps, timeline, and integration with NCA controls.
With the rapid escalation of cyber threats in the region, NCA tightening compliance requirements, and PDPL entering full enforcement — building an Information Security Management System (ISMS) is no longer a deferrable option for Saudi organizations. ISO 27001 certification has shifted from a competitive advantage to a baseline requirement in government tenders and major private-sector contracts. By the end of this guide, you will have a clear roadmap for scoping your ISMS project, allocating resources and budget, and executing the six phases from zero to certification — with full understanding of how to integrate with local NCA/ECC controls.
What ISO 27001 Actually Is — And What It Isn't: Many Saudi organizations treat ISO 27001 as a "technical controls checklist" — buy tools, configure firewalls, enable encryption, then request certification. This understanding is fundamentally wrong. ISO 27001 is a management system standard — a governance framework that defines how an organization makes information security decisions, assesses risks, and monitors the effectiveness of its controls over time. The difference between a controls checklist and a management system is the difference between buying a fire extinguisher and building an integrated safety system that includes detection, alarm, evacuation, and training.
The most common misconception in the Saudi market is that the certificate itself is the goal — hung on the wall, attached to tender submissions, then forgotten. Organizations that adopt this approach discover during annual surveillance audits that their system isn't actually functioning, losing the certificate or having to rebuild from scratch. The certificate is not the goal — the system you build is the goal. When an ISMS operates effectively, security incidents decrease, response times improve, and institutional awareness rises — these are the outcomes that actually protect the business.
The fundamental difference between ISO 27001 and other standards like SOC 2 or PCI DSS is that ISO 27001 is risk-based rather than built on fixed mandatory checklists. The organization decides what its most important information assets are, what threats are most likely, and what controls are appropriate — then justifies its choices in the Statement of Applicability (SoA). This makes the standard flexible enough for a 50-person firm and a 5,000-person corporation — but it requires genuine thinking rather than simply ticking boxes.
Scoping — The Most Important Project Decision: Before any technical or documentation work, the organization needs to make a decision that determines the entire project trajectory: what is the scope of the ISMS? Scope defines which parts of the organization will be covered — the entire organization? IT department only? A specific business line? The wrong choice here kills the project with unjustified costs or produces a certificate with no practical value.
The golden rule: start narrow, then expand. A Saudi fintech company started by scoping to its payment processing division only — 40 employees out of 200. This allowed them to achieve certification in 9 months instead of 18, at one-third the budget of a full-scope implementation. After a year of successful operation, they expanded the scope to cover the entire company at certification renewal. Organizations that start with overly broad scope — "we want certification for everything" — drown in documentation and lose momentum within the first six months.
Phase 1 — Preparation and Planning (2 months): This phase appears administrative but determines the success or failure of the entire project. It begins with writing a Project Charter that secures senior management sign-off — in the context of Saudi family-owned and holding companies, this means explicit approval from the board chairman or CEO, not just a nod in a meeting. The charter must define: scope, approved budget, timeline, and project team authorities.
The project team in a mid-size Saudi organization (200–500 employees) typically needs: a full-time project manager, a CISO (or external consultant fulfilling this role), and representatives from key departments (IT, HR, Legal, Operations). A realistic budget ranges from SAR 150,000 to 400,000 for the first project — covering consultant fees, risk management tools, training costs, and external audit fees. Attempting the project without a specialized ISO 27001 consultant is possible but typically doubles the timeline — the decision depends on whether sufficient internal expertise exists.
Phase 2 — Risk Assessment: This phase is the true heart of ISO 27001, and where most organizations that treat the standard as "just documentation" fail. Risk assessment begins with identifying information assets — everything of value: databases, systems, intellectual property, customer data, and even institutional knowledge in key employees' minds. Then for each asset, potential threats are identified (external attack, human error, natural disaster, technical failure) and vulnerabilities that expose the asset to those threats.
After inventory comes quantitative scoring: for each risk, assess impact on a scale of 1 to 5 (from negligible to catastrophic) and likelihood likewise (from rare to near-certain). Overall risk = impact × likelihood. Practical example from a risk register: asset is the customer database, threat is ransomware, vulnerability is lack of network segmentation, impact = 5 (personal data under PDPL protection), likelihood = 3 (moderate based on sector history), risk = 15 (high). Treatment: implement network segmentation + air-gapped backups + ransomware incident response plan.
The most important output of this phase is the Statement of Applicability — a document that takes the 93 Annex A controls and decides for each: is it applied? If yes, how? If no, why not? The external auditor will examine this document closely — a weak or generic SoA directly leads to non-conformity findings in the audit.
Phase 3 — Control Design and Documentation (3 months): Moving from risk assessment to control design requires translating assessment results into practical procedures. ISO 27001:2022 requires a specific list of mandatory documents as a minimum: the information security policy (a high-level document expressing senior management commitment), risk assessment methodology (how you identify, assess, and treat risks), Risk Treatment Plan (which controls are selected for each risk and their implementation schedule), and Statement of Applicability (SoA).
Why does a small organization (50 employees) need a formal information security policy? Because the Stage 1 auditor will request it as the first document. More importantly: the policy is the contract between senior management and the organization that security is a priority — without it, there is no legal basis for holding employees accountable for security violations. The common problem with treatment plans is vagueness: "we will implement access controls" instead of "we will implement MFA on all administrative accounts within 30 days." A vague plan fails audit because the auditor cannot verify implementation of something undefined.
The real value is not in the certificate itself — but in the system you build. Serious ISO 27001 implementation builds an institutional security culture.
Annex A controls in the 2022 version comprise 93 controls across four categories. Organizational controls (37) cover policies, asset management, and access control. People controls (8) cover screening, awareness, and post-termination responsibilities. Physical controls (14) cover facility and equipment security. Technological controls (34) cover encryption, monitoring, and network security. Common mistakes among Saudi SMEs include: neglecting physical controls claiming data is in the cloud (but devices accessing the cloud need physical protection), and ignoring people controls like background screening during hiring (despite insider threats being among the highest risks).
Phase 4 — Operations and Implementation (3–4 months): The difference between having a written policy and a system that actually works is what the auditor examines in Stage 2. This phase means converting every control documented in the previous phase into a daily operational procedure. For example: the patch management policy is written — but is there an actual schedule for applying patches? Are there records proving critical patches are applied within 48 hours? Is there an exception procedure when a patch conflicts with a production system?
Security awareness during this phase is not an annual lecture where employees attend while staring at their phones. Effective awareness requires: monthly phishing simulations measuring click rates and tracking improvement over time, role-specific training (the IT team needs different training from the finance team), and an incident reporting mechanism that is easy and incentivized (not intimidating). Organizations that transform awareness from a compliance obligation into a culture see measurable reduction in incidents caused by human error.
Measurement & Monitoring produces the evidence that Stage 2 auditors need. Clear security performance indicators must be defined: monthly security incident count, average response time, percentage of patched systems, and percentage of employees who completed training. These indicators are compiled into a monthly report for management — which is the same evidence the auditor requests.
Phase 5 — Internal Audit and Management Review: After the system has operated for a sufficient period (typically at least 2–3 months), an internal audit must be conducted — an independent examination assessing whether the ISMS is operating as documented. Common mistake: confusing internal audit with "checking that documents exist." The internal auditor looks for operational evidence — are periodic reviews actually conducted? Are incident records documented in a timely manner? Are risk assessment results actually acted upon?
When a non-conformity is discovered, it must be documented constructively: what exactly is the problem, what is the evidence, and what is the reference clause in the standard. Then a corrective action is defined with a timeline and responsible party. A good internal audit is not adversarial — it is an opportunity to discover gaps before the external auditor does. Following internal audit comes the Management Review per Clause 9.3 requirements: it must cover status of previous corrective actions, changes in internal and external risks, information security performance (indicators), internal audit results, and opportunities for continual improvement.
Phase 6 — External Audit and Certification: The external audit is conducted in two stages by an independent certification body. Stage 1 is a documentation review: the auditor examines policies, procedures, risk register, SoA, and internal audit results — verifying that the system is theoretically well-designed. If significant gaps are found, a timeframe is set for remediation before proceeding to Stage 2.
Stage 2 is the field audit: the auditor visits the site, conducts employee interviews, and requests operational evidence — incident records, management review minutes, phishing test results, and patch verification. This is the real test: is the system actually working, not just on paper? Choosing the certification body matters — it must be accredited by an internationally recognized body such as UKAS (UK), DAkkS (Germany), or EGAC (Egypt). Non-accredited bodies issue certificates that hold no value in international tenders.
If the auditor discovers a Major Non-Conformity — such as a missing complete risk assessment or no internal audit conducted — certification will not be granted until it is resolved. Typically a 90-day window is given to correct the issue and provide evidence. Minor Non-Conformities are recorded and must be addressed but do not prevent certification. After obtaining the certificate (valid for 3 years), prepare for annual Surveillance Audits in years two and three — smaller audits that verify the system continues to operate.
Integrating with NCA/ECC — Why Dual Implementation Is Strategically Smart: Many Saudi organizations ask: should we implement ISO 27001 or ECC? The correct answer is both — using the ISO 27001 project as the engine that simultaneously achieves ECC compliance. ECC controls are legally binding for all government and semi-government entities and critical infrastructure, while ISO 27001 is internationally recognized and required in private-sector contracts and international partnerships. Implementing only one leaves a gap.
Organizations bound by ECC include: all ministries and government agencies, semi-government and state-owned entities, critical infrastructure providers (energy, water, telecommunications, healthcare), and companies contracting with government on projects involving government data. Even companies not directly bound find that ECC implementation opens the door to government tenders — a massive market in the Vision 2030 economy.
The overlaps between ISO 27001 and ECC are extensive: ECC cybersecurity governance maps to ISO 27001 A.5 controls, security strengthening to A.7 and A.8, cyber resilience to incident and vulnerability management, and third-party security to supply chain controls. A smart organization builds one ISMS that satisfies both requirements — rather than running two separate projects with different teams, which doubles cost and creates policy conflicts.
Common Mistakes — And How to Avoid Them: Mistake one is focusing only on documentation without implementation. In a typical Saudi organization, the project team is tasked with "preparing policies" and produces dozens of documents copied from generic templates without customization. When the auditor asks a random employee "what is the password policy?" no one knows it exists. The fix: every policy written must be communicated, trained on, and activated before audit.
Mistake two is ignoring risk assessment or conducting it superficially. Some organizations fill the risk register once at project start and never revisit it. The auditor looks for update evidence — when was the last time a new risk was added? Did risk scores change after implementing new controls? A risk register unchanged for 6 months is a clear red flag.
Mistake three is failing to genuinely involve senior management. ISO 27001 explicitly requires top management commitment — this does not mean merely signing the policy. It means attending management review, making decisions about acceptable risks, and allocating resources when needed. In Saudi family businesses, the owner sometimes delegates the entire project to the IT manager — the auditor discovers this immediately when no evidence of senior management participation is found.
Mistake four is starting with overly broad scope — as discussed in the scoping section. Mistake five is neglecting security awareness: a Saudi organization spent hundreds of thousands on advanced security systems, but employees use the same password for everything and open suspicious email attachments. The auditor found a phishing click rate exceeding 40% — clear evidence of absent awareness despite a written policy existing.
When Should You Start? If your organization bids on government tenders, works with SAMA-regulated financial institutions, processes personal data under PDPL, or seeks international partnerships — the right time to start is now. Every month without an ISMS is a month of unmanaged risks and missed opportunities.
If your organization doesn't even have a written information security policy or a designated security officer — the first step is not applying directly for certification, but building the basics: appointing a security officer (even part-time) and conducting an initial assessment against ECC controls to determine the size of the gap. The readiness assessment tool at the bottom of this page helps you determine the right starting point for your organization.
Is your organization ready to start the certification project?
Far from ready — start with preparation and planning phase
0 / 16 items completed
How the two standards complement each other — applying both gives best coverage
| ISO 27001 Controls | Corresponding ECC Domain | Note |
|---|---|---|
| A.5 — Organizational Policies | Cybersecurity Governance | Near-complete coverage — ECC adds strategic requirements |
| A.6 — Info Security Organization | Cybersecurity Governance | ECC requires formally appointed CISO |
| A.7, A.8 — Personnel & Asset Security | Security Strengthening | Broad overlap in asset and identity management |
| A.12, A.16 — Operations & Incidents | Cyber Resilience | ECC adds local reporting requirements (CERT-SA) |
| A.15 — Supplier Relations | Third Parties | Both require security assessment and periodic review |
From zero to certification in 6 phases (9-14 months)
Define scope, secure management support, form project team, select risk assessment methodology.
Knowledge is free — execution tools are ready to buy
Information Security Management System (ISMS) Kit
Cybersecurity Policy Bundle
NCA Essential Cybersecurity Controls (ECC) Checklist
Pillar Guide
📖Enterprise Cybersecurity Guide for Saudi Arabia
More in this domain
How to build an ISMS according to ISO 27001 — practical steps, timeline, and integration with NCA controls.
This article is useful for business leaders and execution teams operating in Cybersecurity in the Saudi market.
The next step is to convert insights into a clear execution checklist, align priorities with available resources, and start with the highest-impact move.
Practical insights and important updates delivered straight to your inbox.
By subscribing you agree to receive our newsletter. You can unsubscribe anytime.