ISO Compliance Services • Raleigh, NC

ISO 27001 Certification Consulting for Organizations Building World-Class Security

ISO 27001 is the international gold standard for information security management, recognized worldwide as proof that your organization takes data protection seriously. Whether you need ISO 27001 for competitive advantage, customer requirements, regulatory compliance, or genuine security improvement, Petronella Technology Group, Inc. guides you from initial gap assessment through successful certification audit and ongoing surveillance. Our team has helped organizations across healthcare, defense, technology, and financial services build Information Security Management Systems that pass certification and actually protect information assets.

BBB Accredited Since 2003 • Founded 2002 • 2,500+ Clients Served • Zero Breaches Among Clients Following Our Security Program

Why Choose PTG for ISO

Certification-Ready ISMS Implementation From Experienced Practitioners

ISO certification demands rigorous implementation that survives external auditor scrutiny. Here is why organizations trust Petronella to guide them through the process.

First-Attempt Certification Success

Our implementation methodology is designed to ensure your ISMS passes the Stage 2 certification audit on the first attempt. We know what certification auditors look for because we have prepared organizations for ISO audits across multiple industries and certification bodies.

Multi-Standard Integration

ISO 27001 maps extensively to NIST frameworks, GDPR, HIPAA, SOX, and PCI DSS. We build your ISMS as an integrated management system that satisfies multiple frameworks simultaneously.

Complete Annex A Control Implementation

ISO 27001:2022 Annex A contains 93 controls across four themes: Organizational, People, Physical, and Technological. We assess applicability, implement applicable controls, and document the Statement of Applicability that auditors review as the foundation of your ISMS.

Surveillance Audit Preparation

Certification is not the end — annual surveillance audits and triennial recertification require ongoing ISMS operation. We prepare your team to maintain the management system independently and support you through surveillance audits to ensure continued certification.

Understanding ISO Compliance

ISO 27001, 27002, and 27701: The Information Security Standards That Matter

ISO/IEC 27001 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). Published jointly by the International Organization for Standardization and the International Electrotechnical Commission, ISO 27001 provides a systematic framework for managing information security risks through a combination of policies, processes, technologies, and organizational structures. Unlike prescriptive standards that dictate specific technical controls, ISO 27001 is a risk-based management system standard that requires organizations to identify their unique risks and implement proportionate controls to mitigate them.

The 2022 revision of ISO 27001 restructured Annex A from 114 controls across 14 domains to 93 controls across four themes: Organizational Controls (37 controls covering policies, roles, threat intelligence, and supplier relationships), People Controls (8 controls covering screening, training, and disciplinary processes), Physical Controls (14 controls covering perimeters, monitoring, and equipment security), and Technological Controls (34 controls covering access management, cryptography, secure development, and vulnerability management). Understanding which controls apply to your organization and implementing them effectively is central to certification success.

ISO/IEC 27002 provides detailed implementation guidance for the Annex A controls, offering specific recommendations for how each control should be implemented. While 27001 defines what you must do, 27002 explains how to do it. Petronella Technology Group, Inc. uses 27002 guidance to ensure each control in your Statement of Applicability is implemented to a standard that satisfies certification auditors. For organizations that also need privacy management capabilities, ISO/IEC 27701 extends the 27001 ISMS into a Privacy Information Management System (PIMS), adding requirements and controls specific to the processing of personally identifiable information — making it an excellent complement for organizations subject to GDPR or CCPA.

The certification process follows a defined path. First, organizations must build and operate their ISMS for a period sufficient to demonstrate operational maturity — typically at least three months. Then a Stage 1 audit (documentation review) verifies the ISMS documentation is complete and the organization is ready for the full assessment. The Stage 2 audit evaluates whether the ISMS is effectively implemented and operating as documented. The auditor interviews staff, examines evidence, tests processes, and issues findings classified as major nonconformities, minor nonconformities, or opportunities for improvement. Major nonconformities must be resolved before certification can be granted. Once certified, annual surveillance audits verify continued operation, and full recertification occurs every three years.

Petronella Technology Group, Inc. guides organizations through the entire certification lifecycle. We conduct the initial gap assessment, design the ISMS framework, implement Annex A controls, develop all required documentation, prepare the Statement of Applicability, conduct internal audits, support management reviews, and prepare your team for both Stage 1 and Stage 2 audits. Our goal is first-attempt certification success, and our methodology is designed to ensure nothing is left to chance when the certification auditor arrives. Beyond initial certification, we support ongoing ISMS operation through surveillance audit preparation, internal audit programs, and continual improvement activities that maintain your certification and strengthen your security posture year over year.

Our ISO Services

End-to-End ISO Certification Support

From gap assessment through certification and ongoing surveillance, we deliver the expertise organizations need to achieve and maintain ISO certification.

ISO 27001 Gap Assessment

Our gap assessment evaluates your organization against all ISO 27001:2022 requirements — both the management system clauses (4-10) and the Annex A controls. We assess your existing policies, risk management processes, security controls, documentation, training, and governance structures. Every gap is documented with specific remediation recommendations, estimated effort, and prioritization based on certification impact and security risk.

The assessment also evaluates your organization's readiness for the certification process itself — management commitment, resource availability, scope definition, and timeline expectations. We set realistic expectations for the effort required and develop a project plan that leads to successful certification within your target timeline.

Deliverables include a gap assessment report, draft scope definition, preliminary Statement of Applicability, risk assessment methodology recommendation, certification timeline, and resource requirements estimate.

ISMS Design and Documentation

We design your ISMS framework including scope definition, information security policy, risk assessment and treatment methodology, Statement of Applicability, and the full documentation hierarchy from strategic policies through operational procedures. ISO 27001 requires documented information for context of the organization, leadership commitment, risk assessment and treatment, security objectives, competency evidence, operational planning, performance evaluation, and continual improvement.

Our documentation is tailored to your organization — not generic templates that auditors immediately recognize as boilerplate. Policies reflect your actual governance structure, procedures describe your actual operations, and the Statement of Applicability justifies control selection based on your actual risk assessment results. This approach ensures documentation survives auditor scrutiny because it accurately describes how your organization operates.

For organizations seeking integrated management systems, we design ISMS documentation that also addresses ISO 27701 (privacy), ISO 22301 (business continuity), or other standards relevant to your business.

Annex A Control Implementation

We implement the Annex A controls identified in your Statement of Applicability. Technical controls include access management systems, encryption deployment, secure development practices, vulnerability management, network security, endpoint protection, logging and monitoring, and backup and recovery. Organizational controls include information security policies, role definitions, supplier management, incident management, business continuity, and compliance management. People controls include screening, training, and awareness programs. Physical controls include perimeter security, environmental monitoring, and equipment security.

Each control is implemented with the evidence collection approach that auditors expect — documented policies and procedures, training records, system configurations, monitoring logs, test results, and management review minutes. Our managed cybersecurity services can provide ongoing operation of technical controls including SIEM, EDR, vulnerability scanning, and 24/7 monitoring.

New in ISO 27001:2022 are controls for threat intelligence, cloud security, ICT readiness for business continuity, physical security monitoring, configuration management, information deletion, data masking, data leakage prevention, web filtering, and secure coding. We ensure these new controls are properly addressed.

Risk Assessment and Treatment

Risk assessment is the foundation of ISO 27001. The standard requires a systematic, repeatable risk assessment methodology that identifies information security risks, analyzes their likelihood and impact, evaluates them against your risk criteria, and produces risk treatment decisions. We establish your risk assessment methodology, conduct the initial comprehensive risk assessment, develop the risk treatment plan, and connect risk treatment decisions to Annex A control selection documented in the Statement of Applicability.

Our risk assessment process considers threats, vulnerabilities, and impacts across all information assets within your ISMS scope. Risk treatment options include applying controls, accepting risk, avoiding risk, or transferring risk through insurance. Every decision is documented with justification, creating the risk-based audit trail that ISO 27001 demands.

We also establish the ongoing risk management process — including risk monitoring, periodic reassessment, and integration with change management — so your risk register remains current and your ISMS adapts to new threats and business changes.

Internal Audit and Management Review

ISO 27001 requires internal audits and management reviews before the certification audit. Internal audits evaluate whether the ISMS conforms to the standard's requirements and your own documented procedures. Management reviews ensure top management evaluates the ISMS's suitability, adequacy, and effectiveness. Both must be documented and produce actionable outputs.

We conduct internal audits using experienced auditors who understand what certification auditors look for. Our internal audit reports identify nonconformities using the same classification system certification bodies use, giving you a realistic preview of your certification readiness. Findings are documented with specific corrective actions and timelines so gaps are closed before the external auditor arrives.

We facilitate management reviews by preparing the required inputs (audit results, incident reports, risk assessment changes, performance metrics, improvement suggestions) and ensuring management outputs include clear decisions and action items that demonstrate the leadership engagement auditors expect to see.

Certification Audit Preparation and Support

We prepare your organization for both Stage 1 (documentation review) and Stage 2 (full assessment) certification audits. Preparation includes a mock audit that simulates the certification audit process, evidence package assembly ensuring all required documentation is readily accessible, staff interview preparation so team members can articulate how controls work and why they matter, nonconformity closure verification ensuring all internal audit findings are resolved, and logistics coordination with your chosen certification body.

During the certification audit, our team is available to provide support — answering auditor questions about ISMS design decisions, locating evidence, and addressing any findings that arise. After certification, we help you develop corrective action plans for any minor nonconformities identified and prepare your ongoing internal audit program for surveillance audits.

We also advise on certification body selection, helping you choose an accredited body that is appropriate for your industry and recognized by your customers and business partners.

Our Process

From Gap Assessment to ISO Certification

A proven methodology that delivers first-attempt certification success.

1

Gap Assessment and Scoping

We evaluate your current security posture against ISO 27001:2022, define the ISMS scope, identify all gaps requiring remediation, and develop a certification-focused project plan with realistic timelines and resource requirements.

Timeline: 2-4 weeks • Deliverable: Gap Assessment, Scope Definition, SoA Draft, Project Plan

2

ISMS Design and Implementation

We conduct the risk assessment, design the ISMS framework, develop all required documentation, implement Annex A controls, deploy technical security measures, and train your staff. The ISMS must operate for a minimum period before certification can proceed.

Timeline: 10-20 weeks • Deliverable: Complete ISMS Including Policies, Procedures, Controls, Risk Register, SoA

3

Internal Audit, Management Review, and Certification Prep

We conduct the required internal audit and management review, resolve any findings, assemble evidence packages, prepare staff for auditor interviews, and coordinate with the certification body. A mock audit validates certification readiness before the real thing.

Timeline: 4-6 weeks • Deliverable: Internal Audit Report, Management Review Minutes, Certification Readiness Package

4

Certification and Ongoing Maintenance

We support you through Stage 1 and Stage 2 certification audits, address any audit findings, and establish the ongoing ISMS operation program — internal audit schedule, management review cadence, risk reassessment frequency, continual improvement activities, and surveillance audit preparation. Your ISMS operates independently while we provide advisory support and periodic assessments.

Timeline: Certification audits + ongoing • Deliverable: ISO 27001 Certification, Ongoing ISMS Operation Program

Why Choose PTG

The ISO Certification Partner That Delivers Results

Certification-Focused Methodology

Every activity in our implementation is designed to produce the evidence, documentation, and operational maturity that certification auditors require. No wasted effort on activities that do not contribute to certification success.

Real Security, Not Paper Compliance

Our ISMS implementations actually improve your security posture. With zero breaches across 2,500+ clients, we build management systems that protect information assets, not just pass audits. The certificate is a byproduct of genuine security improvement.

Cross-Framework Integration

If you also need NIST, DFARS, GDPR, HIPAA, or PCI DSS compliance, we build an integrated management system that satisfies all requirements through shared controls and documentation.

Managed Security Operations

Many Annex A controls require operational capabilities like 24/7 monitoring, vulnerability management, and incident response. Our managed cybersecurity services provide these as a service, satisfying ISO requirements without building them in-house.

20+ Years of Experience

Founded in 2002, BBB A+ accredited since 2003. We bring two decades of information security management experience to every ISO engagement, across healthcare, defense, technology, and financial services.

Raleigh-Based, Nationally Available

Headquartered in Raleigh, NC, we serve organizations across the Research Triangle and nationwide. On-site assessments, workshops, and audit support combined with remote implementation capabilities for distributed organizations.

Common Questions

ISO Compliance FAQs

What is the difference between ISO 27001 and ISO 27002?

ISO 27001 is the certifiable management system standard that defines what an ISMS must include. ISO 27002 is an implementation guidance document that provides detailed recommendations for how to implement the Annex A controls referenced in 27001. You certify against 27001; you use 27002 as a reference for implementing controls effectively. Think of 27001 as the requirements and 27002 as the best practice guidance for meeting them.

How long does ISO 27001 certification take?

Typical timelines range from six to twelve months from project start to certification, depending on organizational size, complexity, and existing security maturity. Gap assessment takes two to four weeks. ISMS design and implementation take ten to twenty weeks. Internal audit, management review, and certification preparation take four to six weeks. The ISMS must operate for a minimum period before certification. Certification audits (Stage 1 and Stage 2) are typically scheduled four to eight weeks apart. Organizations with existing security programs or NIST compliance can often accelerate the timeline.

What is the Statement of Applicability?

The Statement of Applicability (SoA) is arguably the most important document in your ISMS. It lists all 93 Annex A controls, states whether each is applicable or not applicable, justifies the decision for each, and for applicable controls, describes how they are implemented. The SoA connects your risk assessment to your control selection, demonstrating that control choices are risk-based rather than arbitrary. Certification auditors use the SoA as their primary reference for evaluating your ISMS. A well-crafted SoA accelerates the audit; a poorly documented one invites scrutiny and findings.

What changed in ISO 27001:2022?

The 2022 revision restructured Annex A from 114 controls across 14 domains to 93 controls across four themes (Organizational, People, Physical, Technological). Eleven new controls were added including threat intelligence, cloud security, ICT readiness for business continuity, physical security monitoring, configuration management, information deletion, data masking, DLP, web filtering, secure coding, and monitoring activities. The management system clauses received minor updates emphasizing the needs of interested parties, planning for changes, and operational planning. Organizations certified under the 2013 version had until October 2025 to transition.

How much does ISO 27001 certification cost?

Total cost depends on organizational size, scope, existing security maturity, and whether you use internal resources or consultants for implementation. Costs include consulting for gap assessment and ISMS implementation, certification body fees for Stage 1 and Stage 2 audits, technology investments for controls like SIEM, EDR, and encryption, and ongoing costs for surveillance audits and ISMS maintenance. Petronella Technology Group, Inc. provides detailed cost estimates during the gap assessment so you understand the full investment before committing. For many organizations, the ROI is clear: ISO 27001 wins contracts, satisfies customer requirements, reduces insurance premiums, and prevents costly security incidents.

What is ISO 27701?

ISO 27701 is an extension to ISO 27001 that adds privacy-specific requirements, creating a Privacy Information Management System (PIMS). It provides additional controls and guidance for PII controllers and processors, mapping closely to GDPR requirements. ISO 27701 certification demonstrates that your privacy management is embedded within your information security management system and meets international standards. It is particularly valuable for organizations subject to GDPR, CCPA, or other privacy regulations, as it provides a structured framework for demonstrating privacy compliance through a recognized international standard.

What happens after certification?

ISO 27001 certification is valid for three years. During this period, annual surveillance audits verify that your ISMS continues to operate effectively. Your organization must maintain the ISMS including ongoing risk assessments, internal audits, management reviews, incident management, continual improvement activities, and documented corrective actions. At the end of the three-year cycle, a full recertification audit evaluates the entire ISMS again. Petronella Technology Group, Inc. supports ongoing ISMS operation through surveillance audit preparation, internal audit programs, and advisory services that ensure continued certification.

How does ISO 27001 relate to NIST and CMMC?

ISO 27001 Annex A controls map extensively to NIST 800-171 and NIST 800-53 controls. Organizations with ISO 27001 certification have a strong foundation for NIST compliance, though the frameworks are not identical — NIST frameworks are more prescriptive about specific technical requirements while ISO 27001 is risk-based and management-system oriented. For defense contractors, ISO 27001 demonstrates security maturity but does not replace the CMMC requirement. Petronella Technology Group, Inc. builds integrated compliance programs that leverage ISO 27001 as the management system foundation while satisfying NIST, DFARS, and CMMC requirements through targeted control additions.

Ready to Achieve ISO 27001 Certification?

Stop wondering whether your security program measures up to international standards. Schedule a free ISO consultation with our experienced practitioners and get a clear path to certification — from gap assessment through successful Stage 2 audit and ongoing surveillance.

BBB Accredited Since 2003 • Founded 2002 • 2,500+ Clients Served • Zero Breaches Among Clients Following Our Security Program