
ISO 27001 & Information Security
ISMS Consulting
We guide organisations through the design, implementation, and certification of their Information Security Management System – from initial gap analysis to successful ISO 27001 audit.
What Is ISMS Consulting?
An Information Security Management System (ISMS) is not a folder of policies that gets reviewed once a year. It is a living governance framework that answers a fundamental question: which information assets are critical to your organisation – and how do you protect them systematically, measurably, and sustainably? ISO/IEC 27001 defines the international standard for this and is recognised globally as the gold standard for information security management.
The underlying logic of the ISMS follows the Plan-Do-Check-Act cycle: risks are identified and assessed, controls are planned and implemented, their effectiveness is reviewed, and the system is continuously improved. This sounds straightforward in principle, but requires genuine engagement with business processes, dependencies, and vulnerabilities in practice.
ISMS consulting bridges the gap between the standard's requirements and your organisation's reality. An experienced ISMS consultant brings structured methodology, audit experience, and the ability to translate abstract requirements into concrete, operational measures – without over-engineering the documentation or losing sight of actual security outcomes.
Our Approach: From Gap Analysis to ISO 27001 Certification
Every ISMS engagement starts with an honest assessment. Our gap analysis maps the current state of your security controls against the requirements of ISO/IEC 27001:2022, identifies material gaps, and produces a prioritised implementation roadmap calibrated to your organisation's actual capacity and risk profile – not a generic checklist. This initial phase also determines the ISMS scope: which business units, locations, and processes should be included. Scope decisions have a major impact on project effort and on the eventual certification.
We then guide you through risk analysis and risk treatment: which threats are relevant for your specific environment, which controls address them economically and effectively, and how are residual risks documented and accepted by management. The Statement of Applicability (SoA) – which maps your control choices against all ISO 27001 Annex A controls – is a core deliverable of this phase and a document that auditors scrutinise closely.
Documentation – security policies, operational procedures, the SoA – is developed to be functional, not voluminous. Policies that no one reads do not protect organisations; they create liability. We prepare your team for the internal audit, provide dry-run walkthroughs of the certification audit process, and support you through the external audit itself. Our consultants have accompanied ISO 27001 certification audits with multiple accredited certification bodies and know exactly where auditors focus their attention.
ISO 27001 or BSI IT-Grundschutz: Choosing the Right Framework
ISO 27001 and the BSI IT-Grundschutz address the same objective – a functioning information security management system – but with different approaches. ISO 27001 is risk-based and flexible: it defines what an ISMS must achieve but leaves the specific controls open. BSI IT-Grundschutz provides a detailed catalogue of prescriptive security requirements for specific system types and processes – from Windows server hardening to physical security measures.
For German federal authorities and many critical infrastructure operators, BSI IT-Grundschutz is either mandated or the de facto standard. For internationally operating organisations, or those that need to demonstrate compliance to foreign clients and partners, ISO 27001 is the recognised choice. Many of our projects combine both frameworks: ISO 27001 provides the certification basis, while Grundschutz building blocks provide technical depth for specific system categories.
We help you make this decision on a sound basis – considering your industry, regulatory obligations, and strategic objectives. The right answer depends on what you need to demonstrate, to whom, and within what timeline. Organisations that already have a BSI Grundschutz implementation can typically leverage it for ISO 27001 certification with relatively modest additional effort.
ISMS Consulting for Regulated Industries: NIS2, DORA, and KRITIS
ISO 27001 certification is increasingly intertwined with regulatory compliance obligations. The NIS2 Directive requires essential and important entities to implement risk-based technical and organisational security measures and to document them. An ISO 27001-aligned ISMS provides a structured framework for meeting these requirements and, crucially, for demonstrating compliance to the national supervisory authority (BSI in Germany). The overlap between ISO 27001 controls and NIS2 Article 21 requirements is substantial – organisations that pursue both simultaneously save significant effort.
DORA (Digital Operational Resilience Act) requires financial entities to establish a comprehensive ICT risk management framework with defined governance, incident response, and third-party risk management processes. ISO 27001 addresses all of these areas and is widely used by financial institutions as the structural backbone for DORA compliance. Our ISMS consulting integrates DORA-specific requirements into the ISMS design from the outset rather than treating them as a separate workstream.
For critical infrastructure operators (KRITIS) under the German BSIG, ISO 27001 certification is accepted as evidence of adequate security measures under the industry-specific security standards (B3S). Blackfort has specific experience in the energy, telecommunications, and financial sectors and understands the sector-specific requirements that must be reflected in the ISMS scope and control selection.
What We Deliver
- Gap analysis & maturity assessment
- ISMS scope definition
- Risk analysis & risk treatment
- Statement of Applicability (SoA)
- Policy & procedure development
- Internal audit preparation
- Certification audit support
- Post-certification maintenance
Frameworks & Standards
- ISO/IEC 27001:2022
- BSI IT-Grundschutz
- NIS2 Directive
- DORA
- KRITIS / BSIG
- TISAX
Related Service
External Information Security Officer
Ongoing ISMS operation after certification – named ISB as a flexible service.
Learn moreDiscuss Your ISMS Project
We will outline a realistic approach for your organisation's size and starting point.
Get in TouchFrequently Asked Questions
What does ISMS consulting typically involve?
ISMS consulting covers the full lifecycle of building, certifying, and maintaining an Information Security Management System. This includes: initial gap analysis against ISO 27001, ISMS scope definition, risk analysis and risk treatment planning, development of policies and the Statement of Applicability, internal audit support, and preparation for external certification. After initial certification, ISMS consulting focuses on ongoing maintenance, surveillance audit preparation, and continuous improvement.
How long does ISO 27001 certification take?
A realistic timeline for initial ISO 27001 certification is 9 to 18 months, depending on the organisation's size, starting point, and available internal capacity. Organisations with existing security controls and documentation can move faster; those starting from scratch require more time for risk analysis and control implementation. Factors that frequently cause delays: unclear ISMS scope, insufficient management commitment, and underestimating the internal coordination effort. We build a realistic project plan from day one.
What is the difference between ISMS consulting and an external Information Security Officer?
ISMS consulting is project-based: it covers the design, implementation, and certification of the ISMS within a defined project scope. An external Information Security Officer (ISB) is an ongoing operational role: they maintain the ISMS day-to-day, conduct risk assessments, manage incidents, and represent the organisation in regulatory matters. Many organisations use consulting support for the initial ISMS build and then transition to an external ISB model for ongoing operation. Blackfort provides both services, which can be combined or transitioned smoothly.
How does ISO 27001 help us meet NIS2 and DORA requirements?
ISO 27001 provides significant coverage of both NIS2 Article 21 requirements and DORA's ICT risk management framework. NIS2 mandates risk-based security measures, incident handling, supply chain security, and access controls – all of which ISO 27001 addresses systematically. DORA's ICT risk management framework maps closely to ISO 27001's risk assessment and treatment methodology. Pursuing ISO 27001 certification while simultaneously addressing NIS2/DORA requirements is the most efficient path: one governance framework, one documentation structure, multiple compliance outcomes.
Can you support us after initial ISO 27001 certification?
Yes. ISO 27001 certification requires annual surveillance audits and a full recertification every three years. Maintaining the ISMS between audits – updating risk assessments, reviewing and updating policies, conducting internal audits, tracking corrective actions – is a continuous operational task. We offer ongoing ISMS maintenance support as a retainer service, or as part of our external ISB offering. For organisations that want to build internal competence over time, we also offer a transition model where we initially run the ISMS and progressively hand over to an internal team.
Kontakt aufnehmen
ISMS Consulting for Your Organisation
From initial gap analysis to ISO 27001 certification – we guide you through every step with a pragmatic, outcome-focused approach.