Pillar guide

ISO 27001 in KSA: A Practical Implementation Guide

How Saudi organisations implement ISO/IEC 27001:2022 — ISMS scope, Annex A controls, certification — and align with SAMA, NCA and PDPL expectations today.

GRC Vantage Team2026-04-0810 min read

ISO/IEC 27001 is the international standard for Information Security Management Systems (ISMS) and the most widely-recognised cybersecurity certification in the world. The current version, ISO/IEC 27001:2022, is the version every Saudi organisation building or refreshing an ISMS should be working from. Existing certified organisations had to transition from the 2013 version by 31 October 2025, and certification bodies are now auditing exclusively against the 2022 standard.

In Saudi Arabia, ISO 27001 plays an outsized role. It is not itself a legal requirement, but the SAMA Cyber Security Framework, the NCA Essential Cybersecurity Controls and the PDPL all expect structured information security management — and ISO 27001 is the framework that most naturally satisfies that expectation. Many Saudi banks, government bodies, telecoms, healthcare providers and large enterprises are already certified, and many more are working toward it as a baseline before layering on Saudi-specific compliance requirements.

This guide walks through what ISO 27001:2022 actually requires, what changed from the 2013 version, how to implement it in a Saudi context, how it maps to SAMA and NCA expectations, and how to build an ISMS that holds up under both certification audits and local regulatory inspections.

What ISO 27001:2022 requires

ISO 27001 uses the Annex SL high-level structure common to all modern ISO management system standards. The main clauses are:

  • Clause 4: Context of the organisation
  • Clause 5: Leadership
  • Clause 6: Planning, including risk assessment and risk treatment
  • Clause 7: Support — resources, competence, awareness, communication, documented information
  • Clause 8: Operation
  • Clause 9: Performance evaluation — monitoring, internal audit, management review
  • Clause 10: Improvement — nonconformity and continual improvement

Alongside the management system clauses, ISO 27001:2022 includes Annex A, the catalogue of information security controls. The 2022 version lists 93 controls grouped into four themes:

  • Organisational controls (37 controls) — policies, roles, threat intelligence, supplier management, classification, access control governance, ICT readiness for business continuity
  • People controls (8 controls) — screening, terms of employment, awareness, disciplinary process, remote working, confidentiality
  • Physical controls (14 controls) — secure areas, equipment, monitoring, clean desk, secure disposal
  • Technological controls (34 controls) — endpoint, configuration, deletion, masking, data leakage prevention, monitoring, network security, secure development, vulnerability management, logging, time synchronisation, capacity, web filtering, cryptography, system protection

The Annex A controls are not mandatory in the absolute sense — the Statement of Applicability (SoA) documents which controls the organisation has determined are applicable, which it has implemented, and the justification for any exclusions. The risk assessment is what drives the SoA, not the other way around.

What changed from ISO 27001:2013

If your team is transitioning from the 2013 version, the changes are significant.

Annex A restructured. The 2013 version had 114 controls in 14 domains. The 2022 version has 93 controls in 4 themes. The reduction is mostly through merging — many old controls were combined — but 11 controls are genuinely new:

  • Threat intelligence
  • Information security for use of cloud services
  • ICT readiness for business continuity
  • Physical security monitoring
  • Configuration management
  • Information deletion
  • Data masking
  • Data leakage prevention
  • Monitoring activities
  • Web filtering
  • Secure coding

These 11 controls reflect how the threat landscape has shifted since 2013 — cloud everywhere, ransomware as the dominant risk, remote work as the norm, supply chain as a frequent attack vector.

Control attributes. The 2022 standard introduces five attributes on every Annex A control: control type, information security properties, cybersecurity concepts, operational capabilities and security domains. These attributes make it much easier to filter and map controls to other frameworks.

Plain language. Annex A control statements were rewritten to be clearer and more action-oriented, which helps the implementation conversation with operational teams.

The transition deadline. Existing certified organisations had until 31 October 2025 to transition to ISO 27001:2022. Any new implementation in 2026 must use the 2022 version.

How ISO 27001 fits into the Saudi GRC stack

For Saudi organisations, ISO 27001 is the foundation that the local frameworks layer on. Understanding the relationship is essential for an efficient programme.

ISO 27001 and SAMA CSF. A well-implemented ISO 27001 ISMS covers somewhere between two-thirds and three-quarters of the SAMA CSF control population. The Saudi-specific gaps are around board-level governance depth, the role and reporting line of the CISO, insider threat, third-party cyber security depth, Saudi-specific incident reporting and the maturity demonstration that SAMA expects year-on-year. Our deeper post on the SAMA CSF and ISO 27001 mapping walks through the overlap and the gaps in detail.

ISO 27001 and NCA ECC. The relationship with NCA ECC is similar — strong overlap, with Saudi-specific additions that need to be layered on top. ECC's main domains map cleanly to ISO 27001's Annex A themes, and a single connected control library can satisfy both at the control level. The NCA-specific layer is around ECC's classification methodology, the integration with CSCC for critical systems, the cloud expectations in CCC, and the data-specific expectations in DCC.

ISO 27001 and PDPL. ISO 27001 provides the security control foundation that PDPL relies on. It does not, by itself, satisfy PDPL — for full PDPL compliance you also need lawful basis, data subject rights, records of processing activities, breach notification and the other privacy obligations. Many Saudi organisations also adopt ISO 27701, the privacy extension to ISO 27001, which maps cleanly to PDPL.

ISO 27001 and ISO 22301. The two standards share the same management system architecture, which is why running them together is significantly more efficient than running them separately. A unified context, leadership, planning and support layer can serve both, with the operation clauses (8) running in parallel for security and continuity.

For the broader picture of how the Saudi GRC frameworks fit together, see our SAMA frameworks complete guide, NCA frameworks complete guide and PDPL practical guide.

A practical Saudi implementation roadmap

Organisations new to ISO 27001 typically run a 9–12 month implementation. Organisations with mature security controls but no formalised ISMS can usually reach certification in 6–9 months. A workable phased plan looks like this.

Phase 1: Mobilise (months 1–2). Define the ISMS scope, secure top-management commitment, appoint the ISMS owner, draft the information security policy, and set up the project workspace. Identify the certification body that will perform the audit and agree the audit window. Scope is the single biggest decision — too narrow and the certificate has limited credibility; too wide and the implementation timeline doubles.

Phase 2: Risk assessment (months 2–4). Build the asset inventory, identify the threats and vulnerabilities, and run a risk assessment that aligns to ISO 27005 or an equivalent methodology. The risk assessment is the engine of the ISMS — every control decision should trace back to a risk.

Phase 3: Risk treatment and SoA (months 4–5). For each identified risk, document the treatment decision: avoid, modify (apply controls), share (insure or transfer) or retain. Build the Statement of Applicability, listing every Annex A control with applicability status and justification. The SoA is one of the artefacts the certification body will scrutinise hardest.

Phase 4: Control implementation (months 4–8). Implement the controls that risk treatment requires. This phase runs in parallel with phase 3 because many controls take time to deploy. Focus on the controls where the gap is largest, not the controls that are easiest. Document everything as you go — auditors expect contemporaneous evidence, not retroactive compilation.

Phase 5: Awareness and training (months 6–8). Roll out the awareness programme across the in-scope population. Role-based training for staff in sensitive functions. Measurable participation, not just an e-learning click-through.

Phase 6: Internal audit (months 8–9). Conduct the first internal audit of the ISMS. Use a competent internal auditor or an external partner who is independent of the implementation team. Track findings to closure before the certification audit.

Phase 7: Management review (month 9). Top management formally reviews the ISMS performance — risk landscape, audit findings, incident records, exercise results, improvement actions. This is a documented meeting with documented decisions, not an informal chat.

Phase 8: Certification audit (months 10–12). Stage 1 documentation review followed by Stage 2 implementation audit. Findings are addressed before the certificate is issued. Surveillance audits run annually with a full recertification audit every three years.

What auditors actually look at

The ISO 27001 certification audit is not a tick-box exercise. The certification body's auditors are trained to look for the gap between documented policy and actual practice. The areas that auditors test most aggressively in 2026 are:

Risk assessment realism. Does the risk assessment match the actual threat landscape, or does it look like a generic template? Auditors compare the documented risks against publicly-known incidents in the sector and against the controls actually implemented.

Statement of Applicability. Is every Annex A control accounted for, with a clear justification? Are exclusions defensible? Have the 11 new controls been considered?

Cloud controls. With the new cloud control in Annex A 5.23, every organisation using cloud services needs to demonstrate cloud-specific security management. Most 2026 audits include a deep dive on this area.

Threat intelligence. Annex A 5.7 is new and asks about threat intelligence collection, analysis and use. Many organisations have a SOC subscription but no documented threat intelligence process — auditors find that gap quickly.

Supplier management. Annex A 5.19–5.23 cover supplier relationships. Auditors expect a tiered supplier inventory, due diligence records and ongoing monitoring evidence.

Incident management. Annex A 5.24–5.28 cover incident management. Auditors expect a documented incident response plan, evidence of testing, and lessons learned from real events.

Internal audit and management review. Independent internal audit and documented management review with traceable decisions. These are the management system clauses where audit findings most often originate.

The pattern across all of these is the same: auditors are testing whether the ISMS is operationally real or paper-only. Connected GRC tooling that produces evidence as a by-product of operations passes this test much more easily than a folder of point-in-time documents.

Common failure modes

Patterns we see repeatedly in Saudi ISO 27001 programmes that struggle:

The over-scoped certificate. An organisation tries to certify the entire enterprise on the first attempt. Three-month delays compound into nine-month delays and the project loses sponsorship. Better: certify a defensible scope first, then expand.

The shopping-list SoA. A Statement of Applicability that marks every control as "applicable" without genuine analysis. Auditors immediately distrust it and dig harder elsewhere.

The disconnected risk register. A risk register maintained in a spreadsheet that has no relationship to the controls or the incidents. Auditors test the linkage by tracing a risk to a control to evidence of operation.

The annual awareness campaign. A single mandatory e-learning module once a year, with no role-based content and no measurement of effectiveness. Auditors interview staff to test the gap.

The CISO under the CIO. Common in Saudi organisations and increasingly questioned in audits — particularly because SAMA CSF expects CISO independence. Even if the structure is technically compatible with ISO 27001, the audit conversation gets harder.

The remedy in every case is the same: one connected workspace where the risk assessment, the SoA, the controls, the evidence, the incidents, the internal audit and the management review all live together with clear ownership and traceability.

How GRC Vantage supports ISO 27001:2022

GRC Vantage's compliance module ships with the full ISO/IEC 27001:2022 control library — all 93 Annex A controls — with pre-built mappings to SAMA CSF, NCA ECC, PDPL and SOC 2. The platform provides a connected ISMS workspace covering the risk assessment, the Statement of Applicability, the control library, evidence collection, internal audit workflow, management review records and continual improvement actions. Every control update flows automatically into every framework view, so a single change updates the SoA, the SAMA CSF assessment and the NCA ECC self-assessment at the same time. The platform is built and supported in Riyadh and Dammam, with deployment options inside KSA for data residency, and is used by Saudi banks, government bodies, telecoms and enterprises to run their ISMS alongside SAMA, NCA and PDPL programmes from one source of truth.

Want to see this in the platform?

Book a demo with the GRC Vantage team in Riyadh or Dammam.

See Compliance Management

Where to go next

This pillar is part of our deeper series on the Saudi GRC framework landscape. To go deeper:

If you would like to see an ISO 27001:2022 ISMS running on real data — with SAMA CSF, NCA ECC and PDPL mapped on top — book a demo of GRC Vantage and we will walk you through how Saudi organisations use the platform to certify, maintain and continuously improve their security programmes from a single connected workspace.

Frequently asked questions

What is ISO/IEC 27001?
ISO/IEC 27001 is the international standard for Information Security Management Systems (ISMS). The current version is ISO/IEC 27001:2022. It defines the requirements for establishing, implementing, maintaining and continually improving an ISMS, and includes Annex A — a list of 93 information security controls organised into four themes (Organisational, People, Physical and Technological).
What changed in ISO 27001:2022?
ISO 27001:2022 reduced Annex A from 114 controls to 93, restructured them from 14 domains into 4 themes (Organisational, People, Physical, Technological), introduced 11 brand-new controls (covering threat intelligence, cloud services, ICT readiness for business continuity, physical security monitoring, configuration management, information deletion, data masking, data leakage prevention, monitoring activities, web filtering and secure coding) and added control attributes for filtering. Existing certified organisations needed to transition to the 2022 version by 31 October 2025.
Is ISO 27001 mandatory in Saudi Arabia?
ISO 27001 itself is not legally mandatory in Saudi Arabia, but the SAMA Cyber Security Framework, the NCA Essential Cybersecurity Controls and PDPL all expect organisations to implement structured information security management. ISO 27001 is the most widely-recognised framework that satisfies that expectation, and is treated by SAMA inspectors and NCA assessors as strong evidence of management system maturity. Many Saudi banks, government bodies, telecoms and healthcare providers are already certified.
How long does ISO 27001 implementation take in KSA?
For an organisation with no existing ISMS, a credible ISO 27001:2022 implementation usually takes 9–12 months from project kick-off to certification audit. Organisations with mature security controls but no formalised ISMS can typically reach certification in 6–9 months. The biggest variables are scope size, the maturity of the risk assessment, and whether the team is running on connected GRC tooling or on disconnected spreadsheets.
How does ISO 27001 map to SAMA CSF and NCA ECC?
ISO 27001 is the international foundation that both SAMA CSF and NCA ECC build on. A well-implemented ISO 27001 ISMS covers somewhere between two-thirds and three-quarters of the SAMA CSF and NCA ECC control populations. The Saudi-specific gaps are around board-level governance depth, third-party assurance, insider threat, regulator notification timelines and the maturity demonstration that both regulators expect. Mapping the three frameworks in a single connected control library is the efficient pattern.
Does ISO 27001 cover personal data and PDPL?
ISO 27001 covers the security of personal data through Annex A controls on data protection, access control, encryption and incident management. It is not a privacy law, so it does not by itself satisfy PDPL — for full PDPL compliance you also need lawful basis, data subject rights, RoPA, breach notification and the other privacy obligations. The two work well together: ISO 27001 provides the security control foundation, PDPL adds the legal privacy obligations. Many Saudi organisations also adopt ISO 27701, the privacy extension to ISO 27001.
How does GRC Vantage support ISO 27001 implementation?
GRC Vantage's compliance module ships with the full ISO/IEC 27001:2022 control library, pre-built mappings to SAMA CSF, NCA ECC, PDPL and SOC 2, and a connected ISMS workspace covering risk assessment, statement of applicability, controls, evidence, internal audit, management review and continual improvement. It is built and supported in Riyadh and Dammam, with deployment options inside KSA for data residency, and is used by Saudi banks, government bodies and enterprises to run a single connected ISMS that satisfies the international standard and the local regulators from one source of truth.