Cyber Essentials to ISO 27001: Building Your Compliance Journey
Cyber Essentials and ISO 27001 aren't competing standards. They're complementary steps on a maturity journey. This guide explains the relationship between them, helps you decide when to progress, and provides practical steps to move from Cyber Essentials (foundation) to ISO 27001 (comprehensive).
The Compliance Maturity Pyramid
Think of information security compliance as a pyramid:
Level 5: ISO 27001 Certification (Gold Standard - Comprehensive)
Level 4: ISO 27001 Preparation (In-Flight - Most coverage)
Level 3: Cyber Essentials+ Advanced (Intermediate - Technical validation)
Level 2: Cyber Essentials (Foundation - Five controls)
Level 1: No formal Certification (Baseline - Ad-hoc security)
Most organisations start at Cyber Essentials (basic, five controls). As they mature and face increased regulatory or customer pressure, they progress toward ISO 27001 (comprehensive, 93 controls across 14 domains).
This progression isn't mandatory, but it reflects increasing maturity in how organisations approach security.
Cyber Essentials vs ISO 27001: Key Differences
The Five Cyber Essentials Controls
Cyber Essentials focuses on five foundational controls:
1. Boundary firewalls and internet gateways
2. Secure configuration
3. User access control
4. Malware protection and patch management
5. Security monitoring and incident response
These five controls prevent 80-90% of common cyberattacks. They're essentials.
The 14 ISO 27001 Domains
ISO 27001 expands security across 14 domains:
1. Information Security Policies: Documented security direction and accountability
2. Organisation of Information Security: Roles, responsibilities, and governance
3. Human Resource Security: Security awareness, background checks, termination procedures
4. Asset Management: Inventory, classification, and handling of assets
5. Access Control: Authentication, authorisation, and privilege management
6. Cryptography: Encryption, key management, and secure communication
7. Physical and Environmental Security: Facilities, equipment protection, and disposal
8. Operations Security: Change management, backups, and logging
9. Communications Security: Network segmentation and secure protocols
10. Systems Acquisition, Development, and Maintenance: Secure development, testing, and deployment
11. Supplier Relationships: Third-party security and contract management
12. Information Security Incident Management: Incident detection, response, and learning
13. Business Continuity Management: Disaster recovery and resilience
14. Compliance: Legal, regulatory, and contractual requirements
ISO 27001 covers everything from incident management to secure development to supplier contracts - areas Cyber Essentials doesn't address.
When to Progress from Cyber Essentials to ISO 27001
You don't need ISO 27001 just because it exists. Progression should be driven by business need:
Progress if...
Skip or defer if...
The Progression Path: Step by Step
Phase 1: Stabilise Cyber Essentials (Months 1-3)
Before considering ISO 27001, ensure Cyber Essentials is embedded as ongoing practice, not a point-in-time audit:
By month three, your Cyber Essentials controls should be operational, not ceremonial.
Phase 2: Gap Analysis and Planning (Month 3-4)
Conduct a gap analysis comparing your current state to ISO 27001:
Self-assessment method:
Common gaps when moving from Cyber Essentials to ISO 27001:
Create a remediation roadmap prioritising:
1. Foundational items that other controls depend on (policies, risk management, roles)
2. High-risk gaps that expose the organisation significantly
3. Effort-light wins that you can tackle quickly to build momentum
Phase 3: Build the Foundation (Months 4-8)
Focus on establishing the three foundational elements of ISO 27001:
1. Information Security Policies
Document your approach to information security at a high level. ISO 27001 expects:
Typical effort: 60-80 hours (drafting, review, approval)
2. Information Security Management System (ISMS)
ISO 27001 requires a documented ISMS - essentially, how your organisation manages information security:
Typical effort: 40-60 hours (documentation, process definition)
3. Risk Management Framework
Unlike Cyber Essentials, ISO 27001 requires systematic risk management:
Typical effort: 80-120 hours (first risk assessment is significant; subsequent ones are faster)
Phase 4: Implement Missing Controls (Months 8-12)
With foundations in place, implement controls for the 14 domains:
Quick wins (2-4 weeks each):
Medium effort (4-8 weeks each):
Significant effort (8+ weeks each):
Phase 5: Engage an Auditor and Formal Assessment (Months 12-14)
Once you believe you meet ISO 27001 requirements, engage an accredited auditor for formal certification:
Choose an auditor:
Two-stage audit:
Stage 1 (preliminary audit - 1-2 weeks)
Stage 2 (formal audit - 2-3 weeks)
Outcomes:
Phase 6: Maintain Certification (Year 2+)
ISO 27001 certification is valid for three years, but maintaining it requires:
Annual surveillance audits (1-2 weeks/year)
Continual improvement cycle
Typical annual effort: 120-200 hours (across the organisation, not just security team)
Cost and Resource Requirements
One-Time Costs
Annual Costs
Resource Effort
Real-World Example: Moving from CE to ISO 27001
Company: SaaS fintech startup, 50 employees, handling customer financial data
Starting point:
Timeline:
Months 1-3: Gap analysis and planning
Months 4-8: Foundation and quick wins
Months 8-12: Comprehensive control implementation
Months 12-14: Audit and certification
Total effort: ~600 hours over 14 months
Equivalent internal staff: 0.4 FTE + external consulting (100 hours)
Cost: ~£80,000 (auditor + external consulting + tools)
Outcome: ISO 27001 certified; enabled sales to enterprise customers who required it
How Fig Supports ISO 27001
Fig Group's platform reduces the work in ISO 27001 compliance through:
With Fig, you move from compliance as an annual event (audit) to compliance as an ongoing practice (continuous monitoring).
The Bottom Line
The progression from Cyber Essentials to ISO 27001 is not mandatory, but increasingly common for organisations handling sensitive data, serving enterprise customers, or operating in regulated industries.
The journey typically takes 12-18 months and costs £45,000-£200,000, but results in:
Start when customer demand or regulatory pressure justifies the investment. Build the foundation systematically. Engage expert auditors. Maintain rigour in ongoing compliance.
The organisations that will dominate 2026 and beyond are those that embed compliance not as a passing audit, but as a core operational practice. This guide provides the roadmap to get there.
Want to see how Fig handles this?
See how Fig simplifies certification and framework alignment for your organisation.
Request a demo