ISO 27001 advocates the use of an Information Security Management System (an ISMS for short), which is made up of a standardised set of policies, processes and procedures to enable you to identify what information needs to be protected, what types of protection you require and what mitigating actions can be taken to address any identified risks.  In effect, your ISMS outlines the approach you take to managing your information security.

Our URM consultant was really thorough, genuinely helpful and contributed real value literally within the first few minutes of our session by pointing out some (not-so-obvious) details of the new version of ISO 27001 that we hadn't been aware of until then. He then proceeded with a very well-prepared run-through and explanation of the controls in scope for our upcoming internal audit. Definitely a highlight and overall, very positive experience for us!
Visulisation studio
Contact the ISO 27001 Experts Today

ISO 27001 Clause 7.5: Documented Information Explained

Published on
27 Apr
2026

URM’s blog breaks down ISO 27001 Clause 7.5 requirements, with practical guidance on how to achieve conformance to this Clause & what external assessors expect.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
15/4/2026
ISO 27001 – Clause 6.3: The Importance of Planned ISMS Change Management

URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
2/4/2026
Transitioning to ISO 27001:2022

If your organisation is looking to transition to ISO 27001:2022, URM’s blog provides practical and invaluable guidance on meeting the new requirements.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
2/4/2026
What is the CIA Security Triad? Confidentiality, Integrity and Availability Explained

URM’s blog explains how the principles of confidentiality, integrity and availability (CIA) can help align your information security controls with best practice

Read more
"
The course was educational but fun, everyone was engaged, and I believe all who attended would now be able to complete an internal audit. The trainer would be our first choice of a tutor for our next ISO training.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.