FAQ

Can we phase ISO 27001 implementation to spread cost and effort?

Yes, you can phase ISO 27001 implementation to spread cost and effort. Many regulated manufacturers do this, but it has consequences for scope, risk, and audit strategy that need to be managed deliberately.

What “phased” ISO 27001 really means

Phasing typically means one or more of the following:

  • Scope phasing: Start with a limited scope (for example, corporate IT plus one plant or one product line) and expand over time.
  • Control phasing: Implement all management system basics early (risk assessment, governance, policies), then deepen technical and operational controls in waves.
  • Site / system phasing: Roll out the ISMS and controls to different plants, networks, and applications in stages.

Any phased approach still has to add up to a single, coherent ISMS with defined scope, interfaces, and responsibilities. Auditors will test how the pieces fit together, not just each piece in isolation.

What must be in place early, even in a phased approach

Certain elements are hard to phase without creating confusion or rework:

  • Defined ISMS scope and boundaries: You can start with a narrow scope, but it must be explicit. Interfaces to out-of-scope plants, OT networks, or suppliers must be described and controlled.
  • Governance and roles: Information security policy, top management commitment, assigned responsibilities, and steering structures should exist from the start.
  • Risk assessment and treatment method: Even if you only assess part of the environment initially, the method should be stable so you do not have to redo earlier work when you extend scope.
  • Documented processes: Change control, incident management, access management, and supplier management processes should be defined early, then instantiated across more systems/sites over time.
  • Minimum technical controls: Baseline controls like backup, logging, and vulnerability management for in-scope systems should not be deferred indefinitely, especially where safety, quality, or export-controlled data is involved.

Typical phasing patterns in industrial and OT-heavy environments

In brownfield manufacturing, phasing is often driven by technology and validation constraints:

  • Phase 1: Central IT and business systems
    • Corporate network, email, document management, ERP, PLM, QMS, and cloud services.
    • Focus on policies, identity and access management, endpoint protection, backup, and incident management.
  • Phase 2: MES and engineering systems
    • MES, SCADA historian interfaces, design data stores that exchange data with OT.
    • Harder integration work: data classification, secure interfaces, role-based access, and audit logging under change control.
  • Phase 3: OT / ICS and plant networks
    • Production equipment, PLCs, DCS, CNC controllers, test stands, and plant network segments.
    • Applied using ICS security practices (often aligned with IEC 62443) and constrained by safety, validation, and downtime windows.

Phasing in this way helps avoid large, risky changes to validated systems and plant networks, but you need clear interfaces and compensating controls where in-scope and out-of-scope areas meet.

Key tradeoffs of a phased ISO 27001 approach

Phasing spreads cost and effort, but introduces tradeoffs that leadership should understand:

  • Pros
    • Lower initial spend and less disruption to operations and validated systems.
    • Ability to learn and refine processes on a smaller scope before scaling.
    • Easier to secure downtime windows for OT changes in later phases.
  • Cons
    • Longer exposure: Unaddressed areas remain at higher risk, sometimes including critical OT or supplier interfaces.
    • Scope complexity: Managing what is and is not “in scope” for the ISMS and audits can be confusing for staff and auditors.
    • Rework risk: If early design decisions or tools do not scale, you may need to redo risk assessments, documentation, or implementations when you extend scope.
    • Integration burden: Each phase must integrate with legacy systems, existing procedures, and site-specific workarounds, which can be significant in older plants.

Impact on certification and audits

You can usually seek certification for a limited ISO 27001 scope and then extend it over time, but with constraints:

  • Scope statement must be precise: Certification will only cover what is documented in the scope. Regulators, customers, and internal stakeholders may assume broader coverage if you are not explicit.
  • Interfaces are still examined: Auditors will look at how in-scope assets interact with out-of-scope systems, contractors, and plants. Weak interfaces can become nonconformities even if the external systems are formally out of scope.
  • Extension audits add cost and effort: Each scope extension or major change can trigger additional audits, documentation updates, and evidence gathering.
  • Validation and change control: In regulated manufacturing, any control that affects validated systems or data flows may require documented impact assessment, testing, and approvals. This can slow later phases.

No implementation or phasing approach can guarantee certification outcomes. Success depends heavily on the quality of execution, documentation, and how well the ISMS is integrated into day-to-day operations.

Considerations for plants with long equipment lifecycles

In environments with decades-old equipment and strict qualification requirements, full, big-bang security upgrades are rarely feasible. Phasing becomes almost the only practical option, but must account for:

  • Legacy systems that cannot be patched or reconfigured easily: Compensating controls such as network zoning, strict access procedures, and monitoring may be more realistic than direct changes.
  • Downtime constraints: Availability requirements may limit when you can introduce new controls, especially on shared lines or critical test equipment.
  • Qualification/validation impact: Changes to software, firmware, or interfaces may trigger requalification. This is a major reason why full replacement or rapid, uniform control rollout often fails in practice.
  • Coexistence strategy: Expect years of coexistence between modern, well-instrumented systems and legacy equipment. Your ISMS should explicitly recognize this and define realistic objectives.

How to structure a pragmatic phased plan

To reduce risk and rework when phasing ISO 27001 implementation:

  1. Define a long-term target scope: Decide which plants, OT environments, and suppliers you ultimately want covered so early design choices do not box you in.
  2. Choose phase boundaries based on risk and practicality: Start where you have the most leverage (often central IT and shared services) and where change is least constrained by validation or downtime.
  3. Standardize core methods early: Fix your risk methodology, classification scheme, and control selection approach before scaling. This improves consistency across phases.
  4. Design for coexistence: Document interfaces, data flows, and residual risks where in-scope and out-of-scope areas meet, and apply compensating controls where direct remediation is not yet possible.
  5. Treat each phase as a controlled change: Use existing change control, configuration management, and validation processes. Tie ISO 27001 activities to those mechanisms rather than inventing parallel structures.
  6. Align with other standards where relevant: If you apply IEC 62443 or similar ICS frameworks, map them to ISO 27001 controls to avoid redundant work and conflicting requirements.

With clear scoping, governance, and realistic integration planning, phasing ISO 27001 is often the only workable approach in complex, regulated manufacturing environments. The main risk is not phasing itself, but unplanned, ad hoc phasing that leads to gaps and inconsistent control application across plants and systems.

Get Started

Built for Speed, Trusted by Experts

Whether you're managing 1 site or 100, C-981 adapts to your environment and scales with your needs—without the complexity of traditional systems.