📋 Whitepaper Compliance · 26 pages · October 25, 2025

Compliance Made Simple: ISO 27001, SOC 2, and GDPR

A practical guide to achieving ISO 27001:2022, SOC 2 Type II, and GDPR compliance simultaneously — including a shared controls mapping and common audit pitfalls to avoid.

CO
📋 Whitepaper Compliance
CO

Topics Covered

  • ISO 27001:2022 requirements and Annex A controls
  • SOC 2 Trust Services Criteria
  • GDPR data protection obligations
  • Framework overlaps and differences
  • Implementation priorities and quick wins
  • Audit preparation and evidence management
  • Building an integrated compliance programme

Executive Summary

Compliance with security frameworks is no longer optional for organisations handling sensitive data or serving regulated industries. ISO 27001, SOC 2, and GDPR are the three most commonly required frameworks for technology companies — and the three most frequently misunderstood.

This guide demystifies each framework, explains where they overlap, and provides a practical implementation roadmap. The goal is not just to achieve certification on paper — it is to build a security programme that genuinely reduces risk and provides assurance to customers, partners, and regulators.


Chapter 1: Understanding the Frameworks

ISO 27001:2022

What it is: An international standard for Information Security Management Systems (ISMS). Published by ISO (International Organization for Standardization). Certification is granted by accredited certification bodies.

What it proves: Your organisation has implemented a systematic approach to managing information security risks, including documented policies, risk management, and 93 security controls across 4 themes.

Who requires it:

  • Government and public sector contracts (UK, India, EU)
  • Enterprise customer due diligence requirements
  • Regulated industries (financial services, healthcare, defence supply chain)

Certification process:

  1. Gap assessment against ISO 27001 requirements
  2. ISMS implementation (policies, risk register, controls)
  3. Stage 1 audit: documentation review by certification body
  4. Stage 2 audit: on-site assessment of implementation
  5. Certificate issued (valid 3 years, with annual surveillance audits)

ISO 27001:2022 changes from 2013: The 2022 update reorganised Annex A from 114 controls across 14 domains to 93 controls across 4 themes:

  • Theme A.5: Organisational controls (37 controls)
  • Theme A.6: People controls (8 controls)
  • Theme A.7: Physical controls (14 controls)
  • Theme A.8: Technological controls (34 controls)

New controls in 2022: threat intelligence, cloud security, ICT readiness for business continuity, data masking, data leakage prevention, monitoring activities, web filtering, secure coding.


SOC 2

What it is: An auditing standard developed by the AICPA (American Institute of CPAs). Applicable to service organisations storing or processing customer data. Performed by licensed CPA firms.

What it proves: Your controls addressing the relevant Trust Services Criteria are designed (Type I) and operating effectively over a period (Type II, typically 6–12 months).

Type I vs Type II:

  • SOC 2 Type I: Point-in-time assessment — controls are designed appropriately as of a specific date. Achievable in 3–6 months.
  • SOC 2 Type II: Operating effectiveness over a period (minimum 6 months, typically 12). Required by most enterprise customers. Takes 9–18 months to achieve.

Trust Services Criteria:

CriteriaAlways RequiredOptional
Security (CC)
Availability (A)
Processing Integrity (PI)
Confidentiality (C)
Privacy (P)

Most organisations start with Security + Confidentiality. SaaS companies in regulated industries typically add Availability.

Who requires it:

  • US enterprise customers (standard procurement requirement)
  • Organisations processing US customer data
  • Cloud service providers

GDPR

What it is: The General Data Protection Regulation — EU law governing the collection, processing, storage, and transfer of personal data of EU residents. Applies regardless of where the processing organisation is based.

What it requires:

  • Lawful basis for processing personal data
  • Privacy notices and consent management
  • Data subject rights (access, erasure, portability, correction)
  • Data Protection Officer (DPO) for certain organisations
  • Data Protection Impact Assessments (DPIA) for high-risk processing
  • Data breach notification (72 hours to supervisory authority)
  • Adequate safeguards for international data transfers

Enforcement:

  • Maximum fine: €20 million or 4% of global annual turnover, whichever is higher
  • Enforcement is active: Meta fined €1.2B (2023), Amazon €746M (2021), WhatsApp €225M (2021)

UK GDPR: Post-Brexit, the UK maintains substantially equivalent law (UK GDPR + Data Protection Act 2018). The ICO is the UK supervisory authority.

India DPDPA: The Digital Personal Data Protection Act 2023 is India’s equivalent data protection law, currently in implementation phase. Applies to digital personal data of Indian residents.


Chapter 2: Framework Comparison

Coverage Overlap

The three frameworks cover significant common ground:

Control AreaISO 27001SOC 2GDPR
Access controlA.8.2, A.8.3CC6Art. 32
EncryptionA.8.24CC6.7Art. 32
Incident responseA.5.26CC7Art. 33, 34
Audit loggingA.8.15CC7.2Art. 32
Vendor managementA.5.19-A.5.22CC9Art. 28
Risk assessmentClauses 6.1, 8.2CC3Art. 35 (DPIA)
Training and awarenessA.6.3CC1.4Art. 39
Business continuityA.5.29-A.5.30A1Art. 32

Practical implication: If you implement ISO 27001 properly, you have completed 60–70% of the work for SOC 2 Security criteria and 40–50% of GDPR technical requirements.

Key Differences

AspectISO 27001SOC 2GDPR
TypeCertificationAttestation reportLegal compliance obligation
Issued byCertification body (accredited)CPA firmN/A (regulatory compliance)
Renewal3-year cycle, annual surveillanceAnnual report periodOngoing
ScopeOrganisation’s entire ISMSService organisation’s controlsAll personal data processing
Prescriptive?What to achieve, not howCriteria-basedPrinciples-based with specific obligations
Legal penaltyLose certificationLose customer contractsFines up to 4% global turnover

Chapter 3: ISO 27001 Implementation

ISMS Scope Definition

The most important decision in ISO 27001 implementation is scope. Too broad creates an unmanageable programme; too narrow provides insufficient assurance and may not satisfy customer requirements.

Common scoping approaches:

  • Full organisation: All departments, all systems, all locations
  • Product/service scope: “The development, delivery, and support of [Product X] for [Customer segment]”
  • Data scope: “Systems processing [Customer / Financial / Health] data”

Document the scope in the ISMS scope statement. The certification body will test that the scope matches what was described.

Mandatory ISO 27001 Requirements (Clauses 4–10)

These are non-negotiable — any nonconformity in these clauses fails certification:

ClauseRequirement
4Context: understand the organisation, stakeholders, and ISMS scope
5Leadership: management commitment, ISMS policy, roles
6Planning: risk assessment methodology, risk treatment plan, Statement of Applicability
7Support: resources, awareness, competence, communication, documented information
8Operation: risk assessment, risk treatment implementation
9Performance evaluation: monitoring, internal audits, management review
10Improvement: nonconformities, corrective actions, continual improvement

Statement of Applicability (SoA)

The SoA is the central document of your ISO 27001 programme. It lists all 93 Annex A controls and for each:

  • Whether it is applicable or excluded (with justification for exclusions)
  • Implementation status
  • Reference to the implementing policy/procedure

The SoA is provided to auditors as proof of considered, documented control selection.

Risk Assessment

ISO 27001 requires a formal information security risk assessment:

  1. Asset inventory: Identify all information assets (systems, data, people, processes, facilities)
  2. Threat identification: What could go wrong? (Malware, insider threat, physical breach, misconfiguration)
  3. Vulnerability identification: What weaknesses exist that threats could exploit?
  4. Impact assessment: What would be the business impact if the threat materialised?
  5. Likelihood assessment: How likely is the threat to materialise given existing controls?
  6. Risk scoring: Combine likelihood × impact to prioritise
  7. Risk treatment: For each high-risk item: treat (implement controls), tolerate (accept), terminate (stop the activity), or transfer (insurance)

Priority Controls for Quick Wins

If starting from scratch, prioritise these Annex A controls first:

  1. A.8.8 — Management of technical vulnerabilities: Patch management programme
  2. A.8.2/A.8.3 — Privileged access management: Restrict and monitor privileged accounts
  3. A.8.5 — Secure authentication: MFA for all remote access and privileged accounts
  4. A.5.26 — Response to information security incidents: Documented incident response procedure
  5. A.8.13 — Information backup: Tested backup and recovery process
  6. A.6.3 — Information security awareness: Security awareness training for all staff

Chapter 4: SOC 2 Implementation

Common Criteria — Security (CC)

The Security Trust Services Criterion covers 9 control categories (CC1–CC9). The most implementation-intensive:

CC6 — Logical and Physical Access:

  • User provisioning and deprovisioning processes
  • MFA for remote access and privileged accounts
  • Quarterly access reviews
  • Role-based access control
  • Encryption of data at rest and in transit

CC7 — System Operations:

  • Vulnerability scanning programme
  • Security monitoring and alerting
  • Incident response procedure
  • Change management process

CC8 — Change Management:

  • Code review process
  • Testing environments (separate from production)
  • Change approval process
  • Security testing before production deployment

CC9 — Risk Mitigation:

  • Vendor risk assessment programme
  • Business continuity and disaster recovery

Evidence Collection

SOC 2 Type II requires evidence that controls operated effectively during the audit period. Plan your evidence collection from day one:

ControlEvidence TypeCollection Method
MFA enforcementScreenshot of Conditional Access policyQuarterly screenshot
Access reviewsAccess review results with approvalsQuarterly review log
Vulnerability scanningScan reports with remediation statusMonthly export from scanner
Security training completionTraining platform completion recordsQuarterly report
Incident responseIncident tickets with timelinesIncident log
Change managementPR/ticket history with approvalsGit/Jira export

Use a GRC (Governance, Risk, and Compliance) platform to automate evidence collection: Vanta, Drata, Secureframe, or Tugboat Logic are purpose-built for SOC 2.

Vendor Selection: SOC 2 Auditor

The auditor is a CPA firm with SOC 2 expertise. Key selection criteria:

  • AICPA membership and peer review
  • Experience with your industry and size
  • Reference checks from similar companies
  • Cost: typically $15,000–$50,000 for Type II (varies significantly by scope and auditor)

Chapter 5: GDPR Implementation

Lawful Basis for Processing

Every processing activity must have a lawful basis:

BasisWhen to Use
ConsentMarketing, cookies, non-essential processing
Contractual necessityProcessing required to deliver your service
Legal obligationTax records, employment law requirements
Legitimate interestsFraud prevention, security monitoring (balance test required)
Vital interestsEmergency healthcare (rare)
Public taskGovernment functions (rare)

Most common for SaaS: Contractual necessity for processing customer data to deliver the service; consent for marketing.

Records of Processing Activities (RoPA)

Article 30 requires a written record of all processing activities:

Processing Activity: Customer Support
Controller: [Your Company]
Purpose: Responding to customer support tickets
Categories of data: Name, email, company, support ticket content
Lawful basis: Contractual necessity
Recipients: Zendesk (processor), [other sub-processors]
Retention: 2 years after contract end
Transfer safeguards: EU-US DPF (Zendesk)

The RoPA is a living document — update it when you add new data processing activities.

Data Subject Rights

Implement processes to fulfil each right within statutory timeframes (1 month, extendable to 3 months for complex requests):

RightWhat It Requires
Access (Art. 15)Provide a copy of all personal data held about the individual
Erasure (Art. 17)Delete personal data; propagate to sub-processors
Portability (Art. 20)Provide data in machine-readable format
Rectification (Art. 16)Correct inaccurate data
Restriction (Art. 18)Stop processing while a dispute is resolved
Objection (Art. 21)Stop processing for direct marketing (absolute right)

Implement a data subject request intake process (email address, web form) and internal workflow to fulfil requests within 30 days.

Data Protection Impact Assessments (DPIA)

Required for processing that is “likely to result in a high risk” — including:

  • Large-scale processing of sensitive data (health, biometric, financial)
  • Systematic profiling
  • Processing of data about vulnerable populations
  • Novel technologies (AI/ML on personal data)
  • Data sharing with third parties at scale

A DPIA documents: the processing, its necessity, risks, and mitigations. It must be completed before the processing begins.

International Data Transfers

Transferring personal data outside the EEA requires a legal mechanism:

MechanismWhen to Use
Adequacy decisionTransfers to countries with EU adequacy (UK, Israel, Japan, etc.)
EU-US Data Privacy FrameworkTransfers to certified US companies
Standard Contractual Clauses (SCCs)Transfers to any third country without adequacy
Binding Corporate Rules (BCRs)Intra-group transfers for large multinationals

For UK post-Brexit: UK SCCs (International Data Transfer Agreements — IDTAs) for transfers from UK to non-adequate countries.


Chapter 6: Building an Integrated Compliance Programme

The Single Programme Approach

Maintaining three separate compliance programmes is expensive and creates inconsistency. Build one integrated programme:

Unified policy framework: Write policies that satisfy all three frameworks simultaneously. An Access Control Policy that references RBAC (ISO 27001 A.8.3), user provisioning/deprovisioning (SOC 2 CC6), and purpose limitation (GDPR Art. 5) covers all three in one document.

Unified evidence repository: Use a GRC platform or structured SharePoint/Confluence to store evidence that satisfies multiple frameworks. A quarterly access review serves ISO 27001 A.8.2, SOC 2 CC6.2, and GDPR Art. 32 simultaneously.

Unified risk register: Maintain one risk register that includes information security risks (ISO 27001), operational risks that affect service availability (SOC 2 CC3), and data protection risks (GDPR Art. 35).

Implementation Sequence Recommendation

For an organisation starting from scratch targeting all three:

Phase 1 (Months 1–3): Foundation

  • Asset inventory and data mapping (feeds all three frameworks)
  • Risk assessment (ISO 27001 + GDPR DPIA assessment)
  • Policy framework first draft
  • Technical controls foundation: MFA, access control, encryption, logging

Phase 2 (Months 4–6): ISO 27001

  • Complete ISMS documentation
  • Stage 1 audit
  • Implement remaining Annex A controls
  • Stage 2 audit

Phase 3 (Months 7–9): GDPR

  • RoPA completion
  • Privacy notices updated
  • Data subject request process implemented
  • Sub-processor agreements (DPAs) signed
  • International transfer mechanisms documented

Phase 4 (Months 10–18): SOC 2 Type II

  • Evidence collection period begins
  • Controls operating and evidence collected
  • Type II audit report

GRC Tools

ToolBest ForCost
VantaSMBs; SOC 2 + ISO 27001 automation$$$$
DrataMid-market; broad framework coverage$$$$
SecureframeGood value; SOC 2 + ISO 27001 + GDPR$$$
Tugboat LogicMid-market; policy library$$$
SprintoIndian market; ISO 27001$$$
Manual (Notion/Confluence)Very small teams starting out$

Chapter 7: Audit Preparation

ISO 27001 Audit Preparation

3 months before Stage 2:

  • Complete internal audit across all ISO 27001 clauses and applicable Annex A controls
  • Resolve all Major nonconformities identified in internal audit
  • Conduct management review meeting (mandatory, must show leadership engagement)
  • Ensure all mandatory documented information is current (policies, procedures, risk register, SoA, audit reports)

1 month before:

  • Evidence pack ready for each Annex A control: policy reference + evidence of implementation
  • All staff have completed information security awareness training
  • Risk assessment and risk treatment plan reviewed and updated

SOC 2 Audit Preparation

Ongoing throughout audit period:

  • Consistent evidence collection (access reviews, training completion, scan reports)
  • All controls operating as designed — no gaps in evidence

1 month before audit report date:

  • Evidence reviewed for completeness
  • Any control gaps have compensating controls documented
  • Vendor SOC 2 reports collected and reviewed

Common Audit Findings to Avoid

FindingHow to Avoid
Policies not reviewed annuallySet calendar reminders; document review date in policy
Access reviews not completed on schedulePut quarterly reviews in calendar; assign DRI
Missing training recordsUse LMS with automated completion tracking
Undocumented exceptions to policyFormal exception process with documented approvals
Risk register not updatedQuarterly risk review as standing agenda item
Vendor assessments not currentAnnual vendor review calendar

Conclusion

ISO 27001, SOC 2, and GDPR compliance is achievable for organisations of any size — the key is building a genuine security programme rather than paper compliance.

The most common mistake is treating compliance as a project that ends at certification. Compliance is an ongoing operational discipline. The organisations that get the most value from their compliance investments are those that use it as a forcing function to build security controls they would want anyway.

CyberneticsPlus provides gap assessments, ISMS implementation support, audit preparation, and ongoing compliance advisory for ISO 27001, SOC 2, and GDPR. Contact us to discuss your compliance programme.

Need expert guidance on Compliance?

Talk to our certified security team and get tailored recommendations for your business.

Book a Consultation