Skip to main content
Fernando Arrieta
ISO 27001

Information security with professional rigor

ISMS, access controls, operational continuity, and incident management.

ISO/IEC 27001ISO 27002NIST CSF
72 hInitial diagnosis
100%Traceability
95Countries
Scope

What is assessed in information security

People, processes, technology, and governance. The focus is on real risk.

Governance and policies

Regulatory framework, roles, risk management, and compliance.

Technical controls

Access, encryption, segmentation, detection, and response.

Operational continuity

BCP, DRP, drills, and incident recovery.

Deliverables

What you receive

01

Prioritized risk map

Findings with impact, evidence, and criticality.

02

Executive report

Summary for leadership with clear decision points.

03

Remediation plan

Actions with owners, deadlines, and criteria.

04

Certification roadmap

Realistic roadmap toward ISO 27001 certification.

Method

How it is executed

01

Discovery and evidence

Interviews, document review, and controlled testing.

02

Gap analysis

Controls assessment against ISO 27001 Annex A.

03

Action plan

Risk-based prioritization and implementation plan.

Let’s discuss information security

If your organization needs real control, the first step is an evidence-based diagnosis.

ISO 27001 certification is the sole responsibility of accredited certification bodies. This is an independent consulting service.