ISO 27001

ISO 27001 compliance without a separate ISMS project.

Vimy maps controls across Annex A and continuously evidences your information security management system from live security operations. No consultants. No parallel workstreams.

Annex A controls mapped Continuous ISMS evidence 100% Canadian infrastructure
Vimy ISO 27001 compliance dashboard
The Challenge

ISO 27001 is powerful. Getting there shouldn't be painful.

ISO 27001 is the global gold standard for information security management. But implementing an ISMS from scratch typically means 6โ€“12 months of consulting, policy writing, risk assessments, and evidence gathering โ€” often in a completely separate system from your actual security operations.

By the time you reach certification, the evidence is already stale and the cycle starts over for your surveillance audit.

ISMS as a parallel project

Most organizations build their ISMS in a GRC tool that's disconnected from their security stack. Evidence is imported, not generated.

Annex A mapping is manual

Mapping technical controls to Annex A requirements is tedious, subjective, and rarely kept up to date after the initial certification push.

Surveillance audits reset the clock

Annual surveillance audits mean annual evidence gathering sprints. Continuous compliance is the goal โ€” but without automation, it's just a slogan.

The Vimy Approach

Your ISMS, built from real security data.

Vimy maps controls across the Annex A domains. Every security detection, response action, posture check, and policy approval generates evidence against your ISMS requirements automatically. Your information security management system isn't a separate project โ€” it's the natural output of running Vimy.

A.5
Organizational Controls

Information security policies, roles, responsibilities, and management direction. Policy management and approval workflows built directly into Vimy.

Policies + roles
A.6
People Controls

Screening, awareness, training records, and access reviews. People management and training tracking in the Compliance section.

Access reviews
A.8
Technological Controls

Access control, cryptography, operations security, network security. This is where Vimy's +11 batteries directly map โ€” every detection and response is Annex A evidence.

Core coverage
A.7
Physical Controls

Physical security is primarily your responsibility, but Vimy tracks related policies and evidences cloud infrastructure controls that replace traditional physical requirements.

Policy-based
ISO 27001 Features

From gap analysis to surveillance audit โ€” covered.

Annex A Control Mapping

Controls mapped to Vimy's security batteries, connectors, and compliance features. See which controls are passing, failing, or need attention โ€” in real time.

Statement of Applicability

Generate your Statement of Applicability directly from Vimy's control mapping. Include justifications for excluded controls with full version history.

Risk Register

Track information security risks with severity, likelihood, treatment plans, and residual risk scores. Link risks directly to Annex A controls for full traceability.

Continuous ISMS Evidence

Every security action maps to ISMS requirements automatically. Your evidence is never stale โ€” surveillance auditors see live data, not a point-in-time snapshot.

Auditor Portal

Give your certification body scoped, read-only access to ISO 27001 evidence. Time-limited tokens, framework-filtered views โ€” no manual packaging required.

Policy Management

ISO 27001-aligned policy templates with version tracking, approval workflows, and automatic control mapping. Review cycles managed in-platform.

Multi-Framework

SOC 2 and ISO 27001. Same data. Same platform.

Many organizations need both SOC 2 (for North American customers) and ISO 27001 (for international customers and regulatory requirements). With traditional tools, that means two separate compliance projects mapping to the same security controls. Vimy maps both simultaneously. A single security event can satisfy controls in SOC 2, ISO 27001, NIST CSF, and more โ€” at the same time. No duplicate work.

Plus NIST CSF, PIPEDA, Law 25, CIS Controls, and CPCSC โ€” all from the same security data.  See all frameworks โ†’

Getting Started

From zero to ISMS.

Connect your infrastructure

Plug in your existing security tools. Each connector feeds evidence to Annex A controls immediately.

~30 minutes

Review gap analysis

Vimy identifies which Annex A controls are covered, partially covered, or missing. Your Statement of Applicability starts taking shape.

Immediate

Adopt policies and treat risks

Use ISO 27001-aligned policy templates. Document risk treatments in the risk register. Fill the gaps identified in step 2.

~2โ€“4 weeks

Certify with confidence

Your auditor accesses evidence directly through the auditor portal. Surveillance audits become routine โ€” evidence is always current.

When you're ready

ISO 27001 compliance features โ€” including Annex A mapping, risk register, Statement of Applicability, and auditor portal โ€” are available on the Bastion plan and above.

See Plans โ†’
ISO 27001 FAQ

Common questions about ISO 27001 with Vimy.

For most organizations, yes. Vimy handles Annex A control mapping, evidence collection, risk register, policy management, Statement of Applicability, and auditor portal. If you have complex GRC requirements across dozens of frameworks and business units, you may need a dedicated GRC platform โ€” but for ISO 27001 certification, Vimy covers the full workflow.
Yes. ISO 27001 certification requires an accredited certification body to perform the Stage 1 and Stage 2 audits. Vimy prepares all evidence and gives your auditor direct access, but the certification itself comes from the auditing body.
Vimy includes a risk register where you document information security risks, assign severity and likelihood, define treatment plans, and track residual risk. This maps directly to Clause 6.1.2 and Annex A requirements.
Not all Annex A controls are technical โ€” some relate to HR processes, physical security, or supplier management. Vimy handles these through policy management, access reviews, vendor risk tracking, and people management features. For purely physical controls, you document your approach in policies and link them to the relevant controls.
Yes. Vimy maps controls across all 7 frameworks simultaneously. Many Annex A controls overlap with SOC 2 Trust Services Criteria โ€” a single security action can satisfy both. Learn about SOC 2 โ†’
No. ISO 27001 features are available on Bastion and Citadel plans. View plan comparison โ†’

See your Annex A coverage
in 30 minutes.

We'll connect to your environment and show you which ISO 27001 controls light up immediately.

Annex A controls mapped Auditor portal included 100% Canadian infrastructure