{"id":394,"date":"2021-09-01T05:35:06","date_gmt":"2021-09-01T09:35:06","guid":{"rendered":"https:\/\/new.orioncan.com\/certifications-audits\/iso-27001\/"},"modified":"2026-04-29T10:16:59","modified_gmt":"2026-04-29T14:16:59","slug":"iso-27001","status":"publish","type":"page","link":"https:\/\/www.orioncan.com\/en\/iso-27001\/","title":{"rendered":"ISO 27001"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"394\" class=\"elementor elementor-394\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1cce7a79 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"1cce7a79\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e878474\" data-id=\"3e878474\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2516b3fb elementor-widget elementor-widget-heading\" data-id=\"2516b3fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><strong>ISO\/IEC 27001:2022 Certification: <\/strong>Information Security Management Systems (ISMS)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10124cc1 elementor-widget elementor-widget-text-editor\" data-id=\"10124cc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Orion Assessment Services is an independent auditing firm providing\u00a0<strong>ISO\/IEC 27001:2022 certification\u00a0<\/strong>and<strong>\u00a0ISMS evaluations<\/strong>\u00a0across North America.\u00a0Orion helps organizations protect data assets by verifying compliance with international security standards, reducing information risk, and providing a framework for systematic data security management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cdd124 elementor-align-center elementor-widget elementor-widget-global elementor-global-2542 elementor-widget-button\" data-id=\"6cdd124\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#schedule-call\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"64\" height=\"64\" viewBox=\"0 0 64 64\"><g transform=\"translate(-909 -400)\"><ellipse cx=\"23.5\" cy=\"24\" rx=\"23.5\" ry=\"24\" transform=\"translate(918 408)\" fill=\"#fff\"><\/ellipse><path d=\"M54.627,9.372a32,32,0,1,0,0,45.255,32,32,0,0,0,0-45.255ZM47.139,33.056l-13.77,13.77a1.461,1.461,0,0,1-1.057.432,1.524,1.524,0,0,1-1.057-.432,1.482,1.482,0,0,1,0-2.1L42.494,33.488H12.647a1.489,1.489,0,0,1,0-2.977H42.494L31.255,19.271a1.484,1.484,0,1,1,2.1-2.1l13.77,13.77a1.528,1.528,0,0,1,.015,2.114Zm0,0\" transform=\"translate(909.001 400.001)\" fill=\"#0b61b2\"><\/path><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Consultation Call<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-289dd2b5 elementor-section-content-middle sp-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"289dd2b5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-22899abd\" data-id=\"22899abd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd41d32 elementor-widget elementor-widget-image\" data-id=\"dd41d32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"720\" height=\"720\" src=\"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg\" class=\"attachment-large size-large wp-image-11356\" alt=\"Meeting room people smiling - Certifications\" srcset=\"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg 720w, https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling-300x300.jpg 300w, https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling-150x150.jpg 150w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6546e198\" data-id=\"6546e198\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46e3b960 elementor-widget elementor-widget-heading\" data-id=\"46e3b960\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Organizations Vhoose Orion Assessment Services for <strong>ISO 27001<\/strong> Certification <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025bed2 elementor-widget elementor-widget-text-editor\" data-id=\"025bed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Orion Assessment Services provides ISO 27001 certification backed by 15 years of auditor experience and a 99% customer satisfaction rating. As the only firm endorsed by three industry associations, Orion delivers efficient, integrated audits across North America to ensure robust information security management.<\/p><p>Orion Assessment Services maintains a long track record of providing certifications that address information security concerns in a cloud-based environment. Orion is currently the only auditing firm endorsed by three industry associations to audit their members. Orion rewards this trust by only utilizing auditors who maintain an overall customer satisfaction rating of 99% or better.<\/p><p>Orion auditors possess over 15 years of auditing experience. This extensive background allows Orion Assessment Services to deeply understand IT industry processes, common software, and technical terminology. This ensures that Orion auditing services remain efficient while establishing mutual goals to meet specific client needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b896e65 btn-inline get-a-quote-btn-cmn-inline ee-button-group-mobile-halign-left ee-button-group-halign-left ee-button-group-gap-default elementor-widget elementor-widget-button-group\" data-id=\"b896e65\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;mouseenter&quot;,&quot;trigger_tablet&quot;:&quot;click_target&quot;,&quot;trigger_mobile&quot;:&quot;click_target&quot;,&quot;_hide&quot;:&quot;mouseleave&quot;,&quot;_hide_tablet&quot;:&quot;click_out&quot;,&quot;_hide_mobile&quot;:&quot;click_out&quot;,&quot;position&quot;:&quot;bottom&quot;,&quot;delay_in&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;delay_out&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;duration&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button-group.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"ee-button-group\"><li class=\"ee-button-gap elementor-repeater-item-5489e20\">\n\t\t\t\t\t<a class=\"ee-button-wrapper\" href=\"https:\/\/zfrmz.com\/jpZ8oMd3pNKgsPCjlJK2\" target=\"_blank\">\n\n\t\t\t\t\t\t<span class=\"ee-button ee-button-link ee-size-sm\" data-label=\"get a quote\">\n\t\t\t\t\t\t\t<span class=\"ee-button-content-wrapper\"><span class=\"ee-button-icon ee-icon ee-icon-support--svg ee-icon--right\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"64\" height=\"64\" viewBox=\"0 0 64 64\"><g transform=\"translate(-909 -400)\"><ellipse cx=\"23.5\" cy=\"24\" rx=\"23.5\" ry=\"24\" transform=\"translate(918 408)\" fill=\"#fff\"><\/ellipse><path d=\"M54.627,9.372a32,32,0,1,0,0,45.255,32,32,0,0,0,0-45.255ZM47.139,33.056l-13.77,13.77a1.461,1.461,0,0,1-1.057.432,1.524,1.524,0,0,1-1.057-.432,1.482,1.482,0,0,1,0-2.1L42.494,33.488H12.647a1.489,1.489,0,0,1,0-2.977H42.494L31.255,19.271a1.484,1.484,0,1,1,2.1-2.1l13.77,13.77a1.528,1.528,0,0,1,.015,2.114Zm0,0\" transform=\"translate(909.001 400.001)\" fill=\"#61c41f\"><\/path><\/g><\/svg><\/span><span class=\"ee-button-text\">\n\t\t\t\t\t\t\t\t\tget a quote\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c710152 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c710152\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dba95a1\" data-id=\"dba95a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d34a917 elementor-widget elementor-widget-heading\" data-id=\"d34a917\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Integrated Audit Capabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5da962c elementor-widget elementor-widget-text-editor\" data-id=\"5da962c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organizations seeking to certify to multiple standards can utilize Orion Assessment Services for integrated audits. This approach allows for the achievement of multiple certifications in a single visit, saving both time and financial resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53403cf standard_table elementor-widget elementor-widget-table\" data-id=\"53403cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<table class=\"ee-table ee-table--even ee-table--rules\">\n\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t<col span=\"1\" class=\"elementor-repeater-item-e30f312\">\n\t\t\t\t\t\t\t<\/colgroup>\n\t\t<thead>\n\t\t\t<tr class=\"ee-table__row\">\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-05d926e\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Primary Standard<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-f13a63a\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Common Integrated Standards<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-6220d06\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Benefit of Integration<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t\t\t\t<\/tr>\n\t\t<\/thead><tbody><tr class=\"ee-table__row elementor-repeater-item-c6a5d3c\">\n\t\t<td class=\"ee-table__cell elementor-repeater-item-afc4eae\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">ISO\/IEC 27001<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-35a99a6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><a href=\"\/en\/iso9001\/\">ISO 9001<\/a>, <a href=\"\/en\/iso-14001\/\">ISO 14001<\/a>, <a href=\"\/en\/iso45001\/\">ISO 45001<\/a><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-84e9639\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Reduced downtime and audit costs.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-25c63e9\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-1960eac\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Information Security<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-71387c6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><a href=\"\/en\/iso17100\/\">ISO 17100<\/a>, <a href=\"\/en\/responsible-recycling-r2\/\">R2 (Responsible Recycling)<\/a><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-2c96400\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Unified compliance reporting across sectors.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr>\n\t\t\t<\/tbody>\n\t\t<\/table>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23e550a1 sp-section icon-set elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23e550a1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15aa2797\" data-id=\"15aa2797\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3b9a3fc6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b9a3fc6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-41968c6c\" data-id=\"41968c6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ad391cc elementor-widget elementor-widget-heading\" data-id=\"6ad391cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is  <strong>ISO 27001<\/strong> certification important for modern organizations?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-488078cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"488078cf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-107a72af\" data-id=\"107a72af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-736c9fc3 elementor-widget elementor-widget-text-editor\" data-id=\"736c9fc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ISO 27001 certification is critical for securing sensitive data across remote and cloud environments while <strong>mitigating cybercrime risks,<\/strong> which are projected to <strong>cost the global economy $11.9 trillion annually by 2026.<\/strong><\/p><p>The modern global business landscape has expanded the attack surface for organizations through remote work models, cloud platforms, and complex supply chains. Because sensitive data now flows across on-premises, cloud, and personal device environments, robust information security management through ISO 27001 has become a strategic necessity.<\/p><p><strong>Cybercrime remains a critical threat<\/strong>, with global cybercrime costs projected to reach <strong>$11.9 trillion annually by 2026 <\/strong>and<strong> $19.7 trillion by 2030<\/strong>, according to the 2024 Cybersecurity Ventures Global Cybercrime Report. These multi-trillion dollar costs encompass intellectual property theft, financial fraud, operational downtime, and regulatory fines.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a25401e elementor-widget elementor-widget-text-editor\" data-id=\"a25401e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Core Objectives of ISO 27001:2022<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26d3bdf standard_table table2 elementor-widget elementor-widget-table\" data-id=\"26d3bdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<table class=\"ee-table ee-table--odd ee-table--rules\">\n\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t<col span=\"1\" class=\"elementor-repeater-item-e30f312\">\n\t\t\t\t\t\t\t<\/colgroup>\n\t\t<thead>\n\t\t\t<tr class=\"ee-table__row\">\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-05d926e\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">ISO 27001:2022 Focus Area<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-072c0f2\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Organizational Implementation & Strategic Benefit<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t\t\t\t<\/tr>\n\t\t<\/thead><tbody><tr class=\"ee-table__row elementor-repeater-item-c6a5d3c\">\n\t\t<td class=\"ee-table__cell elementor-repeater-item-afc4eae\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Risk-Based Approach<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-93351cc\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Organizations identify and assess risks to critical information assets to implement scalable controls across cloud and remote infrastructures.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-25c63e9\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-1960eac\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Cybersecurity & Privacy<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-891af7f\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">The standard explicitly addresses modern threats, including supply chain risks, threat intelligence, and ICT readiness for business continuity.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-6275d76\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-65f12f3\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Emerging Tech Integration<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-ef6741e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">ISO 27001 aligns with frameworks like\u00a0<a class=\"ql-link\" href=\"https:\/\/www.iso.org\/standard\/81230.html\" target=\"_blank\" rel=\"noopener noreferrer\">ISO 42001<\/a>\u00a0for AI governance, ensuring secure deployment of automated technologies.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-4e0a48e\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-3b0712b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Continual Improvement<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-e07f6e1\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Organizations engage in a recurring cycle of monitoring and reviewing security measures to adapt to evolving threats and regulatory changes.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr>\n\t\t\t<\/tbody>\n\t\t<\/table>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9128a9 elementor-widget elementor-widget-text-editor\" data-id=\"d9128a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>For organizations in the digital economy,\u00a0ISO 27001 certification<\/strong>\u00a0serves as a strategic investment beyond simple compliance. Achieving ISO 27001 status supports regulatory alignment with global frameworks such as\u00a0<strong>GDPR<\/strong>,\u00a0<strong>NIS2<\/strong>, and\u00a0<strong>DORA<\/strong>, while building verifiable trust with international customers and partners.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92c832c btn-inline  btn-bg-border-cmn-new ee-button-group-mobile-halign-left ee-button-group-gap-default elementor-widget elementor-widget-button-group\" data-id=\"92c832c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;mouseenter&quot;,&quot;trigger_tablet&quot;:&quot;click_target&quot;,&quot;trigger_mobile&quot;:&quot;click_target&quot;,&quot;_hide&quot;:&quot;mouseleave&quot;,&quot;_hide_tablet&quot;:&quot;click_out&quot;,&quot;_hide_mobile&quot;:&quot;click_out&quot;,&quot;position&quot;:&quot;bottom&quot;,&quot;delay_in&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;delay_out&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;duration&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button-group.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"ee-button-group\"><li class=\"ee-button-gap elementor-repeater-item-be5fb07\">\n\t\t\t\t\t<a class=\"ee-button-wrapper\" href=\"#schedule-call\">\n\n\t\t\t\t\t\t<span class=\"ee-button ee-button-link ee-size-sm\" data-label=\"book a consultation call\">\n\t\t\t\t\t\t\t<span class=\"ee-button-content-wrapper\"><span class=\"ee-button-icon ee-icon ee-icon-support--svg ee-icon--right\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"64\" height=\"64\" viewBox=\"0 0 64 64\"><g transform=\"translate(-909 -400)\"><ellipse cx=\"23.5\" cy=\"24\" rx=\"23.5\" ry=\"24\" transform=\"translate(918 408)\" fill=\"#fff\"><\/ellipse><path d=\"M54.627,9.372a32,32,0,1,0,0,45.255,32,32,0,0,0,0-45.255ZM47.139,33.056l-13.77,13.77a1.461,1.461,0,0,1-1.057.432,1.524,1.524,0,0,1-1.057-.432,1.482,1.482,0,0,1,0-2.1L42.494,33.488H12.647a1.489,1.489,0,0,1,0-2.977H42.494L31.255,19.271a1.484,1.484,0,1,1,2.1-2.1l13.77,13.77a1.528,1.528,0,0,1,.015,2.114Zm0,0\" transform=\"translate(909.001 400.001)\" fill=\"#61c41f\"><\/path><\/g><\/svg><\/span><span class=\"ee-button-text\">\n\t\t\t\t\t\t\t\t\tbook a consultation call\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a1a1164 elementor-section-content-middle sp-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a1a1164\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c97b06\" data-id=\"1c97b06\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a6a6a63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6a6a63\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9b1e391\" data-id=\"9b1e391\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55a2f11e elementor-widget elementor-widget-heading\" data-id=\"55a2f11e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Breakdown of the <strong>ISO 27001 Standard <\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-007b114 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"007b114\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e8de1da\" data-id=\"e8de1da\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-510b26fe elementor-widget elementor-widget-text-editor\" data-id=\"510b26fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Like other ISO standards such as <a href=\"\/iso9001\">ISO 9001<\/a>, <a href=\"\/iso-27001\">ISO 27001:2022<\/a> includes a core set of management system requirements, such as establishing goals and objectives, conducting management reviews, and ensuring continual improvement. What sets it apart is <strong>Annex A<\/strong>, which defines the specific information security controls organizations must consider. In the current version, Annex A contains <strong>93 controls organized into four categories:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7643068d elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7643068d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Organizational<\/strong> (37 controls)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>People <\/strong> (8 controls)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Physical <\/strong> (14 controls)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Technological <\/strong> (34 controls)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8164be5 elementor-widget elementor-widget-text-editor\" data-id=\"8164be5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These controls cover a wide range of security measures, from governance and risk management to technical safeguards. Organizations must review all controls and justify any exclusions, ensuring a comprehensive approach to information security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d05c2e elementor-section-content-middle sp-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d05c2e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-848fa95\" data-id=\"848fa95\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4562d89 elementor-widget elementor-widget-heading\" data-id=\"4562d89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><strong>Get Started<\/strong> with ISO 27001 Quickly and Easily<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff6aae7 elementor-widget elementor-widget-text-editor\" data-id=\"ff6aae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Discover the key steps to take in order to effectively implement ISO 27001 and protect your sensitive information. Get you up and running with the standard in no time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dfb014 elementor-mobile-align-center elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1dfb014\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.orioncan.com\/en\/iso-27001-quickstart-guide\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read The Quick Start Guide<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-479cf4cc elementor-section-content-middle sp-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"479cf4cc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e2566b7\" data-id=\"3e2566b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-356e015d elementor-widget elementor-widget-heading\" data-id=\"356e015d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is the Orion Assessment Services ISO 27001 audit process?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2d8bfdb4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d8bfdb4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7ca8e7c\" data-id=\"7ca8e7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c87db3c elementor-widget elementor-widget-text-editor\" data-id=\"5c87db3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Orion Assessment Services <strong>ISO 27001<\/strong> audit process follows a six-stage path: service agreement, optional gap analysis, Stage 1 readiness review, Stage 2 certification audit, technical review for certificate issuance, and a three-year surveillance cycle to maintain ISMS compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6134c0 standard_table icon_table table4 elementor-widget elementor-widget-table\" data-id=\"b6134c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<table class=\"ee-table ee-table--even ee-table--rules\">\n\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t<col span=\"1\" class=\"elementor-repeater-item-e30f312\">\n\t\t\t\t\t\t\t<\/colgroup>\n\t\t<thead>\n\t\t\t<tr class=\"ee-table__row\">\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-05d926e\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-18e91bd\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Audit Stage<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-f13a63a\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Process Action & Requirements<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-3ed4524\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Core Deliverable<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t\t\t\t<\/tr>\n\t\t<\/thead><tbody><tr class=\"ee-table__row elementor-repeater-item-c6a5d3c\">\n\t\t<td class=\"ee-table__cell elementor-repeater-item-afc4eae\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/step1.png\" width=\"80px\"><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-c8f9836\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><strong>1. Service Agreement<\/strong><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-35a99a6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Orion Assessment Services provides a formal quote based on ISMS scope. The organization signs the agreement to initiate the audit.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-4f4b7fd\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Signed Audit Agreement<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-25c63e9\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-1960eac\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/step2.png\" width=\"60px\"><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-732e0b5\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><strong>2. Optional GAP Audit<\/strong><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-71387c6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">A preliminary review to identify ISMS non-conformities and improvement opportunities before the formal certification audit.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-3d18bc6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Gap Analysis Report<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-6275d76\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-9f58c9c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/step3.png\" width=\"60px\"><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-65f12f3\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><strong>3. Stage 1: Readiness Review<\/strong><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b9a29e6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Orion auditors verify that ISMS documentation meets ISO 27001 requirements and confirm the client is prepared for Stage 2.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-1a3b109\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Readiness Recommendation<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-80abe09\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-0b88e7c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/step4.png\" width=\"60px\"><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b1b30fd\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><strong>4. Stage 2: Certification Audit<\/strong><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-9d36931\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">An onsite evaluation to verify that the Information Security Management System (ISMS) is fully implemented and operationally effective.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-3569beb\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Comprehensive Audit Report<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-911575b\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-0f27874\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/step5.png\" width=\"60px\"><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-1811b87\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><strong>5. Technical Review & Certification<\/strong><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-0b19d91\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Orion\u2019s technical team reviews audit results to ensure accreditation requirements are met before approving the ISO 27001 certificate.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7bd3533\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">ISO 27001:2022 Certificate<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-72f4d50\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-c53f4f7\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/step6.png\" width=\"60px\"><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7d92fe2\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\"><strong>6. Surveillance & Recertification<\/strong><\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-a47254b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">To maintain the 3-year registration, Orion conducts annual surveillance audits, followed by a comprehensive recertification in the third year.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-4062940\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Annual Maintenance Verification<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr>\n\t\t\t<\/tbody>\n\t\t<\/table>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45323ae elementor-widget elementor-widget-text-editor\" data-id=\"45323ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The<strong>\u00a0ISO 27001 certification cycle<\/strong>\u00a0operates on a fixed three-year term. To maintain active certification status, the organization must participate in annual onsite reviews conducted by\u00a0<strong>Orion Assessment Services<\/strong>. While the first two years consist of surveillance audits focusing on specific ISMS controls, the third-year recertification audit provides a comprehensive evaluation of the total system effectiveness.<\/p><p>Prior to the Stage 2 Certification Audit, the organization is required to complete a full management review and a documented internal audit. Orion Assessment Services verifies these critical milestones during the Stage 1 Readiness Review to ensure the ISMS meets the maturity levels required for international registration.<\/p><p>This technical overview was verified by <a href=\"\/en\/the-team\/#david-huebel\">David Huebel<\/a>, President of Orion Assessment Services and member of the ISO standards development committees.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56a1a68 sp-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56a1a68\" data-element_type=\"section\" data-e-type=\"section\" id=\"schedule-call\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e6a7e6\" data-id=\"8e6a7e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0643bbb elementor-widget elementor-widget-heading\" data-id=\"0643bbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Schedule a <strong>Consultation<\/strong><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cdb738 g-form elementor-widget elementor-widget-shortcode\" data-id=\"4cdb738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_1' ><form method='post' enctype='multipart\/form-data' target='gform_ajax_frame_1' id='gform_1'  action='\/en\/wp-json\/wp\/v2\/pages\/394' data-formid='1' novalidate><div class='gf_invisible ginput_recaptchav3' data-sitekey='6Ld4JgQsAAAAAOf5no743ZaCf6M__5FRIvCm8P1Z' data-tabindex='0'><input id=\"input_9e4ac593f2b5cde8e633ad1c4ff5c880\" class=\"gfield_recaptcha_response\" type=\"hidden\" name=\"input_9e4ac593f2b5cde8e633ad1c4ff5c880\" value=\"\"\/><\/div>\n                        <div class='gform-body gform_body'><div id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_1_7\" class=\"gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_7'>LinkedIn<\/label><div class='ginput_container'><input name='input_7' id='input_1_7' type='text' value='' autocomplete='new-password'\/><\/div><div class='gfield_description' id='gfield_description_1_7'>This field is for validation purposes and should be left unchanged.<\/div><\/div><div id=\"field_1_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-full text-input gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_6'>Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Name' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_1_2\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-full text-input gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_2'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_2' id='input_1_2' type='text' value='' class='medium'    placeholder='Company' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_1_3\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-full text-input gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_1_4\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-full text-input gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_4'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_4' id='input_1_4' type='email' value='' class='medium'   placeholder='Email' aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_1_5\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full text-area field_sublabel_below gfield--no-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_1_5'>Message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_5' id='input_1_5' class='textarea medium'    placeholder='Message'  aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Schedule Call'  \/> <input type='hidden' name='gform_ajax' value='form_id=1&amp;title=&amp;description=&amp;tabindex=0&amp;theme=gravity-theme&amp;styles=[]&amp;hash=7c06d6b2c2cdfd801647d95551661ef0' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='iframe' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='kReaCg3xwk8oKzdUGfxEZC9j\/EL7E+HGb1Rkt24fDgZjrLbEybqgcK0MDp9kFIs+uV8Hhfz+IOuR7LmWngUaNC8nEXRNflUekAB2s\/xAQ\/fsSH0=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsIjlmNmRkM2IzMDVmMzgzMjlmOTE3NzUyZjg0YmE2NTkyIl0=' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div>\n\t\t                <iframe style='display:none;width:0px;height:0px;' src='about:blank' name='gform_ajax_frame_1' id='gform_ajax_frame_1' title='This iframe contains the logic required to handle Ajax powered Gravity Forms.'><\/iframe>\n\t\t                <script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https:\/\/www.orioncan.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https:\/\/www.orioncan.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"1\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_1\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_1\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_1\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-abe23d5 elementor-section-content-middle sp-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"abe23d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19358bc\" data-id=\"19358bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-334895e elementor-widget elementor-widget-heading\" data-id=\"334895e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the 37 Organizational Controls in ISO\/IEC 27001:2022 Annex A?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87bba6d elementor-widget elementor-widget-text-editor\" data-id=\"87bba6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe 37 organizational controls in\u00a0ISO\/IEC 27001:2022 listed in\u00a0Annex A establish the governance framework for Information Security Management Systems (ISMS).\u00a0These controls ensure that an organization\u2019s security policies, roles, and supplier relationships are systematically managed to protect critical information assets.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b066639 elementor-widget elementor-widget-text-editor\" data-id=\"b066639\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Annex A Organizational Controls (5.1 \u2013 5.37)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b03104 standard_table elementor-widget elementor-widget-table\" data-id=\"8b03104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<table class=\"ee-table ee-table--even ee-table--rules\">\n\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t<col span=\"1\" class=\"elementor-repeater-item-e30f312\">\n\t\t\t\t\t\t\t<\/colgroup>\n\t\t<thead>\n\t\t\t<tr class=\"ee-table__row\">\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-05d926e\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Control Number<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-18e91bd\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Organizational Control Name<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t<th class=\"ee-table__cell elementor-repeater-item-f13a63a\">\n\t\t\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Implementation Objective<\/span>\n\n\t\t\t\t\t\t\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/th>\n\n\t\t\t\t\t\t<\/tr>\n\t\t<\/thead><tbody><tr class=\"ee-table__row elementor-repeater-item-c6a5d3c\">\n\t\t<td class=\"ee-table__cell elementor-repeater-item-afc4eae\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.1<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-c8f9836\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Policies for information security<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-35a99a6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Defining organizational direction and support for information security.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-25c63e9\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-1960eac\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.2<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-732e0b5\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Information security roles<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-71387c6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Assigning internal responsibilities for information security management.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-6275d76\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-9f58c9c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.3<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-65f12f3\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Segregation of duties<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b9a29e6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Reducing risk of unauthorized or unintentional modification of assets.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-80abe09\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-0b88e7c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.4<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b1b30fd\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Management responsibilities<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-9d36931\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Requiring all personnel to apply security in accordance with established policies.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-911575b\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-0f27874\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.5<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-1811b87\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Contact with authorities<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7bd3533\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Maintaining appropriate communication with relevant legal and regulatory authorities.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-72f4d50\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-c53f4f7\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.6<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7d92fe2\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Contact with special interest groups<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-a47254b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Engaging with professional security groups and specialist forums.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-786e10d\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-03921e6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.7<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-944bc7e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Threat intelligence<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b612934\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Collecting and analyzing information about security threats to provide mitigation.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-b5bbe82\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-ec1cc53\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.8<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-5045e86\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Information security in project management<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-cad4eab\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Integrating security requirements into all organizational project lifecycles.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-c558464\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-3a55230\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.9<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-adb0fd6\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Inventory of information and assets<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-fced97a\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Identifying and maintaining a record of all information assets and facilities.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-ec8191c\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-b61d740\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.10<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-e61a89c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Acceptable use of information<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-241ff5f\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Defining and documenting rules for the appropriate use of information assets.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-2a10c3d\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-b9d5197\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.11<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-0f0b5db\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Return of assets<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-1d0425e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Ensuring all personnel return organizational assets upon termination of employment.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-0f14c44\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-d0fd07a\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.12<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-cfb7e12\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Classification of information<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-8d43f62\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Categorizing information based on its sensitivity and legal requirements.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-7743219\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-12a84ba\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.13<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7858bbc\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Labelling of information<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-0fd806b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Developing and implementing a system for labelling classified information.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-f789313\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-f8a2a20\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.14<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-eec125c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Information transfer<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-bd15317\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Establishing rules and procedures for the secure transfer of information.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-328acc1\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-00001d7\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.15<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-6e53c71\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Access control<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-01d6979\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Restricting access to information and assets based on business requirements.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-2b0834f\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-e615f4e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.16<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-80c6157\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Identity management<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-4012f4b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Managing the full lifecycle of digital identities within the organization.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-ee5cb0a\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-e98cf38\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.17<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b6b5247\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Authentication information<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-a92f7c2\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Controlling the allocation and management of secret authentication data.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-a4bac55\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-bf26b76\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.18<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-8930fb1\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Access rights<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-71c9988\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Provisioning, reviewing, and removing access rights according to policy.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-ece15df\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-96c4143\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.19<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-ad2a17f\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Information security in supplier relationships<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-8bc2f8d\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Maintaining security requirements for accessing or managing organization assets.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-ca5b765\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-d33e7aa\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.20<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-a790653\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Addressing security in supplier agreements<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-77c8ecd\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Codifying security requirements in formal contracts with external suppliers.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-cbe6100\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-78f266c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.21<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-83f45ca\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Managing the ICT supply chain<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-c3e6328\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Addressing security risks within the information and communication technology supply chain.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-628008c\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-1016252\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.22<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-b042916\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Monitoring supplier services<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-dda12d8\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Regularly reviewing and auditing supplier service delivery against agreements.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-abf6113\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-a5034c3\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.23<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-6f7fd8e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Information security for cloud services<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-6d3a1ca\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Establishing security requirements for the procurement and use of cloud services.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-e0fd303\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-43673be\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.24<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-2999c17\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Incident management planning<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-fb05e3e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Preparing the organization to detect, report, and respond to security incidents.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-a47381a\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-92935db\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.25<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-cfd943b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Assessment of security events<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-e19e823\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Evaluating security events to determine if they should be classified as incidents.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-eafcb3c\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-610f66b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.26<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-5e8153b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Response to security incidentsvv<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-0cf96f5\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Responding to incidents in accordance with established documented procedures.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-53a5896\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-c2bdc6f\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.27<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-43c9222\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Learning from security incidents<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7bf49ff\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Utilizing knowledge gained from past incidents to strengthen security controls.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-7950e56\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-ed30961\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.28<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-ea368ec\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Collection of evidence<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-d40379a\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Establishing procedures for the identification and collection of digital evidence.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-e70c01c\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-b172127\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.29<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-4804cb0\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Security during disruption<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-6732179\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Maintaining information security during a crisis or organizational disruption.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-427205b\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-eaee47e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.30<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-50c5578\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">ICT readiness for business continuity<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-c6df1cc\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Ensuring ICT systems are ready to support business continuity requirements.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-9911e24\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-a5f764d\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.31<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-dbaf04d\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Legal and regulatory requirements<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-24da69d\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Identifying and documenting all legal, statutory, and contractual requirements.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-4ff8c9e\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-8d54923\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.32<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-2188da3\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Intellectual property rights<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-0769ac8\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Implementing procedures to protect intellectual property and software copyrights.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-ba5a645\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-36cf58f\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.33<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-90b0c00\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Protection of records<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-957521c\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Protecting organizational records from loss, destruction, and falsification.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-260dfbb\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-687ca96\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.34<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-753f092\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Privacy and protection of PII<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-28fd23a\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Ensuring the protection of personally identifiable information (PII).<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-3b69e97\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-f653db4\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.35<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-035deb9\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Independent review of security<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-7085774\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Conducting periodic independent reviews of the management system.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-32b4f06\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-464e20e\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.36<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-1ede2dc\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Compliance with security policies<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-3c8ad4b\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Monitoring personnel compliance with established security rules and standards.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr><tr class=\"ee-table__row elementor-repeater-item-78488c3\">\n\n\t\t<td class=\"ee-table__cell elementor-repeater-item-cde4aed\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">5.37<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-af46b74\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Documented operating procedures<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><td class=\"ee-table__cell elementor-repeater-item-598abf0\">\n\t\t\t<span class=\"ee-table__text\"><span class=\"ee-table__text__inner\">Maintaining and making available documented procedures for system operations.<\/span>\n\n\t\t\t<\/span>\n\t\t<\/td><\/tr>\n\t\t\t<\/tbody>\n\t\t<\/table>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e77855 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e77855\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b336235\" data-id=\"b336235\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9288f46 elementor-widget elementor-widget-html\" data-id=\"9288f46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"HowTo\",\n  \"name\": \"ISO 9001:2015 Certification Process\",\n  \"description\": \"The formal 6-step process to achieve and maintain ISO 27001:2022 Quality Management System certification with Orion Assessment Services.\",\n  \"step\": [\n    {\n      \"@type\": \"HowToStep\",\n      \"name\": \"Service Agreement\",\n      \"text\": \"Orion Assessment Services provides a custom quote for ISO standards. The client signs the agreement and returns it with the required deposit to initiate the audit cycle.\"\n    },\n    {\n      \"@type\": \"HowToStep\",\n      \"name\": \"GAP Audit (Optional)\",\n      \"text\": \"An independent preliminary review by Orion to identify major gaps, strengths, and weaknesses in the management system prior to formal certification audits.\"\n    },\n    {\n      \"@type\": \"HowToStep\",\n      \"name\": \"Stage 1: Readiness Review\",\n      \"text\": \"A mandatory review to confirm the management system addresses all standard requirements and the client has completed a full internal audit and management review.\"\n    },\n    {\n      \"@type\": \"HowToStep\",\n      \"name\": \"Stage 2: Certification Audit\",\n      \"text\": \"An onsite evaluation where Orion auditors verify that quality processes and documents are implemented according to the ISO 9001:2015 standard.\"\n    },\n    {\n      \"@type\": \"HowToStep\",\n      \"name\": \"Final Review & Certification\",\n      \"text\": \"Orion performs a final technical review of the audit results. Upon approval, the formal ISO 9001 certificate is issued to the organization.\"\n    },\n    {\n      \"@type\": \"HowToStep\",\n      \"name\": \"Surveillance & Recertification\",\n      \"text\": \"To maintain the 3-year certification cycle, organizations undergo annual surveillance audits, with a comprehensive recertification audit occurring in the third year.\"\n    }\n  ]\n}\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 27001:2022 Certification: Information Security Management Systems (ISMS) Orion Assessment Services is an independent auditing firm providing\u00a0ISO\/IEC 27001:2022 certification\u00a0and\u00a0ISMS evaluations\u00a0across North America.\u00a0Orion helps organizations protect data assets by verifying compliance with international security standards, reducing information risk, and providing a framework for systematic data security management. Consultation Call Why Organizations Vhoose Orion Assessment Services for [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":24,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-394","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISO 27001 - Orion Assessment Services<\/title>\n<meta name=\"description\" content=\"ISO 27001 - Is your company protected?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.orioncan.com\/en\/iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 - Orion Assessment Services\" \/>\n<meta property=\"og:description\" content=\"ISO 27001 - Is your company protected?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.orioncan.com\/en\/iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"Orion Assessment Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T14:16:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/\",\"url\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/\",\"name\":\"ISO 27001 - Orion Assessment Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.orioncan.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Meeting-room-people-smiling.jpg\",\"datePublished\":\"2021-09-01T09:35:06+00:00\",\"dateModified\":\"2026-04-29T14:16:59+00:00\",\"description\":\"ISO 27001 - Is your company protected?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.orioncan.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Meeting-room-people-smiling.jpg\",\"contentUrl\":\"https:\\\/\\\/www.orioncan.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Meeting-room-people-smiling.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/iso-27001\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/\",\"name\":\"Orion Assessment Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.orioncan.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISO 27001 - Orion Assessment Services","description":"ISO 27001 - Is your company protected?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.orioncan.com\/en\/iso-27001\/","og_locale":"en_US","og_type":"article","og_title":"ISO 27001 - Orion Assessment Services","og_description":"ISO 27001 - Is your company protected?","og_url":"https:\/\/www.orioncan.com\/en\/iso-27001\/","og_site_name":"Orion Assessment Services","article_modified_time":"2026-04-29T14:16:59+00:00","og_image":[{"width":720,"height":720,"url":"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.orioncan.com\/en\/iso-27001\/","url":"https:\/\/www.orioncan.com\/en\/iso-27001\/","name":"ISO 27001 - Orion Assessment Services","isPartOf":{"@id":"https:\/\/www.orioncan.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.orioncan.com\/en\/iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/www.orioncan.com\/en\/iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg","datePublished":"2021-09-01T09:35:06+00:00","dateModified":"2026-04-29T14:16:59+00:00","description":"ISO 27001 - Is your company protected?","breadcrumb":{"@id":"https:\/\/www.orioncan.com\/en\/iso-27001\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.orioncan.com\/en\/iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orioncan.com\/en\/iso-27001\/#primaryimage","url":"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg","contentUrl":"https:\/\/www.orioncan.com\/wp-content\/uploads\/2021\/11\/Meeting-room-people-smiling.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.orioncan.com\/en\/iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.orioncan.com\/en\/"},{"@type":"ListItem","position":2,"name":"ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/www.orioncan.com\/en\/#website","url":"https:\/\/www.orioncan.com\/en\/","name":"Orion Assessment Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.orioncan.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/pages\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":20,"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/pages\/394\/revisions"}],"predecessor-version":[{"id":24684,"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/pages\/394\/revisions\/24684"}],"wp:attachment":[{"href":"https:\/\/www.orioncan.com\/en\/wp-json\/wp\/v2\/media?parent=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}