ISO 27001 on a Budget: Statement of Applicability for Hudson Valley SMBs (with a 90-day roadmap)

A practical guide for small firms fielding the certification question from European customers — without spending six figures to answer it.

By Jim Venuto | November 28, 2025 | Hudson Valley CISO

The Phone Call That Started It All

If your Hudson Valley precision-machining shop supplies aerospace components to a German OEM, or your Dutchess County IT consulting firm manages cloud infrastructure for a London-based fintech, the question arrives sooner than you expect. It lands in an email, usually buried inside a vendor risk questionnaire: "Please provide your ISO 27001 certificate or describe your timeline for certification." Suddenly, a standard that felt like something only Fortune 500 companies worry about is standing between you and a contract renewal.

This is happening more frequently across the Hudson Valley. A 40-person engineering firm in Newburgh. A managed-services provider in Kingston. A logistics coordinator in Poughkeepsie. European supply-chain regulations, particularly the EU's NIS2 Directive and expanding GDPR enforcement, are pushing certification requirements downstream. The customer isn't asking because they're curious. They're asking because their own auditors require it.

The good news: ISO 27001 certification is absolutely achievable for a 10-to-100-person firm, and it doesn't require hiring a dedicated compliance team or writing a six-figure check. What it does require is understanding the standard's structure, making smart decisions about which controls actually apply to your business, and following a disciplined 90-day plan.

What ISO 27001:2022 Actually Requires

ISO 27001 is an information security management system (ISMS) standard — a structured way of identifying what information matters to your business, figuring out what could go wrong, and putting documented protections in place. The 2022 revision streamlined the control set and modernized the language, but the core logic hasn't changed: context leads to risk assessment, risk assessment drives your Statement of Applicability, and the Statement of Applicability determines which controls you implement.

Think of it as five linked steps. First, you define your organization's context — who you are, what you do, who cares about your information security (customers, regulators, partners), and what scope you're certifying. Second, you conduct a risk assessment, identifying threats to the confidentiality, integrity, and availability of information within that scope. Third, you produce a Statement of Applicability, the single most important document in the entire process, which lists all 93 Annex A controls and states whether each one applies to you and why. Fourth, you implement the controls you selected and collect evidence that they're working. Fifth, an accredited certification body audits your system in two stages.

Plain-English Translation: ISO 27001 is not a checklist you complete once and file away. It's an ongoing management system. The certification body will return every year for a surveillance audit and every three years for a full recertification. Your documentation needs to be living, not a shelf ornament.

The Statement of Applicability: Your Budget's Best Friend

The Statement of Applicability (SoA) is where small firms gain their biggest advantage. The 2022 revision of Annex A consolidated the old 114 controls down to 93, organized into four themes: Organizational (37 controls), People (8 controls), Physical (14 controls), and Technological (34 controls). You are not required to implement all 93. You are required to consider all 93 and justify why each one is included or excluded.

For a 30-person Hudson Valley manufacturing firm that stores customer engineering drawings on a local server and uses Microsoft 365 for email, a realistic SoA might mark 15 to 20 controls as "not applicable" with proper justification. You probably don't need A.7.5 (Protecting against physical and environmental threats to off-site assets) if all your information processing happens in one facility. You likely don't need A.8.23 (Web filtering) if your employees don't use company devices for general browsing and you have a simple firewall with DNS filtering already in place. The key is documenting the reason, not just checking a box.

Controls you almost certainly need, regardless of company size, include A.5.1 (Information security policies), A.6.1 (Screening — background checks for employees handling sensitive data), A.8.1 (User endpoint devices), A.8.5 (Secure authentication), and A.8.9 (Configuration management). These are the table stakes. Where you save money and effort is in honestly evaluating controls against your actual risk profile rather than implementing everything because it seems safer.

Risk Treatment in Plain English

Once your risk assessment identifies threats — say, "ransomware encrypts our file server containing customer engineering drawings" — you have four options: mitigate the risk by implementing controls (backups, endpoint detection, network segmentation), transfer the risk through cyber insurance, avoid the risk by eliminating the activity entirely, or accept the risk with documented management approval. Your risk treatment plan maps each identified risk to one of these four responses and ties it back to specific Annex A controls in your SoA.

For a small firm, the risk treatment plan doesn't need to be a 50-page document. It needs to be clear, traceable, and honest. If you decide to accept a risk — perhaps the risk of a social-engineering attack against your two-person accounting team — you document why the likelihood and impact fall within your risk appetite and have your owner or managing director sign off. Auditors respect transparency far more than they respect a thick binder of controls nobody actually follows.

The 90-Day Roadmap

Days 1 through 30: Gap Assessment and Policy Drafts

The first month is about understanding where you stand today and putting the foundational documents in writing. Start by defining your ISMS scope. For most Hudson Valley SMBs, the scope should be as narrow as defensible — perhaps "the provision of precision-machined components and associated digital design file management" rather than "everything our company does." A narrower scope means fewer controls, less evidence, and lower audit fees. Just make sure the scope genuinely covers what your customer asked about.

During this phase, you'll conduct a gap assessment against all 93 Annex A controls. Walk through each one with the person who actually manages your IT (whether that's a fractional CISO, your MSP's lead engineer, or your in-house IT administrator) and document the current state honestly. For each control, note whether you have something in place already, whether it's partially implemented, or whether it's completely absent. This gap assessment becomes the foundation of your project plan for the next 60 days.

Simultaneously, draft your core policies. You need, at minimum, an information security policy, an acceptable use policy, an access control policy, a risk assessment methodology, and a business continuity plan. These don't need to be novel-length. A clear, four-page information security policy that your employees can actually read and understand is worth more than a 40-page document nobody opens. Write them in the voice of your company, not in the voice of a compliance template you downloaded from the internet. If you use templates as a starting point — and there's nothing wrong with that — strip out the boilerplate and make the language yours.

Days 31 through 60: Control Implementation and Evidence Collection

Month two is where the work gets tangible. Take your gap assessment results and prioritize: address high-risk gaps first, then medium, then low. If your gap assessment revealed that you have no documented process for granting and revoking user access, that's a high-priority item because it touches multiple Annex A controls (A.5.15 Access control, A.5.18 Access rights, A.8.2 Privileged access rights, A.8.3 Information access restriction).

Evidence collection should run in parallel with implementation, not after it. Every time you implement a control, capture the evidence immediately. Enabled multi-factor authentication on Microsoft 365? Screenshot the admin console showing MFA enforcement. Created a new hire onboarding checklist that includes security awareness training? Save a signed copy from the most recent hire. Configured automatic backups to a geographically separate location? Export the backup job report. Your evidence doesn't need to be elaborate, but it needs to be current and traceable to the control it supports.

This is also the month to run your security awareness training. ISO 27001 requires that employees understand the security policies relevant to their role (A.6.3 Information security awareness, education, and training). For a small firm, this can be a two-hour lunch-and-learn session covering phishing recognition, password hygiene, and your new acceptable-use policy. Document attendance, keep the training materials, and note the date. This is evidence your auditor will specifically ask for.

Days 61 through 90: Internal Audit and Management Review

The third month is about proving your system works before an external auditor tests it. Clause 9.2 of ISO 27001 requires an internal audit, and Clause 9.3 requires a management review. These are non-negotiable — your certification body will check for both. The internal audit should be conducted by someone who wasn't directly responsible for implementing the controls. If you built your ISMS in-house, bring in an external consultant for the internal audit. If a consultant built it, have your internal team review it. Independence matters here.

The internal audit produces a report listing conformities, nonconformities, and opportunities for improvement. Don't panic about finding nonconformities — finding and fixing them before the external audit is exactly the point. Address any major nonconformities immediately and document your corrective actions. Minor nonconformities can be logged in your corrective action tracker with a remediation timeline.

The management review is a formal meeting where your leadership team (even if that's just the owner and operations manager) reviews the internal audit results, the current risk landscape, resource needs, and the effectiveness of the ISMS. Produce meeting minutes. This meeting demonstrates management commitment (Clause 5.1), which auditors consistently identify as the single most important factor in a successful certification.

What Auditors Actually Ask For

Certification audits happen in two stages. Stage 1 is a documentation review — the auditor confirms your ISMS documentation is complete and your organization is ready for a full audit. Stage 2 is the implementation audit, where the auditor verifies that your controls are actually working. Here's what to have ready for each stage.

Audit Stage Document / Evidence What the Auditor Is Checking
Stage 1 ISMS Scope Statement Is the scope clearly defined, appropriate, and aligned with the organization's context?
Stage 1 Information Security Policy Does the policy reflect management commitment and set the direction for security objectives?
Stage 1 Risk Assessment Methodology Is the methodology repeatable, and does it define criteria for risk acceptance?
Stage 1 Risk Assessment Results Were risks identified systematically across the defined scope?
Stage 1 Statement of Applicability (SoA) Are all 93 controls addressed with clear inclusion/exclusion justifications tied to risk assessment?
Stage 1 Risk Treatment Plan Does each identified risk have a documented treatment decision and responsible owner?
Stage 1 Internal Audit Report Was an independent audit conducted, and were findings documented?
Stage 1 Management Review Minutes Did leadership formally review the ISMS performance and resource needs?
Stage 2 Access Control Logs Are user accounts provisioned and deprovisioned according to the documented process?
Stage 2 Security Awareness Training Records Have employees received training, and can the organization demonstrate ongoing awareness?
Stage 2 Backup and Recovery Test Results Are backups running on schedule, and has a restoration been tested recently?
Stage 2 Incident Response Records Is there a documented incident management process, even if no major incidents occurred?
Stage 2 Vulnerability Scan or Penetration Test Report Has the organization assessed technical vulnerabilities within the scope?
Stage 2 Corrective Action Log Are nonconformities tracked and closed with evidence of root-cause analysis?
Stage 2 Supplier Security Agreements If third parties handle data in scope, are security requirements documented in contracts?

The Cost Reality

Let's talk numbers, because "budget" is right there in the title. For a 10-to-50-person Hudson Valley firm, here's what to expect. Certification body fees for a Stage 1 and Stage 2 audit typically run between $8,000 and $15,000, depending on the scope size, number of locations, and which accredited body you choose. Annual surveillance audits run roughly half that — $4,000 to $8,000 per year. The three-year recertification audit resets to roughly the initial cost.

If you hire a consultant to guide the process — build your documentation, conduct the gap assessment, prepare you for the audit — expect to pay between $15,000 and $35,000 for a firm that works with SMBs. Some consultants charge per phase; others offer a fixed project fee. Be wary of anyone quoting under $10,000 for full implementation support, as that usually means heavy use of generic templates with minimal customization, which creates problems during the audit when the auditor realizes the policies don't match your actual operations.

Internal effort is the cost most firms underestimate. Expect your primary ISMS owner (often the IT manager or a fractional CISO) to spend 15 to 20 hours per week during the 90-day implementation push and 3 to 5 hours per week on ongoing maintenance after certification. Other staff — HR for personnel security, operations for physical security, finance for supplier management — will each contribute 2 to 5 hours total during the initial project.

Budget Reality Check: Total first-year cost for a 30-person Hudson Valley firm — including consultant, certification body, internal time valued at loaded labor rates, and tooling — typically falls between $35,000 and $60,000. That's real money for an SMB. But if the European contract at stake is worth $200,000 or more per year, the return on investment is clear. And unlike a one-time SOC 2 report, an ISO 27001 certificate is recognized globally, which means every future European customer questionnaire gets easier to answer.

Already Doing NIST CSF? You're Closer Than You Think

Many Hudson Valley firms that work with federal contractors or have been through a NIST Cybersecurity Framework assessment are surprised to learn how much overlap exists with ISO 27001. The two frameworks share substantial common ground, and a formal mapping published by NIST makes the bridge explicit.

The CSF's "Identify" function maps directly to ISO 27001's Clause 4 (Context of the organization) and Clause 6 (Planning, including risk assessment). If you've already built an asset inventory and conducted a risk assessment under CSF, that work translates almost directly. The CSF's "Protect" function covers the same territory as the majority of Annex A controls — access control, awareness training, data security, and maintenance all have direct counterparts. "Detect" maps to ISO 27001's monitoring and logging controls (A.8.15 Logging, A.8.16 Monitoring activities). "Respond" aligns with incident management (A.5.24 through A.5.28). "Recover" connects to business continuity controls (A.5.29 and A.5.30).

The practical implication: if your firm completed a NIST CSF self-assessment and implemented controls across all five functions, your ISO 27001 gap assessment during Days 1 through 30 will reveal far fewer gaps than a firm starting from scratch. Your risk assessment methodology might need minor adjustments to meet ISO 27001's specific requirements, and you'll need to produce the formal SoA document, but the underlying security work is largely done. This can shave 20 to 30 percent off both your consultant costs and your internal time investment.

Picking the Right Certification Body

Not all certification bodies are equal, and this decision matters for both cost and credibility. Choose a body accredited by ANAB (the ANSI National Accreditation Board) or an IAF (International Accreditation Forum) signatory. Your European customer's auditor will check. If the certificate comes from a non-accredited body, it's effectively worthless for supply-chain compliance purposes.

Get quotes from at least three accredited bodies. Prices vary significantly. Ask specifically about auditor travel costs — some bodies charge travel separately, and if the auditor is flying in from across the country, that adds $2,000 or more. Several accredited bodies now offer remote Stage 1 audits with on-site Stage 2, which can reduce costs for Hudson Valley firms that might otherwise pay premium rates for auditors based in Manhattan.

Making It Stick After Day 90

Certification is not the finish line. The firms that get the most value from ISO 27001 are the ones that integrate the ISMS into their daily operations rather than treating it as a compliance exercise they dust off before each surveillance audit. Schedule quarterly risk reviews. Update your SoA when your business changes — new services, new technologies, new locations. Run security awareness refreshers at least annually. Keep your corrective action log current.

The real payoff comes 12 to 18 months after certification, when your second European customer asks the same question and you simply email them the certificate. No scramble, no questionnaire marathon, no late nights assembling evidence. That's the return on the investment — not just the first contract, but every contract after it.

Hudson Valley CISO offers ISO 27001 readiness assessments tailored to SMBs with 10 to 100 employees — covering gap analysis, SoA development, and certification body selection. Schedule a 30-minute call at hudsonvalleyciso.com.

References

ISO/IEC 27001:2022 — Information security, cybersecurity and privacy protection

NIST Cybersecurity Framework Informative References (including ISO 27001 mapping)