Decision guide · Compliance
ISO 27001:2022 recertification: a structured migration and renewal guide
ISO 27001:2022 recertification rarely fails on the technology. It fails because the 11 new controls (Threat Intelligence, Cloud Services, DLP, Monitoring, Secure Coding, Data Masking, Web Filtering, Configuration Management, ICT Readiness, Information Deletion, Physical Security Monitoring) are decided in silos and show up as patchwork in the audit. The clean structure: per new control, one documented decision with evidence, SoA entry, risk-treatment plan and proof of effectiveness. The audit then becomes a presentation, not a surprise.
TL;DR
The 11 new 2022 controls are the recertification truth. Decide each one separately and document it.
Who owns this decision
ISMS officer as owner, CISO as approver, IT-Ops, Data Protection Officer, Legal and business units as contributors.
Key criteria to weight
Gap analysis against the 11 new controls
Threat Intelligence, Cloud, DLP, Monitoring, Secure Coding etc. Per control: present, partial, missing — that is the work list.
Statement of Applicability (SoA)
Each of the 93 controls in the 2022 version needs a documented applicability decision with rationale.
Risk treatment plan
Re-map risks against the new control structure, name actions, owners and dates.
Demonstrable effectiveness
The audit checks effectiveness, not documents. Plan evidence chains per control before the auditor arrives.
Integration with NIS2 / DORA / AI Act
The management-system structure (Clauses 4 to 10) becomes the carrier structure for other regulations. Avoid double work.
Audit cycle and deadlines
Recertification every 3 years, surveillance audits annually. Plan so that gap closure is visible before the surveillance audit.
Step-by-step decision flow
- 1
Delta-mapping 2013 → 2022
Re-map existing control evidence onto the 2022 structure. What stays, what is consolidated, what is new.
- 2
Gap analysis against the 11 new controls
Per new control: is the topic technically implemented? Is it documented as a process? Is there a policy? Is there evidence from the past year?
- 3
Update SoA and risk treatment
Walk through 93 controls, justify applicability, document deviations. Move the risk-treatment plan onto the 2022 structure.
- 4
Update policies and procedures
Information-security policy, cloud policy, threat-intelligence process, DLP policy, monitoring concept, configuration management.
- 5
Internal audit and corrective actions
Run the internal audit with a fresh 2022 checklist. Treat findings as corrective cases, not as an open issues list.
- 6
Prepare for the recertification audit
Anticipate auditor questions, structure the evidence folder, brief interview partners. The audit is a moderated presentation, not a blind check.
Vendor market structure
Strukturvergleich der relevanten ISMS-/Compliance-Tools für ISO 27001:2022 Zertifizierung im DACH-Mittelstand.
| Vendor | ISO 27001:2022 Mapping | Deutsche Lokalisierung | Audit-Vorbereitung | Preis ab | Cloud/On-Prem | BSI-IT-Grundschutz |
|---|---|---|---|---|---|---|
| Drata ↗ | Native ISO 27001:2022 Framework | Englisch primär, DE-Inhalte begrenzt | Auditor-Marketplace inkl. DACH | ab ca. 7.500 USD/Jahr | Cloud-only | Kein natives BSI-Mapping |
| Vanta ↗ | Native ISO 27001:2022 Framework | Englisch primär, DE-Inhalte begrenzt | Auditor-Netzwerk in DE wachsend | ab ca. 8.000 EUR/Jahr | Cloud-only | Kein natives BSI-Mapping |
| Secfix ↗ | Native ISO 27001:2022 mit DE-Fokus | Vollständig deutsch, DACH-fokussiert | DACH-Auditor-Netzwerk integriert | auf Anfrage | Cloud-only | BSI-Mapping ergänzbar |
| verinice ↗ | ISO 27001:2022 Katalog verfügbar | Vollständig deutsch | Manuell, keine Automation | Open-Source plus Pro-Edition (auf Anfrage) | On-Prem oder Hosted | Native BSI-IT-Grundschutz-Unterstützung |
| DocSetMinder ↗ | ISO 27001:2022 unterstützt | Vollständig deutsch | Audit-Modul integriert | auf Anfrage | On-Prem | Native BSI-IT-Grundschutz-Unterstützung |
| ISMS-Tool von Fox & Co. ↗ | ISO 27001:2022 abgedeckt | Vollständig deutsch | Audit-Modul integriert | auf Anfrage | On-Prem oder Hosted | Native BSI-IT-Grundschutz-Mapping |
| HiScout GRC Suite ↗ | ISO 27001:2022 unterstützt | Vollständig deutsch | Audit- und Risiko-Module | auf Anfrage | On-Prem oder Hosted | Native BSI-IT-Grundschutz-Mapping |
Stand: 2026-04. Basierend auf öffentlich zugänglichen Vendor-Angaben. Stand April 2026. Eigene Validierung über DecisionOS-Profil empfohlen.
Anonymised memo excerpt
SaaS-Anbieter, 220 Mitarbeiter, ISO 27001:2013 Bestandszertifikat, nächstes Audit Q4 2026
Readiness score
75
- Trigger
- Re-Zertifizierung muss zwingend gegen 2022er Fassung geführt werden. 11 neue Controls verlangen separate Evidenz-Ketten.
- Top criteria (weights)
- Mapping-Tiefe gegen 11 neue Controls20%
- SoA-Aktualisierung und Begründungstiefe20%
- Risikobehandlungsplan auf 2022er-Struktur15%
- Internes Audit mit 2022er-Checkliste15%
- Nachweisbare Wirksamkeit (Evidenz)15%
- Integration mit DORA / NIS2 / AI-Act15%
- Shortlist
- Drata mit DACH-Auditor
- Vanta mit DACH-Auditor
- Eigenständiger DocSetMinder plus interner ISMS-Beauftragter
- Decision
- Drata für Compliance-Automation, eigener ISMS-Beauftragter für SoA-Begründungen, internes Audit mit externer 2-Personen-Mannschaft.
- Rationale
- Drata reduziert Evidence-Sammlung um geschätzt 60% gegenüber manueller Pflege. Vanta hat in DACH noch zu duenne Auditor-Abdeckung. DocSetMinder ist sehr stark, aber zu personalintensiv für 220-Personen-Saas. Hybrider Ansatz balanciert Automation und Begründungstiefe.
- Residual risks
- Drata-Mapping für A.5.7 Threat Intelligence muss um eigene Quellen ergänzt werden
- Wirksamkeitsnachweis für A.8.16 Monitoring erst nach 6 Monaten Operations valide
Compliance note
ISO 27001:2022 is the foundation for evidence under NIS2 Art. 21, DORA Art. 6 ff. and the AI Act (Art. 9 risk management). A clean migration to 2022 substantially reduces the effort for the other regulations. The new controls on Cloud (A.5.23), Threat Intelligence (A.5.7) and Monitoring (A.8.16) directly mirror NIS2 requirements.
Common pitfalls
- !Treating the 11 new controls as a documentation exercise instead of a real implementation.
- !Keeping SoA justifications generic — auditors ask specifically.
- !Not switching the risk-treatment plan to the 2022 control structure.
- !Running the internal audit with a 2013 checklist and being caught in the external audit.
- !Treating Threat Intelligence and Monitoring as a tool purchase instead of a process decision.
FAQ
Do I have to migrate from ISO 27001:2013 to :2022?
Yes, mandatory. The transition deadline for existing certificates ended on 31 October 2025. Every recertification from 2026 onwards runs against the 2022 version. Anyone still on a :2013 certificate must move to :2022 at the next audit cycle.
What is the difference between ISO 27001:2013 and :2022?
Instead of 114 controls in 14 domains, there are 93 controls in 4 themes (Organisational, People, Physical, Technological). 11 controls are new (Threat Intelligence, Cloud Services, ICT Readiness for Business Continuity, Data Masking, DLP, Monitoring Activities, Web Filtering, Secure Coding, Configuration Management and others). The fundamental management-system structure (Clauses 4 to 10) stays unchanged.
How long does an ISO 27001:2022 recertification take?
A structured recertification project takes 6 to 9 months: gap analysis against the 11 new controls (4 weeks), update of SoA and risk treatment (6 to 8 weeks), policy updates (parallel), internal audit cycle (2 to 4 weeks), external audit through the certifier. The documented decision per new control is the time-critical path.
Related decision guides
Related comparisons
DecisionOS vs Vanta
Vanta automates compliance. DecisionOS documents decisions.
DecisionOS vs Drata
Drata maintains compliance posture. DecisionOS records the decisions behind it.
DecisionOS vs ServiceNow GRC
ServiceNow runs your GRC programme. DecisionOS runs the decisions inside it.
DecisionOS vs Excel and slide decks
Spreadsheets work until the second stakeholder shows up.
DecisionOS vs RFP tools
RFP tools automate Q&A. DecisionOS runs the decision.
Relevant industries
Banken & Finanzdienstleister
Banken entscheiden unter DORA, MaRisk, BAIT gleichzeitig. DecisionOS liefert das Memo, das alle drei Prüfer akzeptieren.
Versicherungen
Versicherer entscheiden unter DORA + Solvency II + VAIT gleichzeitig. Ein Memo-Format für alle drei.
Gesundheitswesen
Gesundheitswesen: KRITIS + NIS2 + B3S + DSGVO Art. 9. DecisionOS macht das Memo prüfbar.
Energieversorger
Energieversorger: KRITIS + IT-SiG 2.0 + NIS2 + branchenspezifische Sicherheit. Memo muss vor BSI und BNetzA bestehen.
Wasser- und Abwasserversorgung
Wasserversorger unter KRITIS + NIS2 + B3S Wasser. Entscheidungen müssen IT und OT sauber trennen und vor BSI bestehen.
