Office

Derwent Point, Clasper Way
Swalwell, Newcastle Upon Tyne
NE16 3BE

Microsoft PartnerCyber Essentials PlusISO 27001CHAS

Financial services firm achieves ISO 27001 on first attempt

Financial Services|60 users|18 months

Achieved ISO 27001 certification on the first audit attempt with zero major non-conformities.

A 60-person wealth management firm needed ISO 27001 certification to satisfy the requirements of institutional clients who were making it a condition of continued business. The firm had good security practices in many areas but lacked the formal documentation and structured approach that ISO 27001 demands.

The challenge was not starting from scratch, but formalising what already existed, filling the gaps, and building the evidence base that auditors would need to see. The team needed guidance on what auditors actually look for and how to present their controls effectively.

Financial Services

Industry

60 users

Company size

18 months

Timeline

The challenge

What we found when we assessed the existing environment.

Client requirements

Institutional clients were making ISO 27001 certification a condition of continued business. Without it, the firm risked losing key accounts that represented a significant portion of revenue.

Documentation gaps

Many good security controls were in place but poorly documented. Evidence was scattered across emails, spreadsheets, and informal processes. Nothing was structured for audit.

Control gaps

Several areas required new controls: formal access management processes, a complete asset inventory, supplier security management, and documented business continuity procedures.

First-time certification

The internal team had no experience with ISO 27001 audits. They needed guidance on what auditors would expect, how to present evidence, and how to handle the assessment process.

“ISO 27001 seemed daunting at first, but Bigfoot made the technical side straightforward. They knew exactly what the auditors would look for and made sure we were ready. Passing on our first attempt was a huge relief.”

Head of Compliance

Our approach

How we delivered the solution, phase by phase.

01

Gap analysis

Conducted a detailed assessment against every ISO 27001 Annex A control. Identified what was already in place, what needed formalising, and what was missing entirely. Prioritised remediation based on risk and audit readiness.

02

Technical controls

Implemented missing technical controls including formal access management with joiner, mover, and leaver processes, a complete asset register, centralised logging and monitoring, and regular backup testing with documented results.

03

Documentation

Formalised all IT and security policies. Documented every control with evidence that auditors could verify. Created the management system documentation including the Statement of Applicability and risk treatment plan.

04

Audit preparation

Ran internal audits to test readiness. Prepared evidence packs organised by control area. Briefed all staff on their roles and responsibilities during the assessment. Addressed any findings before the external audit.

05

Certification audit support

Attended both Stage 1 and Stage 2 audits alongside the firm. Answered technical questions, provided supporting evidence, and addressed minor non-conformities in real time during the assessment.

1st

Attempt certification success

0

Major non-conformities

114

Controls documented and evidenced

100%

Client requirements met

Key controls implemented

The specific technical and process controls we put in place.

Access management

Formal joiner, mover, and leaver processes with complete audit trails. Regular access reviews and privileged access management to ensure only the right people have access to sensitive systems.

Asset management

Complete hardware and software register with defined ownership for every asset. Automated discovery to ensure the register stays current as the environment changes.

Logging and monitoring

Centralised logging across all critical systems with 12-month retention. Security event monitoring with alerting for suspicious activity and regular log reviews.

Business continuity

Documented backup procedures with regular testing and verified recovery. Defined recovery time objectives for every critical system and a tested continuity plan.

Vulnerability management

Regular vulnerability scanning across all systems. Patch management with defined SLAs for critical, high, and medium severity vulnerabilities. Annual penetration testing.

Supplier management

Security requirements defined in all supplier contracts. Regular supplier security reviews and assessments. Risk-based approach to managing third-party access to systems and data.

Want results like these?

Every business starts somewhere. Whether you need ISO 27001 certification, compliance support, or strategic IT guidance, we can help.