TL;DR
Yes, a business with one employee can absolutely achieve ISO 27001 certification. It requires focusing on documenting processes, implementing basic security controls, and demonstrating commitment to information security. The scope of the certification will likely be smaller than for larger organisations, but it’s still valuable.
How to Get ISO 27001 as a Sole Trader
- Understand the Standard: ISO 27001 is about managing information security. It’s not just IT; it covers all information – customer data, financial records, even your business plans. Familiarise yourself with the standard’s requirements. You can purchase a copy from ISO’s website or find summaries online.
- Define Your Scope: This is crucial for a one-person business. Don’t try to cover everything at once. Focus on the core activities that handle sensitive information. For example:
- If you provide consultancy, your scope might be “Provision of consulting services and associated data management”.
- If you run an online shop, it could be “Online sales of products and customer data processing”.
Document this clearly. A small scope makes implementation easier.
- Gap Analysis: Identify what security controls you already have in place and where the gaps are against ISO 27001 requirements. A simple spreadsheet is fine for this.
- Risk Assessment: This is a key part of ISO 27001. You need to identify potential threats to your information (e.g., data breach, hardware failure, human error) and assess the likelihood and impact of each threat. There are various risk assessment methodologies; for a small business, a simple qualitative approach is often sufficient.
- Example Risk: Loss of laptop containing customer data.
- Likelihood: Medium (laptop could be stolen).
- Impact: High (potential fines and reputational damage).
- Implement Controls: Based on your risk assessment, implement security controls to mitigate the identified risks. These can include:
- Access Control: Strong passwords, multi-factor authentication where possible.
- Data Backup: Regular backups of all important data, stored securely offsite (e.g., cloud storage).
# Example backup command (Linux) tar -czvf /mnt/backup/mydata.tar.gz /home/user/documents - Firewall: Use a firewall to protect your network.
- Antivirus Software: Install and keep antivirus software up-to-date.
- Data Encryption: Encrypt sensitive data at rest and in transit.
- Incident Management Plan: A simple plan outlining what you’ll do if a security incident occurs (e.g., data breach).
- Document Everything: This is the most important part! ISO 27001 is about *demonstrating* that you have a robust information security management system (ISMS). Document all your policies, procedures, and controls. Examples:
- Password Policy
- Backup Procedure
- Incident Response Plan
- Risk Assessment Report
- Internal Audit: Conduct an internal audit to check that your ISMS is working effectively and complies with ISO 27001. This can be done yourself, or you could ask a trusted colleague.
- Management Review: Regularly review your ISMS (at least annually) to ensure it remains effective and relevant. Document this review.
- Choose a Certification Body: Research and select an accredited certification body. Get quotes from several bodies before making a decision.
- Certification Audit: The certification body will conduct an audit of your ISMS. This usually involves two stages:
- Stage 1: Document review to check that you have the necessary documentation in place.
- Stage 2: On-site audit to verify that you are implementing the controls described in your documentation.
- Certification: If the audit is successful, you will be awarded ISO 27001 certification.
Tips for Sole Traders
- Keep it Simple: Don’t overcomplicate things. Focus on the essential controls that are relevant to your business.
- Use Templates: There are many ISO 27001 templates available online (some free, some paid) that can help you get started.
- Consider Cloud Services: If you use cloud services, ensure they have appropriate security measures in place and comply with relevant regulations.
- Get Help if Needed: Don’t be afraid to seek help from a cyber security consultant if you are struggling.

