Starting your ISO 27001 certification journey can feel like a massive mountain to climb, especially when you’re running a busy SME. With all the technical controls and paperwork, it’s easy to get overwhelmed. But here’s a secret: a successful Information Security Management System (ISMS) isn’t built on software alone—it’s built on resources.
ISO 27001:2022 Clause 7.1 is the foundation of your entire security framework. If you don’t get your resource allocation right from day one, your ISMS will struggle to stay afloat. This guide breaks down exactly what you need to do to satisfy the auditors and, more importantly, secure your business.
Table of contents
- The Essentials: Key Takeaways for Clause 7.1
- Decoding Clause 7.1: What It Is and Why It Matters
- Assembling Your Resources: A Three-Pillar Approach
- Your Step-by-Step Implementation Plan
- A Pro Tip for Small Organisations
- Preparing for Your Audit: How to Demonstrate Compliance
- Frequently Asked Questions (FAQ) about Clause 7.1
The Essentials: Key Takeaways for Clause 7.1
If you’re in a hurry, here is the “too long; didn’t read” version of what Clause 7.1 requires from your organisation:
- It’s Mandatory: You cannot skip this. You must identify and provide the resources needed to build, maintain, and improve your ISMS.
- Management Must Step Up: The ultimate responsibility for providing budget and people lies with your senior leadership team.
- More Than Just Cash: Resources include people’s time, specialized tools (like an ISMS toolkit), and infrastructure—not just a line item in a budget.
- Mix and Match: You don’t have to do it all alone. You can use internal staff, external consultants, or a blend of both.
Decoding Clause 7.1: What It Is and Why It Matters
To comply with Clause 7.1, you need to understand why it exists. The standard defines it simply:
“The organisation shall determine and provide the resources needed for the establishment, implementation, maintenance and continual improvement of the ISMS.”
In plain English? It means information security shouldn’t just be a “nice to have” idea—it needs to be a properly supported department of your business. A common mistake SMEs make is treating ISO 27001 as a one-off project. Clause 7.1 forces you to think about the entire lifecycle. How will you maintain your security posture in year two or three? That’s what auditors are looking for.
Assembling Your Resources: A Three-Pillar Approach
Think of your resource plan as a tripod. If one leg is missing, the whole thing falls over. Here are the three pillars you need to focus on:
Pillar 1: People – Your Internal and External Team
Your people are your strongest asset. You have two main routes here:
- Internal Growth: Up-skill your current team through Lead Implementer courses or guided training. High Table offers “hands-on” training that runs alongside your actual implementation so you learn while doing.
- External Experts: Hiring a consultant can fast-track your path to certification. Just ensure they understand the specific needs of an SME culture before signing the contract.
Pillar 2: Tools & Infrastructure – Your ISMS Toolkit
Don’t reinvent the wheel. An ISO 27001 Toolkit is a vital resource. It provides the templates, checklists, and video guides that save you hundreds of hours of document creation. Your infrastructure also includes the secure software and physical space needed to keep your data safe.
Pillar 3: Finances – Securing the Budget
Getting your budget signed off is your first big win. It proves management is “all in.” Without a dedicated budget for audits, tools, and training, your ISMS is just a hobby, not a business process.
Your Step-by-Step Implementation Plan
Ready to get started? Follow this checklist to ensure you meet the requirements of Clause 7.1 systematically.
Phase 1: Initial Setup and Role Allocation
- Secure the Budget: Cover the costs of the toolkit, staff time, and the certification audit.
- Acquire Your Toolkit: Get your templates ready so the team isn’t staring at a blank page.
- Map Your Roles: For SMEs, we recommend using a pre-defined ISO 27001 resources template. This helps you quickly assign existing staff to key roles like the Information Security Manager or the Management Review Team.
Phase 2: Resourcing Across the Project Lifecycle
Your needs will change as you progress. A “blended approach” usually works best:
- Establishment & Implementation: Lean on specialists to get the framework right.
- Certification: Use a mix of your internal team and experts to handle the audit.
- Maintenance: Transition the daily tasks to your internal staff to build long-term competency.
Phase 3: Documenting Responsibilities
If it isn’t documented, an auditor will assume it hasn’t happened. You need two specific documents:
- Accountability Matrix (RACI): Defines who “does” the work and where the “buck stops” for every clause.
- Competency Matrix: Records the skills of your team. If you find a gap, this justifies your need for more training or external help.
A Pro Tip for Small Organisations
Don’t panic! You don’t need to hire five new people. In an SME, it’s perfectly fine for one person to wear multiple hats. However, you must respect the Segregation of Duties. For example, the person who requests access to a server shouldn’t be the same person who approves that access. As long as you have those checks and balances, you can run a compliant ISMS with a very small team.
Preparing for Your Audit: How to Demonstrate Compliance
An auditor isn’t there to fail you; they are there to see evidence. To pass Clause 7.1, you should show them:
- Knowledge: Proof that someone on the team (internal or external) actually understands ISO 27001.
- Competence: Your Competency Matrix and training records.
- Ownership: Your Accountability Matrix showing that every security control has a human name attached to it.
Frequently Asked Questions (FAQ) about Clause 7.1
What changed in the 2022 update for Clause 7.1?
Actually, nothing! Clause 7.1 remained the same in the ISO 27001:2022 update, so if you were compliant before, you’re still on the right track.
What is the difference between Clause 7.1 and Clause 7.2?
7.1 is about availability (Do we have the budget and the people?). 7.2 is about competence (Do those people actually know what they are doing?).
Can I outsource everything?
You can outsource the work, but you cannot outsource the responsibility. Senior management remains accountable for the ISMS, even if consultants do the heavy lifting.
About the author
Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management.
Holding an MSc in Software and Systems Security, Stuart combines academic rigor with extensive operational experience. His background includes over a decade leading Data Governance for General Electric (GE) across Europe, as well as founding and exiting a successful cyber security consultancy.
As a qualified ISO 27001 Lead Auditor and Lead Implementer, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. He has successfully guided hundreds of organizations – from high-growth technology startups to enterprise financial institutions – through the audit lifecycle.
His toolkits represents the distillation of that field experience into a standardised framework. They move beyond theoretical compliance, providing a pragmatic, auditor-verified methodology designed to satisfy ISO/IEC 27001:2022 while minimising operational friction.

