Four people seated at a table in a meeting room, with a presenter speaking in front of a screen.

How to build a pragmatic ISMS (without losing your sanity)

How to build a pragmatic ISMS (without losing your sanity)

Yannick H.,

Too Long; Didn't Read

An ISMS must fit the company - not the other way around. Most implementations fail not because of technology, but due to excessive scope, lack of management buy-in, and the attempt to apply enterprise frameworks to SME resources. The pragmatic approach: Start small, expand gradually, and build a system that is truly lived - not just audited.

A silhouette of a person stacking colorful blocks, with a chaotic pile of blocks on the right side.


Why Everyone is Talking About ISMS Now

Over 150,000 organizations worldwide are ISO 27001 certified. The number grows annually by 10-15%.

(ISO Survey / Industry Reports 2025)

This is not because everyone has suddenly become security enthusiasts.

70% of IT service providers in Europe and North America require ISO 27001 from their suppliers.

(Industry Research 2025)

In other words: No ISMS, no contract. At least not with enterprise customers.

Then there are cyber insurances increasingly demanding a structured security management. And regulations like NIS2, which practically mandate an ISMS.

The question is no longer if, but how.

What an ISMS Actually Is (and What It Isn’t)

Before we get into implementation, a brief clarification.

An ISMS - Information Security Management System - is not a tool. Not software. Not a folder with policies.

An ISMS is a structured approach to managing information security.

It includes:

  • Governance: Who is responsible? How are decisions made?

  • Risk Management: What risks do we have? How do we handle them?

  • Controls: What measures do we implement?

  • Continuous Improvement: How do we learn from incidents and audits?

ISO 27001 is the most well-known standard for this - but not the only way.

Why Most ISMS Projects Fail

Here’s the honest truth.

Most ISMS implementations don't fail due to technology. They fail due to five predictable problems.

1. Scope Too Large

The most common mistake: Wanting to certify the entire organization at once.

This works for large companies with dedicated compliance teams. For SMEs, it leads to overwhelm, delays, and eventually abandonment.

Pragmatic Approach: Start small. One department. One critical process. One location. Then expand.

2. Lack of Management Buy-in

Without top-level commitment, nothing happens. No budget. No prioritization. No enforcement.

If the executive team sees an ISMS as an "IT project," it's doomed to fail.

Pragmatic Approach: Position ISMS as a business topic. Translate risks into business language. Demonstrate ROI.

3. Underestimated Risk Analysis

The risk analysis is the heart of ISO 27001. And the part most underestimated.

It's not about creating an Excel list with 500 theoretical risks. It's about understanding and prioritizing the real risks for your company.

Pragmatic Approach: Focus on truly relevant risks. Qualitative assessment instead of pseudo-quantification. Regular updates.

4. Documentation Overload

An ISMS needs documentation. Policies, processes, proofs.

But it doesn't need 500 pages of policies that no one reads.

Pragmatic Approach: Documentation that is actually used. Short. Clear. Current. Better ten pages that are lived by than a hundred pages of shelfware.

5. Checkbox Mentality

"We need the certificate."

That's the wrong reason for an ISMS. If the goal is only the certificate, you get a system that passes audits - but provides no real security.

Pragmatic Approach: Understand ISMS as a tool, not as an end in itself. The certificate is a byproduct of good security practice.


The Pragmatic Path to ISMS

Enough about the problems. Here’s how it works.

Phase 1: Define Scope

What to include?

Not everything. At least not at the start.

Identify the area that is:

  • Most critical to the business

  • Most demanded by customers or regulations

  • Reasonably delimitable

This could be:

  • The cloud infrastructure

  • The customer data processing area

  • A specific service or product

Deliverable: A clearly defined scope with documented boundaries.

Phase 2: Capture Current State

What do we already have?

Most companies already have security measures - they are just not documented or structured.

  • What policies exist?

  • What technical controls are active?

  • What processes already exist?

This is not a critique exercise. This is taking stock.

Deliverable: Gap analysis between current state and ISO 27001 requirements.

Phase 3: Assess Risks

What could go wrong?

Now it gets substantial. Identify the risks for your scope:

  • What assets are critical?

  • What threats exist?

  • What vulnerabilities do we have?

  • What are the impacts if something happens?

Keep it practical. No theoretical scenarios that will never happen. Focus on what is realistic and can cause damage.

Deliverable: Risk assessment with prioritized risks and treatment plan.

Phase 4: Implement Controls

What do we do about it?

Based on the risk assessment: What measures do we need?

ISO 27001 Annex A offers 93 controls as a reference. Not all are relevant for every company.

Choose controls that:

  • Address your top risks

  • Fit your context

  • Are implementable with reasonable effort

Deliverable: Implemented controls with evidence.

Phase 5: Document and Live

How do we keep it running?

An ISMS is not a one-time project. It needs to be lived.

  • Policies that people actually read

  • Processes that work in everyday life

  • Training that sticks

  • Regular reviews and updates

Deliverable: Documented, functional ISMS.

What It Really Costs

Let's talk numbers.

Typical costs for SMEs:

Phase

Cost Range

Gap Analysis & Consulting

CHF 10,000 - 25,000

Implementation & Training

CHF 15,000 - 40,000

Certification Audit

CHF 5,000 - 15,000

Annual Maintenance

CHF 3,000 - 10,000

(SecITHub / Rhymetec 2025)

It sounds like a lot. But compared to:

  • A data breach (average cost several million)

  • Lost enterprise contracts

  • Higher cyber insurance premiums

...it's an investment that pays off.

Organizations with mature security programs save an average of $1.9 million per security incident.

(IBM Cost of Data Breach 2025)

Key Takeaways

  • ISMS must fit the company. Not the other way around. A pragmatic system that is lived is better than a perfect system that only exists in audits.

  • Start small. The biggest mistake is too large a scope. A clearly defined area that works is better than an entire struggling organization.

  • Management buy-in is not optional. Without top-level commitment, the ISMS becomes an IT project - and IT projects without business support fail.

  • Think risk-oriented. Risk analysis is not bureaucracy - it is the core of the system. Invest time here.

  • Documentation that is lived. Ten pages that everyone knows are more valuable than a hundred pages no one reads.

  • The certificate is not the goal. It's a byproduct. The goal is a company that understands and manages information security.

If You Need Support

We help SMEs build an ISMS that works - not just is audited.

  • ISMS Readiness Assessment: Where do you stand? What's missing?

  • Pragmatic Implementation: SME-friendly approach, no enterprise overkill

  • Scope Definition: Finding the right starting point

  • CISO-as-a-Service: Continuous ISMS support without a full-time CISO


Related Articles:

Sources:

Join us on the journey

Effortlessly schedule a conversation and discover how we bring success in the digital world to your company.

Two men sit together in a cozy setting, smiling and sharing a conversation over drinks.

Join us on the journey

Effortlessly schedule a conversation and discover how we bring success in the digital world to your company.

Two men sit together in a cozy setting, smiling and sharing a conversation over drinks.
Abstract design featuring vibrant purple and blue gradients with geometric shapes and lines.
Text reads: "Let’s begin our digital journey."
Contact us!

Grabenstrasse 15a

6340 Baar

Switzerland

+41 43 217 86 70

Copyright © 2025 ODCUS | All rights reserved.

Abstract design featuring vibrant purple and blue gradients with geometric shapes and lines.
Text reads: "Let’s begin our digital journey."
Contact us!

Grabenstrasse 15a

6340 Baar

Switzerland

+41 43 217 86 70

Copyright © 2025 ODCUS | All rights reserved.