Our DIY ISO 27001 package is easy to use, even for those with no prior experience in implementing an ISMS. Dare to try it?
The Do-It-Yourselfer comes with a step-by-step guide that will walk you through the entire implementation process, making it simple and straightforward. Before we forget to tell you, our DIY option is also the most affordable way to kick-start your ISO 27001 in the market!
With our DIY ISO 27001 package, you’ll not only save money and time, but you’ll also be able to demonstrate your commitment to information security to your customers and stakeholders. You’ll be able to improve your organisation’s reputation, increase customer confidence, and enhance your competitiveness in the market.
➤ You need to have your ISMS set up this year.
➤ You don’t have thousands of euros to pay consultants to set up your ISMS.
➤ You have hundreds of excel files where everything is ¨organised¨.
➤ You want to prepare your ISO 27001 setup as affordably as possible.
➤ You want to have access to compliance officers when needed.
Yes? That means the Do-It-Yourselfer package is for you!
Read more below ⇩
See what falls into scope. In this 1:1 Session with one of our Lean Compliance Designers you go over all the components of your organisation. With this X-Ray we can visualise the risks and scope in one image. Watch the video to learn more about our X-Ray.
Our wiki has a wealth of information about the ISO 27001 standard, including its requirements, benefits, and implementation best practices. We call this the Why, How and What. The ISO 27001 wiki is a useful resource for organisations that are implementing or considering implementing ISO 27001 with our Compleye Online Platform, as well as for individuals who are interested in learning more about the standard.
We give you all the auditor-approved templates to apply to your business.
Some of the key ISO 27001 policies include:
➤ Information security policy: This policy outlines the organisation’s commitment to information security and its objectives for implementing an Information Security Management System (ISMS).
➤ Risk management policy: This policy describes the organisation’s approach to identifying, assessing, treating, and monitoring risks to its information assets.
➤ Access control policy: This policy establishes the rules and procedures for granting, managing, and revoking access to information assets and information systems.
➤ Incident management policy: This policy outlines the procedures for responding to and managing information security incidents, including reporting, investigation, and corrective actions.
➤ Business continuity policy: This policy defines the organisation’s approach to ensuring the continuity of critical business processes in the event of a disruption or disaster.
➤ Human resources policy: This policy outlines the rules and procedures for managing the information security responsibilities of employees, contractors, and third-party providers.
➤ Asset management policy: This policy defines the procedures for identifying, classifying, and managing the organisation’s information assets.
➤ Many, many, many, many more, all ready for you to use when you sign up for our DIY Package.
These policies are essential for implementing an effective ISMS and meeting the requirements of the ISO 27001 standard. They provide a framework for ensuring that the organisation’s information assets are protected, risks are managed, and incidents are properly handled. Developing and implementing ISO 27001 policies can be a complex process. We recommend that you seek expert guidance or use pre-developed templates to ensure that the policies are comprehensive and effective.
We help you to do it yourself by guiding you through our step-by-step process using our ISO 27001 wiki, and providing an ISMS platform on which you will store and keep track of all your evidence. With our wiki you’ll find all the explanations you need to fill in a specific section for ISO 27001’s requirements.
This is our platform where you can store all evidence, policies and documents, track changes and do what you gotta do to get certified. It’s your ISMS with all the bells and whistles.
➤ An online tool (Compleye Online) with a user manual (The Wiki).
➤ A deep understanding of the start-up journey and culture.
➤ Lean, transparent and no-nonsense way of working.
➤ The unheard-of ability to make compliance (almost) fun.
➤ 20+ years of combined experience in compliance.
Compleye automates your compliance processes and teaches you the why, how, and what so you understand what you’re doing.
👩🏻 85% are women
🔥 Growing fast
💻 100% remote company
🌎 10+ different nationalities on the team
🐶 Almost all team members have dogs
A free X-Ray session to see what falls in scope
A step-by-step ISO 27001 Roadmap
Our ISO 27001 Wiki will guide you along the road
35+ Audit proof policy templates
Access to Compleye Online
We offer 1 year contract to start with – After this 1st year, it’s a monthly based contract and you can cancel it at any time!
Because we test automation and the latest technology to streamline compliance processes. Also, because our mission is to help startups grow, not make them go broke on creating a solid compliance 😊
No compliance background is required to succeed and achieve the certifications you’re looking for when using our all-in-one compliance platform and our well designed Do-It-Yourselfer package! However, if you do need help you can book a session with one of our compliance officers.
To create the compliance components for your business we offer our DIY Clients a Free X-Ray session. With this X-Ray we can visualize the risks and scope in one image!
No way! We understand that startups need to be lean and efficient, which is why we only charge for the features you need. We offer a range of compliance modules that you can mix and match to create a solution that works for you. If you don’t need a certain module, you won’t be charged for it. Our goal is to make compliance affordable and accessible for startups, and that means being flexible with our pricing.
Absolutely! Our platform is designed to be flexible and customizable so that it can fit the specific needs of your business. We offer a range of compliance modules that you can mix and match to create a solution that works for you. If you need something more specific, our team can work with you to create a custom solution that meets your unique needs. So, whether you’re a tech startup or a traditional business, we’ve got you covered.
Absolutely! As a compliance company, data protection is at the heart of everything we do, and we take cybersecurity very seriously. We are fully compliant with all applicable regulations and have certifications to prove it! Our platform is designed with the highest standards of security in mind, including SSL encryption and two-factor authentication, to ensure that your data is safe and secure. We also partner with trusted security providers to provide additional layers of protection. So rest assured, your data is in good hands with us!
Copyright © 2023 Compleye. All rights reserved.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |