Why Manufacturing ISO 27001 Certification Fails
ISO 27001 certification failure in manufacturing is rarely caused by insufficient IT security management. It is caused by inadequate scope definition, insufficient OT/IT boundary controls, and asset management that covers enterprise IT without covering the operational technology that represents the most significant information security risk in a manufacturing environment.
The Seven Most Common Failures
- ISMS scope excludes OT environment. Defining scope to cover only enterprise IT — excluding SCADA, DCS, PLC networks, industrial IoT — is the most common Stage 2 finding. Auditors assess whether the scope is appropriate for the organisation's information security risks. An ISMS excluding OT is not appropriate for a manufacturer where OT represents the primary operational risk.
- Asset register does not cover production systems. An asset register listing servers and laptops without industrial controllers, HMIs, historians and engineering workstations is incomplete. Annex A.8 asset management applies to all information assets in scope — including OT assets.
- Risk assessment does not address OT-specific threats. Standard IT risk assessments identify enterprise IT threats. OT-specific threats — targeted attacks on industrial control systems, firmware attacks, supply chain compromise of OT software — require specific threat modelling that IT-oriented risk methodologies do not produce.
- Business continuity does not cover production system recovery. Annex A.17 must cover all in-scope systems. Production system recovery has different timelines, validation requirements, and vendor dependencies than enterprise IT recovery. Generic IT recovery plans do not address these.
- Supplier security assessment excludes OT vendors. Annex A.15 must address all suppliers who access in-scope systems. OT vendors with remote access to production systems are frequently absent from supplier security assessments despite representing a significant access risk.
- Physical security not applied to OT areas. Annex A.11 applies to all areas containing in-scope systems. Control rooms, engineering workstation areas, and areas containing industrial controllers frequently have inadequate physical security compared to server rooms.
- Incident response does not address production system incidents. A cyber incident affecting SCADA or a production PLC requires different response than a data breach: safety considerations, vendor engagement, and validation before return to service. Standard IT incident procedures do not address these requirements.
Cyber security specialists. Certification programme within 48 hours.