ISO27001/E-ITS Implementation

RaulWalter’s ISO 27001 and E-ITS implementation services are designed to guide organisations toward a systematic, auditable, and business-aligned information security management framework.

Our approach combines the requirements of the international ISO/IEC 27001:2022 standard with the practical application of the Estonian Information Security Standard (E-ITS), covering asset inventories, risk assessments, security policy development, process implementation, management system design, and staff training.

We have supported municipalities, hospitals, government agencies, and private-sector organisations in achieving the agreed maturity level and audit readiness. The result is a functioning Information Security Management System that reduces risks, ensures compliance, and provides a stable foundation for sustainable digital operations.

ISO 27001 and E-ITS implementation is not about producing documents or passing an audit. It is about building a management system that enables informed risk management, accountability, and resilience.

Our role is not to “do it for you”, but to build it with you — in a way that continues to function long after our engagement ends.

Initial Assessment and Scope Definition

Implementation starts with understanding reality. We assess the organisation’s current security posture, define the ISMS scope, and determine which services, processes, systems, and information assets must be covered under ISO/IEC 27001:2022 and E-ITS.

This phase establishes a practical baseline, not a theoretical gap analysis. It ensures the ISMS is sized correctly for the organisation and aligned with actual risk exposure and regulatory obligations.

Our role:

  • define a realistic and defensible ISMS scope

  • interpret ISO 27001 and E-ITS requirements in operational terms

  • prevent over-engineering and unnecessary bureaucracy

Asset Mapping and Risk Assessment

Effective information security starts with knowing what needs to be protected and why. We map information assets, services, systems, and dependencies, and conduct a risk assessment aligned with ISO 27001 and E-ITS methodologies.

Risks are treated as management inputs — not spreadsheet artefacts.

Our role:

  • lead the risk assessment methodology and process

  • distinguish material risks from theoretical ones

  • translate risk results into clear security decisions

ISMS Structure, Policies, and Governance

We design and document the policies, procedures, roles, and governance structures required for a functioning ISMS, based on how the organisation actually operates.

The objective is not documentation volume, but a manageable and auditable system that supports decision-making and accountability.

Our role:

  • develop or restructure ISMS documentation

  • ensure compliance without excessive formalism

  • build a system the organisation can operate independently

Security Controls and Operational Integration

We support the implementation of organisational and technical controls, ensuring they are proportionate and embedded into day-to-day operations, IT management, and business processes.

Information security must function as part of normal management — not as a parallel compliance exercise.

Our role:

  • support control selection and implementation

  • align security measures with operational reality

  • avoid “paper compliance” and checklist-driven security

Training, Audit Readiness, and Sustainability

An ISMS only works if people understand their responsibilities. We train key roles, support internal control and audit readiness, and prepare organisations for ISO 27001 or E-ITS audits without artificial rehearsal or documentation inflation.

Implementation does not end with the audit — it must remain effective afterward.

Our role:

  • train management and responsible roles in context

  • prepare organisations for real audits, not audit theatre

  • establish a foundation for continuous improvement

Be the enabler. Let’s work together.