ISO 27001 for SaaS Companies: Evidence Collection Guide

ISO 27001 auditors require evidence for every applicable Annex A control in your Statement of Applicability. This guide shows how SaaS companies can automate ISO 27001 evidence collection to eliminate manual screenshot taking and speed up certification.

April 29, 20265 min read
ISO 27001SaaS ComplianceEvidence AutomationAnnex A ControlsISMS
ISO 27001 for SaaS Companies: Evidence Collection Guide

ISO 27001 certification audits demand concrete evidence for every applicable Annex A control in your ISMS (Information Security Management System). For SaaS companies, proving that controls operate effectively often means spending days taking screenshots of AWS configurations, GitHub pull requests, and Okta access logs. While policy management is straightforward, application-level documentation remains a massive time sink. Automating ISO 27001 evidence collection ensures your controls are consistently verified without the manual overhead. This guide breaks down what auditors expect to see from SaaS companies and how to stop collecting it by hand.

What Evidence Do ISO 27001 Auditors Actually Check for SaaS?

Auditors look for two distinct categories of proof: foundational ISMS records (like your Statement of Applicability and risk treatment plans) and operational Annex A evidence (like access logs, encryption configurations, and change management approvals).

SaaS environments are dynamic. Auditors know this. They aren't just checking if a security policy exists on a company intranet; they want proof that your engineering team actually follows it in production. If your policy says all database changes require peer review, the auditor will select a sample of recent database commits and ask to see the approval logs.

For a standard B2B SaaS application, your evidence burden typically falls into these buckets:

  • Organizational Controls (A.5): Proof of user access reviews, asset inventories, and vendor security assessments.
  • People Controls (A.6): Documentation of background checks, security awareness training, and HR offboarding checklists.
  • Technological Controls (A.8): Logs showing secure coding practices, cryptography configurations, network security settings, and data masking.

Honestly, most teams overthink the formatting. Auditors don't need a beautifully designed PDF. They need a clear timestamp, the system context, and the actual setting. A raw database query result or a terminal output with a visible system clock is often better than a heavily cropped UI snippet.

How Do You Document ISO 27001 Annex A Controls?

SaaS companies document Annex A controls by capturing point-in-time system configurations and historical workflow data, usually through infrastructure APIs or visual captures of internal tools.

The exact evidence depends on the control. Here is how SaaS teams typically document the most heavily scrutinized technical requirements:

A.5.15 (Access Control) You need to prove that access to source code, production databases, and customer data is restricted. Evidence usually consists of Identity Provider (IdP) group configurations, role-based access control (RBAC) matrices, and logs showing that access was revoked within your SLA when an employee departed.

A.8.9 (Configuration Management) Auditors want to see how you manage changes to your cloud infrastructure. For SaaS companies using Infrastructure as Code (IaC), evidence is relatively easy to pull. You provide the Terraform or CloudFormation scripts, alongside the GitHub branch protection rules that enforce peer reviews before merging to main.

A.8.24 (Use of Cryptography) You must prove data is encrypted at rest and in transit. Standard evidence includes AWS RDS configuration screens showing KMS key usage, S3 bucket policy outputs enforcing TLS, and load balancer settings confirming the deprecation of outdated cipher suites.

What ISO 27001 Evidence Cannot Be Automated with Traditional GRC Tools?

Traditional GRC platforms rely exclusively on APIs to monitor infrastructure, which means they cannot automate evidence collection for application-level controls, custom internal admin panels, or proprietary workflows.

Platforms like Drata and Vanta are highly effective at checking boolean states in major cloud providers. They can ping AWS to confirm an S3 bucket is private. They can check GitHub to see if MFA is required for the organization.

But an ISO 27001 audit goes deeper than standard cloud configurations. The limitations of API-only tools become obvious when auditors ask for:

  • Internal Admin Tools: If your customer support team uses a custom-built backoffice panel to manage user accounts, no GRC tool has an API integration for it. You will have to manually capture the RBAC settings and login flows.
  • Complex Change Management: When a hotfix is deployed at 2 AM, the approval might happen in a Slack thread rather than a formalized Jira ticket. GRC tools will flag this as a missing control, requiring you to manually hunt down the conversation and link it to the deployment.
  • Visual-Only Settings: Some legacy third-party vendors do not expose their security configurations via API. The only way to prove you enforce strong passwords on that specific tool is to log in and take a picture of the settings page.

This creates a scenario where a SaaS company buys an automation platform but still spends dozens of hours per audit cycle manually gathering the remaining evidence to satisfy the auditor.

How to Automate the Rest of Your ISMS Documentation

You can automate the remaining ISO 27001 evidence by deploying AI agents that navigate application interfaces, capture visual proof of configurations, and map those captures directly to your Annex A controls.

Instead of writing scripts or manually logging into custom portals, modern compliance operations platforms use infrastructure-aware agents. Screenata, for example, connects to your existing stack—GitHub, AWS, Okta—and scans how you actually operate.

When it's time to collect evidence for A.5.15 (Access Control) on a proprietary system, the platform can automatically capture the necessary visual evidence, validate that it matches your written policy, and package it for the auditor.

Every piece of evidence is cryptographically signed with RSA/ECDSA and timestamped using RFC 3161. This creates an unbroken chain of custody. When the auditor reviews the package, they aren't just taking your word that a screenshot is recent and unaltered; the cryptographic proof is embedded in the file itself. This preserves auditor independence while removing the manual collection burden from your engineering team.

Learn More About ISO 27001 Evidence Automation

For a complete breakdown of how to eliminate manual screenshots and build an audit-ready ISMS, see our guide on how to automate ISO 27001 evidence collection, including specific strategies for mapping Annex A controls to your existing SaaS infrastructure.

Ready to Automate Your Compliance?

See what your compliance program looks like with your real systems.