Inventory and mapping
The standard is decomposed into candidate controls and obligations, but the result is still mainly a semantic map. This is where frameworks stop being slogans and become a machine-readable backlog.
The right question is not "can OpenCompliance certify ISO 27001?" The right question is: how far can a scoped corridor move from loose evidence collection toward a proof-carrying certification-readiness package, and where do accredited certification bodies, CPA firms, and human judgment still remain essential? This page answers that boundary directly.
The standard is decomposed into candidate controls and obligations, but the result is still mainly a semantic map. This is where frameworks stop being slogans and become a machine-readable backlog.
The mapped obligations now have typed evidence contracts, clear scope boundaries, and route labels such as decidable, attestation, or judgment. This is where a company can start producing a real readiness package.
The decidable slice is Lean-backed, the verifier produces a trust-surface report, and the result is replayable. This is the strongest current OpenCompliance state for narrow technical corridors.
A scoped package exists for external review: mappings, typed evidence, proofs where possible, attestations where necessary, judgment markers where unavoidable, and a tamper-evident replay bundle. This can materially improve audit and certification preparation.
This is still external. Certification bodies, accreditation schemes, CPA firms, and regulators keep their role. OpenCompliance can improve the evidence substrate, but it does not become the institution that issues the certificate or opinion.
The current ISO 27001 bridge is strong, but it is not a certification replacement. Publicly, OpenCompliance currently exposes 85 mapped controls, 22 Lean-backed controls, and 71 blocked exact-anchor items pending licensed review. That puts the whole-framework story between stages 2 and 3, not at stage 5.
The current SOC 2 bridge sits in the same general place: strong overlap mapping and narrow proof-carrying corridors, but still short of a CPA examination and opinion. Public exact-anchor publication is blocker-aware for 50 promoted controls pending licensed review.
Cyber-baseline, issued, and parts of the medium corridor already show the useful state: typed evidence, exact proof-versus-attestation boundaries, replayable bundles, and a trust-surface report that says exactly what the outcome rests on.
The current hard blockers are licensed exact-anchor review for proprietary standards, live organisation evidence and connectors instead of synthetic-only corridors, real signer and witness identities, and external reviewer rounds with practitioners and assurance specialists.
"We can produce an OpenCompliance certification-readiness package for a scoped ISO 27001 or SOC 2 corridor, showing what is proved, what is attested, what remains judgment-dependent, and how the result can be replayed."
"OpenCompliance proved ISO 27001" or "OpenCompliance replaces a certification body, CPA firm, or regulator." The system can strengthen preparation and evidence quality; it does not erase the external institution.
External reviewers still decide whether the scope is appropriate, whether the ISMS or control environment is adequate, and whether the corridor evidence is enough for the claim being made.
Certification and assurance work often includes interviews, sampling, physical controls, governance review, and adequacy judgments that remain outside the current proof corridor.
The formal certificate, report, or opinion remains attached to an institution operating inside an accreditation or assurance regime. OpenCompliance does not become that institution by publishing better artifacts.
The real value of the package is that outside reviewers can inspect, replay, question, and disagree with it more precisely than they can with a static PDF bundle or a green dashboard tile.
Work through the blocked ISO 27001 and SOC 2 controls with the prepared private review packets so the public-control layer can become more exact without bluffing.
Move beyond synthetic-only corridors by connecting real system exports, real attestation flows, and real scope boundaries for at least one organisation-grade package.
Replace synthetic trust roots with real release identities, witness identities, and publication roots so the trust surface is not only structurally sound but institutionally meaningful.
Subject the corridor and mapping program to ISO 27001 practitioners, SOC 2 assurance reviewers, OSCAL specialists, and formal-methods reviewers before calling it a reference-quality package.