ISO 27001 for Law Firms: What You Need to Know

Law firms hold some of the most sensitive data imaginable. This guide explains how ISO 27001 applies to legal practices, what clients expect, and how to get certified.

Law firms occupy a uniquely sensitive position in the information security landscape. You hold client matter files, commercially sensitive documents, personal data, financial information, and in some cases material covered by legal professional privilege — all of which are of significant value to cybercriminals, competitors, and hostile state actors.

The legal sector has also seen some high-profile breaches in recent years. Clients — particularly corporate and institutional clients — are increasingly asking their legal advisers to demonstrate that they take data security seriously. ISO 27001 is the most credible way to do that.

More often than not, my clients are tech companies or startups, but I thought I’d approach the subject of ISO 27001 for law firms, so here are my thoughts.


Why Law Firms Are Increasingly Pursuing ISO 27001

Corporate and institutional clients are asking for it

Large corporate clients — financial institutions, listed companies, government bodies — are applying the same supply chain security scrutiny to their law firms that they apply to any other supplier. Tender processes for legal panels increasingly include information security requirements, and ISO 27001 certification is emerging as a common specification.

If your firm wants to win or retain work from enterprise and institutional clients, this is becoming unavoidable.

The SRA expects it

The Solicitors Regulation Authority’s Code of Conduct requires that firms have appropriate systems and controls in place to protect client data. The SRA Cyber Security Thematic Review (2018) found significant weaknesses across the sector and has since increased its focus on cyber security in supervision.

ISO 27001 doesn’t satisfy the SRA’s requirements by itself — but it’s strong evidence that you’re taking a structured, risk-based approach to information security, which is exactly what the SRA is looking for.

Cyber insurance requirements are tightening

Insurers offering professional indemnity and cyber liability cover to law firms are asking harder questions. Firms with documented security controls and certification evidence are in a stronger position when it comes to coverage and premiums.

The threat is real

Law firms are disproportionately targeted by cybercriminals. The reasons are obvious: you hold large volumes of sensitive, high-value information; you regularly transfer significant sums of money on behalf of clients; and your clients often include wealthy individuals and major corporations.

Ransomware attacks on UK law firms have increased significantly in recent years. The question is not whether you’ll face a cyber threat — it’s whether you’ll be prepared when you do.


How ISO 27001 Applies to a Law Firm

The good news is that law firms are generally well-suited to ISO 27001. You already have strong cultures of confidentiality, client privilege, and professional responsibility. Many of the values that underpin good information security — discretion, careful handling of sensitive information, clear accountability — are already embedded in how solicitors work.

What ISO 27001 adds is structure, documentation, and evidence.

Scope

Most law firms scope their ISMS to cover the whole practice — all fee-earners, all support staff, all systems used to handle client data. If you have multiple offices, they should typically all be in scope.

If you have a large firm with distinct practice areas or business units, you might scope a single department or service line for initial certification — but this is less common and can create awkward boundary questions.

Key risk areas for law firms

When you conduct your ISO 27001 risk assessment, these are the risk areas most relevant to legal practice:

ISO 27001 Key Risk Areas for Law Firms

ISO 27001 Risk Areas for Law Firms

Key areas to address in your risk assessment — with the specific threats relevant to legal practice

🔒
Client Portals & Matter Management

Your case management system holds every active and archived matter. Access control is critical: who can see which matters, how are permissions set when fee-earners move teams, and what happens when staff leave?

Key risk Unauthorised access to client matters — through shared credentials, lingering access for leavers, or over-provisioned user accounts
👥
Third Parties & Counsel

Matter information routinely flows to barristers, expert witnesses, costs lawyers, and specialist suppliers. Each is a potential weak link in the chain. Few firms have a structured process for assessing their security.

Key risk Confidential data leaving the firm’s control via an unvetted third party with inadequate security — and no contractual obligation to protect it
💻
Remote Working

Lawyers work from home, client offices, courts, and hotels. This creates ongoing risks around unencrypted devices, use of personal equipment, and connecting to untrusted public Wi-Fi networks.

Key risk Client data exposed via a lost or unencrypted device, or intercepted over an unsecured network — with no visibility or ability to wipe remotely
📄
Document Management

Law firms hold both physical and digital documents containing highly sensitive information. Retention periods, secure disposal, and controlling who has access to archived matters all require clear, documented procedures.

Key risk Privileged documents retained beyond their retention period, inadequately disposed of, or accessible to staff who have no business need to see them
💸
Payment Processing

Solicitors routinely transfer large sums of client money — particularly in conveyancing and corporate transactions. This makes payment instructions a high-value target for fraud, requiring specific verification controls beyond standard email procedures.

Key risk Fraudulent bank account substitution — a criminal intercepts email and changes payment details, resulting in significant client money being transferred to a fraudulent account
These risk areas should feed directly into your ISO 27001 risk assessment and risk register. Each area needs documented controls and an assigned owner.

Annex A controls particularly relevant to law firms

Key ISO 27001 Annex A Controls for Law Firms

Key ISO 27001 Annex A Controls for Law Firms

Six controls from ISO 27001:2022 Annex A that are particularly relevant to legal practice

Control
What it requires
Why it matters for law firms
5.14 Information transfer
What it requires
Documented rules for how information is transferred electronically — including encryption requirements for email attachments and secure communication channels.
Why it matters for law firms
Client matter files, privileged correspondence, and financial instructions are shared by email constantly. Policies need to specify when encryption is required and what secure alternatives (client portals, secure messaging) are available.
5.19–22 Supplier management
What it requires
A structured process for identifying, assessing, and monitoring the information security practices of third parties who access, process, or receive your information assets.
Why it matters for law firms
Barristers, expert witnesses, costs consultants, and specialist suppliers regularly receive sensitive matter information. Most firms have no formal process for assessing their security — this control requires one.
6.1 Screening
What it requires
Background verification checks on all individuals before employment or assignment — commensurate with the sensitivity of information they will access and applicable laws.
Why it matters for law firms
Fee-earners and support staff access highly sensitive client matter information from day one. Documented pre-employment screening — including reference checks and, where appropriate, DBS checks — is both an ISO 27001 requirement and good practice.
6.5 Responsibilities after termination
What it requires
Clear procedures for revoking access, returning assets, and enforcing confidentiality obligations when employment or engagement ends — and for communicating these obligations to the departing individual.
Why it matters for law firms
Departing fee-earners may take client relationships and — if access is not removed promptly — potentially client data. A joiners/movers/leavers process with same-day account deactivation on departure is essential.
8.5 Secure authentication
What it requires
Secure authentication controls for all systems, including multi-factor authentication (MFA) where technically feasible, and management of authentication credentials.
Why it matters for law firms
MFA across all systems — email, matter management, remote access, cloud services — is the single most effective control against credential-based attacks. Phishing that steals a password is neutralised if MFA is in place.
8.12 Data leakage prevention
What it requires
Technical and procedural measures to detect and prevent unauthorised disclosure of sensitive information — via email, removable media, cloud storage, or other egress channels.
Why it matters for law firms
Client confidentiality is a fundamental professional obligation. Controls preventing client data from leaving via personal email accounts, USB drives, or unsanctioned cloud storage protect both security and your professional regulatory standing.
These controls should be addressed in your Statement of Applicability (SoA). For each control, document whether it applies, how it is implemented, and the justification for inclusion or exclusion.

GDPR and the Legal Sector

Law firms are data controllers under GDPR. As well as client personal data, you hold employee data and supplier data. ISO 27001 and GDPR are complementary — implementing ISO 27001 addresses most of the “appropriate technical and organisational measures” that GDPR Article 32 requires.

The two areas where you’ll need to go beyond ISO 27001 for GDPR purposes are:

  • Lawful basis for processing — documenting why you process each category of personal data
  • Data subject rights — procedures for handling subject access requests, right to erasure, etc.

Read the guide to implementing ISO 27001 and GDPR together.


What Does Implementation Look Like for a Law Firm?

For a firm of, say, 20–50 people:

Core documentation: Information security policy, acceptable use policy, access control policy, clear desk policy, incident response procedure, remote working policy, data retention policy, supplier security policy — all standard ISO 27001 documents with legal-sector specifics (e.g. references to client privilege, SRA requirements, matter confidentiality).

Risk assessment: A risk register covering the main threat scenarios relevant to legal practice — phishing, BEC, ransomware, data leakage, physical document handling, third-party supplier risks.

Controls: MFA across all systems, encrypted devices, secure client communication procedures, documented joiners/movers/leavers process, supplier review process for key third parties.

Training: Annual information security awareness training for all staff — fee-earners and support staff alike. Given that phishing and social engineering are the most common attack vectors, training that focuses on real-world scenarios is most effective.

Timeline: A typical 20–50 person law firm with reasonable existing security hygiene can reach certification in four to six months.


Getting Started

The ISO 27001 toolkit gives you all the document templates you need, ready to adapt for a legal practice context. Or if you’d prefer a guided programme with a fixed certification date, the consultancy programme may be the right fit.

For a broader overview of what ISO 27001 involves, start with the ISO 27001 basics guide.


Get Started

Free Templates

Free

The 14 mandatory documents. The starting point for any ISO 27001 project.

A great way to get started without the commitment.

Get the free toolkit →

Templates

Full Toolkit

£85

130+ documents; policies, risk register, audit pack, staff communications and everything else you need to build a working ISMS.

Buy now →

Do-It-Yourself

DIY Course

£285

The Do-It-Yourself course introduces the standard, its requirements, and then shows you how to implement it, stage by stage.

Includes the full toolkit & email consultancy.

View the course →

More support?

Coaching

~£3,500

I can guide you through the standard and help you tailor it to your business through a series of coaching workshops.

Includes the full toolkit, personal consultancy, and first-pass guarantee.

Explore coaching →
Photo of author

Written by

Alan Parker

Alan Parker is an ISO 27001 consultant who has helped dozens of UK small businesses achieve certification — often without a dedicated security team or a large budget. With over 30 years in IT governance and qualifications including ITIL v3 Expert, ITIL v4 Bridge, and PRINCE2 Practitioner, Alan writes in plain English for busy teams who need to get things done. Named IT Project Expert of the Year (2024, UK).