“How long will this take?” is the first question every organisation asks when they decide to build a security program. The honest answer is that it depends on what you mean by “security program” — and that phrase covers everything from a basic set of policies to a fully operational governance framework with continuous monitoring, tested incident response, and third-party audit evidence.
Here’s what the timeline actually looks like at each level, based on what we see across organisations building programs from scratch.
Level 1: Minimum Viable Documentation (1–2 Weeks)
This is the foundation. The set of documents that answers the most common questions from customers, auditors, and insurers. It doesn’t mean your security program is mature — it means you have a documented starting point that reflects your actual organisation.
What you’re building:
An information security policy. An acceptable use policy. An access control policy. A basic incident response plan. A risk register with your top risks identified and scored. A data classification scheme. A vendor management policy.
What this gets you:
You can respond to most vendor security assessments. You have enough documentation to satisfy the initial requirements of cyber insurance applications. You can demonstrate to customers that you have a structured approach to security, even if it’s early-stage.
Timeline reality:
If you’re using proven templates and customising them to your organisation, an experienced person can produce this set in 1–2 weeks of focused work. If you’re building from scratch with no templates, multiply that by three or four. If you’re engaging a service to do it for you, expect 1–2 weeks from the point you provide your organisational details.
The common mistake at this stage is spending months trying to make everything perfect before producing anything. A complete, honest, organisation-specific set of core documents is infinitely more valuable than a perfect information security policy with nothing else behind it.
Level 2: Framework-Aligned Program (1–3 Months)
This is where you move from “we have policies” to “we have a program aligned to a recognised framework.” The framework gives you structure, completeness, and credibility with assessors who know what to look for.
What you’re building on top of Level 1:
A complete policy suite covering all domains required by your chosen framework. Standards that define technical requirements for areas like system hardening, logging, encryption, and network security. Procedures for operational processes like vulnerability management, change management, access reviews, and incident handling. A comprehensive risk assessment methodology with documented risk treatment plans. A control matrix mapping your controls to framework requirements. Evidence collection processes to demonstrate that controls are operating.
What this gets you:
You can credibly claim alignment to a recognised standard. You have the documentation foundation for a formal certification or audit if you choose to pursue one. Your security program has the structure to be maintained and improved systematically rather than reactively.
Timeline reality:
For a focused team (even one person with the right tools), expect 4–8 weeks to produce the documentation and another 2–4 weeks to review, refine, and socialise it within the organisation. The documentation is the faster part. Getting organisational buy-in, assigning roles, and establishing the review cadence takes longer.
If you’re targeting a specific certification (ISO 27001, SOC 2, CMMC Level 2), add time for gap assessment, control implementation, and evidence gathering. The documentation tells you what to do — implementing it is a separate workstream.
Level 3: Operational Maturity (6–12 Months)
This is the point where your security program stops being a set of documents and becomes an operating system for how your organisation manages risk. The policies exist, people follow them, evidence is generated, and you can demonstrate it.
What you’re building on top of Level 2:
Tested incident response capabilities — not just a plan, but a team that has rehearsed it. A functioning risk management cycle where risks are reviewed quarterly and treatment actions are tracked to completion. Security awareness training that’s delivered, measured, and improved based on results. Vulnerability management with defined SLAs and demonstrated remediation rates. Access reviews that actually happen on schedule with evidence. Vendor security assessments integrated into your procurement process.
What this gets you:
Audit readiness. The ability to pass a SOC 2 Type II, achieve ISO 27001 certification, or demonstrate CMMC compliance with evidence. Genuine risk reduction, not just documentation. A program that senior management can report on with metrics and trends.
Timeline reality:
Six to twelve months from starting Level 2, assuming consistent effort. This isn’t six months of full-time work — it’s six months of operating the program: running the processes, collecting the evidence, conducting the reviews, and handling the incidents that occur along the way. The documentation created in Level 2 defines the target. Level 3 is the operating history that proves you’re hitting it.
What Slows Things Down
Trying to do everything at once. Organisations that try to implement a 130-document framework in one pass get overwhelmed and stall. Start with the core, operate it, then expand.
Waiting for perfection. A policy that’s 85% right and published is more valuable than a policy that’s 100% right and sitting in someone’s drafts folder for six months.
No clear ownership. Security programs without a named owner — someone who is accountable for maintaining the documentation, driving the review cycle, and reporting to leadership — drift and decay.
Building in isolation. Documentation created by one person without input from the people who operate the systems it describes tends to be disconnected from reality. The best programs are built collaboratively, even if one person does most of the writing.
The Honest Answer
A credible, documented security program foundation can be built in 1–2 weeks. A framework-aligned program takes 1–3 months of focused effort. Operational maturity takes 6–12 months of actually running the program.
The documentation is the fastest part. The hard part is the organisational commitment to operate it consistently. But you can’t operate what doesn’t exist — so the documentation comes first, and it comes faster than most people expect.
Information Security Policy Suite
Desktop ISMS application with 100 documents, 93-control compliance assessment, policy acknowledgment tracking, questionnaire response generator, traceability matrix, board reporting, and 6 AI providers. The complete information security management system in one installed application.
Implementation Services
Need this customised to your organisation?
We'll customise any product to your organisation and deliver in 1–2 weeks. Fixed price, fully async. You review it, your team runs it.
Foundation $1,997 · Toolkit $2,997 · Suite $5,997 · Program $8,997
Get compliance insights and product updates
Product launches only · No spam · Unsubscribe anytime