Skip to content

CONTENTS

WHY ISO/IEC 42001 CERTIFICATION MATTERS
WHAT ISO/IEC 42001 COVERS
ISO 42001 AND THE EU AI ACT
HOW IT WORKS
READY TO START YOUR ISO 42001 JOURNEY?

Why ISO/IEC 42001 Certification Matters

INDEPENDENT VERIFICATION OF AI GOVERNANCE

ISO 42001 certification provides third-party verification that your organisation manages AI systems responsibly. An accredited certification body independently audits your AIMS and awards certification — providing far more credible assurance to clients, partners, and regulators than self-attestation.

REGULATORY PREPARATION — INCLUDING THE EU AI ACT

AI regulation is accelerating globally. The EU AI Act became legally binding in August 2024, with requirements phasing in through 2027 for high-risk AI systems. ISO 42001 implementation supports many of the governance, risk management, documentation, and transparency requirements of the EU AI Act.
However, it is important to understand the relationship accurately: ISO 42001 is not yet formally harmonised under the EU AI Act, meaning certification does not automatically confer presumption of conformity under the Act. Think of ISO 42001 as building the governance foundation — the EU AI Act adds specific legal obligations on top. Organisations operating in the EU should implement ISO 42001 as a foundation and address EU AI Act-specific requirements in parallel.

WHAT ISO/IEC 42001 COVERS

ISO/IEC 42001

is the international standard for an Artificial Intelligence Management System (AIMS). It provides a roadmap for organisations to develop, provide, or use AI systems responsibly and effectively.

ISO 42001 AND THE EU AI ACT

EU AI Act

Sets the mandatory legal requirements, safety standards, and penalties for using AI in the European market

ISO 42001

Provides the global management system (AIMS) that companies use to actually meet those legal requirements.

HOW IT WORKS

1. Discovery Call

We start by understanding your device, your submission timeline, and where you currently stand on cybersecurity documentation. No forms, no discovery questionnaires — just a direct conversation with someone who knows the FDA guidance inside out.

2. Gap Assessment

We map your current position against FDA requirements and produce a clear, prioritised list of what needs to be done. You'll know exactly what's missing and what it will take to fix it.

3. Documentation & Remediation

We get to work. Depending on your needs, this means threat modelling, SBOM development, policy drafting, architecture review, or the full package. We work to your timeline, not ours.

4. Submission Support

We review your final submission documentation, flag any remaining risk, and make sure what goes to the FDA is as strong as it can be. If Q-Sub feedback comes back, we help you respond.

READY TO START YOUR ISO 42001 JOURNEY?

LEGISLATIVE AUTHORITY: SECTION 524B FD&C ACT

If your submission window is approaching, start the conversation now.

FAQ’s

What is the difference between DCC and Cyber Essentials? minus-icon

Conducting a thorough hazard analysis is crucial for ensuring the safety and compliance of medical devices. Hazard analysis identifies potential risks and evaluates their impact on patient safety and device performance. At Periculo, we offer expert hazard analysis services to help you systematically identify, assess, and mitigate risks throughout the product lifecycle. Our approach includes detailed risk assessments, failure mode and effects analysis (FMEA), and the development of robust mitigation strategies. With Periculo’s support, you can ensure that your medical devices meet regulatory standards, enhance patient safety, and maintain high levels of performance and reliability.

Do I need Cyber Essentials Plus for Level 1? plus-icon
What happens if I fail the assessment? plus-icon
How long does a certification last? plus-icon
Would an assessor be able to implement and audit my DCC certification? plus-icon
What happens if I fail the assessment? plus-icon
Does DCC apply to my subcontractors? plus-icon
How does DCC differ from ISO 27001? plus-icon
What is the cost of certification? plus-icon
What is the “Scope” of the certification? plus-icon
How long does the assessment take? plus-icon

Latest Insights

Threat Advisory: Weaponisation of Anthropic's Claude LLM in Targeted Cyberattacks

Threat Advisory: Weaponisation of Anthropic's...

Introduction: The Emergence of AI-Powered Cyber Threats In early 2026, a sophisticated cyber intrusion targeting the Mex...

AI Security Threat Series: Model Inversion

AI Security Threat Series: Model Inversion

Extracting secrets from an AI that was never meant to share them A deployed AI model does not hand over its training dat...

Weekly Round-Up Issue 15

Weekly Round-Up Issue 15

This week's round-up arrives against a backdrop of significant cyber, regulatory and assurance activity affecting health...

MHRA SaMD Classification for Agentic AI: Is Your Agent a Medical Device?

MHRA SaMD Classification for Agentic AI: Is Y...

I have spent the better part of a decade navigating the intersection of cybersecurity and regulated industries, from the...

LiteLLM Supply Chain Attack: The $10 Billion Fallout and What We Now Know

LiteLLM Supply Chain Attack: The $10 Billion ...

In our original post from 27 March, we covered the initial details of the LiteLLM supply chain compromise: the affected ...

AI Security Threat Series: Data Poisoning

AI Security Threat Series: Data Poisoning

Corrupting an AI before it ever goes live Most AI attacks happen at the point of use. Data poisoning happens much earlie...

NHS Clinical Safety and AI Agents: What DCB0129/0160 Actually Requires

NHS Clinical Safety and AI Agents: What DCB01...

I've spent the better part of a decade in cybersecurity, working with digital health organisations and later across the ...

Red Teaming the Microsoft Agent Governance Toolkit: 15 Bypass Vectors

Red Teaming the Microsoft Agent Governance To...

I have spent the better part of a decade in the trenches of cybersecurity, moving from the high-stakes world of NHS digi...