Skip to content

CONTENTS

WHY ISO/IEC 42001 CERTIFICATION MATTERS
WHAT ISO/IEC 42001 COVERS
ISO 42001 AND THE EU AI ACT
HOW IT WORKS
READY TO START YOUR ISO 42001 JOURNEY?

Why ISO/IEC 42001 Certification Matters

INDEPENDENT VERIFICATION OF AI GOVERNANCE

ISO 42001 certification provides third-party verification that your organisation manages AI systems responsibly. An accredited certification body independently audits your AIMS and awards certification — providing far more credible assurance to clients, partners, and regulators than self-attestation.

REGULATORY PREPARATION — INCLUDING THE EU AI ACT

AI regulation is accelerating globally. The EU AI Act became legally binding in August 2024, with requirements phasing in through 2027 for high-risk AI systems. ISO 42001 implementation supports many of the governance, risk management, documentation, and transparency requirements of the EU AI Act.
However, it is important to understand the relationship accurately: ISO 42001 is not yet formally harmonised under the EU AI Act, meaning certification does not automatically confer presumption of conformity under the Act. Think of ISO 42001 as building the governance foundation — the EU AI Act adds specific legal obligations on top. Organisations operating in the EU should implement ISO 42001 as a foundation and address EU AI Act-specific requirements in parallel.

WHAT ISO/IEC 42001 COVERS

ISO/IEC 42001

is the international standard for an Artificial Intelligence Management System (AIMS). It provides a roadmap for organisations to develop, provide, or use AI systems responsibly and effectively.

ISO 42001 AND THE EU AI ACT

EU AI Act

Sets the mandatory legal requirements, safety standards, and penalties for using AI in the European market

ISO 42001

Provides the global management system (AIMS) that companies use to actually meet those legal requirements.

HOW IT WORKS

1. Discovery Call

We start by understanding your device, your submission timeline, and where you currently stand on cybersecurity documentation. No forms, no discovery questionnaires — just a direct conversation with someone who knows the FDA guidance inside out.

2. Gap Assessment

We map your current position against FDA requirements and produce a clear, prioritised list of what needs to be done. You'll know exactly what's missing and what it will take to fix it.

3. Documentation & Remediation

We get to work. Depending on your needs, this means threat modelling, SBOM development, policy drafting, architecture review, or the full package. We work to your timeline, not ours.

4. Submission Support

We review your final submission documentation, flag any remaining risk, and make sure what goes to the FDA is as strong as it can be. If Q-Sub feedback comes back, we help you respond.

READY TO START YOUR ISO 42001 JOURNEY?

LEGISLATIVE AUTHORITY: SECTION 524B FD&C ACT

If your submission window is approaching, start the conversation now.

FAQ’s

What is the difference between DCC and Cyber Essentials? minus-icon

Conducting a thorough hazard analysis is crucial for ensuring the safety and compliance of medical devices. Hazard analysis identifies potential risks and evaluates their impact on patient safety and device performance. At Periculo, we offer expert hazard analysis services to help you systematically identify, assess, and mitigate risks throughout the product lifecycle. Our approach includes detailed risk assessments, failure mode and effects analysis (FMEA), and the development of robust mitigation strategies. With Periculo’s support, you can ensure that your medical devices meet regulatory standards, enhance patient safety, and maintain high levels of performance and reliability.

Do I need Cyber Essentials Plus for Level 1? plus-icon
What happens if I fail the assessment? plus-icon
How long does a certification last? plus-icon
Would an assessor be able to implement and audit my DCC certification? plus-icon
What happens if I fail the assessment? plus-icon
Does DCC apply to my subcontractors? plus-icon
How does DCC differ from ISO 27001? plus-icon
What is the cost of certification? plus-icon
What is the “Scope” of the certification? plus-icon
How long does the assessment take? plus-icon

Latest Insights

Anatomy of a Satellite Hack — Deconstructing the Viasat Incident Through SPARTA

Anatomy of a Satellite Hack — Deconstructing ...

On 24 February 2022, at the exact moment Russian forces crossed into Ukraine, a cyberattack took down tens of thousands ...

Claude Code Source Code Leak

Claude Code Source Code Leak

Claude Code Source Code Leak Was Not a Targeted Cyberattack On the 31 March 2026, Anthropic, maker of the Claude AI, acc...

From Ground to Orbit: The Threat of Rogue Ground Stations and RF Attacks

From Ground to Orbit: The Threat of Rogue Gro...

Every spacecraft communicates with the ground via radio frequency links, TT&C (Telemetry, Tracking, and Command) upl...

Why Space is the Ultimate Cyber-Physical Attack Surface

Why Space is the Ultimate Cyber-Physical Atta...

The Space ISAC reported a 118% surge in space-related cyber incidents in 2025. Space is no longer a benign environment; ...

FortiGate Exploits Put Enterprise Networks at Risk

FortiGate Exploits Put Enterprise Networks at...

In recent months, cybersecurity teams worldwide have observed a significant rise in targeted attacks exploiting vulnerab...

AI-Driven Cyberattacks Target Government Agencies: Key Threats

AI-Driven Cyberattacks Target Government Agen...

In a pivotal development within cybersecurity, recent AI-powered cyberattacks targeting multiple Mexican government agen...

LiteLLM Supply Chain Attack: What Security Leaders Need to Know

LiteLLM Supply Chain Attack: What Security Le...

On 24 March 2026, LiteLLM — one of the most widely used open-source libraries for integrating large language models into...

AI-Assisted Slopoly Malware Elevates Ransomware Threats

AI-Assisted Slopoly Malware Elevates Ransomwa...

The New Face of Ransomware Persistence The cybersecurity landscape is undergoing a significant transformation as artific...