ISMS Audit v3
ISMS Audit v3
ISMS Audit v3
Contents
1. Introduction 5
2. Scope and purpose of this guideline 5
3. References 5
4. Terms and definitions 6
5. Principles of auditing 7
6. Audit management 8
6.1 Managing the ISMS audit programme 8
6.2 Managing an ISMS audit 8
7. The audit process 9
7.1 Scoping and pre-audit survey 9
7.2 Audit planning and preparation 10
7.3 Audit fieldwork 10
7.4 Audit analysis 11
7.5 Audit reporting 11
7.6 Audit closure 13
8. Competence and evaluation of auditors 13
8.1 Auditor competence 13
8.2 Demonstration of auditor competence 14
9. Document control 15
9.1 Authors 15
9.2 History 15
9.3 Feedback 15
9.4 Copyright 15
1. Introduction
This Information Security Management System auditing guideline is maintained by members of the ISO27k
Forum at ISO27001security.com, an international community of practitioners who are actively using the
ISO/IEC 27000-family of ISMS standards known colloquially as "ISO27k".
We wrote this initially in 2008 to contribute to the development of ISO/IEC 27007 by providing what we, as
experienced ISMS implementers and IT/ISMS auditors, believed to be worthwhile content. A secondary
aim was to provide a pragmatic and useful guideline for those involved in auditing ISMSs.
Since then, ISO/IEC 27007 has been published. Other ISO27k standards have been revised as well, so the
guideline was thoroughly updated in 2017.
The main body of this guideline concerns the purpose and process of auditing. Appendix A is a checklist (a
generic set of audit tests) for auditing the information security controls being managed by the ISMS.
Appendix B is a checklist for auditing the management system itself.
3. References
Please refer to:
ISO/IEC 27000:2016 Information technology — Security techniques — Information security
management systems - Overview and vocabulary. This free standard provides an overview of ISO27k
and formally defines many specialist terms used in the standards.
ISO/IEC 27001:2013 Information technology — Security techniques — Information security
management system requirements. This is the formal specification for an ISMS against which
organizations may be certified compliant. Section 6 introduces the need for ‘Internal ISMS audits’ and
briefly sets the main requirements for audit procedures. Section 7 also identifies the need for periodic
(at least annual) management reviews of the ISMS. Other than the controls listed in Annex A, these
are mandatory requirements for certified organizations. Even if the organization implements an
alternative control set, the chosen controls must be checked against those listed in Annex A for
relevance and completeness.
ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information
security controls. Expands substantially on ISO/IEC 27001 Annex A.
5. Principles of auditing
ISO 19011 section 4 covers the principles of auditing in general, Independence is as much about
including important generic audit principles e.g. independent the auditor’s state of mind as
evaluation against agreed criteria, plus more specific principles reporting relationships: objective,
aimed at management systems audits. In all matters related to rational, critical thinking enables
the audit, the auditor should be independent in both attitude and the auditor to notice things that
appearance. The audit function or team should be independent others miss or ignore.
of the area or activity being reviewed to permit objective
completion of the audit assignment.
6. Audit management
The output of this phase is a completed ISMS audit report, signed, dated and distributed according to the
terms of the audit engagement letter.
9. Document control
9.1 Authors
The following members of the ISO27k Forum updated this guideline in 2017: Bhushan Kaluvakolan; Richard
Regalado; Gary Hinson and Pratibha Agrawal.
The following people contributed to the original 2012 version of the guideline: Alchap; Javier Cao
Avellaneda; Anton Aylward; Pritam Bankar; Jesus Benitez; Lee Evans; Gary Hinson; Khawaja Faisal Javed;
Lakshminarayanan; ; Rocky Lam; Prasad Pendse; Renato Aquilino Pujol; Bala Ramanan; Marappan Ramiah;
Copyright © ISO27k Forum, 2017 14 | P a g e
ISO27k Toolkit ISMS auditing guideline v2
Richard Regalado; Mninikhaya Qwabaza (Khaya); Kim Sassaman; Mooney Sherman; John South; Jasmina
Trajkovski; Rob Whitcher and others.
9.2 History
March 2008 – First release of the guideline submitted to the ISO/IEC JTC1/SC27 committee via Standards
New Zealand, and published as part of the free ISO27k Toolkit.
July-August 2017 - Entire document updated, first by a collaborative team effort using Google Docs and
then finalized in MS Word, and republished in the ISO27k Toolkit.
9.3 Feedback
Comments, queries and (especially!) improvement suggestions are welcome either via the ISO27k Forum
or direct to Gary Hinson ([email protected]).
9.4 Copyright
This guideline is copyright © 2017, ISO27k Forum, some rights reserved. It is licensed under
the Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. You are welcome
to reproduce, circulate, use and create derivative works from this provided that (a) it is not
sold or incorporated into a commercial product, (b) it is properly attributed to the ISO27k Forum at
www.ISO27001security.com, (c) if shared, derivative works are shared under the same terms as this.
Introduction
The following checklist of audit tests is generic. It reflects and refers primarily to ISO/IEC 27002's advice on
information security controls without regard to any specific control requirements that an individual
organization might have in relation to its information risks identified through the risk assessment and risk
management processes.
This is generic guidance to help review the organization's We have deliberately modified,
security controls, primarily against the recommendations in extended or elaborated on the
ISO/IEC 27001 Annex A, ISO/IEC 27002 and other ISO27k advice in ISO/IEC 27002 in various
standards. It cannot provide specific guidance on the particular areas, based on our professional
risks and controls applicable to every situation and must work and audit experience with
therefore be customized and interpreted by experienced IT ISMSs in various organizations and
auditors according to the context. For example, the industries that take information
organization's risk analysis may have determined that certain security seriously (e.g. we have
control objectives from the standards are not applicable and incorporated audit tests on
hence the corresponding controls may not be required, whereas business continuity). This is not a
in other areas the control objectives may be more rigorous than simple compliance audit checklist.
suggested in the standard and additional controls may be
required. The Risk Treatment Plan and Statement of Applicability should provide further details on this.
The audit tests noted below are intended as prompts or reminders of the main aspects that competent,
qualified and experienced IT auditors would typically check. They do not cover every single aspect of
information risk, security and related areas. They are not meant to be asked verbatim or checked-off
piecemeal. They are not suitable for use by inexperienced auditors working without supervision.
The checklist is not intended to be used without due consideration and modification. ISMS auditors
normally generate custom checklists reflecting the specific scope and scale of the particular ISMS being
audited, taking into account any information security requirements that are already evident at this stage
(such as information-security relevant laws, regulations and standards that are known to apply to similar
organizations in the industry). Also, the audit checklist may be modified during the course of the audit if
previously underappreciated areas of concern come to light. Finally, the checklist should reflect the
auditors’ normal working practices, for example columns for audit notes, references to audit evidence on
file, SWOT/PEST analyses of the findings etc.
Since completed ISMS audit checklists, files, notes and evidence contain sensitive information
concerning the organization’s information risk and security arrangements, they must be adequately
secured to ensure their confidentiality and integrity.
A.10. Cryptography
A.11.2 Equipment
A.11.2.1 Equipment siting and protection: is ICT and related equipment located in adequately protected
areas? Are computer screens, printers and keyboards sited or protected to prevent unauthorised viewing?
Check the controls to minimize the risk of physical and environmental threats such as:
Water/flooding: facilities appropriately sited to minimize flood potential (e.g. above water table, not
adjacent to water tanks, no water pipes overhead etc.). Where appropriate, additional/secondary
protection installed and maintenance performed e.g. waterproof membranes, drip trays under air
conditioning units, under-floor water detection with remote alarms and incident procedures, regular
surveys or inspections of roofs, under-floor voids etc. for signs of water leakage/penetration;
Fire and smoke: non-flammable facilities and fittings, fire alarms, low-smoke cabling etc.
Temperature, humidity and power: see A.11.2.2
Dust: equipment and air conditioner filters maintained (checked, cleaned, replaced) regularly. ICT
facilities kept clean e.g. using specialist “deep cleaning" including floor and ceiling voids, low dust wall
covering, under-floor sealed, dust covers/membranes etc. [Note: cleaners in sensitive areas such as
computer rooms should normally be accompanied/supervised, unless cleaning is only done by
competent, trustworthy staff. Cleaners may need to be security-cleared and proactively monitored if
the organization handles government classified or other highly sensitive/valuable information.]
Lightning, static electricity and safety: confirm that all exposed metalwork is earth bonded to a
common safety earth point in accordance with electrical regulations. Confirm the use of mounted
lightning conductors, cable isolators, fuses etc. where applicable. Are these controls tested
periodically and following major changes?
A.17.2 Redundancies
A.17.2.1 Availability of information processing facilities: check how the availability requirements for ICT
services are identified and satisfied. Verify resilience, capacity and performance arrangements, including
monitoring and adjustments (e.g. dynamic load balancing). Examine incident records for clues about
unreliable services, equipment, facilities, servers, apps, links, functions, organizations etc. Check that key
information security controls are implemented and functional at disaster recovery/fall-back sites. If
controls at DR/fall-back sites are less strict than those at primary sites, are the additional risks being
treated appropriately (e.g. compensating controls such as increased oversight, and risk acceptance for the
limited period of DR invocation)?
A.18. Compliance
Introduction
The following ISMS management system audit checklist comprises This audit checklist is NOT
a generic set of audit tests. It is structured in line with and intended for certification audits.
reflects ISO/IEC 27001's requirements for all ISMSs without Certification auditors are required
regard to any specific requirements that an individual to follow their formally-
organization might have (for example legal, regulatory and documented and accredited audit
contractual obligations concerning particular information risk and processes, using their own audit
security processes, activities or controls). checklists and audit tests
Whereas ISMS certification audits are narrowly focused on the concerning the extent to which
explicit wording of the standard, this checklist is primarily the ISMS complies with the
intended to guide, or to be adapted and used by, competent requirements specified in ISO/IEC
internal auditors conducting ISMS internal audits. It can also be 27001.
used for internal management reviews of the ISMS including pre-
certification assessments to determine whether the ISMS is in a fit state to be formally audited. That said,
internal audits and management reviews along these lines should help the organization prepare and
finalize the necessary documentation that certification auditors will probably want to review.
Internal audit checklists may The extensive audit tests suggested below in the form of questions and
be further modified during checks are intended as prompts or reminders of the main aspects to be
the course of the audit if checked by competent, qualified and experienced IT auditors. They do
new or previously not cover every single aspect of ISO/IEC 27001. They are not meant to
unappreciated areas of be asked verbatim and simply checked-off, whether in whole or
concern come to light. piecemeal. They are not suitable for use by inexperienced auditors
Unlike strict compliance working without supervision.
audits, internal audits may This checklist is not meant to be used without due consideration and
delve into related issues that modification. It is anticipated that users will normally generate custom
emerge as the audit checklists reflecting the specific scope and scale of the particular ISMS
proceeds, within the more being audited, and the audit tests arising, taking into account any
flexible boundaries of the information security requirements that are already evident at this stage
scope, timescales and (such as information-security relevant laws, regulations and standards
resourcing available. that are known to apply to similar organizations in the industry).
Finally, checklists should support the auditors’ normal working practices, for example in a tabular format
with additional columns for the auditor to record notes and commentary, initial evaluation
(e.g. SWOT/PEST/PESTEL), references to audit evidence on file, maturity metrics etc. Once completed, the
audit checklist links the audit evidence and findings gathered and analysed during the fieldwork and
analysis phases through to the audit report.
Since completed ISMS audit checklists, files, notes and evidence contain sensitive information
concerning the organization’s information risk and security arrangements, they must be adequately
secured to ensure their confidentiality and integrity.
B.5. Leadership
B.5.2 Policy
Review the information security policy suite and related This section concerns the governance
documentation (e.g. ISMS mission statement and scope). aspects: corporate policies must be
Check that it: driven and mandated by management.
Explicitly supports and enables the business purposes and The content of the information risk
objectives of the organization, in the context of and security policies is specified in
information risk, security and related requirements ISO/IEC 27002 section 5.1.1.
(e.g. compliance, protection, safety and business
continuity);
Specifies high-level information risk and security objectives, both internally and externally driven or
imposed, and clearly affirms the organization’s commitment to satisfy them;
Is sufficiently formal and explicit to stand up in legal or disciplinary proceedings, yet readable and
pragmatic enough to be useful in practice (albeit supported by procedures, guidelines etc.);
Supports continual improvement of the ISMS,
reflecting the evolving information risks and business Individual policies, procedures etc. may
situation, and maturity; be owned and authorized at lower levels,
but the overall structure needs senior
management’s explicit leadership and
mandate e.g. through an overarching
corporate strategy or policy on
information risk and security.
Copyright © ISO27k Forum, 2017 45 | P a g e
ISO27k Toolkit ISMS auditing guideline
Is approved, authorized and/or mandated as a coherent and reasonably comprehensive suite by “top”
(senior) management e.g. board, CEO, Executive Committee or Security Committee;
Is communicated widely within the organization, including everyone within the scope of and directly
implicated in the ISMS;
Is, where appropriate (possibly under nondisclosure agreements or in summary form) made available
to other interested parties.
B.6. Planning
B.7. Support
B.7.1 Resources
Review the resources allocated to the ISMS in terms of budget, manpower etc., in relation to the
organization's stated aims for the ISMS and (where applicable) by comparison to comparable organizations
(benchmarking). Is the ISMS adequately funded and resourced in practice? Are sufficient funds allocated
by management to address information security issues in a reasonable timescale and to a suitable level of
quality?
B.7.2 Competence
Review the qualifications, experience and training of those specifically involved in operating the ISMS, and
general information security awareness activities targeting all employees. Are necessary competencies
and training/awareness requirements for information security professionals and others with specific roles
B.7.3 Awareness
Are information security policies etc. well written and disseminated appropriately to all relevant parties?
Are recipients explicitly required to read and comply with them? How does the organisation confirm that
all have in fact read and agreed to comply with the policies e.g. signed acceptance or acknowledgement;
periodic quizzes/tests to confirm that recipients understand their obligations, including their wider role in
information risk management and making the ISMS effective and beneficial for the organisation? How are
policy compliance and non-compliance addressed e.g. benefits/rewards to reinforce compliance and
costs/penalties for non-compliance, through disciplinary procedures, relationship/contractual
management etc.? How are changes communicated e.g. new or revised policies, roles and responsibilities,
information risks (e.g. novel threats) and security controls? Is management sufficiently engaged and
supportive e.g. do managers actively participate in information risk and security awareness activities,
training courses etc.? Are training and awareness plans, budgets and priorities adequate?
B.7.4 Communication
Is there a documented communication plan identifying internal and external audiences to whom
appropriate and timely communication must be made with respect to all activities and occurrences related
to information security e.g. employees (need clear directions of what is expected of them, updates on
policies, training in procedures etc.); third parties/suppliers (need clear directions about what is expected
of them; and legal and regulatory authorities plus certification body and other stakeholders (need to be
notified in the event of breaches or incidents). Does the communication plan state what is to be
communicated, when (timing or frequency), by whom and by what means? Is there evidence confirming
that previously planned communications have taken place and been effective?
B.8. Operation
B.10. Improvement