What to Expect during a ISO 27001 Certification Audit

September 12, 2021

Audit Planning and Scope

What should be in the scope of an ISO 27001 Audit?

  • The tricky thing with an ISMS audit is that the Audit Scope is defined in consultation with the entity up front so there is not a specific list you can refer to.
  • The audit scope provided to you by your auditor should describe the range and limits of the audit for example the locations, the organisations business units, the activities, the systems and the processes as well as the time period covered by the audit.
  • Taking into account the limited duration of the audit the auditor determines which business units and processes systems they will audit. It is critical the audit scope chosen by the auditors be representative of the management system in scope.
  • As part of the ISO 27001 audit engagement your auditor should have put together a detailed plan to determine the scope and the materiality of certain parts of scope.  Materiality will help define what processes they will place emphasis on during the on-site/evidence collection part of the audit.  The auditor will then adjust their sampling plan based on the materiality of each processor asset.

In summary make sure your assets are well documented and assign them materiality rating, based on risk, then look to work with your auditor to develop a detailed audit plan based on that asset list.

The Scope Statement

A Scope Statement is required if you intend to get ISO 27001 certification.

Sample scope statement

The scope encompasses all (Company Name) employees, (Company Name) locations, (Company Name) owned technology and data assets and (Company Name) businesses processes that deliver:

  • (List all product and services in scope).
Tip: Carefully consider which of the backend systems you wish to include. The most important systems to include is the parts that are important to your customers.

You may wish to articulate very clearly what is in scope vs out of scope. Here is an example of a scope statement clearly articulated.

Product and Services

The following products and services are in scope:

In Scope

  • Product 1
  • Service 1
  • Service 2

Out of Scope

  • Back office systems that support the operation of the business that do not directly support in-scope products and services.
  • HR System 1
  • Marketing System 1

Auditing standards

Does the Auditor have to follow any guidelines or standards?

  • Requirements for certifying bodies -  ISO 1702-1 – Conformity assessment - Requirements for bodies providing audit and certification of management systems.
  • Requirements for Auditing and Certifying ISMS – ISO 27006 – Information Technology - Security Techniques - Requirements For Bodies Providing Audit And Certification Of Information Security Management Systems.  These requirements are intended to be used by companies that audit and certify ISMS according to the audit criteria of ISO/IEC27001.
  • Guidelines for auditing ISO 27001 - ISO 27007 Guidelines for ISMS Auditing and ISO 27008 - Information Technology - Security Techniques -Guidelines For Auditors On Information Security Controls
  • Guidelines for auditing management systems - ISO 19001 – Guidelines for Auditing Mgt Systems

Guidelines for auditing under the ISO 27001 certification program are intended to be flexible so they can be adapted to the size and complexity of the organisation being audited.  

The responsibility falls on each auditor to apply the ISO 27007 Guidelines for ISMS Auditing.  

While ISO 27007 outlines the audit activities and steps ISO 27008 provides guidelines on the review of security controls.  

Many auditors will also refer to ISO 19001 – Guidelines for Auditing Mgt Systems as they were specially developed to assist auditors in acetification audit context.

Evidence collection

There are typically two stages of an ISO 27001 certification audit. Stage 1 will be to review the design of your ISMS and stage 2 will be to verify that controls are operating effectively.

What types of evidence will Auditor's want to collect?

 Types of Audit Evidence are typically either qualitative (test if control complies with criteria) or quantitative (test if control is functional/effective).

 There typically 7 types of evidence:

  1. Physical – anything that can be counted, examined, observed inspected(such as wiring, fire protection, asset labels)
  2. Mathematical – Calculating mathematical exactness of certain records (such as number of training hours, invoices matching software inventory)
  3. Confirmative – evidence from a third party (such as logs collected from third party, letters from a lawyer, results form a pen test)
  4. Technical – Analysis results of technical tests/observations performed on a systems (such as analysis of an intrusion text on network, transaction simulation test, observing a firewall configuration)
  5. Analytical – Results from the relationship between recorded analysis and expectations of auditor (such as analysis of network logs to detect deviations, analysis of security incident tickets, analysis of how well employees under their training)
  6. Documentary  - Records or documents (Such as policies, guidelines, training material,  registers, includes letters and/or meeting minutes)
  7. Verbal – Evidence collected during interviews with personnel(such as discussions with key stakeholders during audit interviews
You can use InfoSecAssure to assess your business against ISO 27001 before you begin your audit. The process is guided and will help you collect the documents you need to provide to the auditor.

Assessing controls

How will the auditor assess evidence?

Some auditors have a list of every requirement from the Standard and use a table to record input against each control. For example:

Control <name> <number in standard>.

  • Assessment
  • Observations
  • Documents
  • Interviews
  • Technical Verification
  • Analysis
  • Overall assessment

They will then write up their findings in a non-conformity plan for management review.

Auditors will typically look for multiple type of evidence to confirm their final assessment against each control determined in-scope based on the overall scope of the ISMS.

What is are some specific examples of evidence Auditor's will ask for?

Here are some sample of how evidence could be sought for these 5 requirements:

Policies for information security (A.5.1.1)

  1. Documentation review of the information security policy to validate the content
  2. Interview with the person in charge of the information security to validate the approval and distribution process of the policy
  3. Verification of the policy distribution media (website, hardcopy, version, information in the employee manual

Removal or adjustment of access rights (A. 9. 2. 6)

  1. Documentation review of procedures and process for removal of access rights,
  2. Interview with the person in charge of information security and/or the person in charge of Human Resources to validate the operating of the process,
  3. Analysis of a sample of employees having left the organisation to verify if the access rights have been removed
  4. Observation of access rights in the Systems Directories (ex: Microsoft Active Directory, Novell Access Manager, Apple Open Directory, etc.

Controls against malware (A.12.2.1)

  1. Documentation review of management of measures against malware
  2. Interview with a technician to validate the management process of the measures against malware (monitoring, updates, reports, etc.)
  3. Verifying the configurations of protection against malware software
  4. Analysis of a sample of workstations to check for the presence of protection software and if it is up-to-date

Confidentiality or nondisclosure agreements (A.13.2.4)

  1. Documentation review of the policy and procedures for the distribution of information to the public,
  2. Interview the person in charge of the public website to verify the process for publishing content
  3. Request and review sample NDA’s and confidentiality agreements in place with suppliers/contractors

Review of user access rights (A.9.2.5)

  1. Review documentation on user access rights and policy and review procedures
  2. Interview a person in charge of changes to user access rights
  3. Review last access review process document and outcomes
  4. Analyse a sample of employees that have left the organisation in the last year and validate if they still exist in any of the organisation's active directories
Contact us if you would like further information or help in preparing for your ISO 27001 Certification Audit. 
Secure your business.

"assurance"

confidence or certainty in one's own abilities.

“The business has given us assurance that they have security in place to protect our information”

Our Difference

Established and lead by industry experts.

At the helm of our privately owned, global RegTech firm are industry experts who understand that security controls should never get in the way of business growth. We empower companies large and small to remain resilient against potential threats with easily accessible software solutions for implementing information security governance, risk or compliance measures.

We support businesses every step of the way.

We don't just throw a bunch of standards at you and let you try and figure it out! We have designed a thoughtful way of supporting all businesses consider, articulate and develop security controls that suit the needs of the organisation and provide clever reporting capability to allow insights and outcomes from security assessments to be leveraged by the business and shared with third parties.

Our customers are the heart of our company.

Our platform places customers at the heart of our design process, while providing access to expert knowledge. With simple navigation and tangible results, we guarantee that all data is securely encrypted at-rest and in transit with no exceptions – meeting international standards with annual security penetration testing and ISO 27001 Certification.