ISO27k Guideline On ISMS Audit v2
ISO27k Guideline On ISMS Audit v2
Contents
1. Introduction 5
2. Scope and purpose of this guideline 5
3. References 5
4. Terms and definitions 6
5. Principles of auditing 7
6. Audit management 8
6.1 Managing the ISMS audit programme 8
6.2 Managing an ISMS audit 8
7. The audit process 9
7.1 Scoping and pre-audit survey 9
7.2 Audit planning and preparation 10
7.3 Audit fieldwork 10
7.4 Audit analysis 11
7.5 Audit reporting 11
7.6 Audit closure 13
8. Competence and evaluation of auditors 13
8.1 Auditor competence 13
8.2 Demonstration of auditor competence 14
9. Document control 15
9.1 Authors 15
9.2 History 15
9.3 Feedback 15
9.4 Copyright 15
3. References
Please refer to:
ISO/IEC 27000:2016 Information technology — Security techniques — Information security
management systems - Overview and vocabulary. This free standard provides an overview of ISO27k
and formally defines many specialist terms used in the standards.
ISO/IEC 27001:2013 Information technology — Security techniques — Information security
management system requirements. This is the formal specification for an ISMS against which
organizations may be certified compliant. Section 6 introduces the need for ‘Internal ISMS audits’ and
briefly sets the main requirements for audit procedures. Section 7 also identifies the need for periodic
(at least annual) management reviews of the ISMS. Other than the controls listed in Annex A, these are
mandatory requirements for certified organizations. Even if the organization implements an
alternative control set, the chosen controls must be checked against those listed in Annex A for
relevance and completeness.
ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information
security controls. Expands substantially on ISO/IEC 27001 Annex A.
ISO/IEC 27003:2017 Information technology — Security techniques — Information security
management system — Guidance. Further, practical guidance on designing and implementing a
workable ISMS.
ISO/IEC 27004:2016 Information technology — Security techniques ― Information security management
― Monitoring, measurement, analysis and evaluation. Guidance on selecting/developing and using
metrics to manage information risk and security rationally and proportionately.
ISO/IEC 27006:2015 Information technology — Security techniques — Requirements for bodies
providing audit and certification of information security management systems. Formal accreditation
criteria for certification bodies conducting strict compliance audits against ISO/IEC 27001.
ISO/IEC 27007:2011 Information technology — Security techniques — Guidelines for information
security management systems auditing. Guidance for accredited certification bodies, internal auditors,
external/third party auditors and others conducting compliance auditing of the management system
parts of ISMSs against ISO/IEC 27001.
ISO/IEC TR 27008:2011 Information technology — Security techniques — Guidelines for auditors on
information security controls. Guidance for internal auditors and others auditing or reviewing the
information security aspects of ISMSs.
ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information
security controls based on ISO/IEC 27002 for cloud services. Covers information security controls for
cloud computing.
Other ISO27k and related standards. This growing suite of ISMS-related standards provides a wealth
of sound advice on information risk and security, cybersecurity, cloud security, business continuity
(e.g. ISO 22301) and other topics.
ISO/IEC 17021-1:2015 Conformity assessment — Requirements for bodies providing audit and
certification of management systems — Part 1: Requirements. Guidance on compliance audits by
certification bodies (“third party” audits).
ISO 19011:2011 Guidelines for auditing management systems. Guidance on internal audits (“first
party”) and supplier audits (“second party”).
The IT Audit FAQ has general advice on conducting IT audits, auditor qualifications and competencies,
audit process etc.
ISACA offers professional guidance and support to IT audit professionals.
The Institute of Internal Auditors supports internal auditors of all kinds.
5. Principles of auditing
ISO 19011 section 4 covers the principles of auditing in general, Independence is as much about
including important generic audit principles e.g. independent the auditor’s state of mind as
evaluation against agreed criteria, plus more specific principles reporting relationships: objective,
aimed at management systems audits. In all matters related to the rational, critical thinking enables
audit, the auditor should be independent in both attitude and the auditor to notice things that
appearance. The audit function or team should be independent of others miss or ignore.
the area or activity being reviewed to permit objective completion
of the audit assignment.
6. Audit management
eration is common, for example where analysis or reporting requires additional evidence, more fieldwork may be performe
9.1 Authors
The following members of the ISO27k Forum updated this guideline in 2017: Bhushan Kaluvakolan; Richard
Regalado; Gary Hinson and Pratibha Agrawal.
The following people contributed to the original 2012 version of the guideline: Alchap; Javier Cao
Avellaneda; Anton Aylward; Pritam Bankar; Jesus Benitez; Lee Evans; Gary Hinson; Khawaja Faisal Javed;
Lakshminarayanan; ; Rocky Lam; Prasad Pendse; Renato Aquilino Pujol; Bala Ramanan; Marappan Ramiah;
Richard Regalado; Mninikhaya Qwabaza (Khaya); Kim Sassaman; Mooney Sherman; John South; Jasmina
Trajkovski; Rob Whitcher and others.
9.2 History
March 2008 – First release of the guideline submitted to the ISO/IEC JTC1/SC27 committee via Standards
New Zealand, and published as part of the free ISO27k Toolkit.
July-August 2017 - Entire document updated, first by a collaborative team effort using Google Docs and
then finalized in MS Word, and republished in the ISO27k Toolkit.
9.3 Feedback
Comments, queries and (especially!) improvement suggestions are welcome either via the ISO27k Forum or
direct to Gary Hinson (Gary@isect.com).
9.4 Copyright
This guideline is copyright © 2017, ISO27k Forum, some rights reserved. It is licensed under
the Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. You are welcome
to reproduce, circulate, use and create derivative works from this provided that (a) it is not
sold
or incorporated into a commercial product, (b) it is properly attributed to the ISO27k Forum at
www.ISO27001security.com, (c) if shared, derivative works are shared under the same terms as this.
Introduction
The following checklist of audit tests is generic. It reflects and refers primarily to ISO/IEC 27002's advice on
information security controls without regard to any specific control requirements that an individual
organization might have in relation to its information risks identified through the risk assessment and risk
management processes.
This is generic guidance to help review the organization's We have deliberately modified,
security controls, primarily against the recommendations in extended or elaborated on the
ISO/IEC 27001 Annex A, ISO/IEC 27002 and other ISO27k advice in ISO/IEC 27002 in various
standards. It cannot provide specific guidance on the particular areas, based on our professional
risks and controls applicable to every situation and must work and audit experience with
therefore be customized and interpreted by experienced IT ISMSs in various organizations and
auditors according to the context. For example, the organization's industries that take information
risk analysis may have determined that certain control objectives security seriously (e.g. we have
from the standards are not applicable and hence the incorporated audit tests on
corresponding controls may not be required, whereas in other business continuity). This is not a
areas the control objectives may be more rigorous than suggested simple compliance audit checklist.
in the standard and additional controls may be required. The Risk
Treatment Plan and Statement of Applicability should provide
further details on this.
The audit tests noted below are intended as prompts or reminders of the main aspects that competent,
qualified and experienced IT auditors would typically check. They do not cover every single aspect of
information risk, security and related areas. They are not meant to be asked verbatim or checked-off
piecemeal. They are not suitable for use by inexperienced auditors working without supervision.
The checklist is not intended to be used without due consideration and modification. ISMS auditors
normally generate custom checklists reflecting the specific scope and scale of the particular ISMS being
audited, taking into account any information security requirements that are already evident at this stage
(such as information-security relevant laws, regulations and standards that are known to apply to similar
organizations in the industry). Also, the audit checklist may be modified during the course of the audit if
previously underappreciated areas of concern come to light. Finally, the checklist should reflect the
auditors’ normal working practices, for example columns for audit notes, references to audit evidence on
file, SWOT/PEST analyses of the findings etc.
Since completed ISMS audit checklists, files, notes and evidence contain sensitive information
concerning the organization’s information risk and security arrangements, they must be adequately
secured to ensure their confidentiality and integrity.
A.5. Information security policies
A.5.1 Management direction for information security
A.5.1.1 Policies for information security: review the
Numerous information security
organization’s policies for information risk, security and
controls involve policies, hence policies
related areas (e.g. privacy, business continuity, compliance,
appear many times in this checklist with audit tests reflecting various contexts and objectives. A.5.1.1
governance, risk management, HR, physical/site security,
change management, configuration management, incident
management, logging, classification, systems development
and acquisition …). Is there clear evidence of a sensibly
designed
and managed overall framework/structure/hierarchy? Are the policies reasonably comprehensive, covering
all relevant information risks and control areas? How are the policies authorized, communicated,
understood and accepted? Are all workers and where relevant their employers formally required to
comply? Are there suitable compliance enforcement and reinforcement arrangements? Review the
policies, standards, procedures, guidelines etc. for consistency with: good practices (such as ISO27k, NIST
SP800 and other relevant standards, advisories and guidelines); applicable legal, regulatory and contractual
obligations; corporate strategies and other policies. Are there appropriate cross-references, both internal
and external? Are the policies well-written i.e. readable, reasonable and workable? Do they incorporate
suitable and sufficient controls? Do they cover all essential information assets, systems, services etc.? How
mature is the organization in this area? Look for issues (gaps, overlaps, inconsistencies/conflicts, poor
quality writing, out-of-date/unapproved policies, missed review deadlines etc.) and opportunities for
improvement.
A.5.1.2 Review of the policies for information security: evaluate the process for reviewing information
security and related policies. Check a sample of policies for details such as: policy title; scope and
applicability; status (e.g. draft, authorized, superseded, withdrawn); names of authors and accountable
owners; version numbers; dates of publication; who approved them (e.g. Security Committee or an
equivalent management body); document history/date of last and next reviews; associated compliance
arrangements. Do all policies have a consistent format and style? Are they all current, having completed all
due reviews (including feedback from ISMS management reviews and audits) and if appropriate been re-
authorized and distributed? Cross-check evidence of approvals/authorization for a small sample. Look for
issues and improvement opportunities.
A.10. Cryptography
A.11.2 Equipment
A.11.2.1 Equipment siting and protection: is ICT and related equipment located in adequately protected
areas? Are computer screens, printers and keyboards sited or protected to prevent unauthorised viewing?
Check the controls to minimize the risk of physical and environmental threats such as:
Water/flooding: facilities appropriately sited to minimize flood potential (e.g. above water table, not
adjacent to water tanks, no water pipes overhead etc.). Where appropriate, additional/secondary
protection installed and maintenance performed e.g. waterproof membranes, drip trays under air
conditioning units, under-floor water detection with remote alarms and incident procedures, regular
surveys or inspections of roofs, under-floor voids etc. for signs of water leakage/penetration;
Fire and smoke: non-flammable facilities and fittings, fire alarms, low-smoke cabling etc.
Temperature, humidity and power: see A.11.2.2
Dust: equipment and air conditioner filters maintained (checked, cleaned, replaced) regularly. ICT
facilities kept clean e.g. using specialist “deep cleaning" including floor and ceiling voids, low dust wall
covering, under-floor sealed, dust covers/membranes etc. [Note: cleaners in sensitive areas such as
computer rooms should normally be accompanied/supervised, unless cleaning is only done by
competent, trustworthy staff. Cleaners may need to be security-cleared and proactively monitored if
the organization handles government classified or other highly sensitive/valuable information.]
Lightning, static electricity and safety: confirm that all exposed metalwork is earth bonded to a
common safety earth point in accordance with electrical regulations. Confirm the use of mounted
lightning conductors, cable isolators, fuses etc. where applicable. Are these controls tested periodically
and following major changes?
Other: e.g. theft, explosives, vibration, chemical contamination, electrical supply interference,
communications interference, electromagnetic radiation and vandalism/criminal damage.
A.11.2.2 Supporting utilities - electrical power: check and ask Facilities or electrical engineers to explain
the electrical power arrangements for computer rooms, network closets and other locations housing
shared or critical IT systems (servers, PABX, communications hubs, security systems, safety systems,
building management systems etc.). Are there computer-grade on-line UPSs, filters etc. providing reliable,
high quality power? Is there adequate UPS capacity to support all essential equipment for a sufficient
period (internal, rack-mounted, whole room or whole site systems)? How do we know that all essential
equipment actually uses secure supplies? Are there generators of sufficient capacity? Are UPSs and
generators operated, monitored and maintained as per manufacturer's specifications and tested on-load
regularly? If appropriate, are there redundant (dual-routed) mains feeds from separate substations or
grids? What happens when power cabling, switch gear or equipment changes or tests are made: are
systems and services affected?
Air conditioning: are there properly specified and installed computer-grade air conditioners? Are
chillers/condensers appropriately sited? Is there adequate A/C capacity to support the heat load, even in a
hot summer? Are there redundant/spare units or portables available to improve resilience and permit
maintenance without affecting service? Is there temperature sensing with remote-reading over-
temperature alarms and incident procedures? Is air conditioning equipment professionally operated,
tested and maintained as per manufacturer's specifications? Are there suitable operation and maintenance
procedures, including filter cleaning and dealing with over-temperature or other alarms?
Other: check if the facilities and supporting utilities (e.g. electricity, telecommunications, water supply, gas,
sewage, ventilation and air conditioning) are being inspected and tested regularly to ensure their proper
functioning. They should be alarmed for malfunctioning, and perhaps for unauthorized activity. Check how
alarms are handled out-of-hours (e.g. do security guards have remote alarm indicators/sounders on their
consoles, with suitable response procedures, training/exercises etc.?).
A.11.2.3 Cabling security: is there appropriate physical protection for external cables, junction boxes, air
conditioner chillers, microwave dishes, air inlets etc. against accidental damage or deliberate interference?
Check whether the power cables are segregated from communications cables to prevent interference.
Check whether access to patch panels and cable rooms is controlled, with cabling concealed/protected
against eavesdropping by attaching rogue devices, or physical damage. Are there suitable procedures to
confirm all this? Verify that cabling installations are done in accordance with building codes and other
applicable regulations, standards and policies.
A.11.2.4 Equipment maintenance: check that only qualified personnel carry out maintenance of
equipment (infrastructure and network devices, laptops, desktops etc. and all safety and utility equipment
such as smoke detectors, fire suppression devices, HVAC, access control, CCTV etc.), check that equipment
is maintained and serviced according to the manufacturers’ specifications. Are there up-to-date
maintenance schedules and logs/reports? If equipment is insured, are maintenance and other
requirements of the insurance contract satisfied?
A.11.2.5 Removal of assets: check the policy and procedure concerning removal of information assets (ICT
equipment, storage media and the information content) from sites, buildings, offices, archives and other
locations. Are there documented approvals or authorizations at appropriate levels (e.g. equipment or
information owners)? [How] are movements restricted to authorised personnel? What stops people
secreting USB drives and other small storage devices about their person? Check the procedures for tracking
movements of high-value or high-risk assets. Walk through the process. Check a sample of records
pertaining to movements for accuracy and completeness.
A.11.2.6 Security of equipment and assets off-premises: is there an 'Acceptable Use Policy' or equivalent
guidance covering security requirements and 'DOs and DONTs' for all mobile or portable devices that are
used from home or remote locations? Does it state requirements such as appropriate custody and secure
storage, physical and/or logical access control (e.g. lockable cabinets, encryption), secure connections
(e.g. VPNs), clear desks and clear screens, protection from strong electromagnetic fields, regular backups
etc. How is all this achieved and ensured in practice? How are workers made aware of their obligations?
Are they given enough support to achieve an acceptable level of security?
A.11.2.7 Secure disposal or re-use of equipment: review policies, standards, procedures, guidelines and
associated records relating to how storage media and ICT equipment are re-used or disposed-of. How does
the organization prevent stored information being disclosed, to a sufficient assurance level given the
associated information risks (e.g. relating to the data or system classification)? If there is a reliance on
strong encryption or secure erasure, how does that work and how are non-functional devices and media
disposed- of? Are suitable records maintained of all media that are disposed-of, with details such as nature
of contents, form of disposal and where appropriate positive confirmation of secure disposal? Does the
policy and process cover all ICT devices and media? Hunt for exceptions.
A.11.2.8 Unattended user equipment: if active user sessions are suspended or terminated after a defined
idle time, how are applications suspended/terminated to avoid data loss or corruption? Is the idle time
definition appropriate, given the risks of unauthorized physical access to active/logged-on devices? If
screen-locks are used, are they password-protected? Does this policy apply to all servers, desktops,
laptops, smartphones and other ICT devices? How is it checked and enforced? Are any exceptions risk-
assessed and authorized by management as policy exemptions?
A.11.2.9 Clear desk and clear screen policy: review policies, standards, procedures and guidelines in this
area. How well is it working out in practice? Walk around checking for insecure information assets such as
logged-on but unlocked servers, PCs, laptops and smartphones, insecure digital storage media (such as USB
memory sticks) and paperwork (e.g. diaries; passwords on Post-It notes; files, forms and notes containing
sensitive business or personal information; printouts abandoned on printers and copiers; unlocked filing
cabinets). Do all computing devices have a password-protected screen saver or lock which employees use
when stepping away from their devices, or that it kicks in after a defined idle time? Check the procedures
around usage of printers, photocopiers, scanners, cameras and any other reproduction technologies.
A.17.2 Redundancies
A.17.2.1 Availability of information processing facilities: check how the availability requirements for ICT
services are identified and satisfied. Verify resilience, capacity and performance arrangements, including
monitoring and adjustments (e.g. dynamic load balancing). Examine incident records for clues about
unreliable services, equipment, facilities, servers, apps, links, functions, organizations etc. Check that key
information security controls are implemented and functional at disaster recovery/fall-back sites. If
controls at DR/fall-back sites are less strict than those at primary sites, are the additional risks being
treated appropriately (e.g. compensating controls such as increased oversight, and risk acceptance for the
limited period of DR invocation)?
A.18. Compliance
Introduction
The following ISMS management system audit checklist comprises a This audit checklist is NOT
generic set of audit tests. It is structured in line with and reflects intended for certification audits.
ISO/IEC 27001's requirements for all ISMSs without regard to any Certification auditors are required
specific requirements that an individual organization might have to follow their formally-
(for example legal, regulatory and contractual obligations documented and accredited audit
concerning particular information risk and security processes, processes, using their own audit
activities or controls). checklists and audit tests
Whereas ISMS certification audits are narrowly focused on the concerning the extent to which
explicit wording of the standard, this checklist is primarily intended the ISMS complies with the
to guide, or to be adapted and used by, competent internal requirements specified in ISO/IEC
auditors conducting ISMS internal audits. It can also be used for 27001.
internal management reviews of the ISMS including pre-
certification
assessments to determine whether the ISMS is in a fit state to be formally audited. That said, internal
audits and management reviews along these lines should help the organization prepare and finalize the
necessary documentation that certification auditors will probably want to review.
Internal audit checklists may The extensive audit tests suggested below in the form of questions and
be further modified during checks are intended as prompts or reminders of the main aspects to be
the course of the audit if checked by competent, qualified and experienced IT auditors. They do
new or previously not cover every single aspect of ISO/IEC 27001. They are not meant to
unappreciated areas of be asked verbatim and simply checked-off, whether in whole or
concern come to light. piecemeal. They are not suitable for use by inexperienced auditors
Unlike strict working without supervision.
compliance audits, internal This checklist is not meant to be used without due consideration and
audits may delve into related modification. It is anticipated that users will normally generate custom
issues that emerge as the checklists reflecting the specific scope and scale of the particular ISMS
audit proceeds, within the being audited, and the audit tests arising, taking into account any
more flexible boundaries of information security requirements that are already evident at this stage
the scope, timescales and (such as information-security relevant laws, regulations and standards
resourcing available. that are known to apply to similar organizations in the industry).
Finally, checklists should support the auditors’ normal working practices, for example in a tabular format
with additional columns for the auditor to record notes and commentary, initial evaluation
(e.g. SWOT/PEST/PESTEL), references to audit evidence on file, maturity metrics etc. Once completed, the
audit checklist links the audit evidence and findings gathered and analysed during the fieldwork and
analysis phases through to the audit report.
Since completed ISMS audit checklists, files, notes and evidence contain sensitive information
concerning the organization’s information risk and security arrangements, they must be adequately
secured to ensure their confidentiality and integrity.
B.4. Context of the organization
B.5. Leadership
B.5.2 Policy
Review the information security policy suite and related This section concerns the governance
documentation (e.g. ISMS mission statement and scope). aspects: corporate policies must be
Check that it: driven and mandated by management.
Explicitly supports and enables the business purposes and The content of the information risk and
objectives of the organization, in the context of security policies is specified in ISO/IEC
information risk, security and related requirements 27002 section 5.1.1.
(e.g. compliance, protection, safety and business
continuity);
Specifies high-level information risk and security objectives, both internally and externally driven or
imposed, and clearly affirms the organization’s commitment to satisfy them;
Is sufficiently formal and explicit to stand up in legal or disciplinary proceedings, yet readable and
pragmatic enough to be useful in practice (albeit supported by procedures, guidelines etc.);
Supports continual improvement of the ISMS,
reflecting the evolving information risks and business Individual policies, procedures etc. may
situation, and maturity; be owned and authorized at lower levels,
Is approved, authorized and/or mandated as a but the overall structure needs senior
coherent and reasonably comprehensive suite by “top” management’s explicit leadership and
(senior) management e.g. board, CEO, Executive mandate e.g. through an overarching
Committee or Security Committee; corporate strategy or policy on
information risk and security.
Is communicated widely within the organization, including everyone within the scope of and directly
implicated in the ISMS;
Is, where appropriate (possibly under nondisclosure agreements or in summary form) made available
to other interested parties.
B.6. Planning
B.7. Support
B.7.1 Resources
Review the resources allocated to the ISMS in terms of budget, manpower etc., in relation to the
organization's stated aims for the ISMS and (where applicable) by comparison to comparable organizations
(benchmarking). Is the ISMS adequately funded and resourced in practice? Are sufficient funds allocated by
management to address information security issues in a reasonable timescale and to a suitable level of
quality?
B.7.2 Competence
Review the qualifications, experience and training of those specifically involved in operating the ISMS, and
general information security awareness activities targeting all employees. Are necessary competencies and
training/awareness requirements for information security professionals and others with specific roles and
responsibilities explicitly identified and provided? Are training/awareness budgets adequate to fund the
associated training and awareness activities? Review training evaluation reports etc. and seek evidence to
confirm that any necessary improvement actions have in fact been taken. Check by sampling that
employee HR records note ISMS-related training etc. (where applicable). Assess the general level of
information
security awareness by surveying/sampling, or review the results of surveys/samples conducted as part of
the ISMS.
B.7.3 Awareness
Are information security policies etc. well written and disseminated appropriately to all relevant parties?
Are recipients explicitly required to read and comply with them? How does the organisation confirm that
all have in fact read and agreed to comply with the policies e.g. signed acceptance or acknowledgement;
periodic quizzes/tests to confirm that recipients understand their obligations, including their wider role in
information risk management and making the ISMS effective and beneficial for the organisation? How are
policy compliance and non-compliance addressed e.g. benefits/rewards to reinforce compliance and
costs/penalties for non-compliance, through disciplinary procedures, relationship/contractual
management etc.? How are changes communicated e.g. new or revised policies, roles and responsibilities,
information risks (e.g. novel threats) and security controls? Is management sufficiently engaged and
supportive e.g. do managers actively participate in information risk and security awareness activities,
training courses etc.? Are training and awareness plans, budgets and priorities adequate?
B.7.4 Communication
Is there a documented communication plan identifying internal and external audiences to whom
appropriate and timely communication must be made with respect to all activities and occurrences related
to information security e.g. employees (need clear directions of what is expected of them, updates on
policies, training in procedures etc.); third parties/suppliers (need clear directions about what is expected
of them; and legal and regulatory authorities plus certification body and other stakeholders (need to be
notified in the event of breaches or incidents). Does the communication plan state what is to be
communicated, when (timing or frequency), by whom and by what means? Is there evidence confirming
that previously planned communications have taken place and been effective?
B.8. Operation
B.10. Improvement