ISMSLA PPT Handouts
ISMSLA PPT Handouts
1
2
Welcome
Welcome to your CQI and IRCA Certified
ISO 27001 Lead Auditor Information Security
Management Systems VILT Course (ISMS)
www.quality.org/training
2
4
The Value of Effective Auditing
‘There was an evident belief of senior managers
that they were working in a safe organisation.
This may have been because they may not have
known how to seek out, or to recognise, the
symptoms of an unsafe organisation. It may
also be true that they would not have known
what practical steps to take to turn an unsafe
organisation into a safe organisation.’
SECURITY NOTICE
3
6
MOBILE PHONES IN SILENT MODE
COURSE OVERVIEW
Group
Audit
Practice
Work
Presentation
Exam
4
8
DELEGATE RESPONSIBILITY
COURSE CONTENT
5
10
TESTING UNDERSTANDING
New exam pattern introduced for English speaking course. Refer the
exam guideline document. Learners from UAE will be taking exam in
older pattern only
.
11
DELEGATE INTRODUCTIONS
You will be asked to introduce the person to your left or
right. You will need to discover the following information
about them for the introduction
• Their name
• A brief description of their organisation
• A brief job description
• Their involvement in ISMS
• Why they are here
• And finally…superpowers they wish to have
Time allowed – 2 minutes
6
12
COURSE OBJECTIVES
Upon successful completion of this course you will…
13
COURSE STRUCTURE
7
14
COURSE OBJECTIVES
15
COURSE PLAN
About Unified
Standards Framework
Information
Implementation
Security
&
Management
Measurements
Systems
8
16
COURSE PLAN :AUDIT STAGES
• Pre-audit management
Planning • Document review
• Detailed planning for the on-site audit
17
COURSE PLAN
Planning Audits
Collecting &
Conducting Audits
Verifying Evidence
9
18
COURSE PLAN
Completing Closing
Audit Meeting
19
10
20
CQI-IRCA IS0 27001
LEAD AUDITOR VILT
COURSE
SECTION 2
Standards, Principles and
Definitions
Purpose of this session: To ensure that
delegates from differing backgrounds are
familiar with baseline ISMS terminology.
To discuss the main ISMS principles and
interrelationships of the applicable
standards.
21
HISTORY OF REQUIREMENTS
11
22
THE ISO 27000 SERIES
23
12
24
Information Security – security
preservation of confidentiality, integrity
and availability of information. It may
also include other features such as
authenticity, accountability, non-
rejection and reliability.
25
13
26
RELATIONSHIP BETWEEN CONFIDENTIALITY, INTEGRITY,
AND AVAILABILITY NEEDS TO BE BALANCED
Confidentiality
Security
Integrity Availability
27
14
28
EXAMPLES…
29
15
30
TERMS AND DEFINITIONS
31
16
32
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
organization
person or group of people that has its own functions with
responsibilities, authorities and relationships to achieve its
objectives
33
17
34
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
requirement
need or expectation that is stated, generally implied or
obligatory
35
management system
set of interrelated or interacting elements of an organization to
establish policies and objectives and processes to achieve those
objectives
NOTE 1 : A management system can address a single discipline
or several disciplines.
NOTE 2 : The system elements include the organization’s
structure, roles and responsibilities, planning, operation, etc.
NOTE 3 : The scope of a management system may include the
whole of the organization, specific and identified functions of
the organization, specific and identified sections of the
organization, or one or more functions across a group of
organizations.
18
36
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
top management
person or group of people who directs and controls an
organization at the highest level
NOTE 1: Top management has the power to delegate authority and provide
resources within the
organization.
NOTE 2: If the scope of the management system covers only part of an
organization then top management refers to those who direct and control
that part of the organization.
37
effectiveness
extent to which planned activities are realized and planned
results achieved
policy
intentions and direction of an organization as formally expressed
by its top management
19
38
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
objective
result to be achieved
39
20
40
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
competence
ability to apply knowledge and skills to achieve intended results
41
21
42
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
process
set of interrelated or interacting activities which
transforms inputs into outputs
performance
measurable result
NOTE 1: Performance can relate either to quantitative or qualitative
findings.
NOTE 2: Performance can relate to the management of activities,
processes, products (including services), systems or organizations.
43
monitoring
determining the status of a system, a process or an
activity
NOTE 1 to entry: To determine the status there may be a need to
check, supervise or critically observe.
22
44
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
measurement
process to determine a value
45
23
46
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
conformity
fulfilment of a requirement
nonconformity
non-fulfilment of a requirement
47
corrective action
action to eliminate the cause of a nonconformity and to prevent
recurrence
24
48
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
continual improvement
recurring activity to enhance performance
49
25
50
SECTION 3
Annex SL (normative) - Proposals
for management system
standards and unified
framework
51
ANNEX SL – GENERAL
26
52
ANNEX SL – GENERAL (CONT.)
Unified frameworks:
• high level structure (HLS)
• identical clause titles
• identical text
• common terms and definitions
53
ANNEX SL - APPENDIXES
27
54
ANNEX SL - SL.6 GENERAL PRINCIPLES
55
28
56
ANNEX SL - SL.6 GENERAL PRINCIPLES (CONT.)
57
APPENDIX 1
29
58
APPENDIX 2
59
Appendix 3
They all form the nucleus of future and revised ISO Type
A management system standards.
30
60
APPENDIX 3 (CONT.)
61
APPENDIX 4
31
62
UNIFIED FRAMEWORK
63
32
64
THE BENEFITS OF UNIFIED FRAMEWORK AND HLS
65
•Introduction
•Cl. 1 - Scope
•Cl. 2 - Normative references
•Cl. 3 - Terms and definitions
•Cl. 4 - Context of the organization
•Cl. 5 - Leadership
•Cl. 6 - Planning
•Cl. 7 – Support
•Cl. 8 - Operation
•Cl. 9 - Performance evaluation
•Cl. 10 - Improvement
33
66
GENERAL COMMENT
67
34
68
SECTION 4
69
71
Clause 1-Scope
Clause 2-Normative Reference
Clause 3-Terms and Definitions
36
72
ISO 27001:2022 STRUCTURE
73
Clause 5 Leadership
37
74
ISO 27001:2022 STRUCTURE
Clause 6 Planning
75
Clause 7 Support
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communication
7.5 Documented information
38
76
ISO 27001:2022 STRUCTURE
Clause 8 Operation
77
39
78
ISO 27001:2022 STRUCTURE
Clause 10 Improvement
79
DOCUMENTATION REQUIREMENT
1. Scope of the ISMS (clause 4.3)
2. Information security policy and objectives (clauses 5.2 and 6.2)
3. Risk assessment and risk treatment methodology (clause 6.1.2)
4. Statement of Applicability (clause 6.1.3 d)
5. Risk treatment plan (clauses 6.1.3 e and 6.2)
6. Risk assessment report (clause 8.2)
Documents from Annex A are mandatory only if the organisation has decided to
implement a particular control
40
80
DOCUMENTATION REQUIREMENT
81
ISMS
Strengths Weaknesses
•Improved net security level of the •Requires resources:
organization -material
•Demonstrated conformity with compliance -time
requirements •Distracts personal from other important tasks
•External expertise & assistance brings good •Other…………to be added by the delegates
practices
•Other……to be added by the delegates
Opportunities Threats
•Asset in marketing •Possible access to the organization's info if external
•Improved security for client's and partner's assistance is not properly managed
information •Overconfidence in ISMS as form of total protection
•Opportunities for improvement identified ( it is not and is not intended to be)
•Other…………to be added by the delegates •Other…………to be added by the delegates
41
82
ISMS
Opportunities Threats
•Better market positions - new contracts •External access to the organization's info if no
•Opportunities for improvement identified appropriate measures are applied.
•Other ….. to be added by the delegates •Overconfidence that information is totally
protected
•Other…. to be added by the delegates.
83
42
84
SECTION 5
Information Risk
Assessment and
Treatment
85
43
86
ISO/IEC 27005:2022
Structure of the standard ISO / IEC 27005:2022
Overview- Risk Management - (5)
Define Context - (6)
Risk Assessment - (7)
Risk Treatment - (8)
Operation- (9)
Leveraging related ISMS processes– (10)
Annex A Examples of Techniques in support of the risk assessment
process.
87
44
88
TERMS
INFORMATION SECURITY RISK - potential that a given threat will exploit
vulnerabilities of an asset or group of assets and thereby cause harm to the
organization (It is measured in terms of a combination of the likelihood of an
event and its consequence).
RISK MANAGEMENT - coordinated activities to direct and control an
organization with regard to risk
RISK ASSESSMENT – overall process of risk analysis and risk evaluation
RISK ANALYSIS – systematic use of information to identify sources and to
estimate risk
RISK IDENTIFICATION - process to find, list and characterize elements of risk
RISK ESTIMATION - process to assign values to the probability and
consequences of a risk
89
45
90
TYPICAL RISK IDENTIFICATION TECHNIQUES
Process Mapping
Scenario Analysis
Business Studies and Benchmarking
Incidents Investigation
Auditing and Inspection
HAZOP
Checklists and questionnaires
91
46
92
RISK PROCESS – ISO 27005
93
93
ISO/IEC 27005
47
94
APPROACHES
95
48
96
PROBLEMS WITH THE QUANTITATIVE APPROACH
97
Risk Assessment
The risks have to be assessed to identify the potential
business harm, identifying likelihood of the failure. Establish the
level of the risk and from there whether it is acceptable or
control is required
Controls
These are countermeasures to vulnerabilities.
May be divided into four types: deterrent controls,
preventive controls, corrective controls and detective controls
49
98
QUALITATIVE RISK ANALYSIS
99
50
100
ISO/IEC 27005
101
Residual Risk –
Reduce/Treat Accept or Treat again
Risk
Risk Remains/
Retain/Accept
Accept
Insure/some level of
Transfer
risk remains
51
102
TERMS
103
52
104
INFORMATION SECURITY RISK COMMUNICATION (11)
105
• Risks are not static (12.2), periodic reviews of security risks and
related controls will be carried out:
taking account of new threats and vulnerabilities;
assessing the impact of changes to the business/ environment;
to confirm effectiveness of controls
53
106
ISO 31000:2018
107
54
108
ISO 31000 - CONTENT
1 Scope
2 Normative references
3 Terms and definitions
4 Principles
5 Framework
5.1 General
5.2 Leadership and commitment
5.3 Integration
5.4 Design
5.4.1 Understanding the organization and its context
5.4.2 Articulating risk management commitment
5.4.3 Assigning organizational roles, authorities, responsibilities and
accountabilities 7
5.4.4 Allocating resources
5.4.5 Establishing communication and
109
109
55
110
ISO 31000 - CONTENT
6.4 Risk assessment
6.4.1 General
6.4.2 Risk identification
6.4.3 Risk analysis
6.4.4 Risk evaluation
6.5 Risk treatment
6.5.1 General
6.5.2 Selection of risk treatment options
6.5.3 Preparing and implementing risk treatment plans
6.6 Monitoring and review
6.7 Recording and reporting
111
111
112
56
112
ISO 31000 FRAMEWORK
113
57
114
OTHER STANDARDS RELATED TO RISK MANAGEMENT
Risks will always exist around us, and we can never eliminate unwanted
situations except by completely terminating activities that can produce
negative effects. In most cases, you must follow objectives driven by the
organization`s top management, so the best you can do is use best practices
presented in all three standards to try to prevent or minimize negative effects.
115
58
116
SECTION 6
117
ISO 27002 was published in February 2022 and it now has a different from ISO 27001,
Annex A.
In the last update of 27002 from February 2022, the areas, control objectives and
controls were regrouped, with controls added and dropped. The structure of ISO / IEC
27002 differs from the structure of ISO / IEC 27001: 2013 (Annex A);
Categories & Domains / Areas: Control groups are already organized into four (4)
categories or topics, as opposed to fourteen (14) control domains / areas from version
2013. The four categories include organizational, people, physical and technological
controls.
59
118
THE CODE OF PRACTICE ISO 27002:2022
119
60
120
SCOPE
121
8
7
61
122
123
SECTION 07
STAGES OF ISMS DEVELOPMENT
ISO/IEC 27003
ISO/IEC 27004
62
124
ISMS Development - Stages
125
63
126
ISMS Development - Stages
Statement of Applicability.
ISMS effectiveness measurements- criteria for the
measurements.
ISMS documentation and implementation of the ISMS.
Implementation and monitoring of a Risk Treatment Plan.
Internal audits of the ISMS.
Business Continuity Management.
Management of incidents involving information security.
127
64
128
ISO/IEC 27004
129
PROCESS OF MEASURING
65
130
THE MEASUREMENT RESULTS CAN BE USED:
131
RELEVANT STAKEHOLDERS
For each base measure must be defined and documented relevant
stakeholders who may be:
• Client of measurement: stakeholders requesting information regarding
the effectiveness of the ISMS or the controls;
• Reviewer for measurement: validates the adequacy of the developed
measurement constructs for assessing the effectiveness of the ISMS or
the controls;
• Information Owner : owns the information about an object of
measurement and attributes and is responsible for the measurement;
• Information Collector: is responsible for collecting, recording and
storing the data;
• Information Communicator: is responsible for analyzing data and
communicating measurements results;
66
132
MEASUREMENT CONSTRUCTS – MUST
CONTAIN AT LEAST:
• Measurement Objectives;
• Controls objectives / group of controls / ISMS processes
that must be measured;
• Object of measurement;
• Data that must be collected and used;
• Processes for collecting and analyzing of data;
• Reporting process and reporting form of the
measurement results;
• Roles and responsibilities of the stakeholders;
• Cyclic review of measurement.
133
67
134
135
SECTION 08
ISMS and the Legal
Compliance
68
136
MAINTENANCE AND EVALUATION OF LEGAL
COMPLIANCE- RESPONSIBILITY OF THE ORGANIZATION
137
ROLES
69
138
THE CERTIFICATION/ REGISTRATION
BODY
139
70
140
THE ISMS SHOULD CONTAIN
141
APPLICABLE MIGHT BE
EU legislation.
71
142
RELEVANT LEGISLATION
143
72
144
TELECOMMUNICATIONS ACT /2003/
Purpose:
• to secure freedom and secret of telecommunications;
• To protect the interests of the users;
• To safeguard public interests and national security and
defense
145
BANKING REGULATIONS
73
146
ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
ACT /2001, LAST REVISION 2002/
147
COMPLEXITY OF IS REGULATIONS
74
148
COMPLIANCE
149
IMPORTANT!
Legal Requirements
• Failure to comply with legal requirements may result in a fine or
imprisonment
Conformance to ISO Standards
• Failure to comply with ISO Standard 3rd Party Certification
requirement may lead to loss of registration
75
150
151
SECTION 09
ISO/IEC 27035
Information technology –
Security techniques –
Information security incident
management
76
152
ISO/IEC 27035
153
ISO/IEC 27035
77
154
ISO/IEC 27035
155
78
156
SCOPE
157
79
158
Benefits
Several benefits:
Improve overall information security;
Reduce adverse business impacts;
Strengthen the information security incident prevention, prioritization, and
evidence;
Contribute to budgetary and resource justifications;
Improve updates to information security risk assessment and management
results;
Provide enhanced information security awareness and training program material;
Provide input to your information security policy and related documentation
reviews.
159
PHASES
80
160
PHASE 1 PLAN AND PREPARE
161
81
162
PHASE 3 ASSESSMENT AND DECISION
163
PHASE 4 RESPONSES
82
164
PHASE 5 LESSONS LEARNT
165
ANNEXES
83
166
167
SECTION 10
Accreditation, Certification
and Types of Audits
84
168
THE STANDARDS
International
Organization …Provides National
for Standards Standardization
Standardization Globally Bodies
(ISO)
169
ACCREDITATION
85
170
ACCREDITATION
171
ACCREDITATION
Oversight and control over the accreditation activities in the European Union
86
172
ACCREDITATION
National Accreditation
Body
Certification Bodies
173
ACCREDITATION SCHEME
Government
87
174
BENEFITS OF ACCREDITATION
Complaints management
175
BENEFITS OF CERTIFICATION
Provides confidence in clients and partners that the management system is compliant with the
respective standard
88
176
AUDITOR REGISTRATION SCHEME
Internal Auditor
Registration
177
TYPES OF AUDITS
89
178
SCOPE OF 19011 AND ITS RELATIONSHIP WITH ISO/IEC 17021
ISO 19011 concentrates on internal audits (first party) and audits conducted by
organizations on their external providers and other external interested parties
(second party). ISO 19011 can also be useful for external audits conducted for
purposes other than third party management system certification. ISO/IEC 17021-1
provides requirements for auditing management systems for third party certification;
ISO 19011 can provide useful additional guidance
179
Audit carried out by an auditing organization independent of the client and the user, for the purpose of
certifying the client's management system
NOTE 1 - In the definitions which follow, the term “audit” has been used for simplicity to refer to third-
party certification audit.
NOTE 2 - Third-party certification audits include initial, surveillance, re-certification audits, and can also
include special audits.
90
180
THIRD PARTY AUDITOR
NOTE 3 - Third-party certification audits are typically conducted by audit teams of those bodies
providing certification of conformity to the requirements of management system standards.
NOTE 4 - A joint audit is when two or more auditing organizations cooperate to audit a single client.
NOTE 5 - A combined audit is when a client is being audited against the requirements of two or more
management systems standards together.
NOTE 6 - An integrated audit is when a client has integrated the application of requirements of two or
more management systems standards into a single management system and is being audited against
more than one standard.
181
DISCUSSION
1. Explain the differences between First, Second and Third Party Audits.
2. Give the example of each party
91
182
ASSESSMENT PARTIES
CUSTOMER
Second Party
ORGANIZATION
Third Party
(First Party)
183
92
184
APPLICABLE AUDIT METHODS
On-site audit activities are performed at the location of the auditee. Remote audit activities are performed at any place
other than the location of the auditee, regardless of the distance.
Interactive audit activities involve interaction between the auditee’s personnel and the audit team. Non-interactive audit
activities involve no human interaction with persons representing the auditee but do involve interaction with equipment,
facilities and documentation.
185
EXERCISE
The tutor will prepare a white board with the following methods of audit:
Each team need to choose one of the items and present the benefits of it.
93
186
187
SECTION 11
94
188
MAIN DOCUMENTS TO BE CONSIDERED
189
NB: The new version covers all disciplines whereas the previous version covered only quality and
environmental
95
190
THE PURPOSE OF ISO/IEC 17021
191
96
192
AUDIT STAGES
• Pre-audit activities
Planning
• Audit Planning
Implementation
• On-site audit – Stage 1
and Stage 2 activities
193
• Application
• Application review
• Audit Programme
• Determining audit time
• Multi-site sampling
• Multiple management systems standards
97
194
APPLICATION
Insert Footer
195
Here
195
98
196
AUDIT PROGRAMME
ISO 19011
197
The Audit Programme shall include a two-stage initial audit, surveillance audits in the first and second
years, and a recertification audit in the third year prior to expiration of certification. The three-year
certification cycle begins with the certification or recertification decision.
The determination of the audit programme and any subsequent adjustments shall consider the size of
the client, the scope and complexity of its management system, products and processes as well as
demonstrated level of management system effectiveness and the results of any previous audits.
99
198
DETERMINING AUDIT TIME
Insert Footer
199
Here
199
• The “IAF Mandatory document for Duration of QMS and EMS Audits/2015” provides:
• guidance and methodology for calculating audit duration
• It’s applicable for any type of audit
• The Audit duration depends of 2 parameters
• Men in the scope of the management system
• Complexity of the processes
• Usually the certification body has methodology developed upon the above IAF’s document
100
200
MULTI-SITE SAMPLING
Where multi-site sampling is used for the audit of a client’s management system covering the same
activity in various geographical locations, a sampling programme to ensure proper audit of the
management system.
Where there are multiple sites not covering the same activity sampling is not appropriate
Insert Footer
201
Here
201
PLANNING THE AUDIT: AUDITS OBJECTIVES, SCOPE AND CRITERIA ISO 17021
Audit Objective
Shall be determined by the certification body. The audit scope and criteria, including any changes, shall
be established by the certification body after discussion with the client.
Audit Scope
Shall describe the extent and boundaries of the audit, such as sites, organizational units, activities and
processes to be audited. Where the initial or re-certification process consists of more than one audit
(e.g. covering different sites), the scope of an individual audit may not cover the full certification scope,
but the totality of audits shall be consistent with the scope in the certification document
Audit criteria
• the requirements of a defined normative document on management systems
• the defined processes and documentation of the management system developed by the client.
101
202
AUDITS OBJECTIVES, SCOPE AND CRITERIA - ISO/IEC 19011
Audit objectives:
Define what is to be accomplished by the individual audit
Audit criteria
Used as a reference against which conformity is determined and may include:
• Applicable policies,
• Procedures,
• Standards,
• Work instructions
• Legal requirements,
• Management system requirements,
203
102
204
PLANNING: AUDIT PLAN
The audit plan shall be appropriate to the objectives and the scope of the audit and include or refer to
the following
a) the audit objectives;
b) the audit criteria;
c) the audit scope, including identification of the organizational and functional units or processes
to be audited;
d) the dates and sites where the on-site audit activities will be conducted, including visits to temporary
sites and remote auditing activities, where appropriate;
e) the expected duration of on-site audit activities;
f) the roles and responsibilities of the audit team members and accompanying persons, such as
observers or interpreters.
Insert Footer
205
Here
205
STAGE 1 AUDIT
Stage 1
Purpose – to confirm that company’s ISMS policy, manual and procedures meet the minimum
requirements of the standard.
Activities
• To audit the auditee’s ISMS documentation
• To evaluate physical locations and site-specific conditions and to determine the preparedness for the stage 2
audit
• To review the auditee status and understanding according to standard’s requirements
• To collect necessary information, including statutory, legal and regulatory requirements
• To evaluate internal audits
• To prepare for Stage 2
103
206
STAGE 1 AUDIT - OUTPUT
207
STAGE 2 AUDIT
104
208
INITIAL CERTIFICATION AUDIT CONCLUSIONS
The audit team shall analyze all information and audit evidence gathered during the stage 1 and stage 2
audits to review the audit findings and agree on the audit conclusions.
The audit team shall provide to CB the information necessary for certification decision: the audit
reports; comments on non-conformities; correction and corrective actions taken by clients;
recommendations whether or not to grant certification.
209
SURVEILLANCE
Surveillance activities
Representative areas and functions in the scope of ISMS shall be monitored at planned periods, taking
into account changes at the client or the ISMS
Surveillance audits
On-site audit, not necessarily the full ISMS audits
Shall be planned together with other surveillance activities in order to keep CB confident that the
certified ISMS fulfils ISO 27001:2013 requirements
105
210
RECERTIFICATION
The purpose of the recertification audit is to confirm the continued conformity and effectiveness of the
ISMS as a whole, and its continued relevance and applicability for the scope of certification
It is a full ISMS audit; The recertification audit shall include an on-site audit information for granting
recertification
The certification body shall make decisions on renewing certification based on the results of the
recertification audit, as well as the results of the review of the system over the period of certification
and complaints received from users of certification
211
106
212
PROCESS APPROACH TO AUDITING
213
Objective:
Owner: Personnel
Resources
Materials and
Outputs
Equipment
COP?
Performance
Inputs
Measures
Process
Support
Procedures
107
214
REPORTING & FOLLOW UP
Reporting
• Prepare the audit report
• Approve and distribute the audit report
Follow up
• Check the effectiveness of corrective actions implemented
• Plan for next audit
• Compile the audit file
215
The management of 1st and 2nd party Audit planning and execution should call upon the skills and
techniques identified in the previous slides.
108
216
OTHER TYPES OF AUDITS…
Combined audits - the same organization has developed two or more types of management systems
(quality, ISMS, EnMS) – the audits of all are planned at the same time – which would allow for the joint
assessment of some system elements and more efficient use of audit time.
217
Integrated audits – audits of an integrated management system that complies with more than one
management system standard. Level of possible reduction of audit time depends on:
109
218
219
Case Study 5:
Risk Assessment
(90 Mins)
110
220
Case Study 6:
Risk Assessment
(90 Mins)
221
SECTION 12
Checklists
111
222
CHECKLISTS
• Are compiled from the results of a detailed study of the process descriptions, procedures and the
standard
• Used to ensure that all elements and relevant requirements contained in the standard are covered
and nothing is omitted
223
CHECKLISTS
• Space should be left on the checklist so that answers to the questions can be noted for later use.
112
224
SAMPLING
225
SAMPLE CHECKLIST
113
226
227
SECTION 13
OPENING MEETING
114
228
THE OPENING MEETING
229
115
230
THE OPENING MEETING
• confirmation of relevant work safety, emergency and security procedures for the audit team
• confirmation of the availability, roles and identities of any guides and observers
• the method of reporting, including any grading of audit findings;
• information about the conditions under which the audit may be prematurely terminated
• confirmation of the status of findings of the previous review or audit, if applicable
• methods and procedures to be used to conduct the audit based on sampling
• opportunity for the client to ask questions
Insert Footer
231
Here
231
116
232
Case Study 7:
Risk Assessment
(90 Mins)
233
SECTION 14
CONDUCTING AUDITS:
AUDIT TECHNIQUES
Purpose of this session:
To be able to list and use the words necessary to locate
objective evidence within an auditor’s code of conduct.
To be able to list and explain vertical, horizontal, forward
and backwards auditing trails. To recognize and handle
auditee delaying techniques.
To describe the roles and responsibilities of the auditors,
lead auditors and auditees
117
234
PRINCIPLES OF AUDITING
Independence: the basis for the impartiality of the audit and objectivity of the audit conclusions
Evidence-based approach: the rational method for reaching reliable and reproducible audit conclusions
in a systematic audit process
235
PRINCIPLES OF AUDITING
118
236
AUDITOR CHARACTERISTICS
237
• LEAD AUDITORS
• AUDITORS
• TECHNICAL EXPERTS
• AUDITEES
119
238
LEAD AUDITOR RESPONSIBILITIES
239
AUDITOR RESPONSIBILITIES
120
240
AUDITEE’S RESPONSIBILITIES
• Co-operate with the Auditor in the planning and conducting of the Audit.
• Provide access for the Audit team.
• Provides guides.
• Attend the opening and closing meetings.
• Address and implement corrective action.
241
Observers
The presence and justification of observers during an audit activity shall be agreed to by the certification
body and client prior to the conduct of the audit. The audit team shall ensure that observers do not
unduly influence or interfere in the audit process or outcome of the audit.
Technical experts
The role of technical experts during an audit activity shall be agreed to by the certification body and
client prior to the conduct of the audit. A technical expert shall not act as an auditor in the audit team.
The technical experts shall be accompanied by an auditor.
Insert Footer
242
Here
121
242
GUIDES
Insert Footer
243
Here
243
AUDIT TECHNIQUES
• Interview
• Observation of processes and activities
• Review of documentation and records
• Review of documented information
• Examine Objective Evidence
• Observe Activities
• Listen to Reactions
• Record Findings
122
244
TYPICAL PROCESS OF COLLECTING AND VERIFYING INFORMATION
245
Auditors may not always receive full co-operation from the Auditee, it is therefore important to
recognise when such situations are occurring and take appropriate action.
123
246
THE AUDITORS SIX FRIENDS
• Who ?
• What ?
• Where ?
• When ?
• Why ?
• How ?
247
QUESTION TECHNIQUE
YES / NO Questions
• Often elicit dead end answers - you gain nothing –
• Only useful as a leader question.
Explanation Questions
• Useful for comparing interfaces.
124
248
QUESTIONING TECHNIQUES IN AUDIT INTERVIEW (BEST PRACTICES)
Through Questioning, auditors have to zero down the conversations in a
FRIENDLY MANNER, to witness / verify evidences to reach an audit
conclusion on degree of compliances
Qs. Type Sample Expected Answer Cautions during asking
Open Qs. What is the system you This is a lab where we quality Auditee may go into
maintain here? testing & calibrate measuring defensive mode –
instruments mainly with closed
questions
Probing Which acceptance criteria Every product have different
Qs. you use for quality standards which are acceptance
inspections ? criteria for quality
249
125
250
QUESTIONING TECHNIQUES
251
QUESTION TECHNIQUE
126
252
QUESTIONING TECHNIQUES
253
OBJECTIVE EVIDENCE
Try to establish:
127
254
OBJECTIVE EVIDENCE
255
Investigate Nonconformity
128
256
EVIDENCES IN AUDITS – SAMPLES IN AUDIT TRIAL
Process > Set of interacting activities which transforms inputs and outputs
257
AUDIT TECHNIQUES
1. Horizontal Audit
When conducting Audits it is common practice to plan to cover department by department with the
scope of the Audit. Such Audits are effective at examining each department against their own quality
procedure for which they have direct responsibility. However, such Audits fail to address departmental
interface.
2. Vertical or Project
Such Audits follow a project trail through a company, e.g. through design, purchasing, production,
test and dispatch. But in completing the trail will ensure that departmental interfaces are functioning
adequately.
129
258
AUDIT TECHNIQUES
DEVELOPMENT Horizontal
Vertical
PURCHASING Horizontal
PRODUCTION Horizontal
TRAINING Horizontal
The processes cross through departments and functions, this is why the vertical audit tests the
interdependency between process
259
AUDIT TECHNIQUES
Forward Trace - An audit which follows the natural flow of a product or service process
Backward Trace - An audit which traces records back through the system
130
260
CONDUCTING THE AUDIT
• The auditors audit the area assigned to them in the audit plan.
• Sample the system.
• Collect objective evidence of system effectiveness.
• Compare findings from checklist with requirements.
• Decide compliance or noncompliance.
• Audit team daily meeting [or more frequently].
261
131
262
THE AUDIT
263
OBSERVATIONS
132
264
OBSERVATIONS
Always establish objective evidence when an apparent nonconformity is found, remember the
occurrence discovered may be the effect and not the cause.
Where processes are involved the audit may examine the process controls and records to establish
conformance with the specification.
265
133
266
SECTION 15
CONDUCTING AUDIT:
RAISING NON-
CONFORMITIES
267
Insert Footer
268
Here
134
268
AUDIT FINDINGS ISO 19011
Insert Footer
269
Here
269
RECORDING CONFORMITIES
Insert Footer
270
Here
135
270
RECORDING NONCONFORMITIES
Insert Footer
271
Here
271
NONCONFORMITY REPORTING
Why is it a noncompliance?
• i.e. against what requirement
136
272
NONCONFORMITY REPORT
273
WORDING OF NCR’S
Failure to achieve clear factual information will invite challenge of the findings at the closing meeting.
This will be particularly important in areas where the emphasis is placed on the following
• Management Commitment
• Competence
• Communication
• Continual improvement
137
274
OBSERVATIONS
Notes made by an auditor during assessment may lead to non-compliances being raised or to provide
information for the audit report
275
CATEGORISING NON-CONFORMITIES
Major
Minor
There is a defined system, documented information and arrangements which satisfy agreed
requirements against which the organisation being assessed can demonstrate an acceptable level on
implementation overall, but there are minor discrepancies or lapses in discipline.
138
276
REVIEWING CORRECTIVE ACTIONS
277
139
278
CORRECTIVE ACTION RESPONSIBILITIES
Nonconformity
Auditor
279
140
280
SECTION 16
CONDUCTING AUDITS:
AUDIT REPORTING AND
CLOSING MEETING
Purpose of this section:
To be able to list and present closing meeting
agenda points
To be able to list the contents of an audit report
281
AUDIT REPORTING
Content:
a) identification of the certification body;
b) the name and address of the client and the client’s representative;
c) the type of audit (e.g. initial, surveillance or recertification audit or special audits);
d) the audit criteria;
e) the audit objectives;
f) the audit scope
g) any deviation from the audit plan and their reasons
h) any significant issues impacting on the audit programme
141
282
AUDIT REPORTING
i) identification of the audit team leader, audit team members and any accompanying persons;
j) the dates and places where the audit activities were conducted
k) audit findings
l) significant changes
m) any unresolved issues, if identified
n) where applicable, whether the audit is combined, joint or integrated
o) statement that auditing is based on a sampling process of the available information;
p) recommendation from the audit team
q) use of the certification documents and marks, if applicable
r) verification of effectiveness of taken corrective actions regarding previously identified
nonconformities, if applicable
Insert Footer
283
Here
283
Insert Footer
284
Here
142
284
AUDIT FILE
• Audit plan
• Audit report
• Open/closing meeting attendance list
• Copies of non-conformity reports and objective evidence provided
• Assignment of the audit teams
• Confidentiality statements of the audit team
285
Advise auditee of findings and conclusions reached based on the audit findings
• ACCEPTABLE
• UNACCEPTABLE
143
286
CLOSING MEETING
287
144
288