SC ISO 27001 Self Assessment Checklist
SC ISO 27001 Self Assessment Checklist
Checklist
Preparing your Information Security
Management System for ISO 27001 certification.
ISMS CHECKLIST
Secure your
information assets
Getting certified to ISO 27001:2022 demonstrates your organisation’s
commitment to cyber security and the security of your information assets.
CERTIFICATION DIFFERENTLY 2
TM
ISMS CHECKLIST | ISO 27001:2022
Clause 8 Operation
• Has your organisation established operating procedures, including criteria and implementation of Yes ☐ No ☐
process controls in accordance with criteria, as needed to ensure information security
requirements are met?
• Has your organisation established change management procedures and processes for reviewing Yes ☐ No ☐
the consequences of unintended change?
• Has your organisation determined any/all outsourced processes and established related controls? Yes ☐ No ☐
• Has your organisation determined the documented information to be retained to the extent Yes ☐ No ☐
necessary to have confidence that the processes have been carried out as planned?
Clause 9 Performance evaluation
• Has your organisation established processes and methods for monitoring, measuring, analysing Yes ☐ No ☐
and evaluating ISMS performance and effectiveness i.e., what, when, how, and by whom?
• Has your organisation determined how evidence will be preserved? Yes ☐ No ☐
9.2 Internal audit
• Has your organisation established a documented audit programme that defines timing, Yes ☐ No ☐
responsibilities, reporting, audit criteria and scope?
• Has your organisation established a process to ensure results and evidence of implementation of Yes ☐ No ☐
the internal audit program/process are documented and available?
9.3 Management Review
• Does your organisation conduct and document regular management reviews of the ISMS? Yes ☐ No ☐
10 Nonconformity & Continuous Improvement
• Does your organisation record all nonconformities, including initial correction, root cause and Yes ☐ No ☐
corrective actions?
• Does your organisation continually improve the effectiveness of ISMS using information security Yes ☐ No ☐
policy, audit results, analysis of events, corrective actions and management review?
Mandatory ISMS Documented Information
Does your organisation maintain the following mandatory documentation?
• Documented scope of the ISMS (4.3) Yes ☐ No ☐
• Information Security Policy (5.2) Yes ☐ No ☐
• Organisational roles and responsibilities (5.3) Yes ☐ No ☐
• Statement of Applicability (IS6.1.3d) Yes ☐ No ☐
• Information security risk assessment procedure (6.1.2) Yes ☐ No ☐
• Results of the information security risk assessments (8.2) Yes ☐ No ☐
• Information security risk treatment procedure (plan) (6.1.3) Yes ☐ No ☐
• Decisions regarding information security risk treatments (8.3) Yes ☐ No ☐
• ISMS Objectives, targets and plans to achieve them (6.2) Yes ☐ No ☐
• Competency evidence (7.2) Yes ☐ No ☐
• Operating Procedures (8.1) Yes ☐ No ☐
• Evaluation, Measurement, Analysis and Evaluation results (9.1) i.e., ISMS performance including Yes ☐ No ☐
trends and performance against objectives.
• Internal audit (9.2) i.e., Procedure, Schedule, Internal Audit Reports Yes ☐ No ☐
CONTACT US
CERTIFICATION DIFFERENTLY 6
TM
CERTIFICATION DIFFERENTLY
TM
CONNECT WITH US