Delegate Handouts PPT ISMSLA
Delegate Handouts PPT ISMSLA
1
2
Welcome
Welcome to your CQI and IRCA Certified
ISO 27001 Lead Auditor Information Security
Management Systems VILT Course (ISMS)
www.quality.org/training
2
4
The Value of Effective Auditing
‘There was an evident belief of senior managers
that they were working in a safe organisation.
This may have been because they may not have
known how to seek out, or to recognise, the
symptoms of an unsafe organisation. It may
also be true that they would not have known
what practical steps to take to turn an unsafe
organisation into a safe organisation.’
SECURITY NOTICE
3
6
MOBILE PHONES IN SILENT MODE
COURSE OVERVIEW
Group
Audit
Practice
Work
Presentation
Exam
4
8
DELEGATE RESPONSIBILITY
DELEGATE RESPONSIBILITY
5
10
COURSE CONTENT
11
TESTING UNDERSTANDING
New exam pattern introduced for English speaking course. Refer the
exam guideline document.
6
12
DELEGATE INTRODUCTIONS
You will be asked to introduce the person to your left or
right. You will need to discover the following information
about them for the introduction
• Their name
• A brief description of their organisation
• A brief job description
• Their involvement in ISMS
• Why they are here
• And finally…superpowers they wish to have
Time allowed – 2 minutes
13
COURSE OBJECTIVES
Upon successful completion of this course you will…
7
14
COURSE STRUCTURE
15
COURSE OBJECTIVES
8
16
COURSE PLAN
About Unified
Standards Framework
Information
Implementation
Security
&
Management
Measurements
Systems
17
• Pre-audit management
Planning • Document review
• Detailed planning for the on-site audit
9
18
COURSE PLAN
Planning Audits
Collecting &
Conducting Audits
Verifying Evidence
19
COURSE PLAN
Completing Closing
Audit Meeting
10
20
21
11
22
HISTORY OF REQUIREMENTS
23
12
24
INFORMATION SECURITY MANAGEMENT SYSTEM
25
27
Confidentiality
Security
Integrity Availability
14
28
THREATS AND VULNERABILITIES
29
EXAMPLES…
15
30
Terms and Definitions
31
16
32
COMMON TERMS AND DEFINITION - GENERAL
33
organization
person or group of people that has its own functions with
responsibilities, authorities and relationships to achieve its
objectives
17
34
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
35
requirement
need or expectation that is stated, generally implied or
obligatory
18
36
COMMON TERMS AND DEFINITION - ANNEX
SL. COMPARISON (CONT.)
management system
set of interrelated or interacting elements of an organization to
establish policies and objectives and processes to achieve those
objectives
NOTE 1 : A management system can address a single discipline
or several disciplines.
NOTE 2 : The system elements include the organization’s
structure, roles and responsibilities, planning, operation, etc.
NOTE 3 : The scope of a management system may include the
whole of the organization, specific and identified functions of
the organization, specific and identified sections of the
organization, or one or more functions across a group of
organizations.
37
NOTE 1: Top management has the power to delegate authority and provide
resources within the
organization.
NOTE 2: If the scope of the management system covers only part of an
organization then top management refers to those who direct and control
that part of the organization.
19
38
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
effectiveness
extent to which planned activities are realized and planned
results achieved
policy
intentions and direction of an organization as formally expressed
by its top management
39
20
40
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
Risk
effect of uncertainty
NOTE 1: An effect is a deviation from the expected — positive or negative.
NOTE 2: Uncertainty is the state, even partial, of deficiency of information related
to, understanding or knowledge of, an event, its consequence, or likelihood.
NOTE 3: Risk is often characterized by reference to potential events (ISO Guide 73,
3.5.1.3) and consequences (ISO Guide 73, 3.6.1.3), or a combination of these.
NOTE: Risk is often expressed in terms of a combination of the consequences of an
event (including changes in circumstances) and the associated likelihood (ISO
Guide 73, 3.6.1.1) of occurrence.
41
competence
ability to apply knowledge and skills to achieve intended results
21
42
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
documented information
information required to be controlled and maintained by
an organization and the medium on which it is contained
NOTE 1: Documented information can be in any format and media
and from any source.
NOTE 2: Documented information can refer to:
– the management system, including related processes;
– information created in order for the organization to operate
(documentation);
– evidence of results achieved (records).
43
performance
measurable result
NOTE 1: Performance can relate either to quantitative or qualitative
findings.
NOTE 2: Performance can relate to the management of activities,
processes, products (including services), systems or organizations.
22
44
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
outsource (verb)
make an arrangement where an external organization
performs part of an organization’s function or process
NOTE 1: An external organization is outside the scope of the
management system, although the outsourced function or process
is within the scope.
monitoring
determining the status of a system, a process or an
activity
NOTE 1 to entry: To determine the status there may be a need to
check, supervise or critically observe.
45
measurement
process to determine a value
23
46
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
audit
systematic, independent and documented process for
obtaining audit evidence and evaluating it objectively to
determine the extent to which the audit criteria are
fulfilled
NOTE 1: An audit can be an internal audit (first party) or an
external audit (second party or third party), and it can be a
combined audit (combining two or more disciplines).
NOTE 2: “Audit evidence” and “audit criteria” are defined in ISO
19011.
47
conformity
fulfilment of a requirement
nonconformity
non-fulfilment of a requirement
24
48
COMMON TERMS AND DEFINITION - ANNEX SL. COMPARISON
(CONT.)
correction
action to eliminate a detected nonconformity
corrective action
action to eliminate the cause of a nonconformity and to prevent
recurrence
49
continual improvement
recurring activity to enhance performance
25
50
51
SECTION 3
Annex SL (normative) - Proposals
for management system
standards and unified
framework
26
52
ANNEX SL – GENERAL
53
Unified frameworks:
• high level structure (HLS)
• identical clause titles
• identical text
• common terms and definitions
27
54
ANNEX SL - APPENDIXES
55
28
56
ANNEX SL - SL.6 GENERAL PRINCIPLES (CONT.)
57
29
58
APPENDIX 1
59
APPENDIX 2
30
60
Appendix 3
They all form the nucleus of future and revised ISO Type
A management system standards.
61
APPENDIX 3 (CONT.)
31
62
APPENDIX 4
63
UNIFIED FRAMEWORK
32
64
THE NEED FOR UNIFIED FRAMEWORK AND HLS
65
33
66
HIGH LEVEL STRUCTURE
•Introduction
•Cl. 1 - Scope
•Cl. 2 - Normative references
•Cl. 3 - Terms and definitions
•Cl. 4 - Context of the organization
•Cl. 5 - Leadership
•Cl. 6 - Planning
•Cl. 7 – Support
•Cl. 8 - Operation
•Cl. 9 - Performance evaluation
•Cl. 10 - Improvement
67
GENERAL COMMENT
34
68
69
SECTION 4
35
70
ORIGINS OF ISO/IEC 27001
36
72
ISO 27001:2022 STRUCTURE
Clause 1-Scope
Clause 2-Normative Reference
Clause 3-Terms and Definitions
73
37
74
ISO 27001:2022 STRUCTURE
Clause 5 Leadership
75
Clause 6 Planning
38
76
ISO 27001:2022 STRUCTURE
Clause 7 Support
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communication
7.5 Documented information
77
Clause 8 Operation
39
78
ISO 27001:2022 STRUCTURE
79
Clause 10 Improvement
40
80
DOCUMENTATION REQUIREMENT
1. Scope of the ISMS (clause 4.3)
2. Information security policy and objectives (clauses 5.2 and 6.2)
3. Risk assessment and risk treatment methodology (clause 6.1.2)
4. Statement of Applicability (clause 6.1.3 d)
5. Risk treatment plan (clauses 6.1.3 e and 6.2)
6. Risk assessment report (clause 8.2)
Documents from Annex A are mandatory only if the organisation has decided to
implement a particular control
81
DOCUMENTATION REQUIREMENT
41
82
ISMS
Strengths Weaknesses
•Improved net security level of the •Requires resources:
organization -material
•Demonstrated conformity with compliance -time
requirements •Distracts personal from other important tasks
•External expertise & assistance brings good •Other…………to be added by the delegates
practices
•Other……to be added by the delegates
Opportunities Threats
•Asset in marketing •Possible access to the organization's info if external
•Improved security for client's and partner's assistance is not properly managed
information •Overconfidence in ISMS as form of total protection
•Opportunities for improvement identified ( it is not and is not intended to be)
•Other…………to be added by the delegates •Other…………to be added by the delegates
83
ISMS
Opportunities Threats
•Better market positions - new contracts •External access to the organization's info if no
•Opportunities for improvement identified appropriate measures are applied.
•Other ….. to be added by the delegates •Overconfidence that information is totally
protected
•Other…. to be added by the delegates.
42
84
85
SECTION 5
Information Risk
Assessment and
Treatment
43
86
REFERENCE GUIDANCE ISO STANDARD
87
ISO/IEC 27005:2022
Structure of the standard ISO / IEC 27005:2022
Overview- Risk Management - (5)
Define Context - (6)
Risk Assessment - (7)
Risk Treatment - (8)
Operation- (9)
Leveraging related ISMS processes– (10)
Annex A Examples of Techniques in support of the risk assessment
process.
44
88
INFORMATION SECURITY RISK MANAGEMENT PROCESS
89
TERMS
INFORMATION SECURITY RISK - potential that a given threat will exploit
vulnerabilities of an asset or group of assets and thereby cause harm to the
organization (It is measured in terms of a combination of the likelihood of an
event and its consequence).
RISK MANAGEMENT - coordinated activities to direct and control an
organization with regard to risk
RISK ASSESSMENT – overall process of risk analysis and risk evaluation
RISK ANALYSIS – systematic use of information to identify sources and to
estimate risk
RISK IDENTIFICATION - process to find, list and characterize elements of risk
RISK ESTIMATION - process to assign values to the probability and
consequences of a risk
45
90
ISO/IEC 27005 provides general guidance but does not require or
imply the use of any specific method for risk assessment!
91
Process Mapping
Scenario Analysis
Business Studies and Benchmarking
Incidents Investigation
Auditing and Inspection
HAZOP
Checklists and questionnaires
46
92
TWO ISSUES TO CONSIDER:
93
94
47
94
ISO/IEC 27005
95
APPROACHES
48
96
QUANTITATIVE RISK ANALYSIS
97
49
98
QUALITATIVE RISK ANALYSIS
Risk Assessment
The risks have to be assessed to identify the potential
business harm, identifying likelihood of the failure. Establish the
level of the risk and from there whether it is acceptable or
control is required
Controls
These are countermeasures to vulnerabilities.
May be divided into four types: deterrent controls,
preventive controls, corrective controls and detective controls
99
50
100
THE QUALITATIVE APPROACH
101
ISO/IEC 27005
51
102
RISK TREATMENT OPTIONS (9)
Residual Risk –
Reduce/Treat Accept or Treat again
Risk
Risk Remains/
Retain/Accept
Accept
Insure/some level of
Transfer
risk remains
103
TERMS
52
104
RISK REDUCTION (9.2)- CONTROLS
105
53
106
OTHER ISSUES TO CONSIDER:
• Risks are not static (12.2), periodic reviews of security risks and
related controls will be carried out:
taking account of new threats and vulnerabilities;
assessing the impact of changes to the business/ environment;
to confirm effectiveness of controls
107
ISO 31000:2018
54
108
WHAT IS ISO 31000
109
1 Scope
2 Normative references
3 Terms and definitions
4 Principles
5 Framework
5.1 General
5.2 Leadership and commitment
5.3 Integration
5.4 Design
5.4.1 Understanding the organization and its context
5.4.2 Articulating risk management commitment
5.4.3 Assigning organizational roles, authorities, responsibilities and
accountabilities 7
5.4.4 Allocating resources
5.4.5 Establishing communication and
110
55
110
ISO 31000 - CONTENT
5.5 Implementation
5.6 Evaluation
5.7 Improvement
5.7.1 Adapting
5.7.2 Continually improving
6 Process
6.1 General
6.2 Communication and consultation
6.3 Scope, context and criteria
6.3.1 General
6.3.2 Defining the scope
6.3.3 External and internal context
6.3.4 Defining risk criteria
111
111
112
56
112
ISO 31000 PRINCIPLES
113
113
57
114
RISK MANAGEMENT PROCESS
115
Risks will always exist around us, and we can never eliminate unwanted
situations except by completely terminating activities that can produce
negative effects. In most cases, you must follow objectives driven by the
organization`s top management, so the best you can do is use best practices
presented in all three standards to try to prevent or minimize negative effects.
58
116
117
SECTION 6
59
118
THE CODE OF PRACTICE ISO 27002:2022
ISO 27002 was published in February 2022 and it now has a different from ISO 27001,
Annex A.
In the last update of 27002 from February 2022, the areas, control objectives and
controls were regrouped, with controls added and dropped. The structure of ISO / IEC
27002 differs from the structure of ISO / IEC 27001: 2013 (Annex A);
Categories & Domains / Areas: Control groups are already organized into four (4)
categories or topics, as opposed to fourteen (14) control domains / areas from version
2013. The four categories include organizational, people, physical and technological
controls.
119
60
120
THE CODE OF PRACTICE ISO 27002:2022
121
SCOPE
61
122
ISO 27002 SECTIONS
8
7
123
62
124
SECTION 07
STAGES OF ISMS DEVELOPMENT
ISO/IEC 27003
ISO/IEC 27004
125
63
126
ISMS Development - Stages
127
Statement of Applicability.
ISMS effectiveness measurements- criteria for the
measurements.
ISMS documentation and implementation of the ISMS.
Implementation and monitoring of a Risk Treatment Plan.
Internal audits of the ISMS.
Business Continuity Management.
Management of incidents involving information security.
64
128
ISMS Development - Stages
129
ISO/IEC 27004
65
130
PROCESS OF MEASURING
131
66
132
RELEVANT STAKEHOLDERS
For each base measure must be defined and documented relevant
stakeholders who may be:
• Client of measurement: stakeholders requesting information regarding
the effectiveness of the ISMS or the controls;
• Reviewer for measurement: validates the adequacy of the developed
measurement constructs for assessing the effectiveness of the ISMS or
the controls;
• Information Owner : owns the information about an object of
measurement and attributes and is responsible for the measurement;
• Information Collector: is responsible for collecting, recording and
storing the data;
• Information Communicator: is responsible for analyzing data and
communicating measurements results;
133
• Measurement Objectives;
• Controls objectives / group of controls / ISMS processes
that must be measured;
• Object of measurement;
• Data that must be collected and used;
• Processes for collecting and analyzing of data;
• Reporting process and reporting form of the
measurement results;
• Roles and responsibilities of the stakeholders;
• Cyclic review of measurement.
67
134
POSSIBLE RESULTS OF THE DATA MEASUREMENTS
ANALYSIS /NONCONFORMITIES/:
135
68
136
SECTION 08
ISMS and the Legal
Compliance
137
69
138
ROLES
139
70
140
IDENTIFICATION OF APPLICABLE LEGISLATION
141
71
142
APPLICABLE MIGHT BE
EU legislation.
143
RELEVANT LEGISLATION
72
144
ACTS - MAKE SURE YOU KNOW THE
APPLICABLE LEGISLATION
Access to Public Information Act /2000, last revision 2002/
Classified Information Protection Act /2002, last revision 2003/
• Governs the creation, processing, retention of classified information and
the order and conditions for securing the access to it.
145
Purpose:
• to secure freedom and secret of telecommunications;
• To protect the interests of the users;
• To safeguard public interests and national security and
defense
73
146
BANKING REGULATIONS
147
74
148
COMPLEXITY OF IS REGULATIONS
149
COMPLIANCE
75
150
IMPORTANT!
Legal Requirements
• Failure to comply with legal requirements may result in a fine or
imprisonment
Conformance to ISO Standards
• Failure to comply with ISO Standard 3rd Party Certification
requirement may lead to loss of registration
151
76
152
SECTION 09
ISO/IEC 27035
Information technology –
Security techniques –
Information security incident
management
153
ISO/IEC 27035
77
154
ISO/IEC 27035
155
ISO/IEC 27035
78
156
Information security breaches
157
SCOPE
79
158
TERMS AND DEFINITIONS
information security forensics - application of investigation and
analysis techniques to capture, record and analyse information
security incidents.
information security incident response team /ISIRT/ - team of
appropriately skilled and trusted members of the organization that
handles information security incidents during their lifecycle. The
organization may temporarily attract external experts to
investigate/respond to computer incident .
information security event - identified occurrence of a system,
service or network state indicating a possible breach of
information security, policy or failure of controls, or a previously
unknown situation that may be security relevant.
information security incident - single or a series of unwanted or
unexpected information security events that have a significant
probability of compromising business operations and threatening
information security.
159
Benefits
Several benefits:
Improve overall information security;
Reduce adverse business impacts;
Strengthen the information security incident prevention, prioritization, and
evidence;
Contribute to budgetary and resource justifications;
Improve updates to information security risk assessment and management
results;
Provide enhanced information security awareness and training program material;
Provide input to your information security policy and related documentation
reviews.
80
160
PHASES
161
81
162
PHASE 2 DETECTION AND REPORTING
163
82
164
PHASE 4 RESPONSES
165
83
166
ANNEXES
167
84
168
SECTION 10
Accreditation, Certification
and Types of Audits
169
THE STANDARDS
International
Organization …Provides National
for Standards Standardization
Standardization Globally Bodies
(ISO)
85
170
ACCREDITATION
171
ACCREDITATION
86
172
ACCREDITATION
Oversight and control over the accreditation activities in the European Union
173
ACCREDITATION
National Accreditation
Body
Certification Bodies
87
174
ACCREDITATION SCHEME
Government
175
BENEFITS OF ACCREDITATION
Complaints management
88
176
BENEFITS OF CERTIFICATION
Provides confidence in clients and partners that the management system is compliant with the
respective standard
177
Internal Auditor
Registration
89
178
TYPES OF AUDITS
179
ISO 19011 concentrates on internal audits (first party) and audits conducted by
organizations on their external providers and other external interested parties
(second party). ISO 19011 can also be useful for external audits conducted for
purposes other than third party management system certification. ISO/IEC 17021-1
provides requirements for auditing management systems for third party certification;
ISO 19011 can provide useful additional guidance
90
180
THIRD PARTY AUDITS ACCORDING TO 17021-1:2015
Audit carried out by an auditing organization independent of the client and the user, for the purpose of
certifying the client's management system
NOTE 1 - In the definitions which follow, the term “audit” has been used for simplicity to refer to third-
party certification audit.
NOTE 2 - Third-party certification audits include initial, surveillance, re-certification audits, and can also
include special audits.
181
NOTE 3 - Third-party certification audits are typically conducted by audit teams of those bodies
providing certification of conformity to the requirements of management system standards.
NOTE 4 - A joint audit is when two or more auditing organizations cooperate to audit a single client.
NOTE 5 - A combined audit is when a client is being audited against the requirements of two or more
management systems standards together.
NOTE 6 - An integrated audit is when a client has integrated the application of requirements of two or
more management systems standards into a single management system and is being audited against
more than one standard.
91
182
DISCUSSION
1. Explain the differences between First, Second and Third Party Audits.
2. Give the example of each party
183
ASSESSMENT PARTIES
CUSTOMER
Second Party
ORGANIZATION
Third Party
(First Party)
92
184
OTHER TYPES OF AUDITS
185
On-site audit activities are performed at the location of the auditee. Remote audit activities are performed at any place
other than the location of the auditee, regardless of the distance.
Interactive audit activities involve interaction between the auditee’s personnel and the audit team. Non-interactive audit
activities involve no human interaction with persons representing the auditee but do involve interaction with equipment,
facilities and documentation.
93
186
EXERCISE
The tutor will prepare a white board with the following methods of audit:
Each team need to choose one of the items and present the benefits of it.
187
94
188
SECTION 11
189
95
190
ISO 19011: 2018 GUIDELINES FOR MANAGEMENT
SYSTEMS AUDITING
NB: The new version covers all disciplines whereas the previous version covered only quality and
environmental
191
96
192
RELATIONSHIP BETWEEN ISO/IEC 19011:2018 AND ISO/IEC 17021:2015
ISO 19011 concentrates on internal audits (first party) and audits
conducted by organizations on their external providers and other
external interested parties (second party). ISO 19011 can also be
useful for external audits conducted for purposes other than third
party management system certification. ISO/IEC 17021-1 provides
requirements for auditing management systems for third party
certification; ISO 19011 can provide useful additional guidance
1st party audit 2nd party audit 3rd party audit
Internal audit External provider audit Certification and/or
accreditation audit
193
AUDIT STAGES
• Pre-audit activities
Planning
• Audit Planning
Implementation
• On-site audit – Stage 1
and Stage 2 activities
97
194
PLANNING: PRE-AUDIT ACTIVITIES
• Application
• Application review
• Audit Programme
• Determining audit time
• Multi-site sampling
• Multiple management systems standards
195
APPLICATION
Insert Footer
196
Here
98
196
AUDIT PROGRAMME ISO 19011:2018
197
AUDIT PROGRAMME
ISO 19011
99
198
AUDIT PROGRAMME ISO 17021-1:2015
The Audit Programme shall include a two-stage initial audit, surveillance audits in the first and second
years, and a recertification audit in the third year prior to expiration of certification. The three-year
certification cycle begins with the certification or recertification decision.
The determination of the audit programme and any subsequent adjustments shall consider the size of
the client, the scope and complexity of its management system, products and processes as well as
demonstrated level of management system effectiveness and the results of any previous audits.
199
Insert Footer
200
Here
100
200
DETERMINING AUDIT DURATION
• The “IAF Mandatory document for Duration of QMS and EMS Audits/2015” provides:
• guidance and methodology for calculating audit duration
• It’s applicable for any type of audit
• The Audit duration depends of 2 parameters
• Men in the scope of the management system
• Complexity of the processes
• Usually the certification body has methodology developed upon the above IAF’s document
201
MULTI-SITE SAMPLING
Where multi-site sampling is used for the audit of a client’s management system covering the same
activity in various geographical locations, a sampling programme to ensure proper audit of the
management system.
Where there are multiple sites not covering the same activity sampling is not appropriate
Insert Footer
202
Here
101
202
PLANNING THE AUDIT: AUDITS OBJECTIVES, SCOPE AND CRITERIA ISO 17021
Audit Objective
Shall be determined by the certification body. The audit scope and criteria, including any changes, shall
be established by the certification body after discussion with the client.
Audit Scope
Shall describe the extent and boundaries of the audit, such as sites, organizational units, activities and
processes to be audited. Where the initial or re-certification process consists of more than one audit
(e.g. covering different sites), the scope of an individual audit may not cover the full certification scope,
but the totality of audits shall be consistent with the scope in the certification document
Audit criteria
• the requirements of a defined normative document on management systems
• the defined processes and documentation of the management system developed by the client.
203
Audit objectives:
Define what is to be accomplished by the individual audit
Audit criteria
Used as a reference against which conformity is determined and may include:
• Applicable policies,
• Procedures,
• Standards,
• Work instructions
• Legal requirements,
• Management system requirements,
102
204
COMPETENCY OF AUDIT TEAM
205
The audit plan shall be appropriate to the objectives and the scope of the audit and include or refer to
the following
a) the audit objectives;
b) the audit criteria;
c) the audit scope, including identification of the organizational and functional units or processes
to be audited;
d) the dates and sites where the on-site audit activities will be conducted, including visits to temporary
sites and remote auditing activities, where appropriate;
e) the expected duration of on-site audit activities;
f) the roles and responsibilities of the audit team members and accompanying persons, such as
observers or interpreters.
Insert Footer
206
Here
103
206
STAGE 1 AUDIT
Stage 1
Purpose – to confirm that company’s ISMS policy, manual and procedures meet the minimum
requirements of the standard.
Activities
• To audit the auditee’s ISMS documentation
• To evaluate physical locations and site-specific conditions and to determine the preparedness for the stage 2
audit
• To review the auditee status and understanding according to standard’s requirements
• To collect necessary information, including statutory, legal and regulatory requirements
• To evaluate internal audits
• To prepare for Stage 2
207
104
208
STAGE 2 AUDIT
209
The audit team shall analyze all information and audit evidence gathered during the stage 1 and stage 2
audits to review the audit findings and agree on the audit conclusions.
The audit team shall provide to CB the information necessary for certification decision: the audit
reports; comments on non-conformities; correction and corrective actions taken by clients;
recommendations whether or not to grant certification.
105
210
SURVEILLANCE
Surveillance activities
Representative areas and functions in the scope of ISMS shall be monitored at planned periods, taking
into account changes at the client or the ISMS
Surveillance audits
On-site audit, not necessarily the full ISMS audits
Shall be planned together with other surveillance activities in order to keep CB confident that the
certified ISMS fulfils ISO 27001:2013 requirements
211
RECERTIFICATION
The purpose of the recertification audit is to confirm the continued conformity and effectiveness of the
ISMS as a whole, and its continued relevance and applicability for the scope of certification
It is a full ISMS audit; The recertification audit shall include an on-site audit information for granting
recertification
The certification body shall make decisions on renewing certification based on the results of the
recertification audit, as well as the results of the review of the system over the period of certification
and complaints received from users of certification
106
212
ON-SITE AUDIT ACTIVITIES
213
107
214
THE TURTLE DIAGRAM PROCESS PLAN
Objective:
Owner: Personnel
Resources
Materials and
Outputs
Equipment
COP?
Performance
Inputs
Measures
Process
Support
Procedures
215
Reporting
• Prepare the audit report
• Approve and distribute the audit report
Follow up
• Check the effectiveness of corrective actions implemented
• Plan for next audit
• Compile the audit file
108
216
FIRST AND SECOND PARTY AUDITS
The management of 1st and 2nd party Audit planning and execution should call upon the skills and
techniques identified in the previous slides.
217
Combined audits - the same organization has developed two or more types of management systems
(quality, ISMS, EnMS) – the audits of all are planned at the same time – which would allow for the joint
assessment of some system elements and more efficient use of audit time.
109
218
OTHER TYPES OF AUDITS…
Integrated audits – audits of an integrated management system that complies with more than one
management system standard. Level of possible reduction of audit time depends on:
219
110
220
Case Study 5:
Risk Assessment
(90 Mins)
221
Case Study 6:
Risk Assessment
(90 Mins)
111
222
SECTION 12
Checklists
223
CHECKLISTS
• Are compiled from the results of a detailed study of the process descriptions, procedures and the
standard
• Used to ensure that all elements and relevant requirements contained in the standard are covered
and nothing is omitted
112
224
CHECKLISTS
• Space should be left on the checklist so that answers to the questions can be noted for later use.
225
SAMPLING
113
226
SAMPLE CHECKLIST
227
114
228
SECTION 13
OPENING MEETING
229
115
230
THE OPENING MEETING
231
• confirmation of relevant work safety, emergency and security procedures for the audit team
• confirmation of the availability, roles and identities of any guides and observers
• the method of reporting, including any grading of audit findings;
• information about the conditions under which the audit may be prematurely terminated
• confirmation of the status of findings of the previous review or audit, if applicable
• methods and procedures to be used to conduct the audit based on sampling
• opportunity for the client to ask questions
Insert Footer
232
Here
116
232
233
Case Study 7:
Risk Assessment
(90 Mins)
117
234
SECTION 14
CONDUCTING AUDITS:
AUDIT TECHNIQUES
Purpose of this session:
To be able to list and use the words necessary to locate
objective evidence within an auditor’s code of conduct.
To be able to list and explain vertical, horizontal, forward
and backwards auditing trails. To recognize and handle
auditee delaying techniques.
To describe the roles and responsibilities of the auditors,
lead auditors and auditees
235
PRINCIPLES OF AUDITING
Independence: the basis for the impartiality of the audit and objectivity of the audit conclusions
Evidence-based approach: the rational method for reaching reliable and reproducible audit conclusions
in a systematic audit process
118
236
PRINCIPLES OF AUDITING
237
AUDITOR CHARACTERISTICS
119
238
ROLES, RESPONSIBILITIES, COMPETENCE REQUIREMENTS
• LEAD AUDITORS
• AUDITORS
• TECHNICAL EXPERTS
• AUDITEES
239
120
240
AUDITOR RESPONSIBILITIES
241
AUDITEE’S RESPONSIBILITIES
• Co-operate with the Auditor in the planning and conducting of the Audit.
• Provide access for the Audit team.
• Provides guides.
• Attend the opening and closing meetings.
• Address and implement corrective action.
121
242
OBSERVER AND TECHNICAL EXPERT
Observers
The presence and justification of observers during an audit activity shall be agreed to by the certification
body and client prior to the conduct of the audit. The audit team shall ensure that observers do not
unduly influence or interfere in the audit process or outcome of the audit.
Technical experts
The role of technical experts during an audit activity shall be agreed to by the certification body and
client prior to the conduct of the audit. A technical expert shall not act as an auditor in the audit team.
The technical experts shall be accompanied by an auditor.
Insert Footer
243
Here
243
GUIDES
Insert Footer
244
Here
122
244
AUDIT TECHNIQUES
• Interview
• Observation of processes and activities
• Review of documentation and records
• Review of documented information
• Examine Objective Evidence
• Observe Activities
• Listen to Reactions
• Record Findings
245
123
246
DEALING WITH PROBLEMS
Auditors may not always receive full co-operation from the Auditee, it is therefore important to
recognise when such situations are occurring and take appropriate action.
247
• Who ?
• What ?
• Where ?
• When ?
• Why ?
• How ?
124
248
QUESTION TECHNIQUE
YES / NO Questions
• Often elicit dead end answers - you gain nothing –
• Only useful as a leader question.
Explanation Questions
• Useful for comparing interfaces.
249
Open Qs. What is the system you This is a lab where we quality Auditee may go into
maintain here? testing & calibrate measuring defensive mode –
instruments mainly with closed
questions
Probing Which acceptance criteria Every product have different
Qs. you use for quality standards which are acceptance
inspections ? criteria for quality
125
250
COMMUNICATIONS IN AUDITS – BODY LANGUAGE (BEST PRACTICES)
251
QUESTIONING TECHNIQUES
126
252
QUESTION TECHNIQUE
253
QUESTIONING TECHNIQUES
127
254
OBJECTIVE EVIDENCE
Try to establish:
255
OBJECTIVE EVIDENCE
128
256
FINDING THE ROOT CAUSE
Investigate Nonconformity
257
Process > Set of interacting activities which transforms inputs and outputs
129
258
AUDIT TECHNIQUES
1. Horizontal Audit
When conducting Audits it is common practice to plan to cover department by department with the
scope of the Audit. Such Audits are effective at examining each department against their own quality
procedure for which they have direct responsibility. However, such Audits fail to address departmental
interface.
2. Vertical or Project
Such Audits follow a project trail through a company, e.g. through design, purchasing, production,
test and dispatch. But in completing the trail will ensure that departmental interfaces are functioning
adequately.
259
AUDIT TECHNIQUES
DEVELOPMENT Horizontal
Vertical
PURCHASING Horizontal
PRODUCTION Horizontal
TRAINING Horizontal
The processes cross through departments and functions, this is why the vertical audit tests the
interdependency between process
130
260
AUDIT TECHNIQUES
Forward Trace - An audit which follows the natural flow of a product or service process
Backward Trace - An audit which traces records back through the system
261
• The auditors audit the area assigned to them in the audit plan.
• Sample the system.
• Collect objective evidence of system effectiveness.
• Compare findings from checklist with requirements.
• Decide compliance or noncompliance.
• Audit team daily meeting [or more frequently].
131
262
CONDUCTING THE AUDIT
263
THE AUDIT
132
264
OBSERVATIONS
265
OBSERVATIONS
Always establish objective evidence when an apparent nonconformity is found, remember the
occurrence discovered may be the effect and not the cause.
Where processes are involved the audit may examine the process controls and records to establish
conformance with the specification.
133
266
267
SECTION 15
CONDUCTING AUDIT:
RAISING NON-
CONFORMITIES
134
268
IDENTIFYING AND RECORDING AUDIT FINDINGS
Insert Footer
269
Here
269
Insert Footer
270
Here
135
270
RECORDING CONFORMITIES
Insert Footer
271
Here
271
RECORDING NONCONFORMITIES
Insert Footer
272
Here
136
272
NONCONFORMITY REPORTING
Why is it a noncompliance?
• i.e. against what requirement
273
NONCONFORMITY REPORT
137
274
WORDING OF NCR’S
Failure to achieve clear factual information will invite challenge of the findings at the closing meeting.
This will be particularly important in areas where the emphasis is placed on the following
• Management Commitment
• Competence
• Communication
• Continual improvement
275
OBSERVATIONS
Notes made by an auditor during assessment may lead to non-compliances being raised or to provide
information for the audit report
138
276
CATEGORISING NON-CONFORMITIES
Major
Minor
There is a defined system, documented information and arrangements which satisfy agreed
requirements against which the organisation being assessed can demonstrate an acceptable level on
implementation overall, but there are minor discrepancies or lapses in discipline.
277
139
278
REVIEWING CORRECTIVE ACTIONS
279
Nonconformity
Auditor
140
280
281
SECTION 16
CONDUCTING AUDITS:
AUDIT REPORTING AND
CLOSING MEETING
Purpose of this section:
To be able to list and present closing meeting
agenda points
To be able to list the contents of an audit report
141
282
AUDIT REPORTING
Content:
a) identification of the certification body;
b) the name and address of the client and the client’s representative;
c) the type of audit (e.g. initial, surveillance or recertification audit or special audits);
d) the audit criteria;
e) the audit objectives;
f) the audit scope
g) any deviation from the audit plan and their reasons
h) any significant issues impacting on the audit programme
283
AUDIT REPORTING
i) identification of the audit team leader, audit team members and any accompanying persons;
j) the dates and places where the audit activities were conducted
k) audit findings
l) significant changes
m) any unresolved issues, if identified
n) where applicable, whether the audit is combined, joint or integrated
o) statement that auditing is based on a sampling process of the available information;
p) recommendation from the audit team
q) use of the certification documents and marks, if applicable
r) verification of effectiveness of taken corrective actions regarding previously identified
nonconformities, if applicable
Insert Footer
284
Here
142
284
AUDIT REPORTING CONCLUSIONS
Insert Footer
285
Here
285
AUDIT FILE
• Audit plan
• Audit report
• Open/closing meeting attendance list
• Copies of non-conformity reports and objective evidence provided
• Assignment of the audit teams
• Confidentiality statements of the audit team
143
286
PURPOSE OF CLOSING MEETING
Advise auditee of findings and conclusions reached based on the audit findings
• ACCEPTABLE
• UNACCEPTABLE
287
CLOSING MEETING
144
288
289
145