ISO 27001 Internal Auditor - Delegate Pack
ISO 27001 Internal Auditor - Delegate Pack
About Us
The world's largest provider of classroom and online
training courses
World Class Training Solutions
Subject Matter Experts
Highest Quality Training Material
Accelerated Learning Techniques
Project, Programme, and Change Management, ITIL®
Consultancy
Bespoke Tailor Made Training Solutions
PRINCE2®, MSP®, ITIL®, Soft Skills, and More
theknowledgeacademy Course Syllabus
Module 1: Introduction to ISO 27001 5
Module 4: Leadership 48
Module 5: Planning 52
Module 6: Support 61
theknowledgeacademy Course Syllabus
Module 7: Operation 68
Module 9: Improvement 78
Module 1: Introduction
The information security management system's adoption is a strategic decision for an organisation.
The needs and objectives of the organisation, security requirements, organisational procedures utilised,
and the size and structure of the organisation all influence the establishment and execution of an
organisation's information security management system.
The information security management system protects information confidentiality, integrity, and
availability through a risk management process, giving interested parties confidence that risks are properly
handled.
theknowledgeacademy
Introduction
Significantly, the information security management system
is integrated into, and part of the organisation's process
and overall management structure and that information
security is thought about in the design of processes,
information systems, and controls.
theknowledgeacademy
Compatibility with Other Management System Standards
In order to maintain compatibility with other
management system standards that have adopted
Annex SL, this document applies the high-level
structure, identical sub-clause titles, identical text,
common terms, and core definitions defined in
Annex SL of ISO/IEC Directives, Part 1, Consolidated
ISO Supplement.
theknowledgeacademy
ISO 27001:2022 and its Clauses
Clauses to ISO/IEC 27001
Clause 1: Scope
theknowledgeacademy
theknowledgeacademy
What is Business?
Industries
Module 2: Risk
SWOT Analysis
Information Security Constructs & Characteristics of Assets
Security
Privacy
Cybersecurity Landscape
theknowledgeacademy
Industries
Utilities
Media Food Chemical
Education
Metal Retail
Engineering
Cement FMCG
BSFSI
Oil
Manufacturing
Health Pharma
Care Telecom
IT/ITES
Real Estate Automobile
theknowledgeacademy
Risk
Ransomware
Threats >>>
VVV
Theft,
Malwar Natural
Sabotage,
e Calamities
Supply Chain Misuse & Fire
Attacks
High User
Knowledg
e of IT Risks Lapse in
Systems Controls Physical
Deterrent Security
Corrective
Lack Of Recovery
Docume Directive
ntation
Manmade
Disaster
Threats Against Availability- Internet Threats Against
Threats Data
Systems &
Network
ISMS Failure NIST CSF/ISO 27001:2022
Threats Against Availability
(DDOS)
theknowledgeacademy
SWOT Analysis
Weakness Strengths
theknowledgeacademy
Constructs & Characteristics of Assets
Assets Information
MERCURY
Transformation Assets
theknowledgeacademy
Security
To provide confidence & assurance
Business can depend upon and trust our technologies
Business is not exposed to unacceptable risk
Business can meet its objectives and grasp opportunities
theknowledgeacademy
Privacy
Protecting the privacy of information:
Keep sensitive information off the network, if possible
Encrypt sensitive information
Protect access to your system
Don’t share sensitive information
Password protection
theknowledgeacademy
Privacy
Reliability/Trustworthiness of information
Hijacked websites
Corrupted files
theknowledgeacademy
Triad of Information Security
Confidentiality, Integrity, and Availability (CIA) are the three main goals of information security programs
I A
1. Confidentiality
Confidentiality means that information is not disclosed to groups, organisations, or processes that are not
authorised
For instance, let's say I had a password for my Gmail account, but someone witnessed me logging in. In that
case, both my password and confidentiality have been compromised
theknowledgeacademy
Triad of Information Security
2. Integrity
Means ensuring data accuracy and completeness. This means that information cannot be altered without
authorisation
For instance, if an employee leaves an organisation, all relevant data for that employee should be updated to
reflect JOB LEFT status in order to ensure that the data is accurate and complete. In addition, only authorised
individuals should be permitted to edit employee data
3. Availability
For instance, working with various organisational teams like network operations, development operations,
incident response, and policy/change management is necessary if one needs to access information about a
specific employee to determine whether they have exceeded the allowed number of leaves. One of the
factors that can affect the accessibility of information is a denial of service attack
theknowledgeacademy
Cyber Security is Everyone’s Responsibility
Cybersecurity is everyone’s concern:
Protect customer
information
theknowledgeacademy
Cyber Security is Everyone’s Responsibility
Security breaches leads to:
Reputation loss
Financial loss
theknowledgeacademy
Cybersecurity Landscape
Secure Application Physical Security
Data Protection Network Design Development
4th Party Risk
CASS Assets Inventory
Blue Team
Applications
Security Cryptography Risk Assessment
Identity Management
Engineering ISO/IEC CoBIT
`Framework &
Certifications Standard Data Centric Risk Assessment Data Flow Map
Training Conferences
Source Code Scan
Career Development Industry Specific
DR
Federal
Peer Groups Self Study
Domains Blackbox Whitebox
Laws and Regulations
State
BCP Governance
Recovery
Executive Management Involvement
Detection User Education
Audit
Prevention Protection Risk Informed Reports & Scorecards
Threat Intelligence
SIEM Active Training (New Skills) Company’s Return Supervisory Procedure (WSPs)
KPIs/KRIs
Security Operations Defense
SOC
Policy
Awareness
Data (Reinforced) External Internal Compliance & Enforcement
Incident Leakage
Vulnerability Response
Management
Procedures
Guidelines
Containment Eradication
theknowledgeacademy
Information Security Management
Information security encompasses more than just
protecting data from unauthorised access
The practise of preventing unauthorised access, use,
disclosure, disruption, modification, inspection,
recording, or destruction of information is known as
information security. Information comes in both physical
and digital forms
Information can be either physical or electronic.
Information can include your personal information, your
social media profile, your mobile phone data, your
biometrics, and so on
Thus, information security encompasses numerous
research areas such as cryptography, mobile computing,
cyber forensics, online social media, etc
theknowledgeacademy
Information Security Management
Information security management is about preserving the
‘Confidentiality, Integrity and Availability’ of information and
associated information processing facilities, whether that’s
systems, services, infrastructure or the physical locations. It
ensures business continuity by minimising business damage by
preventing and reducing the impact of security incidents.
theknowledgeacademy
Information Security Management
The purpose of the ISMS is to:
theknowledgeacademy
Information Security Management
Rules for ISMS:
theknowledgeacademy
Need of Information Security
Information system refers to the process of evaluating
available controls or countermeasures inspired by
vulnerabilities discovered and identifying an area that
requires additional research.
theknowledgeacademy
Need of Information Security
2. Enabling the safe operation of applications
The organisation is under tremendous pressure to obtain and run integrated, efficient, and capable
applications.
The modern organisation must establish a setting that protects applications using its IT systems, especially
those applications that are crucial to the organisation's infrastructure.
In an organisation, data can exist in two states: at rest or in motion. Data in motion is being used or
processed by the system at the moment
Attackers were motivated to steal or corrupt the data by its values. The values and integrity of the
organisation's data depend on this. Data in motion and data at rest are both protected by information
security.
theknowledgeacademy
Need of Information Security
4. Organisational technology asset protection
theknowledgeacademy
Threats to Information Security
Threats to information security can take many different forms, including software attacks, intellectual
property theft, identity theft, equipment theft, information theft, sabotage, and information extortion
Threats include anything that has the potential to breach security, harm one or more valuable objects, or
negatively alter, erase, or otherwise affect them
Attack Breach
theknowledgeacademy
Threats to Information Security
Software Attacks include viruses, worms, Trojan horses, and other malware. Many users think that malware,
viruses, worms, and bots are all the same.
However, they are not identical; the only thing they have in common is that each is malicious software that
behaves differently.
Malware is a combination of the words malicious and software. So malware is defined as malicious
software, including intrusive program code or anything else created to harm a system.
1
Malware
Actions
Infection
Methods
2
theknowledgeacademy
Threats to Information Security
The following list of malware is based on the manner of infection:
Virus Trojan
Worms Bots
theknowledgeacademy
Threats to Information Security
1. Virus
They can reproduce themselves and spread throughout the Internet by connecting to the host computer's
software, such as music or videos
The Creeper Virus was initially identified on ARPANET. Examples of viruses include file viruses, macro viruses,
boot sector viruses, stealth viruses, etc
2. Worms
In nature, worms can also replicate themselves, but they do not affix themselves to the host computer's
software
Worms are network-aware, which is their primary difference from viruses. They can quickly switch from one
machine to another if a network is available
They will not harm the target machine, but they might slow it down by taking up hard disc space, for example
theknowledgeacademy
Threats to Information Security
3. Trojan
Greek mythology's "Trojan Horse" tale, which relates how the Greeks
invaded the walled city of Troy by disguising their men within a huge
wooden horse that had been presented to the Trojans as a gift, is where
the word "Trojan" originates
The Trojans loved horses so much that they trusted the gift. The
soldiers entered the city during the night and began an internal uprising
The software will carry out its mission of either stealing information or
performing any other function for which it was designed when it is
executed. They aim to conceal themselves inside software that seems
to be trustworthy
theknowledgeacademy
Threats to Information Security
4. Bots
theknowledgeacademy
Threats to Information Security
Malware based on its actions:
theknowledgeacademy
Threats to Information Security
1. Adware
They come bundled with free software, which is how these developers primarily make money.
Your preferences are tracked, and they show you relevant ads.
If harmful code is included in the software, the adware can monitor your computer's operations and possibly
compromise it.
2. Ransomware
It is malware that either locks the computer, rendering it partially or completely unusable or encrypts all files.
Then a screen will display and ask for money or a ransom
theknowledgeacademy
Threats to Information Security
3. Spyware
It is a programme, or should we say software, that monitors internet actions and discloses the information to
anyone who may be interested
Most frequently, spyware is released through viruses, Trojan horses, and worms. Once dropped, they establish
themselves and keep quiet to avoid being discovered
4. Scareware
Although it appears to be a programme to help you fix your system, once the software is launched, it will
either infect or break your system
In order to frighten you and convince you to take some sort of action, like paying them to fix your system, the
software will display a message
theknowledgeacademy
Threats to Information Security
5. Rootkits
6. Zombies
theknowledgeacademy
Active and Passive Attacks
Active Attacks
Passive Attacks
theknowledgeacademy
theknowledgeacademy
theknowledgeacademy
Understanding the Needs and Expectations of Interested
Parties
The organisation shall determine:
theknowledgeacademy
Determining the Scope of the Information Security
Management System
In order to establish its scope, the organisation shall
determine the boundaries and applicability of the information
security management system
o The requirements
theknowledgeacademy
Information Security Management System
In accordance with this document's requirements, the organisation shall establish, implement, maintain,
and continuously improve an information security management system, including the processes
required and their interactions
theknowledgeacademy
theknowledgeacademy
theknowledgeacademy
Policy
An information security policy shall be established by the top management that:
o Contains information security objectives or gives a framework to set information security goals
o Includes a commitment to improving the information security management system on an ongoing basis
theknowledgeacademy
Organisational Roles, Responsibilities, and Authorities
Top management must confirm that
responsibilities and authorities for information
security roles are assigned and communicated
throughout the organisation
theknowledgeacademy
theknowledgeacademy
Planning of Changes
Organisational Roles, Responsibilities, and Authorities
1. General
When planning for an information security management system, the organisation shall think about the issues
and requirements, as well as determine the risks and opportunities that must be addressed:
o Make sure the information security management system can attain its intended result
o How to Integrate and execute these actions into the processes of its information security management
system; and
theknowledgeacademy
Organisational Roles, Responsibilities, and Authorities
2. Information Security Risk Assessment
theknowledgeacademy
Organisational Roles, Responsibilities, and Authorities
o The information security risks should be identified:
theknowledgeacademy
Organisational Roles, Responsibilities, and Authorities
o Assesses the information security
risks:
theknowledgeacademy
Organisational Roles, Responsibilities, and Authorities
3. Information Security Risk Treatment
An information security risk treatment process shall be defined and applied by the organisation that:
o Select relevant information security risk treatment options, considering the outcomes of the risk assessment
o Determine all controls required to execute the chosen information security risk treatment option
o Compare the controls and verify that no essential controls have been left out
o Produce an Applicability statement that includes the required controls and justification for inclusions,
whether or not they are executed, as well as justification for control exclusions from Annex A
o Create a plan for dealing with information security risks; and
o Receive approval from risk owners for the information security risk treatment plan and acceptance of
residual information security risks
Documented information shall be kept by the organisation regarding the information security risk treatment
process
theknowledgeacademy
Information Security Objectives and Planning to Achieve Them
At relevant functions and levels, the organisation must
establish information security objectives. The information
security objectives must include the following:
o Be observed
o Must be communicated
o Be updated as needed
theknowledgeacademy
Information Security Objectives and Planning to Achieve Them
The organisation must keep documented information on its
information security goals. The organisation must decide
the following when planning how to achieve its information
security objectives:
theknowledgeacademy
Planning of Changes
theknowledgeacademy
theknowledgeacademy
Resources
Competence
Module 6:
Support
Awareness
Communication
Documented Information
Resources
theknowledgeacademy
Competence
The organisation shall:
theknowledgeacademy
Awareness
Individuals performing work under the
organisation's control shall be aware of the
following:
theknowledgeacademy
Communication
The organisation shall determine the requirement for internal and external communications appropriate to
the information security management system involving:
o On what to communicate
o When to communicate
o How to communicate
theknowledgeacademy
Documented Information
1. General
o The organisation determines documented information as being essential for the effectiveness of the
information security management system
When making and updating documented information, the organisation shall make sure relevant:
theknowledgeacademy
Documented Information
3. Control of documented information
The information security management system requires documented information and, by this International
Standard, must be controlled to make sure:
o It is readily available and appropriate for use where and when it is required
o It is adequately safeguarded
The organisation shall address the following activities, as applicable, for the control of documented information:
o Changes' in control
theknowledgeacademy
theknowledgeacademy
theknowledgeacademy
Information Security Risk Assessment
This clause of ISO 27001 is automatically
finished
theknowledgeacademy
Information Security Risk Treatment
Under clause 8.3, the organisation needs to
enforce the information security risk treatment
plan and maintain documented information on
the outcomes of that risk treatment
theknowledgeacademy
theknowledgeacademy
theknowledgeacademy
Internal Audit
The organisation shall conduct internal audits at planned
intervals to give information on whether the information
security management system:
Conforms to
o The organisation's information security management
system requirements
o This International Standard's requirements
Is successfully executed and maintained
theknowledgeacademy
Internal Audit
The organisation shall:
o Plan, establish, implement, and maintain an audit
programme, including the frequency, methods,
responsibilities, planning needs, and reporting
requirements
o The audit programme shall consider the significance of the
processes involved and the outcomes of earlier audits
o Define each audit's audit criteria and scope
o Select auditors and conduct audits that ensure the audit
process's objectivity and impartiality
o Assure that the audit results are reported to the
appropriate management
o Keep documentation as evidence of the audit programme
and the audit results
theknowledgeacademy
Management Review
Top management must conduct planned reviews of the
organisation's information security management system to assure
its continued suitability, adequacy, and effectiveness
The management review shall take into account:
The status of previous management reviews' actions
Changes in internal and external issues that are appropriate to the
information security management system
Feedback on the performance of information security, involving
trends in:
o Corrective and nonconformities actions
o Results of monitoring and measurement
o Audit results
o Achievement of information security goals
theknowledgeacademy
Management Review
Feedback from interested parties
The outcome of the risk assessment and the status of the risk
treatment plan
theknowledgeacademy
theknowledgeacademy
theknowledgeacademy
Nonconformity and Corrective Action
Execute any necessary action
theknowledgeacademy
Continual Improvement
theknowledgeacademy
theknowledgeacademy
Module 10:
Auditing Reflects
Auditing Techniques
Auditing Principles
Phases of Audit
Internal Audit Charter
theknowledgeacademy
Communicate with Organisation and Audit Committee
Develop strategy
Conduct audits
theknowledgeacademy
Auditing Reflects
Organisational policy
theknowledgeacademy
General and Internal Auditing Standards and Guidance
Technical
guidance
Auditor
Procedural guidance
guidance
IT
Auditing
Policy and
Domain programme
knowledge guidance
Industry
guidance
theknowledgeacademy
Auditing Types
First Party Audit
Is an internal audit where a person from the inside of an
organisation will conduct the Audit
Second Party Audit
Also called external audit – an organisation will bring in a
qualified second-party company to perform an audit, making
sure that the organisation comply with a standard or
legislation
Third Party Audit
Where an organisation organises the audit of a third party
(often a supplier) to ensure they are complying with an
agreed contract
theknowledgeacademy
Auditing Techniques
Auditing Techniques
ISO Auditors will use various audit techniques to get the
required objective proof and obtain the objectives of every
internal audit sessions Here are some audit techniques which
are as follows:
Sampling
This technique is one of the most efficient ways to obtain audit
objectives
Auditors must be able to reach valid conclusions about large
systems However, it's often impractical or too costly to study
every single item in a large system
There may be just too many items to examine or they may be
spread over a large geographical area
As a result, auditors work with smaller samples
theknowledgeacademy
Auditing Techniques
Sampling can be further divided into two types:
Judgement-Based Sampling
Judgment-based sampling depends on the knowledge, skill, and experience of audit team members When
using this approach, auditors use their personal judgment to select audit samples
Statistical Sampling
Your statistical sampling plan should help you to achieve your audit objectives and should be based on what is
known about the characteristics that define the population you intend to study
ISO 19011 mentions two statistical sampling techniques: attribute-based sampling and variable-based
sampling
Attribute sampling is used when there are two possible outcomes (attributes) for each sample: yes/no,
pass/fail, correct/incorrect
Variable-based sampling is used when outcomes occur along a range of values
theknowledgeacademy
Auditing Techniques
Observation
Auditors can observe a work process in review or action a physical
feature of premises to determine if a method is efficient in obtaining
intended results
It can be an inactive observation while individuals carry on their work,
or a directed walkthrough where an auditor will ask questions to get a
better understanding
Testing
In some situations, sampling or observing live data will not be possible,
for instance if doing an activity generates unnecessary risk or too much
disruption to the organisation
theknowledgeacademy
Auditing Techniques
Interview
Showing the commitment of the leadership of the organisation is a
major requirement, and one way to audit this is using interviews
Our auditors can meet with individuals from across the organisation
to ask them about various factors of the management system
This is an excellent way to test awareness of critical policies and
methods
theknowledgeacademy
Auditing Techniques
Onsite Vs Offsite
Most audits are performed on-site; but, with the emergence of video
conferencing, remote execution of some of the above techniques is
becoming increasingly feasible
At the planning stage of the audit programme, the balance between
on-site and off-site audits should be carefully considered, and it
should be remembered that some audit techniques can only be
performed on-site
Human Interaction Vs No Human Interaction
Individuals are an essential part of the ISMS of an organisation and are
also a key to discovering what is happening within a management
system
Most of our audit time will be spent working with members of the site
being audited
theknowledgeacademy
Auditing Principles
The main principles of auditing are:
theknowledgeacademy
Auditing Principles
Planning: An auditor must take into account the system as well
as internal control procedures
theknowledgeacademy
Auditing Principles
Legal Framework: Business activities must run within rules and
regulations The rule of law must be applied to protect the rights of
interested parties
Internal Controls: The auditor will examine the internal controls
governing information security Ensure evidence exists of control use
(eg records of resolved incidents)
Report: A report should be prepared by the auditor at the end of an
audit The auditor can draw conclusions and disclose relevant facts
and figures as general information
theknowledgeacademy
Auditing Principles
The techniques for auditing are:
Examination of
Record Analytical Review
Sampling
2 4
1 3 5
Inquiry
Confirmation
theknowledgeacademy
Auditing Principles
Examination of Record: This is commonly done by auditors The
inspection of documentation is to verify the validity of data ISO
focus should be on documentation and records
theknowledgeacademy
Auditing Principles
Confirmation: To ensure the accuracy of data, an auditor collects
information from stakeholders Confirmation is a response to an
inquiry to prove certain data recorded
theknowledgeacademy
Phases of Audit
There are several phases to an internal audit:
theknowledgeacademy
Phases of Audit
Audit Preparation
theknowledgeacademy
Phases of Audit
Audit Performance
theknowledgeacademy
Phases of Audit
Audit Reporting
The report should provide correct and clear data that will be
effective as a management aid in addressing important
organisational issues
theknowledgeacademy
Phases of Audit
Audit Follow-up and Closure
The audit is completed when all the planned audit activities have
been carried out or agreed with the audit client and the report is
produced
theknowledgeacademy
theknowledgeacademy
Classifying Findings
Preparing an Audit Report
The audit scope should be split down in the ISMS audit
plan/checklist This should include timings and priorities
theknowledgeacademy
Assessment of Audit Reports and Documents
The internal audit is one of the key activities in ISO 27001, which assures
that the information security management system (ISMS) is working
efficiently and accurately
An audit report is read by
o People who were audited, or were present at the closing meeting
o Senior management who were not present at the audit for review
o The audit report needs to address the needs of both audiences
The report is required to contain
o The findings of the audit team supported by evidence evidence
o The auditors opinion as to whether the auditee is compliant with
ISO 27001
o Any concerns raised and corrective measures required
theknowledgeacademy
Assessment of Audit Reports and Documents
ISO 19011 recommends the following items are to be included in the certification audit report :
Audit Client
Audit Objective
Audit Scope
Audit Criteria
Audit Conclusions
Audit Findings
theknowledgeacademy
Assessment of Audit Reports and Documents
The following information is useful to internal audit
01 03 05
Summary of Audit Disagreement between Agreed Follow-up
Process & Obstacles Auditor and Auditee Plans
02 04 06
Any Areas not Opportunities for
Audit Plan
Covered Improvement
theknowledgeacademy
Preparing an Audit Report
What to include?
• Scope
Title and introduction
• Objectives
• Key findings
Executive summary • Summary analysis and commentary
• Conclusion(s) drawn from internal audit
theknowledgeacademy
Preparing an Audit Report
• Does the auditor have any reservations about the audit that was
Limitations conducted?
• Were there any limitations that may have hindered the process?
theknowledgeacademy
Report Preparation, Findings, Reconciliation, and Conclusions
Audit Objectives
theknowledgeacademy
Report Preparation, Findings, Reconciliation, and Conclusions
Audit Scope
What were the boundaries of the audit?
If there is more than one manufacturing line that is using the
process, how many were audited?
Was a night shift or evening shift excluded?
Audit Client
Who was the process owner or owners that the audit was
performed for?
Audit Criteria
What were the processes audited against? For instance, this could
be the ISO 27001 standard, internal company procedures and
policies, or customer requirements
theknowledgeacademy
Report Preparation, Findings, Reconciliation, and Conclusions
Audit Findings
theknowledgeacademy
Report Preparation, Findings, Reconciliation, and Conclusions
Audit Conclusions
theknowledgeacademy
Auditing Procedures
There are some activities/steps which are carried out in the procedure:
theknowledgeacademy
Auditing Procedures
theknowledgeacademy
Auditing Procedures
theknowledgeacademy
Auditing Procedures
STEP 4 : CONDUCT AUDIT & RECORD FINDINGS
Responsibility ISMS Audit Team
Input • ISMS Audit Checklist
• Annual Audit Plan
• The ISMS Audit Team conducts the audit and completes pre-
defined audit report During the audit course, the audit and ISMS
Actions audit Team tries to find out proper proofs to determine that:
o The information security policy is an absolute reflection of
the needs of the business
o A proper risk assessment methodology is used
o Documented processes are being followed and meeting
their desired goals
o Technical controls are in place, rightly configured and
working as planned
o Assessing residual risk correctly, acceptable to the
company's management
o Actions that are agreed form earlier audits and reviews
have been executed
o ISMS is compliant with ISO 27001
Output • Output Audit Findings (if any)
theknowledgeacademy
Auditing Procedures
theknowledgeacademy
Auditing Procedures
theknowledgeacademy
Reviewing Documents and Reports
Mandatory Documents by ISO 27001
theknowledgeacademy
Reviewing Documents and Reports
Mandatory Documents by ISO 27001
theknowledgeacademy
Reviewing Documents and Reports
Reports
The following are the six best reports for ISO 27001 audit:
The Statement of
Applicability
The Risk Treatment Plan
Controls Usage
Comments Report
Report
theknowledgeacademy
Classifying Findings
The audit findings are the auditor’s summary or description and
analysis of an inadequately mitigated risk to the organisation
theknowledgeacademy
Classifying Findings
Compliant means adherence with the requirements of the standard and the QMS The
COMPLIANT Continue to monitor trends/indicators
process is implemented and documented and records exist to verify this
A low risk issue that offers an opportunity to improve current practice Processes may Review and implement actions to improve the
OFI cumbersome or overly complex but meet their targets and objectives Unresolved OFIs process(s) Monitor trends/indicators to determine if
may degrade over time to become non-compliant improvement was achieved
A medium risk, minor non-conformance resulting in deviation from process practice not
Investigate root cause(s) and implement corrective
MINOR N/C likely to result in the failure of the management system or process that will not result in
the delivery of non-conforming products nor reduce the effectiveness of the QMS action by next reporting period or next scheduled audit
A high risk, major non-conformance which directly impacts upon customer Implement immediate containment action, investigate
MAJOR N/C requirements, likely to result in the customer receiving non-conforming products or root cause(s) and apply corrective action Re-audit in 4
services, or which may reduce the effectiveness of the QMS weeks to verify correction
theknowledgeacademy
The Reliability of Audit Findings
The following are the aspects that impact the reliability of audit findings:
State what is seen and how it does not satisfy the needs
theknowledgeacademy
theknowledgeacademy
Audit Plan
theknowledgeacademy
Roles and Responsibilities
Assess compliance
theknowledgeacademy
Audit Plan
The ISO 19011 standard tells management about the auditing
activities for auditing to ISO 27001
These are not compulsory steps (eg, small companies can miss
some of them), but they are a best practices for conducting an
audit
theknowledgeacademy
Audit Plan
Prepare an audit plan This plan should involve the following components
and considerations:
theknowledgeacademy
Opening Meeting
An opening meeting between the auditee and all relevant parties
should be held
During the opening meeting, confirm the following with all relevant
parties:
o Audit scope
o Audit objectives
o Audit criteria
o Audit plans
theknowledgeacademy
Opening Meeting
o Roles and responsibilities of the audit team
theknowledgeacademy
Opening Meeting
During the opening meeting, the following items should be clearly
communicated:
theknowledgeacademy
Record Review Activities
Internal auditors should keep in regular contact
to ensure adherence to the audit plan.
theknowledgeacademy
Internal Auditor Checklist
One of the tools available to ensure audits address the essential requirements is the audit checklist.
It serves as a reference point before, during, and after the audit process, and if developed for and used
correctly, it will provide the following benefits:
theknowledgeacademy
Internal Auditor Checklist
An audit plan is a list of guidelines to be followed when conducting the audit; this will be particular to the
nature of the organisation and its ISMS, as well as its specific needs.
Preparation of audit
Knowledge of the client’s
programme
business and its ISMS
Development of audit
strategies or overall plan
theknowledgeacademy
Internal Auditor Checklist
Benefits of a Checklist:
theknowledgeacademy
Communication Between Departments
Here are some tips for communication during an audit:
Less Jargon
theknowledgeacademy
Communication Between Departments
Here are some tips for communication during an audit:
theknowledgeacademy
Drafting Reports and Test Plans
A typical ISMS audit report will contain some of the
following elements, some of which may be split into
appendices or separate documents:
theknowledgeacademy
Drafting Reports and Test Plans
A list of specific recipients (since the contents may be confidential) and appropriate document classification or
circulation instructions.
An outline of the credentials, audit methods, and other information pertaining to individual auditors and team
members.
Audit findings and analysis, supported upon occasion by extracts from the audit files to aid understanding.
The audit conclusions and recommendations are to be discussed with management and eventually integrated
if agreed upon as action plans depending on the organisation’s practices.
A formal statement of the auditors’ reservations, qualifications, scope limitations, or other caveats with
respect to the audit.
Management may be invited to provide a short commentary or formal response, accepting the results of the
audit and stating a commitment to agreed plans.
theknowledgeacademy
The World’s Largest Global Training Provider
theknowledgeacademy.com
/The.Knowledge.Academy.Ltd
/TKA_Training
/the-knowledge-academy
/TheKnowledgeAcademy
Congratulations