0% found this document useful (0 votes)
60 views4 pages

ISO 27001 Certification Document Checklist

To achieve ISO/IEC 27001 certification, organizations must develop mandatory documents such as the ISMS scope, Information Security Policy, and Risk Assessment Process, which demonstrate compliance with the standard. Supporting documents, while not mandatory, are recommended for effective ISMS implementation and include policies on access control, incident management, and business continuity. Maintaining records of implementation and operation is essential for proving that the ISMS is functioning as intended.

Uploaded by

petercwchk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views4 pages

ISO 27001 Certification Document Checklist

To achieve ISO/IEC 27001 certification, organizations must develop mandatory documents such as the ISMS scope, Information Security Policy, and Risk Assessment Process, which demonstrate compliance with the standard. Supporting documents, while not mandatory, are recommended for effective ISMS implementation and include policies on access control, incident management, and business continuity. Maintaining records of implementation and operation is essential for proving that the ISMS is functioning as intended.

Uploaded by

petercwchk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

To achieve **ISO/IEC 27001 certification**, an organization must develop and maintain a comprehensive

set of documents that demonstrate compliance with the standard's requirements. These documents form
the foundation of the **Information Security Management System (ISMS)** and provide evidence of its
implementation, operation, and continuous improvement. Below is a detailed list of the **mandatory and
supporting documents** required for ISO 27001 certification:

---

### **1. Mandatory Documents (Required by ISO 27001)**


These documents are explicitly required by the standard and must be in place for certification.

#### **a. ISMS Scope (Clause 4.3)**


- Defines the boundaries and applicability of the ISMS.
- Includes details about the organization, locations, departments, systems, and processes covered by the
ISMS.

#### **b. Information Security Policy (Clause 5.2)**


- A high-level document that outlines the organization's commitment to information security.
- Includes objectives, roles, and responsibilities for information security.

#### **c. Risk Assessment and Treatment Process (Clause 6.1.2)**


- Documents the methodology used for identifying, analyzing, and evaluating information security risks.
- Includes a **Risk Treatment Plan (RTP)** that outlines how risks will be mitigated, transferred, avoided, or
accepted.

#### **d. Statement of Applicability (SoA) (Clause 6.1.3)**


- Lists the controls from **Annex A** of ISO 27001 that are applicable to the organization.
- Provides justification for including or excluding specific controls.

#### **e. Risk Treatment Plan (Clause 6.1.3)**


- Details the actions taken to address identified risks, including timelines, responsibilities, and resources.

#### **f. Information Security Objectives (Clause 6.2)**


- Documents the organization's information security objectives, which should be measurable and aligned
with the ISMS policy.

#### **g. Evidence of Competence (Clause 7.2)**


- Records of training, qualifications, and experience of personnel involved in the ISMS.

#### **h. Documented Information (Clause 7.5)**


- Evidence that the organization has established, maintained, and retained documented information
required by the standard.

#### **i. Internal Audit Program (Clause 9.2)**


- Documentation of the internal audit process, including audit plans, schedules, and reports.

#### **j. Management Review Results (Clause 9.3)**


- Records of management reviews, including decisions made and actions taken to improve the ISMS.
#### **k. Nonconformities and Corrective Actions (Clause 10.1)**
- Records of nonconformities, corrective actions, and their outcomes.

---

### **2. Supporting Documents (Recommended for Effective ISMS Implementation)**


While not explicitly mandatory, these documents are essential for demonstrating compliance and ensuring
the ISMS operates effectively.

#### **a. Risk Assessment Report**


- Detailed documentation of the risk assessment process, including identified risks, their likelihood, impact,
and risk levels.

#### **b. Asset Inventory**


- A list of information assets (e.g., hardware, software, data) and their classification based on sensitivity and
criticality.

#### **c. Access Control Policy**


- Defines rules for granting, reviewing, and revoking access to information systems and data.

#### **d. Acceptable Use Policy (AUP)**


- Outlines acceptable and prohibited uses of organizational IT resources.

#### **e. Incident Management Procedure**


- Describes the process for detecting, reporting, and responding to information security incidents.

#### **f. Business Continuity Plan (BCP)**


- Documents the organization's strategy for maintaining operations during and after a disruption.

#### **g. Disaster Recovery Plan (DRP)**


- Specifies procedures for recovering IT systems and data after a disaster.

#### **h. Supplier Security Policy**


- Defines security requirements for third-party suppliers and service providers.

#### **i. Change Management Procedure**


- Describes how changes to systems, processes, and configurations are managed securely.

#### **j. Backup Policy**


- Outlines procedures for backing up critical data and systems.

#### **k. Physical Security Policy**


- Defines controls for securing physical access to facilities and equipment.

#### **l. Monitoring and Logging Policy**


- Describes how security events are monitored, logged, and analyzed.
#### **m. Encryption Policy**
- Specifies when and how encryption should be used to protect sensitive data.

#### **n. Data Classification Policy**


- Defines how data is classified based on sensitivity and the controls applied to each classification level.

#### **o. Employee Awareness Training Records**


- Documentation of training sessions and employee participation in information security awareness
programs.

#### **p. Legal and Regulatory Compliance Checklist**


- A list of applicable laws, regulations, and contractual requirements, along with evidence of compliance.

#### **q. Vulnerability Management Procedure**


- Describes how vulnerabilities are identified, assessed, and remediated.

#### **r. Password Policy**


- Defines requirements for creating, managing, and protecting passwords.

---

### **3. Records (Evidence of Implementation and Operation)**


Records provide proof that the ISMS is being implemented and maintained as planned.
- **Risk Assessment Records**: Evidence of risk assessments conducted.
- **Incident Reports**: Records of security incidents and their resolution.
- **Audit Reports**: Results of internal and external audits.
- **Training Records**: Documentation of employee training and awareness activities.
- **Change Records**: Logs of changes made to systems and processes.
- **Monitoring Logs**: Records of security monitoring activities (e.g., firewall logs, intrusion detection logs).
- **Backup and Recovery Logs**: Evidence of backup and recovery activities.
- **Supplier Agreements**: Contracts with third-party suppliers, including security requirements.

---

### **Summary of Key Documents**


| **Category** | **Examples of Documents** |
|-------------------------------|-----------------------------------------------------------------------------------------|
| **Mandatory Documents** | ISMS scope, Information Security Policy, Risk Assessment, SoA, Risk
Treatment Plan |
| **Supporting Documents** | Asset inventory, Access Control Policy, Incident Management Procedure,
BCP, DRP |
| **Records** | Risk assessment records, incident reports, audit reports, training records |

---

### **Tips for Document Preparation**


1. **Align with ISO 27001 Requirements**: Ensure all documents meet the specific clauses of the standard.
2. **Keep Documents Up-to-Date**: Regularly review and update documents to reflect changes in the
organization or its environment.
3. **Involve Stakeholders**: Collaborate with relevant departments (e.g., IT, HR, legal) to ensure
documents are comprehensive and accurate.
4. **Use Templates**: Leverage ISO 27001 document templates to streamline the documentation process.
5. **Maintain Version Control**: Use a document management system to track revisions and ensure the
latest versions are in use.

---

By preparing and maintaining these documents, organizations can demonstrate compliance with ISO 27001
and successfully achieve certification.

You might also like